cybersecurity Crossword Puzzles

Cybersecurity Awareness Month 2024-10-16

Cybersecurity Awareness Month crossword puzzle
Across
  1. A type of malware that demands payment in exchange for restoring access to data
  2. A type of malicious software that replicates itself by attaching to other programs or files, potentially causing harm to computer systems, networks, or data.
  3. Creating a copy of data to prevent its loss in case of a disaster or data breach
  4. A type of software that is designed to damage or exploit a computer system
  5. The process of converting data into a secure format to prevent unauthorized access and ensure confidentiality.
  6. The potential for loss or damage when a threat exploits a vulnerability, often assessed in terms of likelihood and impact on organizational assets.
  7. The process of verifying the identity of a user, device, or system
Down
  1. A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
  2. Type of malware that allows an attacker to remotely control a system or network
  3. A network that encrypts internet connections and helps secure remote access to a network
  4. Adhering to regulatory requirements and industry standards for data protection and privacy in cloud environments
  5. Unsolicited, unwanted, and often malicious messages sent in bulk.
  6. Attack where an attacker gains unauthorized access to a system or network
  7. The act of revising software or systems to fix vulnerabilities and enhance security against emerging threats.

14 Clues: Unsolicited, unwanted, and often malicious messages sent in bulk.The process of verifying the identity of a user, device, or systemAttack where an attacker gains unauthorized access to a system or networkA type of software that is designed to damage or exploit a computer system...

Draeko Cybersecurity Crossword 2024-10-26

Draeko Cybersecurity Crossword crossword puzzle
Across
  1. A form of malware that encrypts a user’s data and demands payment to unlock it.
  2. Malware that gathers information about a person or organization without their knowledge.
  3. Malware that gathers information about a person or organization without their knowledge.
  4. A network security device or software that monitors and controls incoming and outgoing traffic.
  5. A simulated cyberattack to evaluate the security of a system.
  6. An extra layer of security requiring two forms of identification for access.
Down
  1. The psychological manipulation of people to disclose confidential information.
  2. Software intentionally designed to cause damage, such as viruses, worms, and Trojans.
  3. The process of converting information into a code to prevent unauthorized access.
  4. A type of social engineering attack where attackers trick users into revealing personal information.
  5. A trial-and-error method used to guess passwords or encryption keys.
  6. An attack where multiple systems flood a target, causing denial of service.
  7. A tool that encrypts internet traffic and hides a user’s IP address.
  8. A flaw in software that is unknown to the vendor and, therefore, unpatched.
  9. A network of infected devices controlled remotely by a hacker, typically to launch large-scale attacks.

15 Clues: A simulated cyberattack to evaluate the security of a system.A trial-and-error method used to guess passwords or encryption keys.A tool that encrypts internet traffic and hides a user’s IP address.An attack where multiple systems flood a target, causing denial of service.A flaw in software that is unknown to the vendor and, therefore, unpatched....

CROSSWORD 2023-01-12

CROSSWORD crossword puzzle
Across
  1. The art of cooking.
  2. Learns to handle and drive large machines.
  3. Focuses on fighting fires.
  4. Information Technology.
  5. Learns to teach young children.
  6. Deals with teeth.
  7. The art of mending metals.
  8. Dog, cat, and pet care.
  9. Digital photography, planning, and recording.
  10. Heating, ventilation, and air Conditioning.
Down
  1. Builds and constructs things.
  2. Learns how to do procedures on people in need.
  3. Hair, makeup, and nails.
  4. Learns to keep devices safe and secure.
  5. Laws, justice, and how to enforce them.
  6. Learns to design and print.
  7. Nursing and saving lives.
  8. Learns to do auto care and maintenance.
  9. Installs, removes, and repairs electric.

19 Clues: Deals with teeth.The art of cooking.Information Technology.Dog, cat, and pet care.Hair, makeup, and nails.Nursing and saving lives.Focuses on fighting fires.The art of mending metals.Learns to design and print.Builds and constructs things.Learns to teach young children.Learns to keep devices safe and secure.Laws, justice, and how to enforce them....

NUCORPERS 2025-07-27

NUCORPERS crossword puzzle
Across
  1. – What we aim for in business and people
  2. – Helps us grow and improve
  3. – Driving improvement through new ideas
  4. – What we strive to deliver with excellence
  5. – Our company name
  6. – A key HR service
  7. – Our plan to reach our goals
  8. – The process for welcoming new employees
Down
  1. – The structure of how tasks move
  2. – One of our core values
  3. – Protects our systems and data
  4. – Staying aligned with regulations
  5. – What guides our long-term direction
  6. – What makes our efforts stronger
  7. – A measure of performance (Key Performance Indicator)

15 Clues: – Our company name– A key HR service– One of our core values– Helps us grow and improve– Our plan to reach our goals– Protects our systems and data– The structure of how tasks move– What makes our efforts stronger– Staying aligned with regulations– What guides our long-term direction– Driving improvement through new ideas...

Guess me If you Can 2022-06-29

Guess me If you Can crossword puzzle
Across
  1. Moral philosophy
  2. of conduct A set of rules
  3. An event that is either unpleasant or unusual
  4. The act of obeying an order, rule, or request
  5. Possibility of loss or injury
  6. A set of guidelines
Down
  1. An official inspection
  2. One who reports suspected wrongdoing
  3. Verification of the identity
  4. Protection of internet-connected system

10 Clues: Moral philosophyA set of guidelinesAn official inspectionof conduct A set of rulesVerification of the identityPossibility of loss or injuryOne who reports suspected wrongdoingProtection of internet-connected systemAn event that is either unpleasant or unusualThe act of obeying an order, rule, or request

Guess Me If You Can 2022-06-29

Guess Me If You Can crossword puzzle
Across
  1. Moral philosophy
  2. of conduct A set of rules
  3. An event that is either unpleasant or unusual
  4. The act of obeying an order, rule, or request
  5. Possibility of loss or injury
  6. A set of guidelines
Down
  1. An official inspection
  2. One who reports suspected wrongdoing
  3. Verification of the identity
  4. Protection of internet-connected system

10 Clues: Moral philosophyA set of guidelinesAn official inspectionof conduct A set of rulesVerification of the identityPossibility of loss or injuryOne who reports suspected wrongdoingProtection of internet-connected systemAn event that is either unpleasant or unusualThe act of obeying an order, rule, or request

Family Puzzle Time! 2022-01-11

Family Puzzle Time! crossword puzzle
Across
  1. A game completed by all three (human) family members
  2. Messengers for Demon Slayers
  3. The most dignified gentleman in the house
  4. The go-to nightly unwind YouTube videos
  5. Katie's favorite novel!
  6. Both our favorite burger AND a character on Venture Brothers
Down
  1. Taylor's favorite dinner food
  2. Beckett's college major!
  3. Toss a coin to this guy
  4. He loves nighttime belly pets!
  5. Please don't tell people how he lives
  6. He loves to play on the bachelor pad
  7. Our favorite doggo!
  8. This guy loves to grind...

14 Clues: Our favorite doggo!Toss a coin to this guyKatie's favorite novel!Beckett's college major!This guy loves to grind...Messengers for Demon SlayersTaylor's favorite dinner foodHe loves nighttime belly pets!He loves to play on the bachelor padPlease don't tell people how he livesThe go-to nightly unwind YouTube videos...

Product Cybersecurity Awareness 2023-10-09

Product Cybersecurity Awareness crossword puzzle
Across
  1. - weakness of an asset or control that can be exploited by one or more threats
  2. - property that information is not made available or disclosed to unauthorized individuals, entities, or processes
  3. part that is logically and technically separable
  4. - object that has value, or contributes to value
  5. - the process of encoding information to protect information from unauthorized access
  6. - property of being accessible and usable on demand by an authorized entity
  7. - provision of assurance that a claimed characteristic of an entity is correct
  8. - property of accuracy and completeness
Down
  1. - a segment of code or a program designed to take advantage of a flaw in a computer system
  2. - security process that determines a user or service's level of access
  3. - the assurance that someone cannot deny the validity of something
  4. - occurrence or change of a particular set of circumstances
  5. - estimate of magnitude of damage or physical harm from a damage scenario
  6. - person, group, or organization that carries out an attack path

14 Clues: - property of accuracy and completenesspart that is logically and technically separable- object that has value, or contributes to value- occurrence or change of a particular set of circumstances- person, group, or organization that carries out an attack path- the assurance that someone cannot deny the validity of something...

Cybersecurity is Awesome 2019-11-28

Cybersecurity is Awesome crossword puzzle
Across
  1. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  2. An attack that tricks a user into clicking a webpage element which is invisible or disguised as another element, which may allow attackers to steal credentials or reveal other confidential information.
  3. Second component of the famous InfoSec triad.
  4. A function that can be used to map data of arbitrary size to fixed-size values.
  5. A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
  6. An attack that aims to access files and directories that are stored outside the web root folder.
  7. Third component of the famous InfoSec triad.
Down
  1. An attack where the attacker secretly relays and possibly alters the communications between two parties.
  2. The original name of AES, a specification used for the encryption of electronic data.
  3. A method of trying to gather personal information using deceptive e-mails and websites.
  4. First component of the famous InfoSec triad.
  5. An attack where the attacker submits many passwords / passphrases with the hope of eventually guessing it correctly.
  6. A web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database.
  7. _________ occurs when a program tries to store more data in a temporary storage area than it can hold.

14 Clues: First component of the famous InfoSec triad.Third component of the famous InfoSec triad.Second component of the famous InfoSec triad.A function that can be used to map data of arbitrary size to fixed-size values.The original name of AES, a specification used for the encryption of electronic data....

Crossword on Cybersecurity 2024-12-23

Crossword on Cybersecurity crossword puzzle
Across
  1. The process of taking plain text and scrambling it into an unreadable format
  2. A secure network that allows users to connect to the internet privately and safely
  3. information that a website puts on a user's computer.
  4. Threatening behavior facilitated through electronic means such as texting.
  5. The “a” in the C-I-A Triad
  6. A collection of compromised computers used to perform coordinated attacks
  7. The second "D" in DDO
  8. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
Down
  1. The "U" in url
  2. Hardware or software designed to prevent unauthorized access to or from a private network
  3. The “I” in the C-I-A Triad
  4. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction
  5. A type of malicious software designed to block access to a computer system until a sum of money is paid
  6. Unauthorized access to a network, information systems, or application.

14 Clues: The "U" in urlThe second "D" in DDOThe “I” in the C-I-A TriadThe “a” in the C-I-A Triadinformation that a website puts on a user's computer.Unauthorized access to a network, information systems, or application.A collection of compromised computers used to perform coordinated attacks...

Cybersecurity Awareness month 2025-09-30

Cybersecurity Awareness month crossword puzzle
Across
  1. The process of converting information into a code for security
  2. A saved copy of data for recovery after loss or attack
  3. A software update that fixes security vulnerabilities
  4. Manipulating people into revealing confidential information
  5. Software that secretly monitors your computer activities
Down
  1. Malicious software that locks files until a payment is made
  2. A login method requiring two forms of verification
  3. A scam email or message tricking you into giving personal information
  4. A network of infected devices controlled remotely
  5. A program that detects and removes malicious software
  6. A secret string used to secure accounts
  7. Malicious software designed to damage or gain access to a system
  8. A network security system that blocks unauthorized access
  9. A service that creates a secure tunnel for internet traffic

14 Clues: A secret string used to secure accountsA network of infected devices controlled remotelyA login method requiring two forms of verificationA program that detects and removes malicious softwareA software update that fixes security vulnerabilitiesA saved copy of data for recovery after loss or attack...

Shayaans Life 2023-01-11

Shayaans Life crossword puzzle
Across
  1. My favorite game
  2. what is aphone
  3. an animal I hate
  4. my favorite food
  5. where i used to live
Down
  1. what i think my future job is going to be
  2. are something better than cookies
  3. what I have as another pet
  4. what is the base code of a computer
  5. what I have as a pet

10 Clues: what is aphoneMy favorite gamean animal I hatemy favorite foodwhat I have as a petwhere i used to livewhat I have as another petare something better than cookieswhat is the base code of a computerwhat i think my future job is going to be

M3 test crossword 2023-06-14

M3 test crossword crossword puzzle
Across
  1. Stops electricity from flowing, rubber.
  2. Power from water.
  3. Happens again and again.
  4. Power from Earth's heat.
  5. Online protection.
Down
  1. Power lines connecting power supplies to homes in a large area.
  2. Measures the voltage in the circuit.
  3. Makes power and electricity.
  4. If it's high, power is low.
  5. Allows electricity to flow, metal.

10 Clues: Power from water.Online protection.Happens again and again.Power from Earth's heat.If it's high, power is low.Makes power and electricity.Allows electricity to flow, metal.Measures the voltage in the circuit.Stops electricity from flowing, rubber.Power lines connecting power supplies to homes in a large area.

Telecom Olympics 2020 2020-04-10

Telecom Olympics 2020 crossword puzzle
Across
  1. Making copies of data
  2. Tech Support Company
  3. Don't open ___ from people you don't know
  4. WCTA is ____ years old
  5. Use ____ passwords
  6. The capacity of a telecom line to carry signals
  7. Network security system used to stop unauthorized access
  8. Communication over a distance
  9. A piece of code that is capable of destroying data
Down
  1. Board President
  2. NIST involves strategies for ____
  3. The activity of defrauding by posing as a legit business
  4. Someone who seeks to exploit weaknesses in a network
  5. What is a CDR?

14 Clues: What is a CDR?Board PresidentUse ____ passwordsTech Support CompanyMaking copies of dataWCTA is ____ years oldCommunication over a distanceNIST involves strategies for ____Don't open ___ from people you don't knowThe capacity of a telecom line to carry signalsA piece of code that is capable of destroying data...

