cybersecurity Crossword Puzzles
Cybersecurity 3 2024-07-30
Across
- Org at this level perform annual vulnerability scan
- Level 5 in CMM framework
- one of network scanning tool
- ... server - one of the observation class in VA
- ... configuration another observation class in VA
Down
- Team is tasked to conduct testing with objective to break app
- Type of testing which is concerned only with input-output ... box
- PT is by nature ...
- one of the tools used to conduct unauthenticated scan
9 Clues: PT is by nature ... • Level 5 in CMM framework • one of network scanning tool • ... server - one of the observation class in VA • ... configuration another observation class in VA • Org at this level perform annual vulnerability scan • one of the tools used to conduct unauthenticated scan • Team is tasked to conduct testing with objective to break app • ...
CyberSecurity 2 2024-07-24
Across
- New team structure which combines application support and new work
- IAM differentiates between Authenticate and ...
- Non-human identity example
- Category A3 in top 10 application weaknesses
Down
- weakness in application
- Failures related to hardcoded passwords
- faster method of code delivery
- We differentiate betn User and ...
- ISO27000 has 14 different categories of ...
9 Clues: weakness in application • Non-human identity example • faster method of code delivery • We differentiate betn User and ... • Failures related to hardcoded passwords • ISO27000 has 14 different categories of ... • Category A3 in top 10 application weaknesses • IAM differentiates between Authenticate and ... • ...
Cybersecurity Awareness 2024-10-20
Across
- Irrelevant or inappropriate messages sent over the internet.
- Fraudulent scheme, often involving money or personal information.
- A form of phishing using SMS or text messages.
- Theft Stealing personal or sensitive information without permission.
- Engineering Manipulative techniques to trick people into giving up confidential information.
Down
- Two-factor authentication, an extra layer of security for online accounts.
- Fraudulent attempt to obtain sensitive information through deceptive emails.
- Malicious software designed to harm or exploit devices.
- Unauthorized access to data in a system.
9 Clues: Unauthorized access to data in a system. • A form of phishing using SMS or text messages. • Malicious software designed to harm or exploit devices. • Irrelevant or inappropriate messages sent over the internet. • Fraudulent scheme, often involving money or personal information. • Theft Stealing personal or sensitive information without permission. • ...
Cybersecurity Crossword 2023-09-15
Across
- A secure service that connects to another network remotely.
- Should be made up of upper and lower case letters, special characters and numbers.
- Fraudulent emails or messages tricking people into giving up their personal info.
- Someone who breaks into computer systems to obtain unauthorized access to data.
- When a hacker successfully accesses a network or device vulnerabilities and gains access to the device's files and data.
Down
- A type of malware that spreads through computers and corrupts data and software.
- A type of malware that locks users out of their computer in exchange for a ransom.
- A malware that gathers information about a person or organization without their permission.
- Unauthorized access to or from a private network is prevented by this hardware/software.
9 Clues: A secure service that connects to another network remotely. • Someone who breaks into computer systems to obtain unauthorized access to data. • A type of malware that spreads through computers and corrupts data and software. • Fraudulent emails or messages tricking people into giving up their personal info. • ...
Cybersecurity Awarenemss 2025-10-13
Across
- A secret word of phrase used to login to an account.
- phishing attack delivered via text message
- Acronym for Business Email COmpromise, an attack that takes over your business email address
- Fraud that comes from someone inside the organization such as an employee or contractor
- Type of malware that spreads across systems without needing user interaction, also used to bait a hook to catch fish.
Down
- Abbreviation for a Payment Card Industry Data Standard for handling credit card data.
- Voice based phishing attack where scammers impersonate trusted sources over the phone.
- Manipulating people into giving up confidential information through deception or impersonation
- Cyberattack which tricks users into revealing information through fake emails and websites
9 Clues: phishing attack delivered via text message • A secret word of phrase used to login to an account. • Abbreviation for a Payment Card Industry Data Standard for handling credit card data. • Voice based phishing attack where scammers impersonate trusted sources over the phone. • ...
Cybersecurity Crossword 2025-10-12
Across
- Online criminal who tries to steal data
- Always make your password ---- to guess.
- Your secret word to get into an account.
- Online criminal who tries to steal data
Down
- What you should save or copy your files onto (like an external drive).
- A trick where someone pretends to be a company to get your info.
- A bad software that makes your computer sick (like a cold).
- The opposite of strong; a quick-to-guess secret word.
- A scam where bad people trick you for information.
9 Clues: Online criminal who tries to steal data • Always make your password ---- to guess. • Your secret word to get into an account. • Online criminal who tries to steal data • A scam where bad people trick you for information. • The opposite of strong; a quick-to-guess secret word. • A bad software that makes your computer sick (like a cold). • ...
Cybersecurity Month 2022-07-29
Across
- A specifically configured server, also known as decoy server, designed to attract and monitor intruders in a manner such that their actions do not affect production systems
- A malware software that seems legitimate enough that users voluntarily install them onto their computers, allowing the malware to infect their systems.
- a form of cyberattack that infect and spread through computer systems without an action from the user; they can operate on their own and spread by exploiting vulnerabilities within the victim's operating system
- A large number of compromised computers that are used to create and send spam or viruses or flood a network with messages such as a denial-of-service attack
- Finding and exploiting vulnerabilities in a system or on a website
Down
- The process of taking an unencrypted message (plaintext), applying a mathematical function to it (encryption algorithm with a key) and producing an encrypted message (ciphertext)
- This is a type of electronic mail (email) attack that attempts to convince a user that the originator is genuine, by with the intention of obtaining information for use in social engineering
- A highly sophisticated cyber threat as criminals work hard to make spoofed emails and websites appear as realistic and possible
- disrupts computer operations, gathers sensitive information or gains access to private computer systems through the use of code, scripts, active content and other forms of software; abbreviation for malicious software
9 Clues: Finding and exploiting vulnerabilities in a system or on a website • A highly sophisticated cyber threat as criminals work hard to make spoofed emails and websites appear as realistic and possible • A malware software that seems legitimate enough that users voluntarily install them onto their computers, allowing the malware to infect their systems. • ...
Cybersecurity Ylan 2024-11-07
Across
- A test used to verify if a user is human and not a robot.
- A program that protects your computer from viruses.
- Network of devices connected to the internet to exchange data.
- A company that makes equipment and software to help connect and protect computer networks.
- A secret part of the internet, often used for anonymous activities.
Down
- A unique number that identifies a computer or device on the internet or a network.
- A protocol used to connect and control a remote computer.
- A secret word or code to log in.
- A person who tries to break into computers illegally.
9 Clues: A secret word or code to log in. • A program that protects your computer from viruses. • A person who tries to break into computers illegally. • A protocol used to connect and control a remote computer. • A test used to verify if a user is human and not a robot. • Network of devices connected to the internet to exchange data. • ...
JD 2024-12-20
60 Clues: 1 • b • c • 3 • a • v • k • x • i • j • t • 7 • z • 6 • 2 • d • p • m • 5 • f • 4 • y • l • o • j • u • s • 8 • w • g • 9 • e • n • h • q • r • 24 • 30 • 32 • 28 • 10 • 31 • 19 • 27 • 23 • 20 • 22 • 14 • 25 • 12 • 26 • 15 • 18 • 13 • 33 • 16 • 17 • 21 • 29 • 11
Future of Technology 2025-11-17
Across
- Next generation mobile network after 5G
- Protection of computers and networks
- Technology enabling space travel and exploration
- Group of autonomous robots or drones working together
- Discarded electronic devices
- Digital currency and related technologies
- Decentralized digital ledger technology
- Study of genes and DNA manipulation
- Machines that perform tasks autonomously
- Securing data by encoding information
Down
- Immersive computer-generated environment
- A city enhanced with IoT technology
- Augmented reality technology
- Technology using extremely small particles
- Popular cryptocurrency abbreviation
- AI systems that learn from data
- Advanced computing using qubits
- Study of biological systems used in future medicine
- Brain–computer interface technology
- Energy from sustainable sources
20 Clues: Augmented reality technology • Discarded electronic devices • AI systems that learn from data • Advanced computing using qubits • Energy from sustainable sources • A city enhanced with IoT technology • Popular cryptocurrency abbreviation • Study of genes and DNA manipulation • Brain–computer interface technology • Protection of computers and networks • ...
Spanish-English Tech Words (Use - to separate words) 2025-11-21
Across
- Plataforma
- Obsoleto
- Datos
- (Realidad Virutal)
- Motor de busqueda
- Tecnofobo
- Inalamambrico
- Punto de acceso
- Iniciar Session
- Caerse
- Captura de pantalla
- Cargar
- copia de seguridad
- Descargar
- Servidor
- Permitir
- Mejorar
- DEVELOPER Desorallador de software
- Provedor de Internet
Down
- DEVICE Dispositivo Inteligente
- Estar en Linea
- Actualizar
- Tecnologia Ponible
- Adjuntar
- Navegar
- Adricululares
- Ciberseguridad
- Artilugio / Aparato
- BROWSER Navegador
- Gama
- Alta tecnologia
- Red Social
- Registrarse
- Abarcar
- Rastrear
- Ultima Generacion
- Experto Technologico
- Amplio
- Interfaz amigable
- Software Gratuito
40 Clues: Gama • Datos • Caerse • Cargar • Amplio • Navegar • Abarcar • Mejorar • Adjuntar • Obsoleto • Rastrear • Servidor • Permitir • Tecnofobo • Descargar • Plataforma • Actualizar • Red Social • Registrarse • Adricululares • Inalamambrico • Estar en Linea • Ciberseguridad • Alta tecnologia • Punto de acceso • Iniciar Session • Motor de busqueda • BROWSER Navegador • Ultima Generacion • Interfaz amigable • Software Gratuito • Tecnologia Ponible • ...
klausimai 2023-05-17
Across
- Kas yra „object-oriented programming“?
- Kas yra žurnalavimas?
- Kas yra „data cente?
- Kas yra „software development life cycle“?
- Kas yra „operating system“?
- Kas yra „network protocol“?
- Kas yra „serveris“?
- Kas yra „cloud computing“?
- Kas yra „version control“?
- Kas yra „URL“?
- Kas yra „cybersecurity“?
- Kas yra „cache“?
- Kas yra „cyber attack“?
- Kas yra „bug“
- Kas yra „router“?
- Kas yra „firewall“?
Down
- Kas yra „artificial intelligence“?
- Kas yra „RAM“?
- Kas yra „encryption“?
- Kas yra „HTML“?
- Kas yra „API“?
- Kas yra „data backup“?
- Kas yra „malware“?
- Kas yra „database management system“?
- Kas yra algoritmas
- Kas yra duomenų bazė?
- Kas yra „programming language“?
- Kas yra „data mining“?
- Kas yra „open source“?
- Kas yra „user interface“?
30 Clues: Kas yra „bug“ • Kas yra „RAM“? • Kas yra „API“? • Kas yra „URL“? • Kas yra „HTML“? • Kas yra „cache“? • Kas yra „router“? • Kas yra „malware“? • Kas yra algoritmas • Kas yra „serveris“? • Kas yra „firewall“? • Kas yra „data cente? • Kas yra „encryption“? • Kas yra žurnalavimas? • Kas yra duomenų bazė? • Kas yra „data backup“? • Kas yra „data mining“? • Kas yra „open source“? • Kas yra „cyber attack“? • ...
jihana dwi a_xf 18 2025-04-15
Across
- Platform konten digital
- Scientist / Menganalisis data
- Memblokir akses ke situs atau konten
- Memfilter konten negatif
- Konten video di platform digital
- Memblokir konten negatif
- Hak eksklusif penemuan
- Melindungi karya intelektual dan penemuan
- Izin menggunakan karya orang lain
- Cipta / Melindungi karya intelektual
- Tanda produk atau jasa
- Tag yang membantu mesin pencari
- Versi lama halaman web
- Melindungi sistem dari serangan
- Konten menyebar cepat di media sosial
Down
- Operator pencarian lanjutan
- Memeriksa keaslian konten
- Developer / Mengembangkan situs web
- Memblokir akses ke situs atau konten
- Mengembangkan perangkat lunak
- Cari hasil dari situs tertentu
- Mempengaruhi audiens di media sosial
- Cari file dengan tipe tertentu
- Merancang antarmuka pengguna
- Konten digital yang berubah
25 Clues: Hak eksklusif penemuan • Tanda produk atau jasa • Versi lama halaman web • Platform konten digital • Memfilter konten negatif • Memblokir konten negatif • Memeriksa keaslian konten • Operator pencarian lanjutan • Konten digital yang berubah • Merancang antarmuka pengguna • Scientist / Menganalisis data • Mengembangkan perangkat lunak • Cari hasil dari situs tertentu • ...
