cybersecurity Crossword Puzzles
Cybersecurity 2020-12-22
Across
- things that are done to protect a person, organization, or country and their computer information against crime or attacks carried out using the internet
- a group of computers, printers and devices that are interconnected and governed as a whole
- a harmful computer program that can copy itself and spread across a number of connected computers
- to allow secret information to become generally known
- someone who makes money using illegal methods, especially by tricking people
- kind of malware that allows cybercriminals to remotely control your computer
- computer software that is designed to damage the way a computer works
- an attempt to trick someone into giving information over the internet or by email that would allow someone else to take money from them, for example by taking money out of their bank account
Down
- the process of encoding data to prevent theft by ensuring the data can only be accessed with a key
- a technology that allows us to access our files and/or services through the internet from anywhere in the world
- software designed by criminals to prevent computer users from getting access to their own computer system or files unless they pay money
- an attack that enables an attacker to run malware that allows for the generation of cryptocurrency on the infected computer
- a computer program that gets access to a computer or system by appearing to be harmless, but is designed to do something damaging
- a defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based
- the process or action of verifying the identity of a user or process
15 Clues: to allow secret information to become generally known • the process or action of verifying the identity of a user or process • computer software that is designed to damage the way a computer works • someone who makes money using illegal methods, especially by tricking people • kind of malware that allows cybercriminals to remotely control your computer • ...
CyberSecurity 2025-06-19
Across
- The use of physical characteristics, such as fingerprints, to verify identity.
- A copy of data stored separately to protect against data loss.
- Software that secretly monitors and collects information about users.
- A service that encrypts your internet connection and hides your IP address.
- A type of malware that threatens to publish or block access to data unless a ransom is paid.
- A type of cyber attack that attempts to trick individuals into providing sensitive information.
Down
- The process of verifying the identity of a user or device.
- The practice of protecting systems, networks, and programs from digital attacks.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- Software designed to detect and destroy computer viruses.
- A secret word or phrase used to gain access to a system.
- A network security device that monitors and filters incoming and outgoing network traffic.
- The process of converting information or data into a code to prevent unauthorized access.
- Unwanted or unsolicited email messages.
- An individual who uses technical skills to gain unauthorized access to systems.
15 Clues: Unwanted or unsolicited email messages. • A secret word or phrase used to gain access to a system. • Software designed to detect and destroy computer viruses. • The process of verifying the identity of a user or device. • A copy of data stored separately to protect against data loss. • Software that secretly monitors and collects information about users. • ...
Cybersecurity 2025-10-20
Across
- Software that secretly collects information about you
- A scam using fake emails to steal personal information
- Installing the latest software fixes and security patches
- A system that blocks unauthorized access to a network
- Manipulating people into revealing confidential information
- An added layer of security requiring a code or device confirmation
- The process of verifying a user’s identity
- A tool used to securely store and create strong passwords
- The process of converting data into code to prevent access
Down
- When unauthorized access to data occurs
- A copy of important data stored separately for safety
- A secret word or phrase used to access an account
- A tool that hides your IP address and encrypts your internet traffic
- Software that detects and removes malicious programs
- Software designed to damage or disrupt systems
15 Clues: When unauthorized access to data occurs • The process of verifying a user’s identity • Software designed to damage or disrupt systems • A secret word or phrase used to access an account • Software that detects and removes malicious programs • A copy of important data stored separately for safety • Software that secretly collects information about you • ...
Cybersecurity 2024-01-19
Across
- Malware that attaches itself to other software.
- A way to protect a network from incoming and outgoing attacks.
- Keeping secret things secret.
- An attack that takes place through digital means.
- Government agency responsible for Cybersecurity and Infrastructure Security
- The national organization which sets standards for technology
- Malware that can self-replicate and spread on its own.
- A way to secure an account; Something you know.
Down
- The right to access systems or networks.
- Maintaining access to key technologies.
- Verifying someone is who they say they are.
- A malicious software
- Monitoring who accesses what.
- Keeping systems secure and complete.
- A cybersecurity competition
15 Clues: A malicious software • A cybersecurity competition • Monitoring who accesses what. • Keeping secret things secret. • Keeping systems secure and complete. • Maintaining access to key technologies. • The right to access systems or networks. • Verifying someone is who they say they are. • Malware that attaches itself to other software. • ...