Garrett & Angie 2024-04-23

Garrett & Angie crossword puzzle
Across
  1. The city where Garrett proposed
  2. Angie's favorite type of wine
  3. Garrett's college degree
  4. Their favorite sport to watch together
  5. Couples' favorite sport to play together
  6. The current city the couple lives in
  7. The # of years the couple has been together
Down
  1. Couples' favorite TV show to watch together
  2. The sport Garrett played in college
  3. Garrett's middle name
  4. Angie's middle name
  5. City where Angie was born
  6. The state where the couple went to college
  7. Angie's college degree

14 Clues: Angie's middle nameGarrett's middle nameAngie's college degreeGarrett's college degreeCity where Angie was bornAngie's favorite type of wineThe city where Garrett proposedThe sport Garrett played in collegeThe current city the couple lives inTheir favorite sport to watch togetherCouples' favorite sport to play together...

Compleanno 2025-12-17

Compleanno crossword puzzle
Across
  1. dove andiamo a mangiare
  2. la bionda dalla quale vai sempre con i tuoi colleghi
  3. l'ambito lavorativo per combattere gli hacker
  4. la tua macchina dei sogni
  5. la canzone che più ci rappresenta
  6. nomignolo
  7. dove ci siamo conosciuti
Down
  1. il prof che odi
  2. la nobile artedi sopravvivere
  3. la battaglia tra un pasto e l'altro
  4. la materia che ti ha fatto venire gli incubi
  5. l'appuntamento fisso di ogni Ottobre
  6. si trova ANCHE a New York
  7. come ti chiamo

14 Clues: nomignolocome ti chiamoil prof che odidove andiamo a mangiaredove ci siamo conosciutila tua macchina dei sognisi trova ANCHE a New Yorkla nobile artedi sopravviverela canzone che più ci rappresentala battaglia tra un pasto e l'altrol'appuntamento fisso di ogni Ottobrela materia che ti ha fatto venire gli incubi...

Profesi dan peluang usaha dibildang tkjt 2023-11-17

Profesi dan peluang usaha dibildang tkjt crossword puzzle
Across
  1. memastikan perusahaan mematuhi peraturan dan standar keamanan TI
  2. pembuat konten
  3. mengelola dan memelihara jaringan komputer perusahaan
  4. bertanggung jawab memelihara jaringan komputer
  5. mengkroordinasikan proyek proyek TI
Down
  1. yang mengelola jaringan komputer
  2. membangun dan mengembangkan situs web
  3. memberikan pelatihan tentang penggunaan teknologi
  4. yang mengembangkan kecerdasan buatan
  5. yang menjaga keamanan terhadap sistem insfastrukur TI

10 Clues: pembuat kontenyang mengelola jaringan komputermengkroordinasikan proyek proyek TIyang mengembangkan kecerdasan buatanmembangun dan mengembangkan situs webbertanggung jawab memelihara jaringan komputermemberikan pelatihan tentang penggunaan teknologiyang menjaga keamanan terhadap sistem insfastrukur TI...

test 2025-08-27

test crossword puzzle
Across
  1. Who’s responsible for cybersecurity? Not just IT. It’s ___’s job.
  2. If you leave your seat, hit Windows + L — don’t forget to ___ your PC!
  3. Paycheque.pdf.exe isn’t a paycheque. It’s an ___ pretending to be one. (Hint: look at the extension!)
  4. The reps and workouts your brain needs to stay sharp against cyber threats.
  5. When someone slips in behind you through a locked door… or the thing you do with hotdogs before the big game.
  6. One wrong __ is all it takes to turn a normal day into “call IT, we’ve got a problem.”
  7. That free online PDF tool that shrank your file… and smuggled in malware like the horse at Troy. THREAT.
  8. A great place to share vacation pics… and for hackers to gather info about you.
Down
  1. The name of a company that should not be used in any password.
  2. An AI buddy who can explain cybersecurity… or ruin the surprise in your crossword puzzle
  3. Picking up the phone to ask, “Hey, did you really send me that email?”
  4. That “urgent” email from bill.gates@micros0ft.com offering you free money.
  5. A tasty little file that remembers your logins, shopping cart, and site preferences (but sadly, not chocolate chip).

13 Clues: The name of a company that should not be used in any password.Who’s responsible for cybersecurity? Not just IT. It’s ___’s job.If you leave your seat, hit Windows + L — don’t forget to ___ your PC!Picking up the phone to ask, “Hey, did you really send me that email?”That “urgent” email from bill.gates@micros0ft.com offering you free money....

cs 2025-09-25

cs crossword puzzle
Across
  1. The name of a company that should not be used in any password.
  2. A great place to share vacation pics… and for hackers to gather info about you.
  3. If you leave your seat, hit Windows + L — don’t forget to ___ your PC!
  4. Paycheque.pdf.exe isn’t a paycheque. It’s an ___ pretending to be one. (Hint: look at the extension!)
  5. An AI buddy who can explain cybersecurity… or ruin the surprise in your crossword puzzle
  6. The reps and workouts your brain needs to stay sharp against cyber threats.
  7. A tasty little file that lives in your browser and remembers your logins, shopping cart, and site preferences (but sadly, not chocolate chip).
Down
  1. Who’s responsible for cybersecurity? Not just IT. It’s ___’s job.
  2. That free online PDF tool that shrank your file… and smuggled in malware like the horse at Troy. THREAT.
  3. That “urgent” email from bill.gates@micros0ft.com offering you free money.
  4. Picking up the phone to ask, “Hey, did you really send me that email?”
  5. When someone slips in behind you through a locked door… or the thing you do with hotdogs before the big game.
  6. One wrong __ is all it takes to turn a normal day into “call IT, we’ve got a problem.”

13 Clues: The name of a company that should not be used in any password.Who’s responsible for cybersecurity? Not just IT. It’s ___’s job.If you leave your seat, hit Windows + L — don’t forget to ___ your PC!Picking up the phone to ask, “Hey, did you really send me that email?”That “urgent” email from bill.gates@micros0ft.com offering you free money....

Cybersecurity Awareness 2023-10-12

Cybersecurity Awareness crossword puzzle
Across
  1. Tool that helps users create, save, and manage passwords
  2. Fraudulent practice of sending emails or other messages pretending to be from a legitimate source trying to convince you to click on a link
  3. A phishing attack conducted by phone
  4. A person who engages in criminal activity by means of computers or the internet
Down
  1. Being protected against criminal or unauthorized use of electronic data, or the measures taken to achieve this
  2. Multifactor Authentication
  3. A secret word or phrase that must be used to gain access to something
  4. Use of deception to manipulate individuals into divulging confidential or personal information
  5. Malicious software designed to block access to a computer system until a sum of money is paid

9 Clues: Multifactor AuthenticationA phishing attack conducted by phoneTool that helps users create, save, and manage passwordsA secret word or phrase that must be used to gain access to somethingA person who engages in criminal activity by means of computers or the internet...

Cybersecurity Puzzle 2024-10-14

Cybersecurity Puzzle crossword puzzle
Across
  1. using historical data and advanced predictive algorithms
  2. AI- driven systems demonstrate this against evolving threats
  3. One of the databases used in the study
  4. a form of network intrusion
  5. pose an ever-growing challenge to security
Down
  1. researchers argue that this approach will simplify cybersecurity
  2. A form of cyber applications of AI bas
  3. A critical concern against AI systems
  4. one of the various facets of cyber security

9 Clues: a form of network intrusionA critical concern against AI systemsA form of cyber applications of AI basOne of the databases used in the studypose an ever-growing challenge to securityone of the various facets of cyber securityusing historical data and advanced predictive algorithmsAI- driven systems demonstrate this against evolving threats...

Cybersecurity crossword 2024-11-07

Cybersecurity crossword crossword puzzle
Across
  1. A secure network that hides your IP address and encrypts your internet connection to protect privacy.
  2. An affordable mini-computer for learning.
  3. A security method that requires two forms of verification
Down
  1. A software that lets you run different operating systems on the same computer.
  2. The process of converting information into a code to stop unauthorized access.
  3. A weakness in a system that can be exploited to gain unauthorized access.
  4. Software that secretly monitors and collects data without the user's consent.
  5. Attack where an intruder intercepts to spy on or alter an exchange.
  6. An attack method that tries all possible combinations to guess a password or encryption key.

9 Clues: An affordable mini-computer for learning.A security method that requires two forms of verificationAttack where an intruder intercepts to spy on or alter an exchange.A weakness in a system that can be exploited to gain unauthorized access.Software that secretly monitors and collects data without the user's consent....

Cybersecurity Puzzle! 2024-12-03

Cybersecurity Puzzle! crossword puzzle
Across
  1. Unauthorized access to or manipulation of computer systems.
  2. A program that protects your computer from viruses
  3. A network security device that monitors and controls incoming and outgoing traffic.
  4. A process used to confirm the identity of a user.
Down
  1. A method of stealing personal information by pretending to be a trustworthy source.
  2. A type of software designed to harm or exploit systems
  3. A weak point in a system that can be exploited.
  4. A secret code used to secure data.
  5. A person who attempts to gain unauthorized access to networks.

9 Clues: A secret code used to secure data.A weak point in a system that can be exploited.A process used to confirm the identity of a user.A program that protects your computer from virusesA type of software designed to harm or exploit systemsUnauthorized access to or manipulation of computer systems....

Cybersecurity Crossword 2025-04-21

Cybersecurity Crossword crossword puzzle
Across
  1. What type of accounts are most likely to get hacked?
  2. A 13 character password would take about 359,000 ___ to crack
  3. The method to crack passwords by trying all sorts of combinations
  4. Over __% of people use passwords of things that are important to them
  5. "123456" and this are the two most commonly used passwords
Down
  1. Are at a higher risk of password hacking due to their use of the internet and their risky behaviors
  2. "_____ stuffing" is when already stolen/leaked information is used to hack into an account
  3. Who fell victim to a credential stuffing incident in 2020?
  4. Dictionary attacks use ____ words to try and guess passwords

9 Clues: What type of accounts are most likely to get hacked?Who fell victim to a credential stuffing incident in 2020?"123456" and this are the two most commonly used passwordsDictionary attacks use ____ words to try and guess passwordsA 13 character password would take about 359,000 ___ to crack...

Puzzle 2023-01-13

Puzzle crossword puzzle
Across
  1. we comply this compliance
  2. Financial platform for business
  3. Password Manager
  4. Our own ERP
  5. we protect from malicious attacks
Down
  1. I am Zoho’s new bee for calibri
  2. As a manufacturer we ship this
  3. I help you plan and visualise
  4. Zoho’s attempt on server less journey

9 Clues: Our own ERPPassword Managerwe comply this complianceI help you plan and visualiseAs a manufacturer we ship thisI am Zoho’s new bee for calibriFinancial platform for businesswe protect from malicious attacksZoho’s attempt on server less journey

Cybersecurity 3 2024-07-30

Cybersecurity 3 crossword puzzle
Across
  1. Org at this level perform annual vulnerability scan
  2. Level 5 in CMM framework
  3. one of network scanning tool
  4. ... server - one of the observation class in VA
  5. ... configuration another observation class in VA
Down
  1. Team is tasked to conduct testing with objective to break app
  2. Type of testing which is concerned only with input-output ... box
  3. PT is by nature ...
  4. one of the tools used to conduct unauthenticated scan

9 Clues: PT is by nature ...Level 5 in CMM frameworkone of network scanning tool... server - one of the observation class in VA... configuration another observation class in VAOrg at this level perform annual vulnerability scanone of the tools used to conduct unauthenticated scanTeam is tasked to conduct testing with objective to break app...

CyberSecurity 2 2024-07-24

CyberSecurity 2 crossword puzzle
Across
  1. New team structure which combines application support and new work
  2. IAM differentiates between Authenticate and ...
  3. Non-human identity example
  4. Category A3 in top 10 application weaknesses
Down
  1. weakness in application
  2. Failures related to hardcoded passwords
  3. faster method of code delivery
  4. We differentiate betn User and ...
  5. ISO27000 has 14 different categories of ...

9 Clues: weakness in applicationNon-human identity examplefaster method of code deliveryWe differentiate betn User and ...Failures related to hardcoded passwordsISO27000 has 14 different categories of ...Category A3 in top 10 application weaknessesIAM differentiates between Authenticate and ......

Cybersecurity Awareness 2024-10-20

Cybersecurity Awareness crossword puzzle
Across
  1. Irrelevant or inappropriate messages sent over the internet.
  2. Fraudulent scheme, often involving money or personal information.
  3. A form of phishing using SMS or text messages.
  4. Theft Stealing personal or sensitive information without permission.
  5. Engineering Manipulative techniques to trick people into giving up confidential information.
Down
  1. Two-factor authentication, an extra layer of security for online accounts.
  2. Fraudulent attempt to obtain sensitive information through deceptive emails.
  3. Malicious software designed to harm or exploit devices.
  4. Unauthorized access to data in a system.

9 Clues: Unauthorized access to data in a system.A form of phishing using SMS or text messages.Malicious software designed to harm or exploit devices.Irrelevant or inappropriate messages sent over the internet.Fraudulent scheme, often involving money or personal information.Theft Stealing personal or sensitive information without permission....

Cybersecurity Crossword 2023-09-15

Cybersecurity Crossword crossword puzzle
Across
  1. A secure service that connects to another network remotely.
  2. Should be made up of upper and lower case letters, special characters and numbers.
  3. Fraudulent emails or messages tricking people into giving up their personal info.
  4. Someone who breaks into computer systems to obtain unauthorized access to data.
  5. When a hacker successfully accesses a network or device vulnerabilities and gains access to the device's files and data.
Down
  1. A type of malware that spreads through computers and corrupts data and software.
  2. A type of malware that locks users out of their computer in exchange for a ransom.
  3. A malware that gathers information about a person or organization without their permission.
  4. Unauthorized access to or from a private network is prevented by this hardware/software.