Jenny and Nate 2023-01-19
Across
- Jenny is the _________ of her siblings
- What God has _______, let not man separate
- State where honeymoon will be
- Relationship of flower girl (Esther) to Jenny
- Name of wedding venue
- ”Mawiage, mawiage, is what ______ us together today”
- Nate’s birthday month
- Jenny's major
- The couple's favorite author, hint: Narnia
Down
- _____ is patient and kind
- Nate’s hometown, hint: rhymes with “mutton”
- Jenny played this sport in high school
- Nate plays this instrument
- Nate's major
- The formal event to declare a marriage
- Jenny’s birthday month
- First date, hint: Omaha Art Museum
- You may now _____ the bride
- Who drinks coffee black? Him or her
- Class Nate and Jenny met in
20 Clues: Nate's major • Jenny's major • Name of wedding venue • Nate’s birthday month • Jenny’s birthday month • _____ is patient and kind • Nate plays this instrument • You may now _____ the bride • Class Nate and Jenny met in • State where honeymoon will be • First date, hint: Omaha Art Museum • Who drinks coffee black? Him or her • Jenny is the _________ of her siblings • ...
Future of Technology 2025-11-17
Across
- Popular cryptocurrency abbreviation
- Study of genes and DNA manipulation
- Immersive computer-generated environment
- Securing data by encoding information
- Machines that perform tasks autonomously
- Decentralized digital ledger technology
- A city enhanced with IoT technology
- Group of autonomous robots or drones working together
- Digital currency and related technologies
- Next generation mobile network after 5G
Down
- Energy from sustainable sources
- Technology enabling space travel and exploration
- Study of biological systems used in future medicine
- Brain–computer interface technology
- Discarded electronic devices
- AI systems that learn from data
- Advanced computing using qubits
- Augmented reality technology
- Protection of computers and networks
- Technology using extremely small particles
20 Clues: Discarded electronic devices • Augmented reality technology • Energy from sustainable sources • AI systems that learn from data • Advanced computing using qubits • Popular cryptocurrency abbreviation • Brain–computer interface technology • Study of genes and DNA manipulation • A city enhanced with IoT technology • Protection of computers and networks • ...
Cybersecurity Fundamental Chapter 7 2024-06-05
Across
- A model used in cybersecurity to describe the stages of an information systems attack.
- Enhancing the security of an individual computer system by securing the operating system, implementing antivirus solutions, and using host-based security tools like firewalls and intrusion detection systems.
- The first stage in the Kill Chain where the attacker gathers information about the target to find vulnerabilities that can be exploited later.
- The process of securing network devices by implementing proven methods such as securing administrative access, maintaining strong passwords, and using secure communication protocols to protect against vulnerabilities and attacks.
- A technology used for tracking and identifying objects using radio waves.
- The fifth stage in the Kill Chain where malware and backdoors are installed on the target system, allowing the attacker to maintain access.
- The second stage in the Kill Chain where the attacker creates an exploit and malicious payload to use against the target.
- The fourth stage in the Kill Chain where the attacker executes the exploit to take advantage of a vulnerability in the target system.
Down
- The process of improving the security of servers by managing remote access, securing privileged accounts, and monitoring services to prevent unauthorized access and attacks.
- The sixth stage in the Kill Chain where the attacker establishes remote control over the compromised target through a command and control channel or server.
- Measures taken to protect physical assets such as network devices, servers, and other infrastructure components from physical threats like theft, vandalism, and natural disasters.
- Implementing security measures to ensure the confidentiality, integrity, and availability of data. This includes file access control and other techniques to protect data from unauthorized access and corruption.
- The final stage in the Kill Chain where the attacker performs malicious actions such as information theft or launching additional attacks from within the network.
- The third stage in the Kill Chain where the attacker sends the exploit and malicious payload to the target, typically through email or other methods.
- Refers to the area or scope of cybersecurity activities and responsibilities, encompassing the protection of systems, networks, and data from cyber threats.
- Measures and practices used to secure end devices such as workstations, servers, IP phones, and access points within a network.
16 Clues: A technology used for tracking and identifying objects using radio waves. • A model used in cybersecurity to describe the stages of an information systems attack. • The second stage in the Kill Chain where the attacker creates an exploit and malicious payload to use against the target. • ...
Computer Basics 2023-04-06
Across
- email scam
- computers talking to computers
- a computer used for math
- instructions for a computer online
- online protection from hackers
- shortcut for linking in a document
Down
- a common output from typing or drawing
- a set of step-by-step instructions
- an input device with letters and numbers
- people that try to take your online inforamtion
- a websites name
- most used search engine
- device that takes an input and gives an output
13 Clues: email scam • a websites name • most used search engine • a computer used for math • computers talking to computers • online protection from hackers • a set of step-by-step instructions • instructions for a computer online • shortcut for linking in a document • a common output from typing or drawing • an input device with letters and numbers • ...
it work 2023-03-24
Across
- pocket sized computer
- information
- data entered into and received by a computer
- practice of protecting a system from digital attacks
- gaining unauthorized access to a system or account
Down
- a programming language
- how a computer displays data
- data that sits outside of the trend
- fraudulent emails sent to obtain personal information
- method of data depiction
10 Clues: information • pocket sized computer • a programming language • method of data depiction • how a computer displays data • data that sits outside of the trend • data entered into and received by a computer • gaining unauthorized access to a system or account • practice of protecting a system from digital attacks • fraudulent emails sent to obtain personal information
dgeconomy 2025-03-12
Across
- Fifth-generation wireless technology
- Protection of digital systems from cyber threats
- Large and complex data sets
- A newly established business
- Secure and decentralized digital ledger
- Immersive virtual reality technology
- Use of technology to perform tasks with minimal human intervention
- Technology overlaying digital images onto the real world
Down
- Electronic system for storing and making transactions
- Internet-based computing services
- Digital or virtual currency
- Technology-driven financial services
- Online buying and selling of goods and services
- Network of connected smart devices
- Machines performing human-like intelligence tasks
15 Clues: Digital or virtual currency • Large and complex data sets • A newly established business • Internet-based computing services • Network of connected smart devices • Fifth-generation wireless technology • Technology-driven financial services • Immersive virtual reality technology • Secure and decentralized digital ledger • Online buying and selling of goods and services • ...
Browsing safety 2025-05-28
Across
- illegal way of gaining money
- technology designed to protect data,networks,programs
- bullying any person online
- hoaxing or misleading someone
- misusing someone's personal information
- criminal activity generally done to harm someone
- developed to make binary more compact
- computer language with 16 digits
Down
- programme designed to remove viruses
- program that disrupts the normal functioning of a computer
- software preventing unauthorized access to our computer
- illegally entering a device or network
- sending the user an email misleading him
- dating a young individual online
- only language understood by computers
15 Clues: bullying any person online • illegal way of gaining money • hoaxing or misleading someone • dating a young individual online • computer language with 16 digits • programme designed to remove viruses • only language understood by computers • developed to make binary more compact • illegally entering a device or network • misusing someone's personal information • ...
Internet Safety Crossword 2021-02-11
Across
- someone who witnesses but doesn't participate
- a person who stands up for someone else
- footprint information about a person found online
- if something makes you feel sad or uncomfortable tell a _______ adult trusted
- bullying using technology
- information information that can identify someone
Down
- securing information on the internet
- good manners online
- can be trusted
- software intended to do damage to computers
- too much information
11 Clues: can be trusted • good manners online • too much information • bullying using technology • securing information on the internet • a person who stands up for someone else • software intended to do damage to computers • someone who witnesses but doesn't participate • footprint information about a person found online • information information that can identify someone • ...
Lilly and Shehan 2024-08-16
Across
- Couples' Favorite country
- Groom's favorite video game
- The groom was the captain of this sport in school
- Brides first workplace
- What field does the groom work in
- Where they first met
Down
- Brides Favorite Food
- Groom's best friend
- Something the bride loves to do
- What did the bride give for the grooms friends to win their approval
- The groom killed this animal out of cute aggression
- where the bride works
- Brides favorite dance move
13 Clues: Groom's best friend • Brides Favorite Food • Where they first met • where the bride works • Brides first workplace • Couples' Favorite country • Brides favorite dance move • Groom's favorite video game • Something the bride loves to do • What field does the groom work in • The groom was the captain of this sport in school • The groom killed this animal out of cute aggression • ...
Production & Process 2024-07-11
Across
- a series of actions or steps taken in order to achieve a particular end result
- Teddy Swims loses this
- American painter Norman _______
- abbreviation for digital transformation
- continually rhymes with domination
- large scale industrial production
Down
- protection from digital attacks
- "baby you can _____ my car"
- for indicating, measuring, and recording physical quantities
- Cirrus, Stratus, Cumulus to name a few
- setting standards for controls and automation
- should always be first
12 Clues: Teddy Swims loses this • should always be first • "baby you can _____ my car" • protection from digital attacks • American painter Norman _______ • large scale industrial production • continually rhymes with domination • Cirrus, Stratus, Cumulus to name a few • abbreviation for digital transformation • setting standards for controls and automation • ...
April Issue Highlights 2022-04-14
8 Clues: ex. HEPA • what a doctor treats • found behind the wall • protects a user's data • down, slowing down usage • often used in food storage • show, type of industry event • a special joint to prevent something from coming apart
Department of Homeland Security Crossword 2024-03-17
8 Clues: Why DOH was created • One strength; quickly • One weakness; complex rules • One strength; brings together • One weakness; limits on funding • Protecting critical infrastructure • Identifying and mitigating terrorist threats • Department which helps guards the USA from threats
Cyberpatriot 2023-02-08
Across
- gives instructions on what to do
- protection of digital assets
- where users are sorted and adjusted
- protects against incoming cyberattacks
Down
- the scrambling of data to protect it
- gives points for answering questions
- where the competition takes place
- file disguised as something else
- software with ill intents
9 Clues: software with ill intents • protection of digital assets • file disguised as something else • gives instructions on what to do • where the competition takes place • where users are sorted and adjusted • the scrambling of data to protect it • gives points for answering questions • protects against incoming cyberattacks
Spanish-English Tech Words (Use - to separate words) 2025-11-21
Across
- Actualizar
- Inalamambrico
- Permitir
- Red Social
- Caerse
- Amplio
- Servidor
- Gama
- Obsoleto
- Provedor de Internet
- Interfaz amigable
- Cargar
- Copia de seguridad
- Adjuntar
- Ultima Generacion
- Alta tecnologia
- Navegar
- Ciberseguridad
- Registrarse
Down
- Tecnologia Ponible
- Mejorar
- Abarcar
- Artilugio / Aparato
- (Realidad Virutal)
- Motor de busqueda
- Rastrear
- Captura de pantalla
- Software Gratuito
- Desorallador de software
- Estar en Linea
- Plataforma
- DEVICE Dispositivo Inteligente
- Iniciar Session
- Navegador
- Descargar
- Tecnofobo
- Datos
- Punto de acceso
- Experto Technologico
- Adricululares
40 Clues: Gama • Datos • Caerse • Amplio • Cargar • Mejorar • Abarcar • Navegar • Rastrear • Permitir • Servidor • Obsoleto • Adjuntar • Navegador • Descargar • Tecnofobo • Actualizar • Red Social • Plataforma • Registrarse • Inalamambrico • Adricululares • Estar en Linea • Ciberseguridad • Iniciar Session • Punto de acceso • Alta tecnologia • Motor de busqueda • Software Gratuito • Interfaz amigable • Ultima Generacion • Tecnologia Ponible • ...
Cyber Security Awareness 2025-04-07
Across
- The act of attempting to crack passwords or keys through exhaustive attempts
- Indian cybersecurity nodal agency
- A person who gains unauthorized access to data
- An Act to provide for the processing of digital personal data
- Phishing attack that uses QR codes to deceive victims and steal sensitive information
- Malicious tool that records keystrokes
- Cyberattack where a cybercriminal pretends to be a trusted entity or individual to gain unauthorised access to sensitive systems, data
- Cyber cell governed by MHA
- Ministry responsible for cybersecurity in India
- An Attack technique used by cybercriminals to steal sensitive financial information from individuals and businesses without their knowledge
- Cybercriminals pose as law enforcement officers or government officials and contact individuals
- Fix released to remove software vulnerabilities
Down
- A type of software designed to damage or disrupt systems
- A fake site mimicking a legitimate one
- Data encrypted to prevent unauthorized access
- Telecom Regulatory Authority of India (TRAI) portal, which helps users report fraudulent phone numbers
- Attack where users are tricked into giving up confidential info
- Type of attack exploiting human psychology
- Unwanted software designed to throw ads
- Powerful technology merging "deep learning" and "fake“, can be used to create incredibly realistic manipulated media
- Telecom Regulatory Authority of India (TRAI) portal, which helps users to report suspicious incoming international calls
- India's initiative for citizen cyber hygiene and digital cleanliness
- Type of software that tracks user activity without consent
- Cyber Crisis Management Plan
- Multi-Factor Authentication
- Unwanted or unsolicited emails, often used for phishing
- Organization responsible for critical infra protection in India
- Indian law governing IT offences
28 Clues: Cyber cell governed by MHA • Multi-Factor Authentication • Cyber Crisis Management Plan • Indian law governing IT offences • Indian cybersecurity nodal agency • A fake site mimicking a legitimate one • Malicious tool that records keystrokes • Unwanted software designed to throw ads • Type of attack exploiting human psychology • Data encrypted to prevent unauthorized access • ...