Cybersecurity 2023-09-13
Across
- Avoid using these public ones
- Being harassed or threatened online
- Cybersecurity Awareness Month
- Frequent software --- fix cybersecurity “loopholes” attackers can exploit
- Something you shouldn't share online
- This security software company was purchased by Intel in February 2011
- Software that is created specifically to help detect, prevent and remove software viruses
- Division of the Ministry of Science, Energy, and Technology that addresses cyber threat matters
- Made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyber thieves to gain access to the information
Down
- The practice of tricking Internet users into revealing personal or confidential information which can then be used illicitly
- Cybersecurity Awareness Month Theme 2021
- Type of security threat
- An attempt by hackers to damage or destroy a computer network or system
- Being pursued by someone through the anonymity of social media
- Establishes secure and encrypted connections to provide greater privacy
15 Clues: Type of security threat • Avoid using these public ones • Cybersecurity Awareness Month • Being harassed or threatened online • Something you shouldn't share online • Cybersecurity Awareness Month Theme 2021 • Being pursued by someone through the anonymity of social media • An attempt by hackers to damage or destroy a computer network or system • ...
Cybersecurity 2025-10-13
Across
- Istilah umum untuk perisian jahat seperti virus, worm, dan Trojan. (General term for malicious software.)
- Kejadian apabila penyerang berjaya menceroboh dan mengakses data sensitif. (An incident where an attacker successfully accesses sensitive data.)
- Perisian yang direka untuk mengesan, mencegah, dan membuang perisian jahat. (Software designed to detect and remove malicious programs.)
- Individu yang cuba mendapat akses tanpa kebenaran ke dalam sistem komputer. (Individual who seeks unauthorized access to a system.)
- Membenarkan pengguna mencipta sambungan yang selamat ke rangkaian lain melalui Internet. (Creates a secure connection over the Internet.)
- Kajian tentang teknik komunikasi selamat bagi menghalang pihak ketiga. (Study of secure communication techniques.)
- Proses mengesahkan identiti pengguna, cth. melalui kata laluan. (Process of verifying a user's identity.)
- Gabungan aksara rahsia yang digunakan untuk melindungi akaun anda. (Secret string of characters to protect your account.)
Down
- Sistem keselamatan rangkaian yang memantau dan mengawal trafik masuk dan keluar. (Network security system that monitors and controls traffic.)
- Cubaan menipu mangsa melalui e-mel palsu untuk mencuri maklumat sensitif. (Scam attempt, often via email, to steal sensitive info.)
- Kemas kini kod yang dikeluarkan oleh pemaju untuk membetulkan bug atau security vulnerability. (Code update to fix bugs or a security vulnerability.)
- Kaedah keselamatan yang memerlukan dua jenis pengesahan berbeza. (Security method requiring two different forms of verification.)
- Proses menukar data biasa kepada kod yang sukar dibaca untuk keselamatan. (Process of converting data into an unreadable code.)
- Malware yang secara senyap memantau aktiviti pengguna dan mencuri data. (Malware that secretly monitors user activity.)
- Salinan data yang disimpan di tempat lain, digunakan jika data asal hilang atau rosak. (Copy of data kept elsewhere for recovery.)
15 Clues: Istilah umum untuk perisian jahat seperti virus, worm, dan Trojan. (General term for malicious software.) • Proses mengesahkan identiti pengguna, cth. melalui kata laluan. (Process of verifying a user's identity.) • Kajian tentang teknik komunikasi selamat bagi menghalang pihak ketiga. (Study of secure communication techniques.) • ...
Cybersecurity 2022-04-27
Across
- coding files to hide their contents
- using fraudulent emails to access information
- device on a network with no use other use besides tricking bad actors
- determining the importance of each item
- US law that prohibits avoiding copyright controls
- online document that verifies authenticity
Down
- to find additional ways to remain within an attack surface for a time
- crimes that target and or use computers / computer systems
- stores public and private keys
- cipher that replaces each letter uniquely through rotation
- controls on real world access
- weakness in a system, policy, etc.
- situation that poses potential dangers
- keeping information secret
- intentionally bad programs added to devices
15 Clues: keeping information secret • controls on real world access • stores public and private keys • weakness in a system, policy, etc. • coding files to hide their contents • situation that poses potential dangers • determining the importance of each item • online document that verifies authenticity • intentionally bad programs added to devices • ...
Disruptive Technology 2025-07-24
Across
- Finds weaknesses and risks in applications or computer systems
- Public cloud computing architecture
- Uses endpoint monitoring to detect potential cybersecurity breaches
- A large, virtual world centred around user interactivity
- The act of automating everything that a business can automate
- A cybersecurity measure that uses security controls to protect users and devices
- Uses quantum mechanics and sciences to solve complex computing problems
- A user's experience across one website/application
- Combines practices and technologies to mitigate business risks
- Covers victims in the event of a cybersecurity breach
- Abbreviation is (BI)
Down
- Abbreviation is (AI)
- A form of authentication that provides users with an extra layer of security
- Abbreviation is (XaaS)
- Encompasses technologies that focus on immersive realities
- Technologies that are developed with the thought of lessening environmental impacts
16 Clues: Abbreviation is (AI) • Abbreviation is (BI) • Abbreviation is (XaaS) • Public cloud computing architecture • A user's experience across one website/application • Covers victims in the event of a cybersecurity breach • A large, virtual world centred around user interactivity • Encompasses technologies that focus on immersive realities • ...