9 Clues: A secure service that connects to another network remotely.Someone who breaks into computer systems to obtain unauthorized access to data.A type of malware that spreads through computers and corrupts data and software.Fraudulent emails or messages tricking people into giving up their personal info....

Cybersecurity Awarenemss 2025-10-13

Cybersecurity Awarenemss crossword puzzle
Across
  1. A secret word of phrase used to login to an account.
  2. phishing attack delivered via text message
  3. Acronym for Business Email COmpromise, an attack that takes over your business email address
  4. Fraud that comes from someone inside the organization such as an employee or contractor
  5. Type of malware that spreads across systems without needing user interaction, also used to bait a hook to catch fish.
Down
  1. Abbreviation for a Payment Card Industry Data Standard for handling credit card data.
  2. Voice based phishing attack where scammers impersonate trusted sources over the phone.
  3. Manipulating people into giving up confidential information through deception or impersonation
  4. Cyberattack which tricks users into revealing information through fake emails and websites

9 Clues: phishing attack delivered via text messageA secret word of phrase used to login to an account.Abbreviation for a Payment Card Industry Data Standard for handling credit card data.Voice based phishing attack where scammers impersonate trusted sources over the phone....

Cybersecurity Crossword 2025-10-12

Cybersecurity Crossword crossword puzzle
Across
  1. Online criminal who tries to steal data
  2. Always make your password ---- to guess.
  3. Your secret word to get into an account.
  4. Online criminal who tries to steal data
Down
  1. What you should save or copy your files onto (like an external drive).
  2. A trick where someone pretends to be a company to get your info.
  3. A bad software that makes your computer sick (like a cold).
  4. The opposite of strong; a quick-to-guess secret word.
  5. A scam where bad people trick you for information.

9 Clues: Online criminal who tries to steal dataAlways make your password ---- to guess.Your secret word to get into an account.Online criminal who tries to steal dataA scam where bad people trick you for information.The opposite of strong; a quick-to-guess secret word.A bad software that makes your computer sick (like a cold)....

Cybersecurity Attacks 2023-04-15

Cybersecurity Attacks crossword puzzle
Across
  1. With _____, the victim’s system is held hostage until they agree to pay money to the attacker.
  2. A _____ attack occurs when a malicious actor sends emails that seem to be coming from trusted, legitimate sources in an attempt to grab sensitive information from the target.
  3. In a _____ attack, a hacker embeds malicious code into an insecure website.
  4. A _____ attack gets its name from the “brutish” or simple methodology employed by the attack. The attacker simply tries to guess the login credentials of someone with access to the target system.
Down
  1. A _____ attack uses a malicious program that is hidden inside a seemingly legitimate one
  2. _____ types of cyber attacks refer to breaches in cybersecurity that make it possible for an attacker to eavesdrop on the data sent back and forth between two people, networks, or computers.
  3. A _____ attack is designed to overwhelm the resources of a system to the point where it is unable to reply to legitimate service requests.
  4. _____ infects a computer and changes how it functions, destroys data, or spies on the user or network traffic as it passes through.
  5. With _____, a hacker alters DNS records to send traffic to a fake website.

9 Clues: With _____, a hacker alters DNS records to send traffic to a fake website.In a _____ attack, a hacker embeds malicious code into an insecure website.A _____ attack uses a malicious program that is hidden inside a seemingly legitimate oneWith _____, the victim’s system is held hostage until they agree to pay money to the attacker....

Cybersecurity puzzle 2023-04-21

Cybersecurity puzzle crossword puzzle
Across
  1. related to your identity or personal information
  2. looking over someones shoulder to get information
  3. a file or code
  4. takes over your computer
Down
  1. the opposite to a virus
  2. knowledge obtained from investigating
  3. a type of malware that can copy itself
  4. data
  5. a network of computer infected by malware
  6. and individual who uses computer networking to overcome a technical problem

10 Clues: dataa file or codethe opposite to a virustakes over your computerknowledge obtained from investigatinga type of malware that can copy itselfa network of computer infected by malwarerelated to your identity or personal informationlooking over someones shoulder to get information...

Cybersecurity 2.2 2022-02-22

Cybersecurity 2.2 crossword puzzle
Across
  1. Software running with elevated privileges to control a computer or to gain access to restricted accounts and data
  2. Problems, faults, and bugs in the program that are exploitable, allowing attackers access to the computer on which the program is running
  3. A file that contains an official record of activities that occur on a computer
  4. software that replicates and infects many computers, turning the computer into a "zombie"
  5. Reverse the encryption process, making the data human-readable again
Down
  1. A human-based attack in which the malicious user intercepts communication between the victim's computer and the internet
  2. Software and hardware that track all keyboard clicks, including back spaces, to discover usernames, passwords, credit card numbers, and other sensitive information
  3. Small units of data, transmitted on a network. Collected together, they compose some larger data, such as a document, a website, a movie, etc
  4. Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it

9 Clues: Reverse the encryption process, making the data human-readable againA file that contains an official record of activities that occur on a computersoftware that replicates and infects many computers, turning the computer into a "zombie"Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it...

Cybersecurity Month 2022-10-13

Cybersecurity Month crossword puzzle
Across
  1. ________ Information must be protected from leaks or accidental exposure.
  2. Button in Outlook to report suspicious email or phishing in one click.
  3. _______ Period is the length of time information assets are maintained for an authorized person.
  4. Security _______ is a single or series of unwanted or unexpected information Security Events
Down
  1. What is celebrated in October?
  2. Information is accessible to authorized users.
  3. Information is accurate, complete, and reliable.
  4. Mail that seeks to offer services, products, or advertisements but it could be from either a genuine company or a cybercriminal trying to trick you.
  5. A Security ______ is an identified occurrence within a system, service, or network that may be security relevant.

9 Clues: What is celebrated in October?Information is accessible to authorized users.Information is accurate, complete, and reliable.Button in Outlook to report suspicious email or phishing in one click.________ Information must be protected from leaks or accidental exposure....

Majors and Concentrations 2022-01-26

Majors and Concentrations crossword puzzle
Across
  1. studies the past
  2. studies the ocean
  3. lights...camera...action!
  4. spends a lot of time with a calculator
  5. the study of living organisms
Down
  1. studies how to effectively target consumers
  2. the scientific study of mind and behavior
  3. clinicals are part of the program
  4. synthesizes biology and chemistry
  5. learns to protect on a digital platform
  6. works with chemicals and beakers
  7. synthesizes math science and creativity to build things

12 Clues: studies the paststudies the oceanlights...camera...action!the study of living organismsworks with chemicals and beakersclinicals are part of the programsynthesizes biology and chemistryspends a lot of time with a calculatorlearns to protect on a digital platformthe scientific study of mind and behaviorstudies how to effectively target consumers...

Tech 2025-07-11

Tech crossword puzzle
Across
  1. Approval
  2. practice of protecting computer systems
  3. Disguises itself as an legitimate program
  4. Science Technology engineering & mathematics
  5. Program used to keep intruders out
  6. Naazharae Smith
Down
  1. ensures that resources are only granted to those users who are entitled to them
  2. Damages & disables computers systems
  3. Attempt to trick users
  4. attacker that lurks on your network for extended periods
  5. Hijacks system and encrypts files
  6. software designed to detect and remove malware

12 Clues: ApprovalNaazharae SmithAttempt to trick usersHijacks system and encrypts filesProgram used to keep intruders outDamages & disables computers systemspractice of protecting computer systemsDisguises itself as an legitimate programScience Technology engineering & mathematicssoftware designed to detect and remove malware...

Cybersecurity Month 2022-07-29

Cybersecurity Month crossword puzzle
Across
  1. A specifically configured server, also known as decoy server, designed to attract and monitor intruders in a manner such that their actions do not affect production systems
  2. A malware software that seems legitimate enough that users voluntarily install them onto their computers, allowing the malware to infect their systems.
  3. a form of cyberattack that infect and spread through computer systems without an action from the user; they can operate on their own and spread by exploiting vulnerabilities within the victim's operating system
  4. A large number of compromised computers that are used to create and send spam or viruses or flood a network with messages such as a denial-of-service attack
  5. Finding and exploiting vulnerabilities in a system or on a website
Down
  1. The process of taking an unencrypted message (plaintext), applying a mathematical function to it (encryption algorithm with a key) and producing an encrypted message (ciphertext)
  2. This is a type of electronic mail (email) attack that attempts to convince a user that the originator is genuine, by with the intention of obtaining information for use in social engineering
  3. A highly sophisticated cyber threat as criminals work hard to make spoofed emails and websites appear as realistic and possible
  4. disrupts computer operations, gathers sensitive information or gains access to private computer systems through the use of code, scripts, active content and other forms of software; abbreviation for malicious software

9 Clues: Finding and exploiting vulnerabilities in a system or on a websiteA highly sophisticated cyber threat as criminals work hard to make spoofed emails and websites appear as realistic and possibleA malware software that seems legitimate enough that users voluntarily install them onto their computers, allowing the malware to infect their systems....

Cybersecurity Ylan 2024-11-07

Cybersecurity Ylan crossword puzzle
Across
  1. A test used to verify if a user is human and not a robot.
  2. A program that protects your computer from viruses.
  3. Network of devices connected to the internet to exchange data.
  4. A company that makes equipment and software to help connect and protect computer networks.
  5. A secret part of the internet, often used for anonymous activities.
Down
  1. A unique number that identifies a computer or device on the internet or a network.
  2. A protocol used to connect and control a remote computer.
  3. A secret word or code to log in.
  4. A person who tries to break into computers illegally.

9 Clues: A secret word or code to log in.A program that protects your computer from viruses.A person who tries to break into computers illegally.A protocol used to connect and control a remote computer.A test used to verify if a user is human and not a robot.Network of devices connected to the internet to exchange data....

Majors and Concentrations 2022-01-26

Majors and Concentrations crossword puzzle
Across
  1. learns to protect on a digital platform
  2. the scientific study of mind and behavior
  3. works with chemicals and beakers
  4. spends a lot of time with a calculator
  5. studies the ocean
  6. synthesizes math science and creativity to build things
Down
  1. studies how to effectively target consumers
  2. synthesizes biology and chemistry
  3. clinicals are part of the program
  4. studies the past
  5. lights...camera...action!
  6. the study of living organisms

12 Clues: studies the paststudies the oceanlights...camera...action!the study of living organismsworks with chemicals and beakerssynthesizes biology and chemistryclinicals are part of the programspends a lot of time with a calculatorlearns to protect on a digital platformthe scientific study of mind and behaviorstudies how to effectively target consumers...

NAVFAC Capabilities 2023-02-16

NAVFAC Capabilities crossword puzzle
Across
  1. NEPA regulations requirement
  2. ________ Handling Ashore Procurement
  3. ________Facilities and Equipment Engineering
  4. Protection against criminal or unauthorized use of electronic data
  5. Basic physical and organizational structures and facilities
  6. Real Estate _________ and Management
Down
  1. _______ and Facilities Operations
  2. _________ Vehicles provide transportation services
  3. Relating to impact of human activity on the natural world
  4. Proposed or planned undertaking
  5. NAVFAC Capabilities: ______ & Construction
  6. Detailed coordination of a complex operation involving people, facilities, or supplies.

12 Clues: NEPA regulations requirementProposed or planned undertaking_______ and Facilities Operations________ Handling Ashore ProcurementReal Estate _________ and ManagementNAVFAC Capabilities: ______ & Construction________Facilities and Equipment Engineering_________ Vehicles provide transportation services...

klausimai 2023-05-17

klausimai crossword puzzle
Across
  1. Kas yra „object-oriented programming“?
  2. Kas yra žurnalavimas?
  3. Kas yra „data cente?
  4. Kas yra „software development life cycle“?
  5. Kas yra „operating system“?
  6. Kas yra „network protocol“?
  7. Kas yra „serveris“?
  8. Kas yra „cloud computing“?
  9. Kas yra „version control“?
  10. Kas yra „URL“?
  11. Kas yra „cybersecurity“?
  12. Kas yra „cache“?
  13. Kas yra „cyber attack“?
  14. Kas yra „bug“
  15. Kas yra „router“?
  16. Kas yra „firewall“?
Down
  1. Kas yra „artificial intelligence“?
  2. Kas yra „RAM“?
  3. Kas yra „encryption“?
  4. Kas yra „HTML“?
  5. Kas yra „API“?
  6. Kas yra „data backup“?
  7. Kas yra „malware“?
  8. Kas yra „database management system“?
  9. Kas yra algoritmas
  10. Kas yra duomenų bazė?
  11. Kas yra „programming language“?
  12. Kas yra „data mining“?
  13. Kas yra „open source“?
  14. Kas yra „user interface“?

30 Clues: Kas yra „bug“Kas yra „RAM“?Kas yra „API“?Kas yra „URL“?Kas yra „HTML“?Kas yra „cache“?Kas yra „router“?Kas yra „malware“?Kas yra algoritmasKas yra „serveris“?Kas yra „firewall“?Kas yra „data cente?Kas yra „encryption“?Kas yra žurnalavimas?Kas yra duomenų bazė?Kas yra „data backup“?Kas yra „data mining“?Kas yra „open source“?Kas yra „cyber attack“?...

jihana dwi a_xf 18 2025-04-15

jihana dwi a_xf 18 crossword puzzle
Across
  1. Platform konten digital
  2. Scientist / Menganalisis data
  3. Memblokir akses ke situs atau konten
  4. Memfilter konten negatif
  5. Konten video di platform digital
  6. Memblokir konten negatif
  7. Hak eksklusif penemuan
  8. Melindungi karya intelektual dan penemuan
  9. Izin menggunakan karya orang lain
  10. Cipta / Melindungi karya intelektual
  11. Tanda produk atau jasa
  12. Tag yang membantu mesin pencari
  13. Versi lama halaman web
  14. Melindungi sistem dari serangan
  15. Konten menyebar cepat di media sosial
Down
  1. Operator pencarian lanjutan
  2. Memeriksa keaslian konten
  3. Developer / Mengembangkan situs web
  4. Memblokir akses ke situs atau konten
  5. Mengembangkan perangkat lunak
  6. Cari hasil dari situs tertentu
  7. Mempengaruhi audiens di media sosial
  8. Cari file dengan tipe tertentu
  9. Merancang antarmuka pengguna
  10. Konten digital yang berubah

25 Clues: Hak eksklusif penemuanTanda produk atau jasaVersi lama halaman webPlatform konten digitalMemfilter konten negatifMemblokir konten negatifMemeriksa keaslian kontenOperator pencarian lanjutanKonten digital yang berubahMerancang antarmuka penggunaScientist / Menganalisis dataMengembangkan perangkat lunakCari hasil dari situs tertentu...