Chapter 2 - Cybersecurity Threat Landscape 2025-09-08
Across
- attacks seeking to extort money or other concessions from victims by threatening to release sensitive information or launching further attacks
- the set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment
- attack that attempts to compromise devices, systems, or software before it even reaches the organization
- attacks motivated by organizations seeking to steal secret information from other organizations
- attack that occurs when an employee, contractor, vendor, or other individual with authorized access to information and systems uses that access to wage an attack
- a geographic view of threat intelligence
- an anonymous network created through encryption technology and often used for illicit activity
- attacks by actors hacking into either foreign governments or corporations
- attacks motivated by a desire to get even with an individual or organization by exacting retribution against them
- attacks seeking to take down or interrupt critical systems or networks
- term for attackers who use hacking techniques but have limited skills; aka script kiddie
- threat actor that comes from within our own environment
Down
- attacks motivated by a desire to expose vulnerabilities and improve security
- attack in which access to sensitive information is gained and then removed from an organization
- attacker who uses hacking techniques to accomplish an activist goal
- includes information like the severity, fixes, and other information useful for both attackers and defenders
- the path or means by which an attack can gain access to a target in order to cause harm
- threat actor that exists outside organizations: competitors, criminals, and the curious
- threat intelligence that is acquired from publicly available sources
- attacks on a system that exploits vulnerabilities that are unknown to others, including the vendor
- the study of the methods used by cybersecurity adversaries when engaging in attacks
21 Clues: a geographic view of threat intelligence • threat actor that comes from within our own environment • attacker who uses hacking techniques to accomplish an activist goal • threat intelligence that is acquired from publicly available sources • attacks seeking to take down or interrupt critical systems or networks • ...
Hack me! 2025-01-29
7 Clues: what infosec manages • free password manager • another word for infosec • read something encrypted • hash, but without potatoes • antivirus, global outage in '24 • common encoding for sending data
Cybersecurity Crossword 2022-12-16
Across
- a relatively new cyberattack technique that injects malicious code within digital ads
- a malware type in which security mechanism is bypassed to access a system
- a type of malware which replicates from one computer to another
- refer to the weak point in software code which can be exploited by a threat actor. They are most commonly found in an application like SaaS (Software as a service) software.
- the person who explores methods for breaching defenses and exploiting weaknesses in a computer system or network
Down
- a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid
- a cybercrime that happens when someone impersonates a trusted contact or brand, pretending to be someone you trust in order to access sensitive personal information
- refers to any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems
- an attack that attempts to steal your money, or your identity, by getting you to reveal personal information on websites that pretend to be legitimate
9 Clues: a type of malware which replicates from one computer to another • a malware type in which security mechanism is bypassed to access a system • a relatively new cyberattack technique that injects malicious code within digital ads • the person who explores methods for breaching defenses and exploiting weaknesses in a computer system or network • ...
Cybersecurity vocab 2021-09-28
Across
- available to anyone
- The process of validating a user.
- A type of hacking that uses every combination or guess to gain authorization.
- when users cycle through multiple roles.
- when trust relationship is considered two way.
- used to decrypt data and given to one person.
Down
- what you leave behind on the internet.
- the measurement or analysis of a biological feature to validate a user.
- when credentials are falsely authorized.
9 Clues: available to anyone • The process of validating a user. • what you leave behind on the internet. • when credentials are falsely authorized. • when users cycle through multiple roles. • used to decrypt data and given to one person. • when trust relationship is considered two way. • the measurement or analysis of a biological feature to validate a user. • ...
Cybersecurity Crossword 2023-02-15
Across
- A method cyber criminals use to lure you into giving away personal information by disguising as people you trust
- The practice of defending computers, mobile devices and IT systems against cyber criminals
- A series of letters, numbers and symbols to protect your device and online accounts
- The act of using more than one type of information to identify who you are in order to grant access to your online account
Down
- A type of malware that blocks access to computer file until a ransom is paid
- A type of code or programme that can cause your device to slow down or malfunction
- The act of ensuring your account/device is using the latest software
- An icon that suggests the website is safe
- A dishonest scheme to cheat you of your data or money
9 Clues: An icon that suggests the website is safe • A dishonest scheme to cheat you of your data or money • The act of ensuring your account/device is using the latest software • A type of malware that blocks access to computer file until a ransom is paid • A type of code or programme that can cause your device to slow down or malfunction • ...
Cybersecurity Month 2016-10-03
Across
- A highly skilled computer expert involved with circumvention of computer security
- Defrauding an online account holder of personal or financial information by posing as a legitimate company, typically via a fake email
- A type of malware that is often disguised as legitimate software
- Software that is intended to damage or disable computers and computer systems
- A part of a computer network that is designed to block unauthorized access while permitting outward communication
- Code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
- A type of fraud that targets high-profile end users such as C-level corporate executives, politicians and celebrities
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- A self-replicating computer program that penetrates an operating system with the intent of spreading malicious code
9 Clues: A type of malware that is often disguised as legitimate software • Software that is intended to damage or disable computers and computer systems • A highly skilled computer expert involved with circumvention of computer security • A type of malicious software designed to block access to a computer system until a sum of money is paid • ...
Cybersecurity Crossword 2022-05-10
Across
- malware that spreads by users from an infected device to the rest of the devices on a system
- pretending to be someone you trust in order to get you to visit a fake site and enter private info
- malicious software including viruses and ransomware running on your device
- unethical distribution of mass digital messages
- that accesses or controls a device without being detected
Down
- when someone steals your personal info and uses it for fraud
- a type of virus that does not rely on users to copy and paste but can replicate itself once in a system
- malware that prevents you from accessing your files and demands money for their return
- malware disguised as a trusted source that convinces a user to open a link or attachment
9 Clues: unethical distribution of mass digital messages • that accesses or controls a device without being detected • when someone steals your personal info and uses it for fraud • malicious software including viruses and ransomware running on your device • malware that prevents you from accessing your files and demands money for their return • ...
Cybersecurity Crossword 2023-09-28
Across
- A software installed on your computer that's used to keep intruders out.
- The _____ Man is an award winning security awareness series on KnowBe4.
- Virtual Private network
- A Data ____ is when a hacker successfully attacks a business, gaining control of it's network.
- If your computer gets this, it could change, corrupt, or destroy information.
Down
- Two-factor _________ is an extra layer of protection used to ensure the security of online accounts..
- Wi-Fi Access points that allow users to connect to the internet while away from home. Can be vulnerable to threats.
- A scam where a hacker poses as a legitimate business or organization in order to fool someone into giving over their personal information.
- A name commonly given to unsolicited emails
9 Clues: Virtual Private network • A name commonly given to unsolicited emails • The _____ Man is an award winning security awareness series on KnowBe4. • A software installed on your computer that's used to keep intruders out. • If your computer gets this, it could change, corrupt, or destroy information. • ...
Cybersecurity Crossword 2023-09-14
Across
- Protecting your online data and information.
- Learning about online threats and how to protect against them.
- A protective barrier for your computer or network
- Malicious software that can harm your computer.
Down
- Sending deceptive emails to trick people into revealing information.
- Unauthorized access to someone's computer or accounts.
- The practice of tracking and monitoring online activities.
- A secret code used to access your online accounts
- Keeping your personal information and data safe.
9 Clues: Protecting your online data and information. • Malicious software that can harm your computer. • Keeping your personal information and data safe. • A secret code used to access your online accounts • A protective barrier for your computer or network • Unauthorized access to someone's computer or accounts. • The practice of tracking and monitoring online activities. • ...
Crossword: Cybersecurity 2023-11-09
Across
- the current era characterized by widespread use of digital technology
- a person who uses computers to gain unauthorized access to data.
- a computer program that records every keystroke made by a computer user,
- concept of protecting computer systems, networks, and data from theft, damage, or unauthorized access
Down
- a type of disk storage composed of a thin and flexible disk of a magnetic storage medium
- Malicious software designed to spread from one computer to another
- a type of crime involving a computer or a computer network
- various types of malicious software, including viruses, worms, and spyware.
- process of converting information into a code to prevent unauthorized access
9 Clues: a type of crime involving a computer or a computer network • a person who uses computers to gain unauthorized access to data. • Malicious software designed to spread from one computer to another • the current era characterized by widespread use of digital technology • a computer program that records every keystroke made by a computer user, • ...
Cybersecurity puzzle 2024-09-15
Across
- Always make sure your software is _____. (7 letters)
- The bad software that locks your files until you pay money. (9 letters)
- A special word or code used to protect accounts. (8 letters)
- A program that can harm your computer. (5 letters)
- A device we use to connect to the internet. (8 letters)
- A trick someone uses online to get your personal information. (7 letters)
Down
- Don’t open suspicious _____. They might have viruses. (7 letters)
- Keep your _____ private and never share it with others. (8 letters)
- Software that helps protect your computer from bad programs. (10 letters)
9 Clues: A program that can harm your computer. (5 letters) • Always make sure your software is _____. (7 letters) • A device we use to connect to the internet. (8 letters) • A special word or code used to protect accounts. (8 letters) • Don’t open suspicious _____. They might have viruses. (7 letters) • Keep your _____ private and never share it with others. (8 letters) • ...
Cybersecurity Awareness 2024-10-20
Across
- Fraudulent scheme, often involving money or personal information.
- Stealing personal or sensitive information without permission.
- Fraudulent attempt to obtain sensitive information through deceptive emails.
- Malicious software designed to harm or exploit devices.
Down
- A form of phishing using SMS or text messages.
- Two-factor authentication, an extra layer of security for online accounts.
- Unauthorized access to data in a system.
- Manipulative techniques to trick people into giving up confidential information.
- Irrelevant or inappropriate messages sent over the internet.
9 Clues: Unauthorized access to data in a system. • A form of phishing using SMS or text messages. • Malicious software designed to harm or exploit devices. • Irrelevant or inappropriate messages sent over the internet. • Stealing personal or sensitive information without permission. • Fraudulent scheme, often involving money or personal information. • ...
Automotive cybersecurity 2025-08-05
Across
- group represents the characteristics of a vulnerability that may change over time.
- Control the body and disable the braking system.
- Track the vehicle, open the door, start the engine, and drive away.
- The requirement for users to participate in the compromise of a vulnerable component.
Down
- effects of an exploited vulnerability on the component.
- The context by which vulnerability is being attacked.
- The conditions that must exist to exploit the vulnerability
- Connected vehicles invades location privacy.
- level is an essential factor for vulnerability prioritization.
9 Clues: Connected vehicles invades location privacy. • Control the body and disable the braking system. • The context by which vulnerability is being attacked. • effects of an exploited vulnerability on the component. • The conditions that must exist to exploit the vulnerability • level is an essential factor for vulnerability prioritization. • ...
Cybersecurity (Ans) 2025-08-01
Across
- _____es infect you and make you sick
- A piece of material used to mend a weak point
- A person or thing likely to cause damage or danger
- In greek mythology, there was a wooden horse called the ______ horse.
- An invertebrate animal with long, slender soft bodies and no limbs.
Down
- The process of converting information into a code to prevent unauthorized access.
- Sounds like 'fishing'
- To make use of a situation in a way considered unfair
- Opposite of defend
9 Clues: Opposite of defend • Sounds like 'fishing' • _____es infect you and make you sick • A piece of material used to mend a weak point • A person or thing likely to cause damage or danger • To make use of a situation in a way considered unfair • An invertebrate animal with long, slender soft bodies and no limbs. • ...
ILOVEYOU Virus 2025-03-27
Across
- Process after the virus attack
- What the virus did to data
- Method to prevent malicious emails
- ILOVEYOU’s lasting impact on cybersecurity
- Email provider impacted
- Key strategy in the virus’s success
- Scale of the ILOVEYOU virus impact
- Email client targeted for spreading
- Country where the virus originated
- Language exploited in the attack
- Alleged author of the virus
- Self-replicating malware type
- File included in the malicious email
- How the virus moved between systems
- Software designed to detect and remove threats
- Mass email tactic used by the virus
- Term for amateur hackers
- Primary method of infection
- Another name for the ILOVEYOU virus
- UK government entity affected
- Trickery used to deceive victims
- Security measure against malware
- Company whose software was affected
Down
- The virus affected computers worldwide
- Set of programming instructions
- Impact of the virus on files
- General term for harmful software
- Fix used to prevent infection
- Unauthorized system access
- One of the virus’s creators
- How some perceived the virus at first
- Disguised malware that tricks users
- Programming language used in the virus
- Malicious software that spreads between computers
- Windows component altered by the virus
- Term for computers affected by malware
- Investigated the virus attack
- Industry responding to the attack
- How the virus damaged files
- US government organization affected
- Characteristic of the ILOVEYOU virus
- Effect on user files
- Infamous computer worm from 2000
- Operating system vulnerable to the virus
- Microsoft’s email service affected
- Malicious digital assault
- Automation process exploited by the virus
- Deceptive practice related to cybercrime
- ILOVEYOU email subject line
49 Clues: Effect on user files • Email provider impacted • Term for amateur hackers • Malicious digital assault • What the virus did to data • Unauthorized system access • One of the virus’s creators • How the virus damaged files • Alleged author of the virus • Primary method of infection • ILOVEYOU email subject line • Impact of the virus on files • Fix used to prevent infection • ...