FISMA Training 2022-01-18
Across
- Policies and procedures are fully institutionalized, repeatable, automated where appropriate, consistently implemented, and regularly updated
- Assessor selects the sample items without intentional bias to include or exclude certain items in the population
- the process of the assessor re-preforming the control’s procedures for accuracy
- a period of time, normally two weeks, in which specific work has to be completed and made ready for review
- supports the ability to limit or contain the impact of a potential cybersecurity event
- supports the ability to contain the impact of a potential cybersecurity incident
- Based on assessor's sound and seasoned judgement
Down
- the process of looking at the entity’s management perform a process outlined in the procedures
- relating to or measured by the quality or characteristics
- The ____ provides educational guidance materials; develops and grades the Uniform CPA Examination; and monitors and enforces compliance within the profession.
- (acronym) provides a detailed step-by-step account of the work the assessor completed
- enables timely discovery of cybersecurity events
- assists in developing an organizational understanding to managing cybersecurity risk to systems, people, assets, data, and capabilities.
- relating to, or involving the measurement of quantity or amount
- stands for "Prepared by Client" or "Provided by Client." For assurance engagements, the assessor will issue PBC items to the client. Each item is a request to either hold a meeting or obtain documentation.
- Control is designed to put into place when specific requirements for compliance can't be met with existing controls
- a framework for developing complex software products in an iterative and incremental fashion and is the most widely recognized Agile framework
- identifies appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident
18 Clues: enables timely discovery of cybersecurity events • Based on assessor's sound and seasoned judgement • relating to or measured by the quality or characteristics • relating to, or involving the measurement of quantity or amount • the process of the assessor re-preforming the control’s procedures for accuracy • ...
cybersecurity 2023-01-25
Across
- an interruption in authorized users access to a computer network, typically one caused with malicious intent
- an exchange of keys where the parties involved are not authenticated, meaning fraud can happen.
- A form of denial of service attack desgined to overwhelm an inbox or inhibit a server by sending a massive number of emails to a specific person or system
- software that generates revenue by throwing ads up on your screen
- a software or hardware tool that allows the user to monitor your internet traffic
- a situation in which a person or program successfully identifies itself as another by falsifying data
- a computer that is connected to the internet and taken over by a computer worm, virus, or other malware
- malicious software designed to steal data and harm or destroy computers.
- occurs when multiple machines are operating together to attack one target
Down
- a malfunction of a hardware or a software component
- A computer virus written in the same type of macro language as things like excel or word
- ethical hacking
- a type of malware that infects your computer and harms its master boot partition
- any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- average time between repairable failures of a technology product
15 Clues: ethical hacking • a malfunction of a hardware or a software component • average time between repairable failures of a technology product • software that generates revenue by throwing ads up on your screen • malicious software designed to steal data and harm or destroy computers. • occurs when multiple machines are operating together to attack one target • ...
Cybersecurity 2023-09-13
Across
- royal Canadian mounted police
- fraudulent practice of sending emails
- software designed to block computer access until money is paid
- belief in reliability and truth
- defense
- weakness or flaw
Down
- converting data into code
- secret word or phrase
- being kept secret or private
- make full use and benefit
- malicious software
- verifying identity
- electronic device for storing/processing data
- being free from danger or threat
- system designed to block unauthorized access
15 Clues: defense • weakness or flaw • malicious software • verifying identity • secret word or phrase • converting data into code • make full use and benefit • being kept secret or private • royal Canadian mounted police • belief in reliability and truth • being free from danger or threat • fraudulent practice of sending emails • system designed to block unauthorized access • ...
Cybersecurity Fundamentals Chapter 1 2024-06-02
Across
- Identifies and explains various cybersecurity threats that affect individuals, businesses, and organizations. It covers the nature of these threats and their potential impact .
- Involves the collaboration between businesses, government agencies, and countries to share information about serious cyberattacks.
- Professionals dedicated to protecting information systems and networks from cyber threats.
- refers to the broad scope of cybersecurity, which includes understanding the history and evolution of hacking, the role of cyber criminals, and the ongoing need for cybersecurity professionals to protect data and systems .
- The various areas within cybersecurity, such as big data, data analytics, and the responsibilities of businesses to protect data.