Jenny and Nate 2023-01-19

Jenny and Nate crossword puzzle
Across
  1. Jenny is the _________ of her siblings
  2. What God has _______, let not man separate
  3. State where honeymoon will be
  4. Relationship of flower girl (Esther) to Jenny
  5. Name of wedding venue
  6. ”Mawiage, mawiage, is what ______ us together today”
  7. Nate’s birthday month
  8. Jenny's major
  9. The couple's favorite author, hint: Narnia
Down
  1. _____ is patient and kind
  2. Nate’s hometown, hint: rhymes with “mutton”
  3. Jenny played this sport in high school
  4. Nate plays this instrument
  5. Nate's major
  6. The formal event to declare a marriage
  7. Jenny’s birthday month
  8. First date, hint: Omaha Art Museum
  9. You may now _____ the bride
  10. Who drinks coffee black? Him or her
  11. Class Nate and Jenny met in

20 Clues: Nate's majorJenny's majorName of wedding venueNate’s birthday monthJenny’s birthday month_____ is patient and kindNate plays this instrumentYou may now _____ the brideClass Nate and Jenny met inState where honeymoon will beFirst date, hint: Omaha Art MuseumWho drinks coffee black? Him or herJenny is the _________ of her siblings...

Future of Technology 2025-11-17

Future of Technology crossword puzzle
Across
  1. Popular cryptocurrency abbreviation
  2. Study of genes and DNA manipulation
  3. Immersive computer-generated environment
  4. Securing data by encoding information
  5. Machines that perform tasks autonomously
  6. Decentralized digital ledger technology
  7. A city enhanced with IoT technology
  8. Group of autonomous robots or drones working together
  9. Digital currency and related technologies
  10. Next generation mobile network after 5G
Down
  1. Energy from sustainable sources
  2. Technology enabling space travel and exploration
  3. Study of biological systems used in future medicine
  4. Brain–computer interface technology
  5. Discarded electronic devices
  6. AI systems that learn from data
  7. Advanced computing using qubits
  8. Augmented reality technology
  9. Protection of computers and networks
  10. Technology using extremely small particles

20 Clues: Discarded electronic devicesAugmented reality technologyEnergy from sustainable sourcesAI systems that learn from dataAdvanced computing using qubitsPopular cryptocurrency abbreviationBrain–computer interface technologyStudy of genes and DNA manipulationA city enhanced with IoT technologyProtection of computers and networks...

JD 2024-12-20

JD crossword puzzle
Across
  1. b
  2. 3
  3. 30
  4. x
  5. 28
  6. i
  7. 10
  8. 20
  9. z
  10. 22
  11. p
  12. m
  13. 14
  14. 4
  15. 25
  16. o
  17. 12
  18. 26
  19. u
  20. 18
  21. 8
  22. w
  23. 13
  24. 21
  25. e
  26. h
  27. 29
  28. q
  29. 11
  30. r
Down
  1. 1
  2. c
  3. a
  4. v
  5. k
  6. 24
  7. 32
  8. 31
  9. j
  10. 19
  11. 27
  12. 23
  13. t
  14. 7
  15. 6
  16. 2
  17. d
  18. 5
  19. f
  20. y
  21. l
  22. j
  23. 15
  24. s
  25. 33
  26. 16
  27. 17
  28. g
  29. 9
  30. n

60 Clues: 1bc3avkxijt7z62dpm5f4ylojus8wg9enhqr243032281031192723202214251226151813331617212911

Future of Technology 2025-11-17

Future of Technology crossword puzzle
Across
  1. Next generation mobile network after 5G
  2. Protection of computers and networks
  3. Technology enabling space travel and exploration
  4. Group of autonomous robots or drones working together
  5. Discarded electronic devices
  6. Digital currency and related technologies
  7. Decentralized digital ledger technology
  8. Study of genes and DNA manipulation
  9. Machines that perform tasks autonomously
  10. Securing data by encoding information
Down
  1. Immersive computer-generated environment
  2. A city enhanced with IoT technology
  3. Augmented reality technology
  4. Technology using extremely small particles
  5. Popular cryptocurrency abbreviation
  6. AI systems that learn from data
  7. Advanced computing using qubits
  8. Study of biological systems used in future medicine
  9. Brain–computer interface technology
  10. Energy from sustainable sources

20 Clues: Augmented reality technologyDiscarded electronic devicesAI systems that learn from dataAdvanced computing using qubitsEnergy from sustainable sourcesA city enhanced with IoT technologyPopular cryptocurrency abbreviationStudy of genes and DNA manipulationBrain–computer interface technologyProtection of computers and networks...

Spanish-English Tech Words (Use - to separate words) 2025-11-21

Spanish-English Tech Words (Use - to separate words) crossword puzzle
Across
  1. Plataforma
  2. Obsoleto
  3. Datos
  4. (Realidad Virutal)
  5. Motor de busqueda
  6. Tecnofobo
  7. Inalamambrico
  8. Punto de acceso
  9. Iniciar Session
  10. Caerse
  11. Captura de pantalla
  12. Cargar
  13. copia de seguridad
  14. Descargar
  15. Servidor
  16. Permitir
  17. Mejorar
  18. DEVELOPER Desorallador de software
  19. Provedor de Internet
Down
  1. DEVICE Dispositivo Inteligente
  2. Estar en Linea
  3. Actualizar
  4. Tecnologia Ponible
  5. Adjuntar
  6. Navegar
  7. Adricululares
  8. Ciberseguridad
  9. Artilugio / Aparato
  10. BROWSER Navegador
  11. Gama
  12. Alta tecnologia
  13. Red Social
  14. Registrarse
  15. Abarcar
  16. Rastrear
  17. Ultima Generacion
  18. Experto Technologico
  19. Amplio
  20. Interfaz amigable
  21. Software Gratuito

40 Clues: GamaDatosCaerseCargarAmplioNavegarAbarcarMejorarAdjuntarObsoletoRastrearServidorPermitirTecnofoboDescargarPlataformaActualizarRed SocialRegistrarseAdriculularesInalamambricoEstar en LineaCiberseguridadAlta tecnologiaPunto de accesoIniciar SessionMotor de busquedaBROWSER NavegadorUltima GeneracionInterfaz amigableSoftware GratuitoTecnologia Ponible...

Cybersecurity Fundamental Chapter 7 2024-06-05

Cybersecurity Fundamental Chapter 7 crossword puzzle
Across
  1. A model used in cybersecurity to describe the stages of an information systems attack.
  2. Enhancing the security of an individual computer system by securing the operating system, implementing antivirus solutions, and using host-based security tools like firewalls and intrusion detection systems.
  3. The first stage in the Kill Chain where the attacker gathers information about the target to find vulnerabilities that can be exploited later.
  4. The process of securing network devices by implementing proven methods such as securing administrative access, maintaining strong passwords, and using secure communication protocols to protect against vulnerabilities and attacks.
  5. A technology used for tracking and identifying objects using radio waves.
  6. The fifth stage in the Kill Chain where malware and backdoors are installed on the target system, allowing the attacker to maintain access.
  7. The second stage in the Kill Chain where the attacker creates an exploit and malicious payload to use against the target.
  8. The fourth stage in the Kill Chain where the attacker executes the exploit to take advantage of a vulnerability in the target system.
Down
  1. The process of improving the security of servers by managing remote access, securing privileged accounts, and monitoring services to prevent unauthorized access and attacks.
  2. The sixth stage in the Kill Chain where the attacker establishes remote control over the compromised target through a command and control channel or server.
  3. Measures taken to protect physical assets such as network devices, servers, and other infrastructure components from physical threats like theft, vandalism, and natural disasters.
  4. Implementing security measures to ensure the confidentiality, integrity, and availability of data. This includes file access control and other techniques to protect data from unauthorized access and corruption.
  5. The final stage in the Kill Chain where the attacker performs malicious actions such as information theft or launching additional attacks from within the network.
  6. The third stage in the Kill Chain where the attacker sends the exploit and malicious payload to the target, typically through email or other methods.
  7. Refers to the area or scope of cybersecurity activities and responsibilities, encompassing the protection of systems, networks, and data from cyber threats.
  8. Measures and practices used to secure end devices such as workstations, servers, IP phones, and access points within a network.

16 Clues: A technology used for tracking and identifying objects using radio waves.A model used in cybersecurity to describe the stages of an information systems attack.The second stage in the Kill Chain where the attacker creates an exploit and malicious payload to use against the target....

it work 2023-03-24

it work crossword puzzle
Across
  1. pocket sized computer
  2. information
  3. data entered into and received by a computer
  4. practice of protecting a system from digital attacks
  5. gaining unauthorized access to a system or account
Down
  1. a programming language
  2. how a computer displays data
  3. data that sits outside of the trend
  4. fraudulent emails sent to obtain personal information
  5. method of data depiction

10 Clues: informationpocket sized computera programming languagemethod of data depictionhow a computer displays datadata that sits outside of the trenddata entered into and received by a computergaining unauthorized access to a system or accountpractice of protecting a system from digital attacksfraudulent emails sent to obtain personal information

Internet Safety Crossword 2021-02-11

Internet Safety Crossword crossword puzzle
Across
  1. someone who witnesses but doesn't participate
  2. a person who stands up for someone else
  3. footprint information about a person found online
  4. if something makes you feel sad or uncomfortable tell a _______ adult trusted
  5. bullying using technology
  6. information information that can identify someone
Down
  1. securing information on the internet
  2. good manners online
  3. can be trusted
  4. software intended to do damage to computers
  5. too much information

11 Clues: can be trustedgood manners onlinetoo much informationbullying using technologysecuring information on the interneta person who stands up for someone elsesoftware intended to do damage to computerssomeone who witnesses but doesn't participatefootprint information about a person found onlineinformation information that can identify someone...

dgeconomy 2025-03-12

dgeconomy crossword puzzle
Across
  1. Fifth-generation wireless technology
  2. Protection of digital systems from cyber threats
  3. Large and complex data sets
  4. A newly established business
  5. Secure and decentralized digital ledger
  6. Immersive virtual reality technology
  7. Use of technology to perform tasks with minimal human intervention
  8. Technology overlaying digital images onto the real world
Down
  1. Electronic system for storing and making transactions
  2. Internet-based computing services
  3. Digital or virtual currency
  4. Technology-driven financial services
  5. Online buying and selling of goods and services
  6. Network of connected smart devices
  7. Machines performing human-like intelligence tasks

15 Clues: Digital or virtual currencyLarge and complex data setsA newly established businessInternet-based computing servicesNetwork of connected smart devicesFifth-generation wireless technologyTechnology-driven financial servicesImmersive virtual reality technologySecure and decentralized digital ledgerOnline buying and selling of goods and services...

Browsing safety 2025-05-28

Browsing safety crossword puzzle
Across
  1. illegal way of gaining money
  2. technology designed to protect data,networks,programs
  3. bullying any person online
  4. hoaxing or misleading someone
  5. misusing someone's personal information
  6. criminal activity generally done to harm someone
  7. developed to make binary more compact
  8. computer language with 16 digits
Down
  1. programme designed to remove viruses
  2. program that disrupts the normal functioning of a computer
  3. software preventing unauthorized access to our computer
  4. illegally entering a device or network
  5. sending the user an email misleading him
  6. dating a young individual online
  7. only language understood by computers

15 Clues: bullying any person onlineillegal way of gaining moneyhoaxing or misleading someonedating a young individual onlinecomputer language with 16 digitsprogramme designed to remove virusesonly language understood by computersdeveloped to make binary more compactillegally entering a device or networkmisusing someone's personal information...

Lilly and Shehan 2024-08-16

Lilly and Shehan crossword puzzle
Across
  1. Couples' Favorite country
  2. Groom's favorite video game
  3. The groom was the captain of this sport in school
  4. Brides first workplace
  5. What field does the groom work in
  6. Where they first met
Down
  1. Brides Favorite Food
  2. Groom's best friend
  3. Something the bride loves to do
  4. What did the bride give for the grooms friends to win their approval
  5. The groom killed this animal out of cute aggression
  6. where the bride works
  7. Brides favorite dance move

13 Clues: Groom's best friendBrides Favorite FoodWhere they first metwhere the bride worksBrides first workplaceCouples' Favorite countryBrides favorite dance moveGroom's favorite video gameSomething the bride loves to doWhat field does the groom work inThe groom was the captain of this sport in schoolThe groom killed this animal out of cute aggression...

Production & Process 2024-07-11

Production & Process crossword puzzle
Across
  1. a series of actions or steps taken in order to achieve a particular end result
  2. Teddy Swims loses this
  3. American painter Norman _______
  4. abbreviation for digital transformation
  5. continually rhymes with domination
  6. large scale industrial production
Down
  1. protection from digital attacks
  2. "baby you can _____ my car"
  3. for indicating, measuring, and recording physical quantities
  4. Cirrus, Stratus, Cumulus to name a few
  5. setting standards for controls and automation
  6. should always be first

12 Clues: Teddy Swims loses thisshould always be first"baby you can _____ my car"protection from digital attacksAmerican painter Norman _______large scale industrial productioncontinually rhymes with dominationCirrus, Stratus, Cumulus to name a fewabbreviation for digital transformationsetting standards for controls and automation...