Black Hat Crossword 2020-07-27
IT Application and Emerging Technologies - crossword Puzzel 2025-09-15
Across
- Virtual environment for immersive experience
- A decentralized digital currency
- Machines simulating human intelligence
- Computers designed to mimic the human brain
- Smart devices connected via the internet (3)
- Technology enabling virtual meetings
- Protects against cyber threats
- Collection and analysis of huge data sets
- Ability of machines to learn from data
Down
- Tracking technology used in logistics and shopping
- Replacing paper-based systems with computers (11)
- Sharing resources over the internet
- 3D _________, used in manufacturing
13 Clues: Protects against cyber threats • A decentralized digital currency • Sharing resources over the internet • 3D _________, used in manufacturing • Technology enabling virtual meetings • Machines simulating human intelligence • Ability of machines to learn from data • Collection and analysis of huge data sets • Computers designed to mimic the human brain • ...
CSN Turkeyday Puzzle 2021-11-24
Across
- Carbonblack and crowdstrike are ____ tools
- Swimlane and Phantom/splunk are ____ tools
- Twenty leaves and purple
- Only company in the US that specialized soley in cybersecurity hiring
- Anonymous by design, removing unconscious bias and fear of reprisal
- Intune, sentinel, and AD are in this cloud
Down
- Incident responders may have the responsibility to extract and analyze _______
- K8s
- A CI/CD Engineer or Container Engineer
- Find and be _____
- Cloud automation, Monty, and not Perl
- _____ your career
- Ubuntu and CentOS are ____ variants
13 Clues: K8s • Find and be _____ • _____ your career • Twenty leaves and purple • Ubuntu and CentOS are ____ variants • Cloud automation, Monty, and not Perl • A CI/CD Engineer or Container Engineer • Carbonblack and crowdstrike are ____ tools • Swimlane and Phantom/splunk are ____ tools • Intune, sentinel, and AD are in this cloud • ...
Cybersecurity Unit - Vocabulary Crossword 2023-04-25
Across
- Using someone else’s work and claiming it is your own
- A type of online threat where a fake website is used to try and trick people into providing personal information.
- Settings on social media that limit who can see your online activity.
- The right to be free of undue intrusion.
- Computer programs designed to protect your computer from online threats, like viruses and other malicious software.
- An illegal use of copyrighted material.
- Original work that is not protected by copyright and is free to use without permission is known to be in this.
Down
- A type of malware that is spread through human interaction, usually by clicking on an infected attachment, download, or link.
- A setting online or on social media that prevents another user from seeing your profile or contacting you in any way.
- An online community of people with like interests
- The exclusive right to make copies. This automatically applies to original work.
- Formal ways to give credit to an original creator or author.
- These are guidelines for using copyright-protected work in a specific way and for a specific purpose, like a school project, to avoid copyright infringement.
- Malicious Software.
- A permanent record of all of your online activity.
- A detailed report on someone’s actions and behaviors
- A type of online threat where a fake email is used to try and trick people into clicking and providing personal information.
- A type of malware that is difficult to detect and secretly watches what you do online. Some versions can copy your keystrokes.
- A type of malware that looks like a trustworthy file or program but isn’t. Insidious malware.
- A type of malware that self-replicates and spreads without human interaction. Can use up all of your RAM and make your computer freeze and become unusable.
20 Clues: Malicious Software. • An illegal use of copyrighted material. • The right to be free of undue intrusion. • An online community of people with like interests • A permanent record of all of your online activity. • A detailed report on someone’s actions and behaviors • Using someone else’s work and claiming it is your own • ...
cybersecurity crossword by perla 2022-05-23
Across
- a wireless technology for exchanging data over short distances.
- Computer viruses are small programs or scripts that can negatively affect the health of your computer
- A technology that allows us to access our files and/or services through the internet from anywhere in the world
- A copy of data and/or applications contained in the IT stored on magnetic media outside of the IT to be used in the event IT data are lost.
- Any circumstance or event with the potential to adversely impact an information system through unauthorized access, destruction, disclosure, modification of data, and/or denial of service
- the determining factor in the classification of an enclave of servers/computers
- An audio or video clip that has been edited and manipulated to seem real or believable.
- A network point that acts as an entrance to another network
- Type of surveillance software that has the capability to record every key stroke you make on a Log file, usually encrypted
- Any program that acts to produce copies of itself. Examples include; a program, a worm, or virus.
- Encryption is the process of converting data to an unrecognizable or "encrypted" form. It is commonly used to protect sensitive information so that only authorized parties can view it
- Unauthorized act of bypassing the security mechanisms of a system.
- Software that is intended to damage or disable computers and computer systems
- An attempt to gather information about an information system for the apparent purpose of circumventing its security controls.
- the science that deals with the logic of form, quantity, and disposition
- A feature or defect of a computer system that allows surreptitious unauthorized access to data
- A bot is an automated program that runs over the Internet
- A decoy system or network that serves to attract potential attackers.
Down
- The activity of defrauding an online account holder of financial information by posing as a legitimate company
- Is global system of interconnected computer networks that use the internet protocol suite
- A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- a term used to describe any fraudulent business or scheme that takes money or other goods from an unsuspecting person.
- A hacker security tool that captures passwords and message traffic to and from a computer.
- A block of data sent over the network transmitting the identities of the sending and receiving stations, error-control information, and message.
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
- Is the body of technology's, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
- It acts as a barrier between a trusted system or network and outside connections, such as the Internet.
- a process that ensures and confirms a user’s identity.
- Self replicating virus that does not alter files but resides in active memory and duplicates itself
- Type of incident involving insertion of a large volume of data resulting in denial of service.
- A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.
- A person who uses computers to gain unauthorized access to data
- A weakness in automated system security procedures, technical controls, environmental controls, administrative controls, internal controls, etc., that could be used as an entry point to gain unauthorized access to information or disrupt critical processing.
- Software agent that performs a function or operation on behalf of another application or system while hiding the details involved.
- To indiscriminately send unsolicited, unwanted, irrelevant, or inappropriate messages, especially commercial advertising in mass quantities.
- a way for the website to recognize you and keep track of your preferences.
- Software that enables a user to obtain convert information about another's computer activities by transmitting data from their hard drive
37 Clues: a process that ensures and confirms a user’s identity. • A bot is an automated program that runs over the Internet • A network point that acts as an entrance to another network • a wireless technology for exchanging data over short distances. • A person who uses computers to gain unauthorized access to data • ...
2023 Cybersecurity Awareness Month 2023-10-06
Across
- A process or measure used to verify a user's identity.
- Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
- Unsolicited emails sent to many addresses.
- Converting data into a form that cannot be easily understood by unauthorized people.
- A mechanism for creating a secure connection between a computing device and a computer network.
- A cybersecurity risk that originates from within an organization.
- The ability of individuals to understand and exercise control over how information about themselves may be used by others.
- Software designed to block malware from entering protected networks.
- An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
- An unauthorized user who attempts to or gains access to an information system.
- Faking the sending address of a transmission to gain illegal entry into a secure system.
- A collection of computers compromised by malicious code and controlled across a network.
- A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
Down
- Software that compromises the operation of a system by performing an unauthorized function or process.
- A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
- Part of the internet that isn't indexed by search engines.
- The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization.
- Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
- The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
- Computer programs that can block, detect, and remove viruses and other malware.
- A flaw or weakness in an information system that could be exploited.
- A type of malware that denies a user's access to a system or data until a sum of money is paid
22 Clues: Unsolicited emails sent to many addresses. • A process or measure used to verify a user's identity. • Part of the internet that isn't indexed by search engines. • A cybersecurity risk that originates from within an organization. • A flaw or weakness in an information system that could be exploited. • ...
Cybersecurity Awareness Month 2024 2024-09-24
Across
- Pop-up malware intent on using fear tactics to get you to perform an action.
- Data must be accessible when you need them. Part of the CIA triad.
- The trustworthiness that data have not been altered or modified by unauthorized users. Part of the CIA triad.
- A flaw in a system that can enable an adversary to compromise the security of that system.
- A type of threat that includes authorized system users and disgruntled employees.
- "Good guy" hackers.
- A popular, but not-so-secure, policy where users can use their personal smart devices to conduct business.
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a system.
- Multiple compromised systems under the control of a single attacker.
- A device that permits the flow of authorized data, while keeping unauthorized data out.
- A vulnerability or exploit that is unknown to software developers and security professionals.
- A team that acts as the adversary during a security assessment.
- Using fraudulent e-mails to trick recipients into providing sensitive information or taking a deliberate action.
- The broad term for nontraditional, internet-connected smart devices.
- A network of devices created for the sole purpose of luring in an attacker.
- A protocol used to ensure time synchronization between devices.
Down
- The act of moving around, looking for vulnerable Wi-Fi networks.
- Hardware and/or software used to capture and record key strokes.
- Spear phishing aimed at high-profile targets such as executives.
- Cryptography that uses two different keys for encryption and decryption.
- Information that can be used to distinguish an individual’s identity.
- The act of applying a fix to a software defect.
- An (abbreviated) attack where a malicious actor sits in-between two parties, intercepting communications.
- Cryptography that uses the same shared secret key for both encryption and decryption.
- An attack from multiple compromised systems that target a single system, service, or application.
- Malware intent on holding your data hostage in an attempt to extort money.
- Protecting of information from unauthorized access. Part of the CIA triad.
- A team usually involved with the defense of the organization’s infrastructure.
- An old method programmers use to bypass security to gain access to a system or software. "War Games"
- "Bad guy" hackers.
- An isolated environment used by security professionals to run suspicious code or to "detonate" potential malware.
31 Clues: "Bad guy" hackers. • "Good guy" hackers. • The act of applying a fix to a software defect. • A team that acts as the adversary during a security assessment. • A protocol used to ensure time synchronization between devices. • The act of moving around, looking for vulnerable Wi-Fi networks. • Hardware and/or software used to capture and record key strokes. • ...
Cybersecurity Ethics, Laws & Standards 2025-10-09
Across
- unauthorized access to computer systems
- moral principles that govern a person's behavior or actions
- policy that defines proper and improper use of technology and networks
- process of converting data into a code to prevent unauthorized access
- copies of data stored separately for recovery in case of loss
- using someone else's work without giving proper credit
- law that protects sensitive health information
- coordinates international cybercrime investigations
- security process requiring two separate forms of identification
- online platforms for sharing content and communication
- software designed to damage or disrupt a computer system
- legal right that grants the creator control over their work
- network security system that monitors and controls incoming and outgoing traffic
Down
- criminal activity carried out using computers or the internet
- trail of data created by a person’s online activity
- software that secretly monitors user activity
- option that controls who can see your online information
- protects us critical infrastructure from cyber threats
- deceptive attempt to obtain sensitive information by pretending to be a trustworthy source
- unauthorized access and release of confidential information
- using digital technology to harass or intimidate someone
- crime of obtaining someone’s personal information to commit fraud
- manipulating people to give up confidential information
- study of ethical issues surrounding computer use
- protects student education records and data
- a secret word or phrase used to gain access to a system
- software designed to detect and remove malicious programs
- malware that locks users out of their files until a payment is made
- update to software that fixes vulnerabilities or bugs
- proper and respectful behavior when communicating online
- practices and steps taken to maintain system health and improve security
- internet crime complaint center that accepts and investigates online crime reports
32 Clues: unauthorized access to computer systems • protects student education records and data • software that secretly monitors user activity • law that protects sensitive health information • study of ethical issues surrounding computer use • trail of data created by a person’s online activity • coordinates international cybercrime investigations • ...
2025 Cybersecurity Awareness Month 2025-09-24
Across
- Software that displays unwanted advertisements.
- A vulnerability unknown to those who should mitigate it.
- Network security system that monitors and controls incoming and outgoing traffic.
- System that aggregates and analyzes security data.
- Software update that fixes vulnerabilities.
- Malware disguised as legitimate software.
- Symmetric encryption standard used worldwide.
- Unauthorized transmission of sensitive information.
- Isolated environment for testing suspicious code.
- Framework for managing digital identities.
- Routine practices to maintain security health.
- Simulated attack to evaluate system security.
- Security broker between users and cloud services.
- Security method requiring multiple forms of verification.
- Software that secretly gathers user information.
- Protocol for secure communication over networks.
- Attack method that tries every possible password combination.
Down
- Psychological manipulation to trick users into giving up confidential info.
- General term for malicious software.
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- Malware that encrypts data and demands payment for its release.
- Prolonged and targeted cyberattack.
- Creates a secure connection over the internet.
- Malware that hides its presence from detection.
- Process of converting data into a coded format.
- Controls access to privileged accounts.
- Network of infected devices controlled remotely.
- Malware that replicates itself to spread.
- Hidden method of bypassing normal authentication.
- Converts data into a fixed-size string.
30 Clues: Prolonged and targeted cyberattack. • General term for malicious software. • Controls access to privileged accounts. • Converts data into a fixed-size string. • Malware disguised as legitimate software. • Malware that replicates itself to spread. • Framework for managing digital identities. • Software update that fixes vulnerabilities. • ...
February Huddle 2025-02-21
Across
- If our new brand fonts are not available, we should use _____
- Your one-stop-shop for brand-related materials
- Recently promoted to CRO
- Our new intranet features a ________________ resources column.
Down
- Confidence and _________
- Cybersecurity Training is due ____________ 3rd
- Recently promoted to CSO
- ISE 2025 was held in ____________
- ______ are due February 28th
- Germany's discount platform is _____________
- India's discount platform is ___________
11 Clues: Confidence and _________ • Recently promoted to CSO • Recently promoted to CRO • ______ are due February 28th • ISE 2025 was held in ____________ • India's discount platform is ___________ • Germany's discount platform is _____________ • Cybersecurity Training is due ____________ 3rd • Your one-stop-shop for brand-related materials • ...
bytetrails7 2025-02-25
Across
- Storing data over the internet
- Protecting data from unauthorized access
- Software managing hardware and software resources
- Virtual representation of physical hardware
Down
- Device that connects multiple networks
- A column in a table
- Secures data by converting it to a coded form
- Smallest unit of data in computing
- High-level programming language
- Set of vertices connected by edges
10 Clues: A column in a table • Storing data over the internet • High-level programming language • Smallest unit of data in computing • Set of vertices connected by edges • Device that connects multiple networks • Protecting data from unauthorized access • Virtual representation of physical hardware • Secures data by converting it to a coded form • ...
ONBOARDING 2025-10-06
Across
- A barrier that blocks malicious network traffic
- Core principle of honesty and moral conduct
- Unexpected danger or uncertainty that may cause loss
- Protection against unauthorized access to computer systems
- Ensuring responsibility and answerability
Down
- Planning for potential future risks
- Professional review of compliance and controls
- Safeguard for confidential information
- Evidence-based evaluation in auditing
- Moralprinciple guiding fair behavior
10 Clues: Planning for potential future risks • Moralprinciple guiding fair behavior • Evidence-based evaluation in auditing • Safeguard for confidential information • Ensuring responsibility and answerability • Core principle of honesty and moral conduct • Professional review of compliance and controls • A barrier that blocks malicious network traffic • ...
ONBOARDING 2025-10-06
Across
- A barrier that blocks malicious network traffic
- Core principle of honesty and moral conduct
- Unexpected danger or uncertainty that may cause loss
- Protection against unauthorized access to computer systems
- Ensuring responsibility and answerability
Down
- Planning for potential future risks
- Professional review of compliance and controls
- Safeguard for confidential information
- Evidence-based evaluation in auditing
- Moralprinciple guiding fair behavior
10 Clues: Planning for potential future risks • Moralprinciple guiding fair behavior • Evidence-based evaluation in auditing • Safeguard for confidential information • Ensuring responsibility and answerability • Core principle of honesty and moral conduct • Professional review of compliance and controls • A barrier that blocks malicious network traffic • ...
TTS INFORMATIKA (Dipta 8D) 2025-10-13
Across
- Kondisi komputer yang berhenti bekerja mendadak
- Papan utama tempat semua komponen komputer terhubung
- Jalan pintas untuk membuka file atau aplikasi
- Keluar dari sistem komputer
Down
- Keamanan dunia maya
- Tampilan awal layar komputer
- Mode menyimpan data sebelum komputer dimatikan
- Sistem keamanan jaringan untuk mencegah akses tidak sah
- Jenis malware yang menular ke file
- Program untuk mengatur unduhan
10 Clues: Keamanan dunia maya • Keluar dari sistem komputer • Tampilan awal layar komputer • Program untuk mengatur unduhan • Jenis malware yang menular ke file • Jalan pintas untuk membuka file atau aplikasi • Mode menyimpan data sebelum komputer dimatikan • Kondisi komputer yang berhenti bekerja mendadak • Papan utama tempat semua komponen komputer terhubung • ...
Safety & Risk Awareness Month 2025-10-12
Across
- Formal review to ensure standards are met.
- Screenings to monitor health & well-being.
- Ensures a safe remote work environment.
- Word or phrase used to access systems.
- A proactive measure to prevent incidents.
- The state of being informed and alert.
- Protecting systems from online threats.
Down
- Process of identifying potential hazards.
- Keeping sensitive data safe from exposure.
- Understanding potential risks.
- A scam email pretending to be legitimate.
- Measures taken to avoid danger or harm.
- Possibility of loss or harm.
- Digitally altered video.
- Valuable digital information.
- Adhering to rules and regulations.
16 Clues: Digitally altered video. • Possibility of loss or harm. • Valuable digital information. • Understanding potential risks. • Adhering to rules and regulations. • Word or phrase used to access systems. • The state of being informed and alert. • Ensures a safe remote work environment. • Measures taken to avoid danger or harm. • Protecting systems from online threats. • ...
Crossword 2024-04-18
Across
- a device to separate your network
- different word for a trial version
- where data is stored on a pc
- is also an island
- most important software on a pc
Down
- a system for redundant storage
- protects your pc from attacks
- a program that isnt what it claims to be
- a common peripheral
- the prominent layer 2 protokol
10 Clues: is also an island • a common peripheral • where data is stored on a pc • protects your pc from attacks • a system for redundant storage • the prominent layer 2 protokol • most important software on a pc • a device to separate your network • different word for a trial version • a program that isnt what it claims to be
ONBOARDING 2025-10-06
Across
- Core principle of honesty and moral conduct
- Evidence-based evaluation in auditing
- Protection against unauthorized access to computer systems
- Moralprinciple guiding fair behavior
- Planning for potential future risks
Down
- A barrier that blocks malicious network traffic
- Ensuring responsibility and answerability
- Unexpected danger or uncertainty that may cause loss
- Professional review of compliance and controls
- Safeguard for confidential information
10 Clues: Planning for potential future risks • Moralprinciple guiding fair behavior • Evidence-based evaluation in auditing • Safeguard for confidential information • Ensuring responsibility and answerability • Core principle of honesty and moral conduct • Professional review of compliance and controls • A barrier that blocks malicious network traffic • ...
Participation | Cybersecurity Crossword Puzzle 2023-03-13
Across
- Malware that can reproduce itself
- phishing that targets a specific individual
- program that is run entirely from the network
- encrypted parts of the internet
- hacker poses as a legitimate business
- attack on a computer system
- technology used to keep intruders out
- breach hacker successfully breaking into a system
- Coding used to protect your information
- computer infected with a virus
Down
- contains items that are temporarily blocked
- capture of data as its being transmitted
- process of identifying a user
- a private network across a public network
- records keystrokes made on a computer
- malware that hijacks your system
- malware used by hackers to spy on you
- tricked into clicking on a object on a web page
- hacker changes the IP address of an email
- video that has been altered to make it authentic
20 Clues: attack on a computer system • process of identifying a user • computer infected with a virus • encrypted parts of the internet • malware that hijacks your system • Malware that can reproduce itself • records keystrokes made on a computer • malware used by hackers to spy on you • hacker poses as a legitimate business • technology used to keep intruders out • ...
NOVA Cybersecurity Lab Glossary 2022-10-03
Across
- a fictional virus modeled after the Stuxnet virus that is able to damage physical infrastructure.
- extra copies of computer files that can be used to restore files that are lost or damaged.
- a computer program that can copy itself and cause harm in various ways, such as stealing private
- the amount of data that can pass through a network or part of a network per second.
- or destroying data.
- a computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
- a flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
- someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
- a company or organization that gives users and devices access to the Internet.
- two or more interconnected devices that can exchange data.
Down
- a type of malware that holds victims’ computer files hostage by locking access to them or encrypting them.
- a distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
- attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
- code written in a programming language that instructs computers to perform specific tasks.
- a type of connection between devices that can exchange information and power supply.
- a data storage device that is used to store, back up, and transfer computer files.
- multiple computers on a network that are infected with a program that can be controlled remotely.
- software designed to block malware from entering protected networks.
- programs that harm computers, networks, or people.
- viruses, worms, ransomware, and other
- unsolicited emails sent to many addresses in order to make money through advertising or identity theft.
- a piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
- the process of using codes to make readable information unreadable.
23 Clues: or destroying data. • viruses, worms, ransomware, and other • programs that harm computers, networks, or people. • two or more interconnected devices that can exchange data. • the process of using codes to make readable information unreadable. • software designed to block malware from entering protected networks. • ...
CIS178 Cybersecurity Crossword Puzzle 2023-04-19
Across
- authentication using physical characteristics
- people carrying out specific actions
- software that installs itself secretly
- highly targeted phishing attacks
- virus disguised as legitimate software
- protect personal data
- users directed towards fake websites
- updates to improve security
Down
- permission to be on hard-drive
- security feature to detect hacking
- users denied access to services
- mathematical fuction that protects information
- attempting to obtain sensitive information
- prevents unauthorized access
- program added for entertainment
- emails asking for sensitive information
- detect and remove viruses
- software that makes data unstable
- secret software installed on hard-drive
- shared storage accessed online
20 Clues: protect personal data • detect and remove viruses • updates to improve security • prevents unauthorized access • permission to be on hard-drive • shared storage accessed online • users denied access to services • program added for entertainment • highly targeted phishing attacks • software that makes data unstable • security feature to detect hacking • ...
CIS 178 Cybersecurity Participation 2023-04-20
Across
- Malware that demands payment
- Software that detects malware
- Criminal activity on computer systems
- secure website connection
- Successful cyber attack
- a software vulnerability
- a system weakness
- malicious digital activity
- data protection method
- fraudulent email technique
Down
- network security barrier
- a traffic overload cyberattack
- user identity verification
- computer infection
- secret access code
- unauthorized access
- harmful software program
- unsolicited email
- A network of infected computers
- physical trait recognition
20 Clues: unsolicited email • a system weakness • computer infection • secret access code • unauthorized access • data protection method • Successful cyber attack • network security barrier • harmful software program • a software vulnerability • secure website connection • user identity verification • physical trait recognition • malicious digital activity • fraudulent email technique • ...
The Internet and Cybersecurity 2024-04-30
Across
- A type of cyber attack where individuals are manipulated into revealing sensitive information.
- A trial and error method used to decode encrypted data such as passwords.
- An unauthorized wireless access point that allows unauthorized users to connect to a secure network.
- The action of tracking and recording keys struck on a keyboard, typically in a covert manner.
- The practice and study of techniques for secure communication, often involving encryption and decryption.
- A type of computation in which many calculations or processes are carried out simultaneously.
- Refers to the gap between people who have access to modern information and communication technology and those who do not.
- A process that converts input data into a fixed-size string of bytes, often used for data integrity verification.
- The practice of concealing messages or data within other non-secret text or data.
- The process of verifying the identity of a user or system.
- A type of encryption where the same key is used for both encryption and decryption.
Down
- A cryptographic key that can be freely distributed and used to encrypt messages.
- A networking device that forwards data packets between computer networks.
- A global network of interconnected computers that communicate with each other using a common set of protocols.
- A cyber attack that disrupts normal traffic of a targeted server.
- The inclusion of extra components in a system to improve reliability and performance.
- A set of rules that govern the exchange of data between devices.
- The process of encoding information in such a way that only authorized parties can access it.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A public-key encryption algorithm used for secure data transmission over the internet.
- Small units of data that are transmitted over a network.
21 Clues: Small units of data that are transmitted over a network. • The process of verifying the identity of a user or system. • A set of rules that govern the exchange of data between devices. • A cyber attack that disrupts normal traffic of a targeted server. • A networking device that forwards data packets between computer networks. • ...
Practice Cybersecurity Terminology Puzzle 2025-03-12
Across
- Software to remove malware
- Fraud started with phone freaking
- Any harmful hacking techniques
- Malicious software
- An unintended problem with electronics
- Access using tor browser
- Deliberate theft of sensitive data
- Taking advantage of a vulnerability
- Performs tasks to solve problems
- A barrier between networks
Down
- A weakness or flaw
- Manages computers recourses and processes
- Online harassment
- String of octets under 256
- Unauthorized access to sensitive data
- Malicious program that infects computers
- Used to block specific users
- Maintenance of data quality
- A type of malware
- Recently discovered exploits
20 Clues: Online harassment • A type of malware • A weakness or flaw • Malicious software • Access using tor browser • Software to remove malware • String of octets under 256 • A barrier between networks • Maintenance of data quality • Used to block specific users • Recently discovered exploits • Any harmful hacking techniques • Performs tasks to solve problems • Fraud started with phone freaking • ...
Cybersecurity Acronyms and Terms 2024-11-27
Across
- A protocol for collecting and organizing log messages across a network.
- The process of updating software and systems to address vulnerabilities.
- Indicator of Compromise, data points that signal malicious activity.
- The part of malware that performs the malicious action.
- A record of events or actions on a system or network.
- Remote Monitoring and Management, tools for remote administration of client systems.
- The likelihood of a threat exploiting a vulnerability with impact.
- Malicious software such as viruses, worms, or ransomware.
- A one-way function to generate a fixed-size representation of data.
- Isolating suspicious files or processes to prevent harm to systems.
- Mean Time to Detect, the average time to identify a security incident.
- Mean Time to Respond, the average time to respond to and remediate an incident.
- A vulnerability unknown to the vendor, exploited before a fix is available.
- A security event compromising the confidentiality, integrity, or availability of information.