Computer Basics 2023-04-06

Computer Basics crossword puzzle
Across
  1. email scam
  2. computers talking to computers
  3. a computer used for math
  4. instructions for a computer online
  5. online protection from hackers
  6. shortcut for linking in a document
Down
  1. a common output from typing or drawing
  2. a set of step-by-step instructions
  3. an input device with letters and numbers
  4. people that try to take your online inforamtion
  5. a websites name
  6. most used search engine
  7. device that takes an input and gives an output

13 Clues: email scama websites namemost used search enginea computer used for mathcomputers talking to computersonline protection from hackersa set of step-by-step instructionsinstructions for a computer onlineshortcut for linking in a documenta common output from typing or drawingan input device with letters and numbers...

April Issue Highlights 2022-04-14

April Issue Highlights crossword puzzle
Across
  1. protects a user's data
  2. found behind the wall
  3. often used in food storage
Down
  1. ex. HEPA
  2. show, type of industry event
  3. down, slowing down usage
  4. what a doctor treats
  5. a special joint to prevent something from coming apart

8 Clues: ex. HEPAwhat a doctor treatsfound behind the wallprotects a user's datadown, slowing down usageoften used in food storageshow, type of industry eventa special joint to prevent something from coming apart

Department of Homeland Security Crossword 2024-03-17

Department of Homeland Security Crossword crossword puzzle
Across
  1. One weakness; complex rules
  2. One strength; quickly
  3. Why DOH was created
  4. Protecting critical infrastructure
Down
  1. One weakness; limits on funding
  2. Department which helps guards the USA from threats
  3. Identifying and mitigating terrorist threats
  4. One strength; brings together

8 Clues: Why DOH was createdOne strength; quicklyOne weakness; complex rulesOne strength; brings togetherOne weakness; limits on fundingProtecting critical infrastructureIdentifying and mitigating terrorist threatsDepartment which helps guards the USA from threats

Cybersecurity Crossword 2022-12-16

Cybersecurity Crossword crossword puzzle
Across
  1. a relatively new cyberattack technique that injects malicious code within digital ads
  2. a malware type in which security mechanism is bypassed to access a system
  3. a type of malware which replicates from one computer to another
  4. refer to the weak point in software code which can be exploited by a threat actor. They are most commonly found in an application like SaaS (Software as a service) software.
  5. the person who explores methods for breaching defenses and exploiting weaknesses in a computer system or network
Down
  1. a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid
  2. a cybercrime that happens when someone impersonates a trusted contact or brand, pretending to be someone you trust in order to access sensitive personal information
  3. refers to any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems
  4. an attack that attempts to steal your money, or your identity, by getting you to reveal personal information on websites that pretend to be legitimate

9 Clues: a type of malware which replicates from one computer to anothera malware type in which security mechanism is bypassed to access a systema relatively new cyberattack technique that injects malicious code within digital adsthe person who explores methods for breaching defenses and exploiting weaknesses in a computer system or network...

Cybersecurity vocab 2021-09-28

Cybersecurity vocab crossword puzzle
Across
  1. available to anyone
  2. The process of validating a user.
  3. A type of hacking that uses every combination or guess to gain authorization.
  4. when users cycle through multiple roles.
  5. when trust relationship is considered two way.
  6. used to decrypt data and given to one person.
Down
  1. what you leave behind on the internet.
  2. the measurement or analysis of a biological feature to validate a user.
  3. when credentials are falsely authorized.

9 Clues: available to anyoneThe process of validating a user.what you leave behind on the internet.when credentials are falsely authorized.when users cycle through multiple roles.used to decrypt data and given to one person.when trust relationship is considered two way.the measurement or analysis of a biological feature to validate a user....

Cybersecurity Crossword 2023-02-15

Cybersecurity Crossword crossword puzzle
Across
  1. A method cyber criminals use to lure you into giving away personal information by disguising as people you trust
  2. The practice of defending computers, mobile devices and IT systems against cyber criminals
  3. A series of letters, numbers and symbols to protect your device and online accounts
  4. The act of using more than one type of information to identify who you are in order to grant access to your online account
Down
  1. A type of malware that blocks access to computer file until a ransom is paid
  2. A type of code or programme that can cause your device to slow down or malfunction
  3. The act of ensuring your account/device is using the latest software
  4. An icon that suggests the website is safe
  5. A dishonest scheme to cheat you of your data or money

9 Clues: An icon that suggests the website is safeA dishonest scheme to cheat you of your data or moneyThe act of ensuring your account/device is using the latest softwareA type of malware that blocks access to computer file until a ransom is paidA type of code or programme that can cause your device to slow down or malfunction...

Cybersecurity Month 2016-10-03

Cybersecurity Month crossword puzzle
Across
  1. A highly skilled computer expert involved with circumvention of computer security
  2. Defrauding an online account holder of personal or financial information by posing as a legitimate company, typically via a fake email
  3. A type of malware that is often disguised as legitimate software
  4. Software that is intended to damage or disable computers and computer systems
  5. A part of a computer network that is designed to block unauthorized access while permitting outward communication
  6. Code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
  1. A type of fraud that targets high-profile end users such as C-level corporate executives, politicians and celebrities
  2. A type of malicious software designed to block access to a computer system until a sum of money is paid
  3. A self-replicating computer program that penetrates an operating system with the intent of spreading malicious code

9 Clues: A type of malware that is often disguised as legitimate softwareSoftware that is intended to damage or disable computers and computer systemsA highly skilled computer expert involved with circumvention of computer securityA type of malicious software designed to block access to a computer system until a sum of money is paid...

Cybersecurity Crossword 2022-05-10

Cybersecurity Crossword crossword puzzle
Across
  1. malware that spreads by users from an infected device to the rest of the devices on a system
  2. pretending to be someone you trust in order to get you to visit a fake site and enter private info
  3. malicious software including viruses and ransomware running on your device
  4. unethical distribution of mass digital messages
  5. that accesses or controls a device without being detected
Down
  1. when someone steals your personal info and uses it for fraud
  2. a type of virus that does not rely on users to copy and paste but can replicate itself once in a system
  3. malware that prevents you from accessing your files and demands money for their return
  4. malware disguised as a trusted source that convinces a user to open a link or attachment

9 Clues: unethical distribution of mass digital messagesthat accesses or controls a device without being detectedwhen someone steals your personal info and uses it for fraudmalicious software including viruses and ransomware running on your devicemalware that prevents you from accessing your files and demands money for their return...

Cybersecurity Crossword 2023-09-28

Cybersecurity Crossword crossword puzzle
Across
  1. A software installed on your computer that's used to keep intruders out.
  2. The _____ Man is an award winning security awareness series on KnowBe4.
  3. Virtual Private network
  4. A Data ____ is when a hacker successfully attacks a business, gaining control of it's network.
  5. If your computer gets this, it could change, corrupt, or destroy information.
Down
  1. Two-factor _________ is an extra layer of protection used to ensure the security of online accounts..
  2. Wi-Fi Access points that allow users to connect to the internet while away from home. Can be vulnerable to threats.
  3. A scam where a hacker poses as a legitimate business or organization in order to fool someone into giving over their personal information.
  4. A name commonly given to unsolicited emails

9 Clues: Virtual Private networkA name commonly given to unsolicited emailsThe _____ Man is an award winning security awareness series on KnowBe4.A software installed on your computer that's used to keep intruders out.If your computer gets this, it could change, corrupt, or destroy information....

Cybersecurity Crossword 2023-09-14

Cybersecurity Crossword crossword puzzle
Across
  1. Protecting your online data and information.
  2. Learning about online threats and how to protect against them.
  3. A protective barrier for your computer or network
  4. Malicious software that can harm your computer.
Down
  1. Sending deceptive emails to trick people into revealing information.
  2. Unauthorized access to someone's computer or accounts.
  3. The practice of tracking and monitoring online activities.
  4. A secret code used to access your online accounts
  5. Keeping your personal information and data safe.

9 Clues: Protecting your online data and information.Malicious software that can harm your computer.Keeping your personal information and data safe.A secret code used to access your online accountsA protective barrier for your computer or networkUnauthorized access to someone's computer or accounts.The practice of tracking and monitoring online activities....

Crossword: Cybersecurity 2023-11-09

Crossword: Cybersecurity crossword puzzle
Across
  1. the current era characterized by widespread use of digital technology
  2. a person who uses computers to gain unauthorized access to data.
  3. a computer program that records every keystroke made by a computer user,
  4. concept of protecting computer systems, networks, and data from theft, damage, or unauthorized access
Down
  1. a type of disk storage composed of a thin and flexible disk of a magnetic storage medium
  2. Malicious software designed to spread from one computer to another
  3. a type of crime involving a computer or a computer network
  4. various types of malicious software, including viruses, worms, and spyware.
  5. process of converting information into a code to prevent unauthorized access

9 Clues: a type of crime involving a computer or a computer networka person who uses computers to gain unauthorized access to data.Malicious software designed to spread from one computer to anotherthe current era characterized by widespread use of digital technologya computer program that records every keystroke made by a computer user,...

Cybersecurity puzzle 2024-09-15

Cybersecurity puzzle crossword puzzle
Across
  1. Always make sure your software is _____. (7 letters)
  2. The bad software that locks your files until you pay money. (9 letters)
  3. A special word or code used to protect accounts. (8 letters)
  4. A program that can harm your computer. (5 letters)
  5. A device we use to connect to the internet. (8 letters)
  6. A trick someone uses online to get your personal information. (7 letters)
Down
  1. Don’t open suspicious _____. They might have viruses. (7 letters)
  2. Keep your _____ private and never share it with others. (8 letters)
  3. Software that helps protect your computer from bad programs. (10 letters)

9 Clues: A program that can harm your computer. (5 letters)Always make sure your software is _____. (7 letters)A device we use to connect to the internet. (8 letters)A special word or code used to protect accounts. (8 letters)Don’t open suspicious _____. They might have viruses. (7 letters)Keep your _____ private and never share it with others. (8 letters)...

Cybersecurity Awareness 2024-10-20

Cybersecurity Awareness crossword puzzle
Across
  1. Fraudulent scheme, often involving money or personal information.
  2. Stealing personal or sensitive information without permission.
  3. Fraudulent attempt to obtain sensitive information through deceptive emails.
  4. Malicious software designed to harm or exploit devices.
Down
  1. A form of phishing using SMS or text messages.
  2. Two-factor authentication, an extra layer of security for online accounts.
  3. Unauthorized access to data in a system.
  4. Manipulative techniques to trick people into giving up confidential information.
  5. Irrelevant or inappropriate messages sent over the internet.

9 Clues: Unauthorized access to data in a system.A form of phishing using SMS or text messages.Malicious software designed to harm or exploit devices.Irrelevant or inappropriate messages sent over the internet.Stealing personal or sensitive information without permission.Fraudulent scheme, often involving money or personal information....

Automotive cybersecurity 2025-08-05

Automotive cybersecurity crossword puzzle
Across
  1. group represents the characteristics of a vulnerability that may change over time.
  2. Control the body and disable the braking system.
  3. Track the vehicle, open the door, start the engine, and drive away.
  4. The requirement for users to participate in the compromise of a vulnerable component.
Down
  1. effects of an exploited vulnerability on the component.
  2. The context by which vulnerability is being attacked.
  3. The conditions that must exist to exploit the vulnerability
  4. Connected vehicles invades location privacy.
  5. level is an essential factor for vulnerability prioritization.

9 Clues: Connected vehicles invades location privacy.Control the body and disable the braking system.The context by which vulnerability is being attacked.effects of an exploited vulnerability on the component.The conditions that must exist to exploit the vulnerabilitylevel is an essential factor for vulnerability prioritization....

Cybersecurity (Ans) 2025-08-01

Cybersecurity (Ans) crossword puzzle
Across
  1. _____es infect you and make you sick
  2. A piece of material used to mend a weak point
  3. A person or thing likely to cause damage or danger
  4. In greek mythology, there was a wooden horse called the ______ horse.
  5. An invertebrate animal with long, slender soft bodies and no limbs.
Down
  1. The process of converting information into a code to prevent unauthorized access.
  2. Sounds like 'fishing'
  3. To make use of a situation in a way considered unfair
  4. Opposite of defend

9 Clues: Opposite of defendSounds like 'fishing'_____es infect you and make you sickA piece of material used to mend a weak pointA person or thing likely to cause damage or dangerTo make use of a situation in a way considered unfairAn invertebrate animal with long, slender soft bodies and no limbs....

Spanish-English Tech Words (Use - to separate words) 2025-11-21

Spanish-English Tech Words (Use - to separate words) crossword puzzle
Across
  1. Actualizar
  2. Inalamambrico
  3. Permitir
  4. Red Social
  5. Caerse
  6. Amplio
  7. Servidor
  8. Gama
  9. Obsoleto
  10. Provedor de Internet
  11. Interfaz amigable
  12. Cargar
  13. Copia de seguridad
  14. Adjuntar
  15. Ultima Generacion
  16. Alta tecnologia
  17. Navegar
  18. Ciberseguridad
  19. Registrarse
Down
  1. Tecnologia Ponible
  2. Mejorar
  3. Abarcar
  4. Artilugio / Aparato
  5. (Realidad Virutal)
  6. Motor de busqueda
  7. Rastrear
  8. Captura de pantalla
  9. Software Gratuito
  10. Desorallador de software
  11. Estar en Linea
  12. Plataforma
  13. DEVICE Dispositivo Inteligente
  14. Iniciar Session
  15. Navegador
  16. Descargar
  17. Tecnofobo
  18. Datos
  19. Punto de acceso
  20. Experto Technologico
  21. Adricululares

40 Clues: GamaDatosCaerseAmplioCargarMejorarAbarcarNavegarRastrearPermitirServidorObsoletoAdjuntarNavegadorDescargarTecnofoboActualizarRed SocialPlataformaRegistrarseInalamambricoAdriculularesEstar en LineaCiberseguridadIniciar SessionPunto de accesoAlta tecnologiaMotor de busquedaSoftware GratuitoInterfaz amigableUltima GeneracionTecnologia Ponible...