Down
- Isolating suspicious files or programs to observe their behavior.
- Command and Control infrastructure used by attackers to communicate with compromised systems.
- Security Operations Center, a centralized team for monitoring and responding to security incidents.
- A network security device that monitors and filters incoming and outgoing traffic.
- A social engineering attack to steal sensitive information via deceptive emails or websites.
- Data Loss Prevention, tools to prevent data exfiltration.
- A potential cause of an incident that could harm a system or organization.
- Endpoint Detection and Response, tools for endpoint threat detection and response.
- Virtual Private Network, encrypting data over untrusted networks.
- Security Information and Event Management, a tool for log aggregation and analysis.
- Advanced Persistent Threat, a sophisticated and long-term cyber attack.
- Tactics, Techniques, and Procedures used by threat actors.
- Demilitarized Zone, a subnet adding security for external-facing services.
- A method used to take advantage of vulnerabilities.
- Open Source Intelligence, information gathered from publicly available sources.
- Cloud Access Security Broker, tools that enforce security policies for cloud services.
30 Clues: A method used to take advantage of vulnerabilities. • A record of events or actions on a system or network. • The part of malware that performs the malicious action. • Data Loss Prevention, tools to prevent data exfiltration. • Malicious software such as viruses, worms, or ransomware. • Tactics, Techniques, and Procedures used by threat actors. • ...
Year 9 cybersecurity 1 2024-11-05
Across
- A type of malware that infects files and spreads to other systems, often damaging files and affecting system performance.
- A password that combines letters, numbers, and symbols, is at least 8 characters long, and avoids common words to prevent unauthorized access.
- A security system that monitors and controls network traffic, blocking unauthorized access to protect systems from malicious attacks.
- A professional who protects networks and systems from hacking, malware, and other threats by monitoring, installing security measures, and educating users.
- A security process that requires users to provide two forms of identification to access an account, adding an extra layer of protection.
- Unauthorized access to computer systems or networks, often with the intent to steal or modify data.
- Software that displays unwanted advertisements on a device, which can slow down the system and pose security risks.
- A program designed to detect, prevent, and remove malware, including viruses and spyware, to protect computer systems.
- The process of converting data into a secure format to prevent unauthorized access during transmission over networks.
- The information and data left behind from a user’s online activities, which can be tracked or accessed by others.
Down
- A unique numerical identifier assigned to each device on a network, allowing devices to communicate over the internet or within a local network.
- A method of manipulating people into revealing confidential information, often for malicious purposes, by exploiting trust.
- A service that encrypts internet connections, making online activities more secure and protecting users' identities and data on public networks.
- A text-based interface that allows users to interact with the computer by typing commands rather than using graphical icons.
- A tool used to block unwanted and potentially harmful emails, such as phishing attempts or advertisements, from reaching a user’s inbox.
- Controls that allow users to manage who can view their profiles, posts, and personal information on social platforms.
- A fraudulent attempt to steal personal information by pretending to be a legitimate entity, often using fake emails or messages.
- A virtual point used to identify specific services or applications on a networked device, allowing data to flow to and from the device.
- Malicious software designed to harm, exploit, or otherwise compromise a computer system, including viruses, adware, and spyware.
- A fake public Wi-Fi network set up to steal personal information from users who connect to it.
20 Clues: A fake public Wi-Fi network set up to steal personal information from users who connect to it. • Unauthorized access to computer systems or networks, often with the intent to steal or modify data. • The information and data left behind from a user’s online activities, which can be tracked or accessed by others. • ...
Cybersecurity Awareness Month 2025 2025-10-06
Across
- Applying a mathematical algorithm to data to promote integrity.
- Process of accessing and modifying mobile device privileges to bypass OS restrictions.
- A collection of analyzed, publicly available information applicable to security questions (acronym)
- Sharing the risk with another organization, such as an insurance company.
- Any observed, verified, and documented occurrence.
- A periodical outbound connection between a compromised computer and an external controller.
- Anything of value to an organization
- A famous framework used to determine adversarial tactics, techniques, & common knowledge.
- A documented history of how evidence was handled, collected, transported, and preserved.
- Self-replicating malicious code that spreads across vulnerable networks.
- Actions that attempt to deny malicious actors the ability to cause further damage.
- An isolated testing environment where security practitioners can detonate and observe malicious payloads.
Down
- A piece of code written to add functionality or enhanced features, such as to a web browser.
- Type of hold that retains a device in a secure storage area for forensic investigation.
- Protocol that provides secure remote access to network devices.
- Gray hat hacker whose motivations are socially or politically motivated.
- Secondary authentication tool using something you either know, have, or are (acronym).
- Proactively examining one's own infrastructure for potential threats.
- An intermediary device which acts as a gateway between user devices, applications, and the internet.
- Data stored in READ-ONLY memory, which executes when a device is powered on.
- A testing methodology where extreme demands are placed on software to determine robustness.
- The use of security tools & controls to reduce the risk of a vulnerability to acceptable levels.
- A type of "bomb" intentionally inserted into a software system, which detonates under specific conditions.
- An action taken to segment an infected host from communicating with the rest of a network.
- Global standard for protecting stored, processed, and transmitted credit card info.
- List of rules that controls the manner by which network resources may be accessed (acronym).
- Actions and technologies used by organizations to prevent loss of sensitive data (acronym).
27 Clues: Anything of value to an organization • Any observed, verified, and documented occurrence. • Protocol that provides secure remote access to network devices. • Applying a mathematical algorithm to data to promote integrity. • Proactively examining one's own infrastructure for potential threats. • ...
Topic 7 - Development of Computer Industry and Law 2024-05-02
Across
- In Malaysia, a core legislation in governing the communications and multimedia industry is called
- What vendor is ranked first for the semiconductor industry in 2018
- Sector that handles communication on a global scale and create infrastructure that allows any type of data sending
- Computer system resources and services that can be accessed over the cloud
- Cyber law exists to handle cybersecurity and…
- Digital form of value that can be used as a token for transaction electronically
- The act of analyzing data, create conclusion about that information, and make a future prediction out of it is called
- Devices of information-age products are called
- Law that cover all internet-related technologies and provide a legal system for controlling it is called
- Hardware component that acts as the “brain” of a desktop computer, that could performs both arithmetic and operations, is called
Down
- Institution that is responsible for the abuse of telecommunicating services done by the industries in that certain sector is called
- In telecommunication industry, who manufacture and sell telecommunications equipment
- Design/infrastructure of information resource that can be navigated efficiently
- The process of protecting systems, data, and networks from cyber attacks is called
- In telecommunication industry, who operate and provide access to deliver services via internet
- Major segments of telecommunication industry besides equipment vendors and service providers
- The most important legislation that applies to telecoms (including internet)
- What is the leading computer manufacturing company that based in Taiwan
- What institution that serve as the telecommunications regulator in Malaysia
- Two of the most leading countries that controlled more than 80% of the semiconductor industry are U.S. and…
20 Clues: Cyber law exists to handle cybersecurity and… • Devices of information-age products are called • What vendor is ranked first for the semiconductor industry in 2018 • What is the leading computer manufacturing company that based in Taiwan • Computer system resources and services that can be accessed over the cloud • ...
AI in Cybersecurity 2025-10-20
Across
- – Permission to enter a system.
- – Short for Artificial Intelligence.
- – A crime AI can help detect.
- – Harmful software detected by AI.
- – To protect data by converting it into code.
- – What we do to teach AI models.
Down
- – Automated programs that can attack or protect systems.
- – What AI learns from.
- – The goal of cybersecurity.
- – A warning sent when AI detects a threat.
- – A common target for cyberattacks.
- – What hackers use to fool people.
12 Clues: – What AI learns from. • – The goal of cybersecurity. • – A crime AI can help detect. • – Permission to enter a system. • – What we do to teach AI models. • – Harmful software detected by AI. • – What hackers use to fool people. • – A common target for cyberattacks. • – Short for Artificial Intelligence. • – A warning sent when AI detects a threat. • ...
CWiCS Cybersecurity Crossword Event 2021-02-25
Across
- A _____________ breach targeted 130 accounts, including those of past presidents and Elon Musk, resulted in attackers swindling $121,000 in Bitcoin through nearly 300 transactions
- This is a well-known banking trojan that steals credentials and other sensitive information from an infected machine.
- The telecom service provider became the victim of a Magecart card-skimming attack.
- This app's "Find Friends" feature could have exposed user's profile data and phone numbers (Jan 2021)
- Which Hotel had the breach Hackers gained access to over 10 million guest records .including Justin Bieber, Twitter CEO Jack Dorsey, and government officials
- A now-defunct online service that had been previously selling access to data hacked from other websites, 21 arrested in UK
- Hackers target Microsoft ___ machines running which servers to deploy backdoors and other kinds of malware
- International hotel chain disclosed a data breach of 5.2 million hotel guests, making it their second data breach hitting them
- This pharmacy chain announced an error within their mobile app's messaging feature exposing names, prescription numbers and drug names
- This unsecured component of Mailfire’s was breached, the hacker had access to over 320 million records from notifications being pushed out to Mailfire clients.
- Milpitas, Calif.-based platform security vendor ----------------- had compromised NetExtender VPN client and SMB-oriented Secure Mobile Access
Down
- -- based cyber attacks rose 630% between January and April 2020
- Trojan functioning as a downloader or dropper of other malwares
- Hacker remotely controlled, and clicked on various functions on the screen to change the level of sodium hydroxide to over 100 times its normal levels, at _________ Water Treatment Plant
- __________ Confusion Supply-Chain Attack Hit Over 35 High-Profile Companies
- Even in 2021, the Top 10 from ___ is the most effective first step towards changing the software development culture within your org
- Hosted on this cloud, a massive US property and demography database exposed 200 million records (March 2020)
- Hackers are now using this Google service to bypass web security and steal credit cards
- Hackers hit Nebraska Medical Center with --------------- and stole patient data
- The university paid a $1.14 million ransom to hackers in order to save COVID-19 research.
- Malicious code was sneaked into updates to this SolarWinds software
- Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug
- Since -------, the US FBI reported a 300% increase in reported cybercrimes
- LodaRAT Windows Malware Now Also Targets ______ Devices
- Malware designed to steal sensitive information stored on an infected device comes back disguised as a Game launcher
25 Clues: LodaRAT Windows Malware Now Also Targets ______ Devices • Trojan functioning as a downloader or dropper of other malwares • -- based cyber attacks rose 630% between January and April 2020 • Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug • Malicious code was sneaked into updates to this SolarWinds software • ...
Cybersecurity Unit 3 Terminology 2022-10-10
Across
- A base-16 number system. The extra digits are represented by the letters a through f, so all digits in hex are 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f.
- Wired Equivalent Privacy is a security algorithm used in wireless networks.
- The Maximum Transmission Unit is the maximum amount of bytes than can be packaged into frame data.
- A wireless access point is a device provides connectivity to a network.
- An operating system similar in concept to the Windows OS but used more often to host routers and web servers.
- A media access control addresses is unique numeric code that is assigned to networking hardware components (typically a network interface card or NIC) that is built into computers and mobile devices.
- The selective process of allowing or restricting the availability of a resource.
- The fourth and last phase of ethical hacking in which the security professionals fix the system vulnerabilities uncovered in the previous phases.
- The act of starting or launching a process. The new processes is a child process of a parent process..
- The operation of joining character strings end-to-end.
- A device that plots a graph of signal strength (vertical axis) versus frequency (horizontal axis).
- A standard that computers use to represent letters , numbers, and symbols. (It stands for American Standard Code for Information Interchange.)
- The first phase of ethical hacking, which involves probing of the network to understand its structure and to see what services are open and running.
- A collection of files on a computer, logically grouped together.
Down
- A program that allows a user to enter commands to interact with an operating system.
- An exchange of messages that prove the identity of users and computers in a system.
- The third phase of ethical hacking, which involves launching exploits at targeted vulnerabilities to see if they are genuine exposures on the system.
- It can have two meanings in computer terminology: it can be a specific application or function such as email, chat, etc. or it can refer to a specific part of an application, such as transmitting the data of a webpage
- Pronounced "ganoo" or "g.noo", it is a UNIX-like operating system.
- A very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden, allowing the user to focus on the details that are important for the task at hand.
- The second phase of ethical hacking, which involves taking a closer look at the services and software running on the hosts.
- A starting point for data analysis. It is the initial data set used in later comparisons.
- An input value to a command.
- Software that is is freely available to anyone who wants to use it. Users can modify it and distribute it however they want.
- A method of transferring and organizing data over a network using packets, which contain routing information along with the data.
- A process in UNIX that runs without user input.
- An attack where a malicious user changes and corrupts the MAC-IP address information on a target computer.
- A network communication protocol occurring in the data link layer 2 and physical layer 1 of the OSI model.
28 Clues: An input value to a command. • A process in UNIX that runs without user input. • The operation of joining character strings end-to-end. • A collection of files on a computer, logically grouped together. • Pronounced "ganoo" or "g.noo", it is a UNIX-like operating system. • A wireless access point is a device provides connectivity to a network. • ...
Cybersecurity Awareness Month Crossword 2023-09-21
Across
- Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
- A cybersecurity risk that originates from within an organization (2 words).
- A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
- A mechanism for creating a secure connection between a computing device and a computer network
- The ability of individuals to understand and exercise control over how information about themselves may be used by others.
- Unsolicited emails sent to many addresses.
- A process or measure used to verify a user's identity.
- Part of the internet that isn't indexed by search engines.
- Faking the sending address of a transmission to gain illegal entry into a secure system.
- An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities (2 words).
- The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization (2 words).
- Computer programs that can block, detect, and remove viruses and other malware.
- A type of malware that denies a user's access to a system or data until a sum of money is paid.
Down
- The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
- A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
- Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
- Software that compromises the operation of a system by performing an unauthorized function or process.
- A string of characters used to authenticate an identity.
- Extra copies of computer files that can be used to restore files that are lost or damaged.
- A flaw or weakness in an information system that could be exploited.
- An unauthorized user who attempts to or gains access to an information system.
- A collection of computers compromised by malicious code and controlled across a network.
- Software designed to block malware from entering protected networks.
- Converting data into a form that cannot be easily understood by unauthorized people.
24 Clues: Unsolicited emails sent to many addresses. • A process or measure used to verify a user's identity. • A string of characters used to authenticate an identity. • Part of the internet that isn't indexed by search engines. • A flaw or weakness in an information system that could be exploited. • Software designed to block malware from entering protected networks. • ...
2024 Cybersecurity Awareness Month 2024-09-17
Across
- A digital document used to verify the identity of a user or device online
- Software used to detect, prevent, and remove malicious software
- A security risk that originates from within the organization, often involving employees
- A tool that records keystrokes on a keyboard, often used to steal sensitive information
- The process of verifying a user or device
- A person who uses technical skills to exploit systems or networks
- The unauthorized access and retrieval of sensitive information from a system
- A type of malware that locks users out of their systems until a ransom is paid
- A hidden way of bypassing security controls in a system
- A string of characters used to authenticate access to a system or account
Down
- A software update designed to fix vulnerabilities or bugs
- An attempt to damage, disrupt, or gain unauthorized access to a computer or network
- Software designed to disrupt, damage, or gain unauthorized access to a computer system
- A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
- A network security system that monitors and controls incoming and outgoing traffic
- A vulnerability in software that is taken advantage of by hackers to carry out attacks
- A virtual private network that allows secure remote access to a network over the internet
- The use of deception to manipulate individuals into divulging confidential information
- The process used by an organization to handle and recover from a cyberattack
- An additional security layer that requires a second form of verification beyond a password
- The process of converting information or data into a code to prevent unauthorized access
- Software that gathers information from a user's device without their knowledge
22 Clues: The process of verifying a user or device • A hidden way of bypassing security controls in a system • A software update designed to fix vulnerabilities or bugs • Software used to detect, prevent, and remove malicious software • A person who uses technical skills to exploit systems or networks • ...
CIS178 - Cybersecurity Crossword Puzzle 2023-07-13
Across
- bring your own device
- code that protects data
- malicious software
- transmit information without users knowledge
- penetration testers
- wont allow changes to system’s settings
- illegally exploit network vulnerabilities
- identifies device connected to internet
- high traffic creates web shutdown
- vulnerable free wireless hotspots
- practicing to identify cyber threats
- software to carry out cyberattacks
- preventan d remove malware infections
- harrassing others over online platforms
Down
- propaganda to steal personal information
- downloaded apps disguised malicious attacks
- virtual private network
- exploits vulnerabilities in software
- helps remember passwords encrypted
- unauthorized users gain access
- attacks users until pay ransom
- clicking on hidden links
- tries to steal personal data
- software preventing access to networks
- scrambling sensitive data
25 Clues: malicious software • penetration testers • bring your own device • virtual private network • code that protects data • clicking on hidden links • scrambling sensitive data • tries to steal personal data • unauthorized users gain access • attacks users until pay ransom • high traffic creates web shutdown • vulnerable free wireless hotspots • helps remember passwords encrypted • ...
Cybersecurity Crossword Mod 9 2025-03-15
Across
- Easier to remember and longer
- Short and complex, harder to remember
- Item or Message used in phishing
- Phishing using QR Codes
- Security method using physical traits
- Hidden devices on ATM's or readers
- Encrypted network connection
- Authorization that requires two logins
- Malware hiding in files that spread
- Phishing high-profile individuals
Down
- Record all things typed on keyboard
- Infected ads on legit websites
- Someone with unauthorized access
- BitWarden is a password ______
- Fooling a user to gain access
- Self-replicating malware
- Seemingly legit, but is fake
- Malware that encrypts files
- Phishing over the phone
- Phising via text messages
20 Clues: Phishing using QR Codes • Phishing over the phone • Self-replicating malware • Phising via text messages • Malware that encrypts files • Seemingly legit, but is fake • Encrypted network connection • Easier to remember and longer • Fooling a user to gain access • Infected ads on legit websites • BitWarden is a password ______ • Someone with unauthorized access • ...
Middle-School Cybersecurity Crossword 2025-04-30
Across
- Sneaky grabbing of data
- A trick to steal money or info
- Software that secretly watches you
- Scrambling data into code
- Fake messages to steal info
- Pops up ads and may track you
- Bullying someone online
- Malware that hides as something safe
- A flaw in software used by hackers
- Records what you type
- Pretending to be someone else online
- Staying safe online
Down
- Sharing private info without permission
- Protection against online threats
- Bad software that harms devices
- Hiding your real identity online
- Unwanted or junk messages
- Locks files, demands money to unlock
- Network of hacked devices used for attacks
- Posting to upset or annoy people
- Misleading headline to get clicks
- Software that blocks viruses
- Person who breaks into computer systems
23 Clues: Staying safe online • Records what you type • Sneaky grabbing of data • Bullying someone online • Unwanted or junk messages • Scrambling data into code • Fake messages to steal info • Software that blocks viruses • Pops up ads and may track you • A trick to steal money or info • Bad software that harms devices • Hiding your real identity online • Posting to upset or annoy people • ...
Cracking the Cybersecurity Code 2024-12-08
Across
- The obligation to explain, justify, and take responsibility for decisions or actions.
- Facts and statistics collected together for reference or analysis, foundational to AI systems.
- The branch of medicine dealing with the prevention, diagnosis, and treatment of cancer.
- The measurement and statistical analysis of people's physical and behavioral characteristics.
- A term used to describe intelligence created by humans, often associated with machine learning.
- The study of genomes, which has applications in AI-driven preventive medicine.
- Adhering to rules, regulations, or standards, especially in data privacy and security.
- The quality of being open and honest, crucial in ethical AI development.
Down
- The branch of medicine concerned with the study and treatment of eye disorders.
- The introduction of new ideas, methods, or technologies.
- The process of converting information into a code to prevent unauthorized access.
- The ability to acquire and apply knowledge and skills, often simulated by AI systems.
- A rule or directive made and maintained by an authority, often to ensure ethical AI practices.
- The process of identifying a condition or disease, often enhanced by AI in healthcare.
- The science of diagnosing, treating, and preventing illness.
- Tailored specifically to an individual, especially in medicine or treatment.
- A set of rules or steps followed by computers to solve problems or perform tasks.
- Relating to moral principles or the branch of knowledge dealing with them.
- The act of forecasting or anticipating an event or outcome.
- A term associated with advanced computing that poses both opportunities and threats to cybersecurity.
20 Clues: The introduction of new ideas, methods, or technologies. • The act of forecasting or anticipating an event or outcome. • The science of diagnosing, treating, and preventing illness. • The quality of being open and honest, crucial in ethical AI development. • Relating to moral principles or the branch of knowledge dealing with them. • ...
Reasons why Singapore is Safe / Not Safe 2024-07-23
Across
- Public cooperation via [] like SGSecure.
- Advanced surveillance and cybersecurity[]
- Robust laws and proactive Internal [] Department
- [] platforms spreading extremist ideologies.
Down
- terrorist may target tourist hotspots
- Potential for reduced vigilance over time.
- [] to regional terrorist hotspots.
- Emphasis on racial and religious [] reduces radicalisation.
8 Clues: [] to regional terrorist hotspots. • terrorist may target tourist hotspots • Public cooperation via [] like SGSecure. • Advanced surveillance and cybersecurity[] • Potential for reduced vigilance over time. • [] platforms spreading extremist ideologies. • Robust laws and proactive Internal [] Department • Emphasis on racial and religious [] reduces radicalisation.
GCSAM 2023 2023-07-10
Across
- A “tunnel” for private network browsing:
- The collection, use, sharing, storage, destruction, or processing of PI that is provided by an individual in connection with obtaining a product, service, or employment, including an individual’s choice on how their PI is used.
- Be client obsessed, champion our people, lead with integrity, own it, and win as one are examples of TIAA’s:
- What malware propagates without a host program?
- A _____ review is done quarterly to review privileged access.
- What is the most common attack vector for malware?
- TIAA’s ______ promotes a culture of inclusion, diversity and equity by connecting associates across diverse perspectives, wide-ranging talents and unique experiences.
- A targeted form of phishing that is customized for specific individuals within a specific organization.
- What does GCSAM stand for?
- Suspicious sender address, invalid branding, appealing to emotions, sense of urgency, invalid URL’s, request for sensitive data, spelling errors, requests to click links, and signatures are all __________ of phishing attempts.
Down
- Who founded TIAA?
- Malware that limits users access until a ransom is paid.
- A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.
- Who is the security awareness program’s mascot?
- What is TIAA’s social impact hashtag?
- Be the change by delivering lifetime income for all with investments that build a better world is TIAA’s:
- When somebody sends an e-mail with a link to a bogus website it is called:
- In 2021 TIAA cybersecurity expanded to become TIAA _____ cybersecurity.
- The probability of exposure or loss of assets is considered?
19 Clues: Who founded TIAA? • What does GCSAM stand for? • What is TIAA’s social impact hashtag? • A “tunnel” for private network browsing: • Who is the security awareness program’s mascot? • What malware propagates without a host program? • What is the most common attack vector for malware? • Malware that limits users access until a ransom is paid. • ...
Future Jobs 2022-01-15
Across
- discontinue a job here and offer it in another country
- a specialist who’s an authority on something
- can continue for a long time
- a plan
- safety
- outdated and old-fashioned
Down
- someone who takes on gig work
- what we expect to happen in the future
- intelligence advanced computer software
- someone who starts a new company
- work temporary work on a specific project
- protecting systems, networks, and programs from digital attacks
12 Clues: a plan • safety • outdated and old-fashioned • can continue for a long time • someone who takes on gig work • someone who starts a new company • what we expect to happen in the future • intelligence advanced computer software • work temporary work on a specific project • a specialist who’s an authority on something • discontinue a job here and offer it in another country • ...
Big 8 Ideas of Cyber 2024-01-11
Across
- worth a great deal
- doing the right thing online
- Always conected world
- synonym for electronic
- a staemnt of intent to damage
Down
- keeping computers safe and sound
- imaginng what could go wrong and figuring out how to stop it
- the application of conceptual knowledge
- It's like the key to a magical fortress and how to build it
- navigating dangers online
- the big impact of cybersecurity choices
- keeping secerets safe online
12 Clues: worth a great deal • Always conected world • synonym for electronic • navigating dangers online • doing the right thing online • keeping secerets safe online • a staemnt of intent to damage • keeping computers safe and sound • the application of conceptual knowledge • the big impact of cybersecurity choices • It's like the key to a magical fortress and how to build it • ...
cybersicuritie eng briac 2024-03-13
Across
- A barrier against network threats
- Harmful software
- is a network of private computers that have been infected with malicious software and are controlled as a group without the owners' knowledge.
- Fixing software vulnerabilities
- Protection against online threats
- Leaking sensitive information have 1 space (_)
- Unauthorized access
Down
- Double security confirmation for login have 1 space (_)
- Online assault
- Weakness in security
- Tricking people to reveal private information
- Scrambling data to keep it secret
12 Clues: Online assault • Harmful software • Unauthorized access • Weakness in security • Fixing software vulnerabilities • A barrier against network threats • Scrambling data to keep it secret • Protection against online threats • Tricking people to reveal private information • Leaking sensitive information have 1 space (_) • Double security confirmation for login have 1 space (_) • ...
IO LA SO 2023-05-31
Across
- Truffa informatica via e-mail
- Programma di videoscrittura creato da Microsoft
- Il foglio di Excel è fatto di righe e ....
- Icona da cliccare per segnalare un sospetto phishing
- Non lasciare mai il tuo dispositivo aziendale....
- Programma di social networking aziendale
- Programma per fogli di calcolo
Down
- Sicurezza informatica (ingl.)
- Riunione organizzata attraverso la piattaforma Zoom
- Teams permette di lavorare e modificare ......files condivisi
- Strumento per realizzare presentazioni illustrate
- Programma di posta elettronica
12 Clues: Sicurezza informatica (ingl.) • Truffa informatica via e-mail • Programma di posta elettronica • Programma per fogli di calcolo • Programma di social networking aziendale • Il foglio di Excel è fatto di righe e .... • Programma di videoscrittura creato da Microsoft • Strumento per realizzare presentazioni illustrate • Non lasciare mai il tuo dispositivo aziendale.... • ...
day two - know your coworker 2022-03-27
Across
- shortest POV (__ minutes)
- POV?