Cyberpatriot 2023-02-08

Cyberpatriot crossword puzzle
Across
  1. gives instructions on what to do
  2. protection of digital assets
  3. where users are sorted and adjusted
  4. protects against incoming cyberattacks
Down
  1. the scrambling of data to protect it
  2. gives points for answering questions
  3. where the competition takes place
  4. file disguised as something else
  5. software with ill intents

9 Clues: software with ill intentsprotection of digital assetsfile disguised as something elsegives instructions on what to dowhere the competition takes placewhere users are sorted and adjustedthe scrambling of data to protect itgives points for answering questionsprotects against incoming cyberattacks

ILOVEYOU Virus 2025-03-27

ILOVEYOU Virus crossword puzzle
Across
  1. Process after the virus attack
  2. What the virus did to data
  3. Method to prevent malicious emails
  4. ILOVEYOU’s lasting impact on cybersecurity
  5. Email provider impacted
  6. Key strategy in the virus’s success
  7. Scale of the ILOVEYOU virus impact
  8. Email client targeted for spreading
  9. Country where the virus originated
  10. Language exploited in the attack
  11. Alleged author of the virus
  12. Self-replicating malware type
  13. File included in the malicious email
  14. How the virus moved between systems
  15. Software designed to detect and remove threats
  16. Mass email tactic used by the virus
  17. Term for amateur hackers
  18. Primary method of infection
  19. Another name for the ILOVEYOU virus
  20. UK government entity affected
  21. Trickery used to deceive victims
  22. Security measure against malware
  23. Company whose software was affected
Down
  1. The virus affected computers worldwide
  2. Set of programming instructions
  3. Impact of the virus on files
  4. General term for harmful software
  5. Fix used to prevent infection
  6. Unauthorized system access
  7. One of the virus’s creators
  8. How some perceived the virus at first
  9. Disguised malware that tricks users
  10. Programming language used in the virus
  11. Malicious software that spreads between computers
  12. Windows component altered by the virus
  13. Term for computers affected by malware
  14. Investigated the virus attack
  15. Industry responding to the attack
  16. How the virus damaged files
  17. US government organization affected
  18. Characteristic of the ILOVEYOU virus
  19. Effect on user files
  20. Infamous computer worm from 2000
  21. Operating system vulnerable to the virus
  22. Microsoft’s email service affected
  23. Malicious digital assault
  24. Automation process exploited by the virus
  25. Deceptive practice related to cybercrime
  26. ILOVEYOU email subject line

49 Clues: Effect on user filesEmail provider impactedTerm for amateur hackersMalicious digital assaultWhat the virus did to dataUnauthorized system accessOne of the virus’s creatorsHow the virus damaged filesAlleged author of the virusPrimary method of infectionILOVEYOU email subject lineImpact of the virus on filesFix used to prevent infection...

Hack me! 2025-01-29

Hack me! crossword puzzle
Across
  1. what infosec manages
  2. hash, but without potatoes
  3. antivirus, global outage in '24
  4. free password manager
Down
  1. another word for infosec
  2. common encoding for sending data
  3. read something encrypted

7 Clues: what infosec managesfree password manageranother word for infosecread something encryptedhash, but without potatoesantivirus, global outage in '24common encoding for sending data

Cyber Security Awareness 2025-04-07

Cyber Security Awareness crossword puzzle
Across
  1. The act of attempting to crack passwords or keys through exhaustive attempts
  2. Indian cybersecurity nodal agency
  3. A person who gains unauthorized access to data
  4. An Act to provide for the processing of digital personal data
  5. Phishing attack that uses QR codes to deceive victims and steal sensitive information
  6. Malicious tool that records keystrokes
  7. Cyberattack where a cybercriminal pretends to be a trusted entity or individual to gain unauthorised access to sensitive systems, data
  8. Cyber cell governed by MHA
  9. Ministry responsible for cybersecurity in India
  10. An Attack technique used by cybercriminals to steal sensitive financial information from individuals and businesses without their knowledge
  11. Cybercriminals pose as law enforcement officers or government officials and contact individuals
  12. Fix released to remove software vulnerabilities
Down
  1. A type of software designed to damage or disrupt systems
  2. A fake site mimicking a legitimate one
  3. Data encrypted to prevent unauthorized access
  4. Telecom Regulatory Authority of India (TRAI) portal, which helps users report fraudulent phone numbers
  5. Attack where users are tricked into giving up confidential info
  6. Type of attack exploiting human psychology
  7. Unwanted software designed to throw ads
  8. Powerful technology merging "deep learning" and "fake“, can be used to create incredibly realistic manipulated media
  9. Telecom Regulatory Authority of India (TRAI) portal, which helps users to report suspicious incoming international calls
  10. India's initiative for citizen cyber hygiene and digital cleanliness
  11. Type of software that tracks user activity without consent
  12. Cyber Crisis Management Plan
  13. Multi-Factor Authentication
  14. Unwanted or unsolicited emails, often used for phishing
  15. Organization responsible for critical infra protection in India
  16. Indian law governing IT offences

28 Clues: Cyber cell governed by MHAMulti-Factor AuthenticationCyber Crisis Management PlanIndian law governing IT offencesIndian cybersecurity nodal agencyA fake site mimicking a legitimate oneMalicious tool that records keystrokesUnwanted software designed to throw adsType of attack exploiting human psychologyData encrypted to prevent unauthorized access...

Chapter 2 - Cybersecurity Threat Landscape 2025-09-08

Chapter 2 - Cybersecurity Threat Landscape crossword puzzle
Across
  1. attacks seeking to extort money or other concessions from victims by threatening to release sensitive information or launching further attacks
  2. the set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment
  3. attack that attempts to compromise devices, systems, or software before it even reaches the organization
  4. attacks motivated by organizations seeking to steal secret information from other organizations
  5. attack that occurs when an employee, contractor, vendor, or other individual with authorized access to information and systems uses that access to wage an attack
  6. a geographic view of threat intelligence
  7. an anonymous network created through encryption technology and often used for illicit activity
  8. attacks by actors hacking into either foreign governments or corporations
  9. attacks motivated by a desire to get even with an individual or organization by exacting retribution against them
  10. attacks seeking to take down or interrupt critical systems or networks
  11. term for attackers who use hacking techniques but have limited skills; aka script kiddie
  12. threat actor that comes from within our own environment
Down
  1. attacks motivated by a desire to expose vulnerabilities and improve security
  2. attack in which access to sensitive information is gained and then removed from an organization
  3. attacker who uses hacking techniques to accomplish an activist goal
  4. includes information like the severity, fixes, and other information useful for both attackers and defenders
  5. the path or means by which an attack can gain access to a target in order to cause harm
  6. threat actor that exists outside organizations: competitors, criminals, and the curious
  7. threat intelligence that is acquired from publicly available sources
  8. attacks on a system that exploits vulnerabilities that are unknown to others, including the vendor
  9. the study of the methods used by cybersecurity adversaries when engaging in attacks

21 Clues: a geographic view of threat intelligencethreat actor that comes from within our own environmentattacker who uses hacking techniques to accomplish an activist goalthreat intelligence that is acquired from publicly available sourcesattacks seeking to take down or interrupt critical systems or networks...

Black Hat Crossword 2020-07-27

Black Hat Crossword crossword puzzle
Across
  1. Where computers can fly
  2. Distant labor
  3. Not your Grandmother's Tuna
Down
  1. Defensive computing
  2. For Loops
  3. Troy's Downfall

6 Clues: For LoopsDistant laborTroy's DownfallDefensive computingWhere computers can flyNot your Grandmother's Tuna

IT Application and Emerging Technologies - crossword Puzzel 2025-09-15

IT Application and Emerging Technologies - crossword Puzzel crossword puzzle
Across
  1. Virtual environment for immersive experience
  2. A decentralized digital currency
  3. Machines simulating human intelligence
  4. Computers designed to mimic the human brain
  5. Smart devices connected via the internet (3)
  6. Technology enabling virtual meetings
  7. Protects against cyber threats
  8. Collection and analysis of huge data sets
  9. Ability of machines to learn from data
Down
  1. Tracking technology used in logistics and shopping
  2. Replacing paper-based systems with computers (11)
  3. Sharing resources over the internet
  4. 3D _________, used in manufacturing

13 Clues: Protects against cyber threatsA decentralized digital currencySharing resources over the internet3D _________, used in manufacturingTechnology enabling virtual meetingsMachines simulating human intelligenceAbility of machines to learn from dataCollection and analysis of huge data setsComputers designed to mimic the human brain...

Vocabulary Review 2026-02-13

Vocabulary Review crossword puzzle
Across
  1. Proof that you bought something
  2. Group of related TV or media episodes
  3. Money you can spend in a shop instead of cash
  4. Visual images used to explain information
  5. Being friendly and welcoming to guests
  6. Main person in a story
  7. An official public statement
  8. A custom passed down through generations
  9. System that chooses online content
Down
  1. Protection against digital attacks
  2. Rules of a company
  3. Short, attention-grabbing news title
  4. To look at websites for information
  5. A regularly updated online journal
  6. A public display of art
  7. A shop or manufacturer guarantee
  8. Money returned to a customer
  9. Not working properly

18 Clues: Rules of a companyNot working properlyMain person in a storyA public display of artMoney returned to a customerAn official public statementProof that you bought somethingA shop or manufacturer guaranteeProtection against digital attacksA regularly updated online journalSystem that chooses online contentTo look at websites for information...

CSN Turkeyday Puzzle 2021-11-24

CSN Turkeyday Puzzle crossword puzzle
Across
  1. Carbonblack and crowdstrike are ____ tools
  2. Swimlane and Phantom/splunk are ____ tools
  3. Twenty leaves and purple
  4. Only company in the US that specialized soley in cybersecurity hiring
  5. Anonymous by design, removing unconscious bias and fear of reprisal
  6. Intune, sentinel, and AD are in this cloud
Down
  1. Incident responders may have the responsibility to extract and analyze _______
  2. K8s
  3. A CI/CD Engineer or Container Engineer
  4. Find and be _____
  5. Cloud automation, Monty, and not Perl
  6. _____ your career
  7. Ubuntu and CentOS are ____ variants

13 Clues: K8sFind and be __________ your careerTwenty leaves and purpleUbuntu and CentOS are ____ variantsCloud automation, Monty, and not PerlA CI/CD Engineer or Container EngineerCarbonblack and crowdstrike are ____ toolsSwimlane and Phantom/splunk are ____ toolsIntune, sentinel, and AD are in this cloud...

Participation | Cybersecurity Crossword Puzzle 2023-03-13

Participation | Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Malware that can reproduce itself
  2. phishing that targets a specific individual
  3. program that is run entirely from the network
  4. encrypted parts of the internet
  5. hacker poses as a legitimate business
  6. attack on a computer system
  7. technology used to keep intruders out
  8. breach hacker successfully breaking into a system
  9. Coding used to protect your information
  10. computer infected with a virus
Down
  1. contains items that are temporarily blocked
  2. capture of data as its being transmitted
  3. process of identifying a user
  4. a private network across a public network
  5. records keystrokes made on a computer
  6. malware that hijacks your system
  7. malware used by hackers to spy on you
  8. tricked into clicking on a object on a web page
  9. hacker changes the IP address of an email
  10. video that has been altered to make it authentic

20 Clues: attack on a computer systemprocess of identifying a usercomputer infected with a virusencrypted parts of the internetmalware that hijacks your systemMalware that can reproduce itselfrecords keystrokes made on a computermalware used by hackers to spy on youhacker poses as a legitimate businesstechnology used to keep intruders out...

NOVA Cybersecurity Lab Glossary 2022-10-03

NOVA Cybersecurity Lab Glossary crossword puzzle
Across
  1. a fictional virus modeled after the Stuxnet virus that is able to damage physical infrastructure.
  2. extra copies of computer files that can be used to restore files that are lost or damaged.
  3. a computer program that can copy itself and cause harm in various ways, such as stealing private
  4. the amount of data that can pass through a network or part of a network per second.
  5. or destroying data.
  6. a computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
  7. a flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
  8. someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
  9. a company or organization that gives users and devices access to the Internet.
  10. two or more interconnected devices that can exchange data.
Down
  1. a type of malware that holds victims’ computer files hostage by locking access to them or encrypting them.
  2. a distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
  3. attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
  4. code written in a programming language that instructs computers to perform specific tasks.
  5. a type of connection between devices that can exchange information and power supply.
  6. a data storage device that is used to store, back up, and transfer computer files.
  7. multiple computers on a network that are infected with a program that can be controlled remotely.
  8. software designed to block malware from entering protected networks.
  9. programs that harm computers, networks, or people.
  10. viruses, worms, ransomware, and other
  11. unsolicited emails sent to many addresses in order to make money through advertising or identity theft.
  12. a piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
  13. the process of using codes to make readable information unreadable.

23 Clues: or destroying data.viruses, worms, ransomware, and otherprograms that harm computers, networks, or people.two or more interconnected devices that can exchange data.the process of using codes to make readable information unreadable.software designed to block malware from entering protected networks....

CIS178 Cybersecurity Crossword Puzzle 2023-04-19

CIS178 Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. authentication using physical characteristics
  2. people carrying out specific actions
  3. software that installs itself secretly
  4. highly targeted phishing attacks
  5. virus disguised as legitimate software
  6. protect personal data
  7. users directed towards fake websites
  8. updates to improve security
Down
  1. permission to be on hard-drive
  2. security feature to detect hacking
  3. users denied access to services
  4. mathematical fuction that protects information
  5. attempting to obtain sensitive information
  6. prevents unauthorized access
  7. program added for entertainment
  8. emails asking for sensitive information
  9. detect and remove viruses
  10. software that makes data unstable
  11. secret software installed on hard-drive
  12. shared storage accessed online

20 Clues: protect personal datadetect and remove virusesupdates to improve securityprevents unauthorized accesspermission to be on hard-driveshared storage accessed onlineusers denied access to servicesprogram added for entertainmenthighly targeted phishing attackssoftware that makes data unstablesecurity feature to detect hacking...

CIS 178 Cybersecurity Participation 2023-04-20

CIS 178 Cybersecurity Participation crossword puzzle
Across
  1. Malware that demands payment
  2. Software that detects malware
  3. Criminal activity on computer systems
  4. secure website connection
  5. Successful cyber attack
  6. a software vulnerability
  7. a system weakness
  8. malicious digital activity
  9. data protection method
  10. fraudulent email technique
Down
  1. network security barrier
  2. a traffic overload cyberattack
  3. user identity verification
  4. computer infection
  5. secret access code
  6. unauthorized access
  7. harmful software program
  8. unsolicited email
  9. A network of infected computers
  10. physical trait recognition

20 Clues: unsolicited emaila system weaknesscomputer infectionsecret access codeunauthorized accessdata protection methodSuccessful cyber attacknetwork security barrierharmful software programa software vulnerabilitysecure website connectionuser identity verificationphysical trait recognitionmalicious digital activityfraudulent email technique...

The Internet and Cybersecurity 2024-04-30

The Internet and Cybersecurity crossword puzzle
Across
  1. A type of cyber attack where individuals are manipulated into revealing sensitive information.
  2. A trial and error method used to decode encrypted data such as passwords.
  3. An unauthorized wireless access point that allows unauthorized users to connect to a secure network.
  4. The action of tracking and recording keys struck on a keyboard, typically in a covert manner.
  5. The practice and study of techniques for secure communication, often involving encryption and decryption.
  6. A type of computation in which many calculations or processes are carried out simultaneously.
  7. Refers to the gap between people who have access to modern information and communication technology and those who do not.
  8. A process that converts input data into a fixed-size string of bytes, often used for data integrity verification.
  9. The practice of concealing messages or data within other non-secret text or data.
  10. The process of verifying the identity of a user or system.
  11. A type of encryption where the same key is used for both encryption and decryption.
Down
  1. A cryptographic key that can be freely distributed and used to encrypt messages.
  2. A networking device that forwards data packets between computer networks.
  3. A global network of interconnected computers that communicate with each other using a common set of protocols.
  4. A cyber attack that disrupts normal traffic of a targeted server.
  5. The inclusion of extra components in a system to improve reliability and performance.
  6. A set of rules that govern the exchange of data between devices.
  7. The process of encoding information in such a way that only authorized parties can access it.
  8. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  9. A public-key encryption algorithm used for secure data transmission over the internet.
  10. Small units of data that are transmitted over a network.

21 Clues: Small units of data that are transmitted over a network.The process of verifying the identity of a user or system.A set of rules that govern the exchange of data between devices.A cyber attack that disrupts normal traffic of a targeted server.A networking device that forwards data packets between computer networks....

Practice Cybersecurity Terminology Puzzle 2025-03-12

Practice Cybersecurity Terminology Puzzle crossword puzzle
Across
  1. Software to remove malware
  2. Fraud started with phone freaking
  3. Any harmful hacking techniques
  4. Malicious software
  5. An unintended problem with electronics
  6. Access using tor browser
  7. Deliberate theft of sensitive data
  8. Taking advantage of a vulnerability
  9. Performs tasks to solve problems
  10. A barrier between networks
Down
  1. A weakness or flaw
  2. Manages computers recourses and processes
  3. Online harassment
  4. String of octets under 256
  5. Unauthorized access to sensitive data
  6. Malicious program that infects computers
  7. Used to block specific users
  8. Maintenance of data quality
  9. A type of malware
  10. Recently discovered exploits

20 Clues: Online harassmentA type of malwareA weakness or flawMalicious softwareAccess using tor browserSoftware to remove malwareString of octets under 256A barrier between networksMaintenance of data qualityUsed to block specific usersRecently discovered exploitsAny harmful hacking techniquesPerforms tasks to solve problemsFraud started with phone freaking...

Cybersecurity Acronyms and Terms 2024-11-27

Cybersecurity Acronyms and Terms crossword puzzle
Across
  1. A protocol for collecting and organizing log messages across a network.
  2. The process of updating software and systems to address vulnerabilities.
  3. Indicator of Compromise, data points that signal malicious activity.
  4. The part of malware that performs the malicious action.
  5. A record of events or actions on a system or network.
  6. Remote Monitoring and Management, tools for remote administration of client systems.
  7. The likelihood of a threat exploiting a vulnerability with impact.
  8. Malicious software such as viruses, worms, or ransomware.
  9. A one-way function to generate a fixed-size representation of data.
  10. Isolating suspicious files or processes to prevent harm to systems.
  11. Mean Time to Detect, the average time to identify a security incident.
  12. Mean Time to Respond, the average time to respond to and remediate an incident.
  13. A vulnerability unknown to the vendor, exploited before a fix is available.
  14. A security event compromising the confidentiality, integrity, or availability of information.
Down
  1. Isolating suspicious files or programs to observe their behavior.
  2. Command and Control infrastructure used by attackers to communicate with compromised systems.
  3. Security Operations Center, a centralized team for monitoring and responding to security incidents.
  4. A network security device that monitors and filters incoming and outgoing traffic.
  5. A social engineering attack to steal sensitive information via deceptive emails or websites.
  6. Data Loss Prevention, tools to prevent data exfiltration.
  7. A potential cause of an incident that could harm a system or organization.
  8. Endpoint Detection and Response, tools for endpoint threat detection and response.
  9. Virtual Private Network, encrypting data over untrusted networks.
  10. Security Information and Event Management, a tool for log aggregation and analysis.
  11. Advanced Persistent Threat, a sophisticated and long-term cyber attack.
  12. Tactics, Techniques, and Procedures used by threat actors.
  13. Demilitarized Zone, a subnet adding security for external-facing services.
  14. A method used to take advantage of vulnerabilities.
  15. Open Source Intelligence, information gathered from publicly available sources.
  16. Cloud Access Security Broker, tools that enforce security policies for cloud services.

30 Clues: A method used to take advantage of vulnerabilities.A record of events or actions on a system or network.The part of malware that performs the malicious action.Data Loss Prevention, tools to prevent data exfiltration.Malicious software such as viruses, worms, or ransomware.Tactics, Techniques, and Procedures used by threat actors....

Year 9 cybersecurity 1 2024-11-05

Year 9 cybersecurity 1 crossword puzzle
Across
  1. A type of malware that infects files and spreads to other systems, often damaging files and affecting system performance.
  2. A password that combines letters, numbers, and symbols, is at least 8 characters long, and avoids common words to prevent unauthorized access.
  3. A security system that monitors and controls network traffic, blocking unauthorized access to protect systems from malicious attacks.
  4. A professional who protects networks and systems from hacking, malware, and other threats by monitoring, installing security measures, and educating users.
  5. A security process that requires users to provide two forms of identification to access an account, adding an extra layer of protection.
  6. Unauthorized access to computer systems or networks, often with the intent to steal or modify data.
  7. Software that displays unwanted advertisements on a device, which can slow down the system and pose security risks.
  8. A program designed to detect, prevent, and remove malware, including viruses and spyware, to protect computer systems.
  9. The process of converting data into a secure format to prevent unauthorized access during transmission over networks.
  10. The information and data left behind from a user’s online activities, which can be tracked or accessed by others.
Down
  1. A unique numerical identifier assigned to each device on a network, allowing devices to communicate over the internet or within a local network.
  2. A method of manipulating people into revealing confidential information, often for malicious purposes, by exploiting trust.
  3. A service that encrypts internet connections, making online activities more secure and protecting users' identities and data on public networks.
  4. A text-based interface that allows users to interact with the computer by typing commands rather than using graphical icons.
  5. A tool used to block unwanted and potentially harmful emails, such as phishing attempts or advertisements, from reaching a user’s inbox.
  6. Controls that allow users to manage who can view their profiles, posts, and personal information on social platforms.
  7. A fraudulent attempt to steal personal information by pretending to be a legitimate entity, often using fake emails or messages.
  8. A virtual point used to identify specific services or applications on a networked device, allowing data to flow to and from the device.
  9. Malicious software designed to harm, exploit, or otherwise compromise a computer system, including viruses, adware, and spyware.
  10. A fake public Wi-Fi network set up to steal personal information from users who connect to it.

20 Clues: A fake public Wi-Fi network set up to steal personal information from users who connect to it.Unauthorized access to computer systems or networks, often with the intent to steal or modify data.The information and data left behind from a user’s online activities, which can be tracked or accessed by others....

Cybersecurity Awareness Month 2025 2025-10-06

Cybersecurity Awareness Month 2025 crossword puzzle
Across
  1. Applying a mathematical algorithm to data to promote integrity.
  2. Process of accessing and modifying mobile device privileges to bypass OS restrictions.
  3. A collection of analyzed, publicly available information applicable to security questions (acronym)
  4. Sharing the risk with another organization, such as an insurance company.
  5. Any observed, verified, and documented occurrence.
  6. A periodical outbound connection between a compromised computer and an external controller.
  7. Anything of value to an organization
  8. A famous framework used to determine adversarial tactics, techniques, & common knowledge.
  9. A documented history of how evidence was handled, collected, transported, and preserved.
  10. Self-replicating malicious code that spreads across vulnerable networks.
  11. Actions that attempt to deny malicious actors the ability to cause further damage.
  12. An isolated testing environment where security practitioners can detonate and observe malicious payloads.
Down
  1. A piece of code written to add functionality or enhanced features, such as to a web browser.
  2. Type of hold that retains a device in a secure storage area for forensic investigation.
  3. Protocol that provides secure remote access to network devices.
  4. Gray hat hacker whose motivations are socially or politically motivated.
  5. Secondary authentication tool using something you either know, have, or are (acronym).
  6. Proactively examining one's own infrastructure for potential threats.
  7. An intermediary device which acts as a gateway between user devices, applications, and the internet.
  8. Data stored in READ-ONLY memory, which executes when a device is powered on.
  9. A testing methodology where extreme demands are placed on software to determine robustness.
  10. The use of security tools & controls to reduce the risk of a vulnerability to acceptable levels.
  11. A type of "bomb" intentionally inserted into a software system, which detonates under specific conditions.
  12. An action taken to segment an infected host from communicating with the rest of a network.
  13. Global standard for protecting stored, processed, and transmitted credit card info.
  14. List of rules that controls the manner by which network resources may be accessed (acronym).
  15. Actions and technologies used by organizations to prevent loss of sensitive data (acronym).

27 Clues: Anything of value to an organizationAny observed, verified, and documented occurrence.Protocol that provides secure remote access to network devices.Applying a mathematical algorithm to data to promote integrity.Proactively examining one's own infrastructure for potential threats....

ReadOn Insights Crossword 22-01-26 2026-01-20

ReadOn Insights Crossword 22-01-26 crossword puzzle
Across
  1. The country linked to the 2025 cyber breach of a Norwegian hydroelectric dam.
  2. The Indonesian president whose likeness was impersonated in deepfake scam videos.
  3. The core organisational capability—combining preparedness, response, and recovery—that determines whether firms can survive major cyberattacks.
  4. Britain’s largest carmaker, forced into a five-week production shutdown in 2025 following a major cyberattack.
  5. The most common form of cyber-enabled fraud affecting individuals globally in 2025, often involving deceptive emails, messages, or links.
Down
  1. Artificial Intelligence, identified by 94% of executives as the biggest driver of change in the cybersecurity threat landscape.
  2. Business networks where a single weak vendor or software supplier can trigger cascading cyber failures across multiple organisations.
  3. AI-generated video and audio content used to impersonate leaders, executives, or relatives to commit fraud and misinformation campaigns.
  4. The organisation that released the Global Cybersecurity Outlook 2026.
  5. A cyber threat that has overtaken ransomware as the primary concern of CEOs, due to its scale, speed, and reputational damage.

10 Clues: The organisation that released the Global Cybersecurity Outlook 2026.The country linked to the 2025 cyber breach of a Norwegian hydroelectric dam.The Indonesian president whose likeness was impersonated in deepfake scam videos.Britain’s largest carmaker, forced into a five-week production shutdown in 2025 following a major cyberattack....

Cybersecurity Unit - Vocabulary Crossword 2023-04-25

Cybersecurity Unit - Vocabulary Crossword crossword puzzle
Across
  1. Using someone else’s work and claiming it is your own
  2. A type of online threat where a fake website is used to try and trick people into providing personal information.
  3. Settings on social media that limit who can see your online activity.
  4. The right to be free of undue intrusion.
  5. Computer programs designed to protect your computer from online threats, like viruses and other malicious software.
  6. An illegal use of copyrighted material.
  7. Original work that is not protected by copyright and is free to use without permission is known to be in this.
Down
  1. A type of malware that is spread through human interaction, usually by clicking on an infected attachment, download, or link.
  2. A setting online or on social media that prevents another user from seeing your profile or contacting you in any way.
  3. An online community of people with like interests
  4. The exclusive right to make copies. This automatically applies to original work.
  5. Formal ways to give credit to an original creator or author.
  6. These are guidelines for using copyright-protected work in a specific way and for a specific purpose, like a school project, to avoid copyright infringement.
  7. Malicious Software.
  8. A permanent record of all of your online activity.
  9. A detailed report on someone’s actions and behaviors
  10. A type of online threat where a fake email is used to try and trick people into clicking and providing personal information.
  11. A type of malware that is difficult to detect and secretly watches what you do online. Some versions can copy your keystrokes.
  12. A type of malware that looks like a trustworthy file or program but isn’t. Insidious malware.
  13. A type of malware that self-replicates and spreads without human interaction. Can use up all of your RAM and make your computer freeze and become unusable.