- To which cybersecurity framework is Pentera mapped?
Down
- Morgan's end of night in Greece
- first of 2022
- Dor's favorite fruit
- How much RAM is needed for a Pentera RAN installation
- Maayan's second name
- One of Pentera's features
- Who said "Tenerife is great and dolphins are amazing but... Q1 isn't over yet!"
10 Clues: POV? • first of 2022 • Dor's favorite fruit • Maayan's second name • shortest POV (__ minutes) • One of Pentera's features • Morgan's end of night in Greece • To which cybersecurity framework is Pentera mapped? • How much RAM is needed for a Pentera RAN installation • Who said "Tenerife is great and dolphins are amazing but... Q1 isn't over yet!"
Technology 2024-03-18
Across
- Wireless technology for short-range communication.
- Security barrier for network traffic.
- Software that manages computer resources.
- Protection of computer systems from theft or damage.
Down
- Writing instructions for computers to execute.
- Measurement and analysis of unique physical characteristics.
- Software for accessing the internet.
- Global Positioning System for location tracking.
- This vast network connects computers worldwide.
- Artificial Intelligence Software
10 Clues: Artificial Intelligence Software • Software for accessing the internet. • Security barrier for network traffic. • Software that manages computer resources. • Writing instructions for computers to execute. • This vast network connects computers worldwide. • Global Positioning System for location tracking. • Wireless technology for short-range communication. • ...
byte trail 3 2025-03-05
Across
- Secures data by converting it to a coded form
- Software managing hardware and software resources
- Smallest unit of data in computing
- Storing data over the internet
- Device that connects multiple networks
Down
- Virtual representation of physical hardware
- High-level programming language
- Protecting data from unauthorized access
- A column in a table
- Set of vertices connected by edges
10 Clues: A column in a table • Storing data over the internet • High-level programming language • Set of vertices connected by edges • Smallest unit of data in computing • Device that connects multiple networks • Protecting data from unauthorized access • Virtual representation of physical hardware • Secures data by converting it to a coded form • ...
STEM Crossword 2025-08-19
Across
- – Creating new ideas, tools, or methods.
- Exploration – Study and travel beyond Earth.
- – Using math or computers to simulate real-world systems.
- – The study of the natural world.
- – Protecting digital information.
Down
- Energy – Energy from sun, wind, or water.
- – The language of STEM.
- – Applying science to make tools or systems.
- – Designing and building solutions.
- – Science, Technology, Engineering, and Mathematics.
10 Clues: – The language of STEM. • – The study of the natural world. • – Protecting digital information. • – Designing and building solutions. • – Creating new ideas, tools, or methods. • Energy – Energy from sun, wind, or water. • – Applying science to make tools or systems. • Exploration – Study and travel beyond Earth. • – Science, Technology, Engineering, and Mathematics. • ...
We Make IT Happen 2025-05-15
Across
- Programs that run on a computer
- A global system connecting computers
- Machine used for calculations and information
- A group of connected devices
- Organized collection of data
Down
- Physical parts of a computer
- Protection against online threats
- A person who writes computer code
- A step-by-step process used in computing
- Technology involving machines that do tasks
10 Clues: Physical parts of a computer • A group of connected devices • Organized collection of data • Programs that run on a computer • Protection against online threats • A person who writes computer code • A global system connecting computers • A step-by-step process used in computing • Technology involving machines that do tasks • Machine used for calculations and information
Internet Safety Crossword 2021-02-11
Across
- information information that can identify someone
- securing information on the internet
- can be trusted
- if something makes you feel sad or uncomfortable tell a _______ adult trusted
- software intended to do damage to computers
- someone who witnesses but doesn't participate
Down
- information about a person found online
- bullying using technology
- a person who stands up for someone else
- good manners online
- too much information
11 Clues: can be trusted • good manners online • too much information • bullying using technology • securing information on the internet • information about a person found online • a person who stands up for someone else • software intended to do damage to computers • someone who witnesses but doesn't participate • information information that can identify someone • ...
Safety & Risk Awareness Month 2025-10-12
Across
- Adhering to rules and regulations.
- A scam email pretending to be legitimate.
- Process of identifying potential hazards.
- Digitally altered video.
- Protecting systems from online threats.
- Understanding potential risks.
- Valuable digital information.
Down
- Word or phrase used to access systems
- Screenings to monitor health & well-being.
- Checklist Ensures a safe remote work environment.
- The state of being informed and alert.
- Possibility of loss or harm.
- A proactive measure to prevent incidents.
- Formal review to ensure standards are met.
- Keeping sensitive data safe from exposure.
- Measures taken to avoid danger or harm.
16 Clues: Digitally altered video. • Possibility of loss or harm. • Valuable digital information. • Understanding potential risks. • Adhering to rules and regulations. • Word or phrase used to access systems • The state of being informed and alert. • Protecting systems from online threats. • Measures taken to avoid danger or harm. • A scam email pretending to be legitimate. • ...
Cybersecurity/Web Design 2019-11-05
Across
- to scramble information so that it can be sent safely over the Internet
- Hacking’ - Testing a computer systems to find security vulnerabilities
- Audience
- is the branch of Computer Science that deals with online threats, how to keep data safe and preventing cybercrime (criminal activity carried out using a computer/computer networks)
- preferred way to present/layout digital material
- attack intended to direct a website’s traffic to another fake site by hacking a DNS server or redirecting the computer electronically.
- to help protect a computer network from unauthorised access
- reason for which the website has been created e.g. to entertain
Down
- Testing
- a secret word to unlock a device – must include numbers/special characters
- by reproducing itself or infecting other programs by modifying them.
- to use and understand
- a user is sent a fake email that looks like it is from a bank/business hoping to gather personal information.
- simple way to get passwords/PIN numbers by criminals standing behind you and watching.
14 Clues: Testing • Audience • to use and understand • preferred way to present/layout digital material • to help protect a computer network from unauthorised access • reason for which the website has been created e.g. to entertain • by reproducing itself or infecting other programs by modifying them. • Hacking’ - Testing a computer systems to find security vulnerabilities • ...
Cybersecurity Awareness Crossword 2025-08-27
Across
- when unauthorized access to data or a system is made (hacked)
- an mfa type that is related to something unique to you; ie- fingerprint, facial recognition, etc.
- uses more than one type of authentication to verify a user identity
- proves someone's identity; Rayburn Use for access into ERCOT MIS
- global network (web) of computers that are connected and can share information with each other
Down
- to check that something is correct
- malicious software that locks your files until a demanded payment is made
- malicious software
- stored in your browser to track users across websites and remember preferences; "Third-Party ___ "
- habits, practices, and procedures that individuals and organizations use to maintain their digital health and security
- "___ Trust"; a model where no one is trusted by default
- a software update
- malicious email, generally attempts to get you to click a link or download a malicious file
13 Clues: a software update • malicious software • to check that something is correct • "___ Trust"; a model where no one is trusted by default • when unauthorized access to data or a system is made (hacked) • proves someone's identity; Rayburn Use for access into ERCOT MIS • uses more than one type of authentication to verify a user identity • ...
Kisner Wedding 2025-04-01
Across
- Our dog's name
- Name of our church
- What we're doing for our honeymoon
- Furthers we've traveled together
- Our favorite video game
- Said "I love you" first
- Number of years together
- Nickname Ryan calls Elissa
- Elissa's job title
- Elissa's birth month
Down
- Name of the hike where they got lost
- Ryan's birth month
- Artist we listen to together most often
- Instrument Elissa played in school
- Where we made our wedding bands
- Where Ryan proposed
- Ryan's eye color
- Elissa's second middle name
- Favorite Carlisle ice cream spot
- Street we live on
- Ryan's bachelor's degree
- The bigger foodie
- Our favorite food to eat together
- Ryan's favorite sports team
- Our first dance song
25 Clues: Our dog's name • Ryan's eye color • Street we live on • The bigger foodie • Ryan's birth month • Name of our church • Elissa's job title • Where Ryan proposed • Our first dance song • Elissa's birth month • Our favorite video game • Said "I love you" first • Ryan's bachelor's degree • Number of years together • Nickname Ryan calls Elissa • Elissa's second middle name • ...
TTS INFORMATIKA (Dara Cantika Dinsky X-G) 2025-04-10
Across
- itu merek dagang
- yang di Maksud hak cipta
- konten digital berunsur budaya?
- Konsekuensi konten negatif?
- Konsekuensi pelanggaran HAKI
- Tujuan validasi konten negatif?
- Tugas cybersecurity engineer?
- itu ranking?
- fungsi utama search engine?.
- penting unsur budaya dalam konten digital?
- untuk diseminasi konten budaya?
- itu konten negatif
- Tugas web developer?
- tugas programer
Down
- manfaat pendaftaran HAKI
- itu crawling?
- diseminasi konten budaya?
- Tugas database administrator?
- itu paten
- itu indexing
- Tugas data scientist?
- Tantangan validasi konten negatif?
- search engine?
- Metode validasi konten negatif?
- menghindari pelanggaran budaya?
25 Clues: itu paten • itu indexing • itu ranking? • itu crawling? • search engine? • tugas programer • itu merek dagang • itu konten negatif • Tugas web developer? • Tugas data scientist? • manfaat pendaftaran HAKI • yang di Maksud hak cipta • diseminasi konten budaya? • Konsekuensi konten negatif? • Konsekuensi pelanggaran HAKI • fungsi utama search engine?. • Tugas database administrator? • ...
Telecom Olympics 2021 2021-05-04
Across
- Network security system used to stop unauthorized access
- Someone who seeks to exploit weaknesses in a network
- Making copies of data
- Tech Support Company
- Communications over a distance
- Don't open ____ from people you don't know
- Use ____ passwords
Down
- What is a CDR?
- A piece of code that is capable of destroying data
- The capacity of a telecom line to carry signals
- The activity of defrauding by posting as a legitimate business
- NIST involves strategies for ____
- Board President
13 Clues: What is a CDR? • Board President • Use ____ passwords • Tech Support Company • Making copies of data • Communications over a distance • NIST involves strategies for ____ • Don't open ____ from people you don't know • The capacity of a telecom line to carry signals • A piece of code that is capable of destroying data • Someone who seeks to exploit weaknesses in a network • ...
Office of Performance Management and Internal Controls 2021-03-05
Across
- Intentional deceptive action
- Periodic comparison of source documents
- Office directed by Lt. Col. Terry
- Last name of OPMIC Information Security Officer
- Training due April 15th by all employees
Down
- Synonym for bloom, blossom and singing birds
- Control working in less than optimal condition
- Reduces the risk of error and inefficiency
- Acronym for Information Security Officer
- Complete acronym for internal control standards
- Last name of Internal Audit Manager
- The end toward which effort is directed
- Evaluation document with code of ethics
13 Clues: Intentional deceptive action • Office directed by Lt. Col. Terry • Last name of Internal Audit Manager • Periodic comparison of source documents • The end toward which effort is directed • Evaluation document with code of ethics • Acronym for Information Security Officer • Training due April 15th by all employees • Reduces the risk of error and inefficiency • ...
August Crossword Puzzle 2024-08-18
Across
- Hero of a movie-turned-musical playing at the Kennedy Center
- Spielberg blockbuster approaching its 50th anniversary
- environmental certification for buildings
- site of the 2024 Olympics
- ___ Sullivan, 14-year-old signed with the Major Soccer League
- new Academic Dean
- ____ Richard, transgender tennis player
Down
- recently infamous cybersecurity company
- students may go to France, for instance (acronym)
- Chamber Chorus trip location
- controversial location for Olympic open-course swimming
- Charlie xcx album associated with the Harris campaign
- new Democratic presidential candidate
13 Clues: new Academic Dean • site of the 2024 Olympics • Chamber Chorus trip location • new Democratic presidential candidate • recently infamous cybersecurity company • ____ Richard, transgender tennis player • environmental certification for buildings • students may go to France, for instance (acronym) • Charlie xcx album associated with the Harris campaign • ...
CS Month Week 2 2023-09-14
Across
- _______ Control: The practice of restricting access to resources based on user roles and permissions to prevent unauthorized access.
- Cybersecurity _______:A structured approach that defines guidelines and best practices for securing information systems.
- _______ Response: A planned approach to managing and mitigating the impact of a cybersecurity incident.
- _______ of Service: An attack that overwhelms a system, network, or website with excessive traffic, rendering it inaccessible.
- The process of verifying the identity of a user, system, or device to grant access to resources.
Down
- ______ Breach: Unauthorized access, acquisition, or disclosure of sensitive data, often involving large amounts of personal or confidential information.
- _______Testing: Ethical hacking conducted to identify vulnerabilities and assess the security of a system or network
- Malware that encrypts a victim’s data and demands payment (ransom) for its decryption.
8 Clues: Malware that encrypts a victim’s data and demands payment (ransom) for its decryption. • The process of verifying the identity of a user, system, or device to grant access to resources. • _______ Response: A planned approach to managing and mitigating the impact of a cybersecurity incident. • ...