20 Clues: Malicious Software.An illegal use of copyrighted material.The right to be free of undue intrusion.An online community of people with like interestsA permanent record of all of your online activity.A detailed report on someone’s actions and behaviorsUsing someone else’s work and claiming it is your own...

cybersecurity crossword by perla 2022-05-23

cybersecurity crossword by perla crossword puzzle
Across
  1. a wireless technology for exchanging data over short distances.
  2. Computer viruses are small programs or scripts that can negatively affect the health of your computer
  3. A technology that allows us to access our files and/or services through the internet from anywhere in the world
  4. A copy of data and/or applications contained in the IT stored on magnetic media outside of the IT to be used in the event IT data are lost.
  5. Any circumstance or event with the potential to adversely impact an information system through unauthorized access, destruction, disclosure, modification of data, and/or denial of service
  6. the determining factor in the classification of an enclave of servers/computers
  7. An audio or video clip that has been edited and manipulated to seem real or believable.
  8. A network point that acts as an entrance to another network
  9. Type of surveillance software that has the capability to record every key stroke you make on a Log file, usually encrypted
  10. Any program that acts to produce copies of itself. Examples include; a program, a worm, or virus.
  11. Encryption is the process of converting data to an unrecognizable or "encrypted" form. It is commonly used to protect sensitive information so that only authorized parties can view it
  12. Unauthorized act of bypassing the security mechanisms of a system.
  13. Software that is intended to damage or disable computers and computer systems
  14. An attempt to gather information about an information system for the apparent purpose of circumventing its security controls.
  15. the science that deals with the logic of form, quantity, and disposition
  16. A feature or defect of a computer system that allows surreptitious unauthorized access to data
  17. A bot is an automated program that runs over the Internet
  18. A decoy system or network that serves to attract potential attackers.
Down
  1. The activity of defrauding an online account holder of financial information by posing as a legitimate company
  2. Is global system of interconnected computer networks that use the internet protocol suite
  3. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
  4. a term used to describe any fraudulent business or scheme that takes money or other goods from an unsuspecting person.
  5. A hacker security tool that captures passwords and message traffic to and from a computer.
  6. A block of data sent over the network transmitting the identities of the sending and receiving stations, error-control information, and message.
  7. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  8. Is the body of technology's, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
  9. It acts as a barrier between a trusted system or network and outside connections, such as the Internet.
  10. a process that ensures and confirms a user’s identity.
  11. Self replicating virus that does not alter files but resides in active memory and duplicates itself
  12. Type of incident involving insertion of a large volume of data resulting in denial of service.
  13. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.
  14. A person who uses computers to gain unauthorized access to data
  15. A weakness in automated system security procedures, technical controls, environmental controls, administrative controls, internal controls, etc., that could be used as an entry point to gain unauthorized access to information or disrupt critical processing.
  16. Software agent that performs a function or operation on behalf of another application or system while hiding the details involved.
  17. To indiscriminately send unsolicited, unwanted, irrelevant, or inappropriate messages, especially commercial advertising in mass quantities.
  18. a way for the website to recognize you and keep track of your preferences.
  19. Software that enables a user to obtain convert information about another's computer activities by transmitting data from their hard drive

37 Clues: a process that ensures and confirms a user’s identity.A bot is an automated program that runs over the InternetA network point that acts as an entrance to another networka wireless technology for exchanging data over short distances.A person who uses computers to gain unauthorized access to data...

2023 Cybersecurity Awareness Month 2023-10-06

2023 Cybersecurity Awareness Month crossword puzzle
Across
  1. A process or measure used to verify a user's identity.
  2. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  3. Unsolicited emails sent to many addresses.
  4. Converting data into a form that cannot be easily understood by unauthorized people.
  5. A mechanism for creating a secure connection between a computing device and a computer network.
  6. A cybersecurity risk that originates from within an organization.
  7. The ability of individuals to understand and exercise control over how information about themselves may be used by others.
  8. Software designed to block malware from entering protected networks.
  9. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
  10. An unauthorized user who attempts to or gains access to an information system.
  11. Faking the sending address of a transmission to gain illegal entry into a secure system.
  12. A collection of computers compromised by malicious code and controlled across a network.
  13. A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
Down
  1. Software that compromises the operation of a system by performing an unauthorized function or process.
  2. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  3. Part of the internet that isn't indexed by search engines.
  4. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization.
  5. Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
  6. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
  7. Computer programs that can block, detect, and remove viruses and other malware.
  8. A flaw or weakness in an information system that could be exploited.
  9. A type of malware that denies a user's access to a system or data until a sum of money is paid

22 Clues: Unsolicited emails sent to many addresses.A process or measure used to verify a user's identity.Part of the internet that isn't indexed by search engines.A cybersecurity risk that originates from within an organization.A flaw or weakness in an information system that could be exploited....

Cybersecurity Awareness Month 2024 2024-09-24

Cybersecurity Awareness Month 2024 crossword puzzle
Across
  1. Pop-up malware intent on using fear tactics to get you to perform an action.
  2. Data must be accessible when you need them. Part of the CIA triad.
  3. The trustworthiness that data have not been altered or modified by unauthorized users. Part of the CIA triad.
  4. A flaw in a system that can enable an adversary to compromise the security of that system.
  5. A type of threat that includes authorized system users and disgruntled employees.
  6. "Good guy" hackers.
  7. A popular, but not-so-secure, policy where users can use their personal smart devices to conduct business.
  8. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a system.
  9. Multiple compromised systems under the control of a single attacker.
  10. A device that permits the flow of authorized data, while keeping unauthorized data out.
  11. A vulnerability or exploit that is unknown to software developers and security professionals.
  12. A team that acts as the adversary during a security assessment.
  13. Using fraudulent e-mails to trick recipients into providing sensitive information or taking a deliberate action.
  14. The broad term for nontraditional, internet-connected smart devices.
  15. A network of devices created for the sole purpose of luring in an attacker.
  16. A protocol used to ensure time synchronization between devices.
Down
  1. The act of moving around, looking for vulnerable Wi-Fi networks.
  2. Hardware and/or software used to capture and record key strokes.
  3. Spear phishing aimed at high-profile targets such as executives.
  4. Cryptography that uses two different keys for encryption and decryption.
  5. Information that can be used to distinguish an individual’s identity.
  6. The act of applying a fix to a software defect.
  7. An (abbreviated) attack where a malicious actor sits in-between two parties, intercepting communications.
  8. Cryptography that uses the same shared secret key for both encryption and decryption.
  9. An attack from multiple compromised systems that target a single system, service, or application.
  10. Malware intent on holding your data hostage in an attempt to extort money.
  11. Protecting of information from unauthorized access. Part of the CIA triad.
  12. A team usually involved with the defense of the organization’s infrastructure.
  13. An old method programmers use to bypass security to gain access to a system or software. "War Games"
  14. "Bad guy" hackers.
  15. An isolated environment used by security professionals to run suspicious code or to "detonate" potential malware.

31 Clues: "Bad guy" hackers."Good guy" hackers.The act of applying a fix to a software defect.A team that acts as the adversary during a security assessment.A protocol used to ensure time synchronization between devices.The act of moving around, looking for vulnerable Wi-Fi networks.Hardware and/or software used to capture and record key strokes....

Cybersecurity Ethics, Laws & Standards 2025-10-09

Cybersecurity Ethics, Laws & Standards crossword puzzle
Across
  1. unauthorized access to computer systems
  2. moral principles that govern a person's behavior or actions
  3. policy that defines proper and improper use of technology and networks
  4. process of converting data into a code to prevent unauthorized access
  5. copies of data stored separately for recovery in case of loss
  6. using someone else's work without giving proper credit
  7. law that protects sensitive health information
  8. coordinates international cybercrime investigations
  9. security process requiring two separate forms of identification
  10. online platforms for sharing content and communication
  11. software designed to damage or disrupt a computer system
  12. legal right that grants the creator control over their work
  13. network security system that monitors and controls incoming and outgoing traffic
Down
  1. criminal activity carried out using computers or the internet
  2. trail of data created by a person’s online activity
  3. software that secretly monitors user activity
  4. option that controls who can see your online information
  5. protects us critical infrastructure from cyber threats
  6. deceptive attempt to obtain sensitive information by pretending to be a trustworthy source
  7. unauthorized access and release of confidential information
  8. using digital technology to harass or intimidate someone
  9. crime of obtaining someone’s personal information to commit fraud
  10. manipulating people to give up confidential information
  11. study of ethical issues surrounding computer use
  12. protects student education records and data
  13. a secret word or phrase used to gain access to a system
  14. software designed to detect and remove malicious programs
  15. malware that locks users out of their files until a payment is made
  16. update to software that fixes vulnerabilities or bugs
  17. proper and respectful behavior when communicating online
  18. practices and steps taken to maintain system health and improve security
  19. internet crime complaint center that accepts and investigates online crime reports

32 Clues: unauthorized access to computer systemsprotects student education records and datasoftware that secretly monitors user activitylaw that protects sensitive health informationstudy of ethical issues surrounding computer usetrail of data created by a person’s online activitycoordinates international cybercrime investigations...

2025 Cybersecurity Awareness Month 2025-09-24

2025 Cybersecurity Awareness Month crossword puzzle
Across
  1. Software that displays unwanted advertisements.
  2. A vulnerability unknown to those who should mitigate it.
  3. Network security system that monitors and controls incoming and outgoing traffic.
  4. System that aggregates and analyzes security data.
  5. Software update that fixes vulnerabilities.
  6. Malware disguised as legitimate software.
  7. Symmetric encryption standard used worldwide.
  8. Unauthorized transmission of sensitive information.
  9. Isolated environment for testing suspicious code.
  10. Framework for managing digital identities.
  11. Routine practices to maintain security health.
  12. Simulated attack to evaluate system security.
  13. Security broker between users and cloud services.
  14. Security method requiring multiple forms of verification.
  15. Software that secretly gathers user information.
  16. Protocol for secure communication over networks.
  17. Attack method that tries every possible password combination.
Down
  1. Psychological manipulation to trick users into giving up confidential info.
  2. General term for malicious software.
  3. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  4. Malware that encrypts data and demands payment for its release.
  5. Prolonged and targeted cyberattack.
  6. Creates a secure connection over the internet.
  7. Malware that hides its presence from detection.
  8. Process of converting data into a coded format.
  9. Controls access to privileged accounts.
  10. Network of infected devices controlled remotely.
  11. Malware that replicates itself to spread.
  12. Hidden method of bypassing normal authentication.
  13. Converts data into a fixed-size string.

30 Clues: Prolonged and targeted cyberattack.General term for malicious software.Controls access to privileged accounts.Converts data into a fixed-size string.Malware disguised as legitimate software.Malware that replicates itself to spread.Framework for managing digital identities.Software update that fixes vulnerabilities....

Crossword 2024-04-18

Crossword crossword puzzle
Across
  1. a device to separate your network
  2. different word for a trial version
  3. where data is stored on a pc
  4. is also an island
  5. most important software on a pc
Down
  1. a system for redundant storage
  2. protects your pc from attacks
  3. a program that isnt what it claims to be
  4. a common peripheral
  5. the prominent layer 2 protokol

10 Clues: is also an islanda common peripheralwhere data is stored on a pcprotects your pc from attacksa system for redundant storagethe prominent layer 2 protokolmost important software on a pca device to separate your networkdifferent word for a trial versiona program that isnt what it claims to be

ONBOARDING 2025-10-06

ONBOARDING crossword puzzle
Across
  1. Core principle of honesty and moral conduct
  2. Evidence-based evaluation in auditing
  3. Protection against unauthorized access to computer systems
  4. Moralprinciple guiding fair behavior
  5. Planning for potential future risks
Down
  1. A barrier that blocks malicious network traffic
  2. Ensuring responsibility and answerability
  3. Unexpected danger or uncertainty that may cause loss
  4. Professional review of compliance and controls
  5. Safeguard for confidential information

10 Clues: Planning for potential future risksMoralprinciple guiding fair behaviorEvidence-based evaluation in auditingSafeguard for confidential informationEnsuring responsibility and answerabilityCore principle of honesty and moral conductProfessional review of compliance and controlsA barrier that blocks malicious network traffic...

Teen Leaders Crossword Puzzle 2026-01-14

Teen Leaders Crossword Puzzle crossword puzzle
Across
  1. You need to earn 2 volunteer _____ per month
  2. President of TLC
  3. Our lead advisor
  4. What day is TLC always on.
  5. The theme for this weeks meeting
Down
  1. Something our club is always doing
  2. One of the Core Values, the act of telling the truth
  3. Abbreviation for an upcoming event
  4. Our shirt color this year
  5. Our teen spotlight for this week
  6. TLC's Treasurer

11 Clues: TLC's TreasurerPresident of TLCOur lead advisorOur shirt color this yearWhat day is TLC always on.Our teen spotlight for this weekThe theme for this weeks meetingSomething our club is always doingAbbreviation for an upcoming eventYou need to earn 2 volunteer _____ per monthOne of the Core Values, the act of telling the truth

February Huddle 2025-02-21

February Huddle crossword puzzle
Across
  1. If our new brand fonts are not available, we should use _____
  2. Your one-stop-shop for brand-related materials
  3. Recently promoted to CRO
  4. Our new intranet features a ________________ resources column.
Down
  1. Confidence and _________
  2. Cybersecurity Training is due ____________ 3rd
  3. Recently promoted to CSO
  4. ISE 2025 was held in ____________
  5. ______ are due February 28th
  6. Germany's discount platform is _____________
  7. India's discount platform is ___________

11 Clues: Confidence and _________Recently promoted to CSORecently promoted to CRO______ are due February 28thISE 2025 was held in ____________India's discount platform is ___________Germany's discount platform is _____________Cybersecurity Training is due ____________ 3rdYour one-stop-shop for brand-related materials...