Down
- Industry-recognized credentials that validate the knowledge and skills of cybersecurity professionals.
- Individuals or groups who use computers, networks, and the internet to commit illegal activities.
- The frameworks and guidelines, such as the ISO 27000 series, that help organizations implement effective cybersecurity measures.
8 Clues: Professionals dedicated to protecting information systems and networks from cyber threats. • Individuals or groups who use computers, networks, and the internet to commit illegal activities. • Industry-recognized credentials that validate the knowledge and skills of cybersecurity professionals. • ...
Hackers, Scams, and Online Safety 2023-04-22
Across
- Online Harassment
- Security Protects against unauthorized access
- Media manipulation to change image
- Designs, Builds, and tests cybersecurity
- Cyber "kidnapping" for payment
- Tricks for getting private information
- Protects info from cyber attacks
- Harmful Software
- Collects private info without consent
- work that uses personal devices
Down
- Seemlessly harmful Malware until downloaded
- Detects, prevents, and removes malware
- Monitors networks for possible threats
- Software for securing cloud data
- Identifies device by internet connection
- Compromised computers used for cyberattacks
- Designer of data networks
- Paid testers of cybersecurity
- Scrambling date to restrict access
19 Clues: Harmful Software • Online Harassment • Designer of data networks • Paid testers of cybersecurity • Cyber "kidnapping" for payment • work that uses personal devices • Software for securing cloud data • Protects info from cyber attacks • Media manipulation to change image • Scrambling date to restrict access • Collects private info without consent • ...
Cybersecurity 2024-08-08
Across
- A type of server that allows the access of data and programs over the Internet instead of your computer’s hard drive.
- The amount of data that can pass through a network or part of a network per second.
- Protects against code injection attacks and other malicious content on trusted web pages.
- Malware that locks access to files and demands a ransom to release them.
- Monitors and restricts the sharing of sensitive information to prevent data breaches.
- Software that collects user data without consent and sends it to third parties.
- Encodes data to keep it safe from unauthorized access.
- Software that stops known malware. It’s crucial for catching viruses before they can cause trouble.
Down
- Software designed to infect and damage a system or network, including viruses, worms, and trojans.
- Malware disguised as harmless software to gain access to a system.
- A specific type of cyberattack that exploits the fraudulent use of electronic communications to take advantage of users and collect personal information.
- Ensures secure access to cloud apps and keeps an eye on unsanctioned activities.
- Any unauthorized attempt to access, alter, steal, or block system or user information.
- Acts as a barrier between the network and incoming/outgoing traffic, analyzing and managing web activities.
14 Clues: Encodes data to keep it safe from unauthorized access. • Malware disguised as harmless software to gain access to a system. • Malware that locks access to files and demands a ransom to release them. • Software that collects user data without consent and sends it to third parties. • ...
Cybersecurity 2025-10-08
Across
- The regular message before it’s turned into a secret:
- Turning the secret code back into the original message:
- A type of malware that attaches itself to a host file and spreads when the infected file is executed:
- The practice of protecting systems, networks, and programs from digital attacks:
- Hiding a secret message inside something else so no one knows the message is even there:
- Unlike viruses, this can spread independently and across computer networks:
- This type of machine looked like a typewriter. The Germans used it to send secret military messages:
- The secret version of the message after encryption:
- A type of cipher where each letter in the message is shifted a certain number of places down or up the alphabet:
Down
- Changing a message into a secret code so no one else can read it:
- The science of writing and solving secret codes:
- This is a type of malware that encrypts files or locks systems and demands payment to restore access:
- The art of writing and solving secret codes to keep information safe:
- This disguises itself as a real program (maybe even something fun) but performs very bad activities:
- This secretly monitors a user’s activities without the user's consent:
15 Clues: The science of writing and solving secret codes: • The secret version of the message after encryption: • The regular message before it’s turned into a secret: • Turning the secret code back into the original message: • Changing a message into a secret code so no one else can read it: • The art of writing and solving secret codes to keep information safe: • ...
boundless 2022-01-13
12 Clues: who you are • Pay or else • Bad software • what you sell • Who you protect • your goal in 2022 • Wall of protection • theme of this event • Pen & Teller's tricks • best cybersecurity vendor • how SonicWall goes to market • Patented real-time AI security
Crossword Day 2024-12-16
Across
- Founding sponsor
- Shining star of our logo
- The awesome director of ACES
- A series of lectures
- A building that can meet all your basic needs!
- A trap
Down
- A perk of an honors college program
- Fun merch, on theme too
- Research or ___
- Our passion...of course
- Matchmaking...but with a cybersecurity professional
- Earned in the near future
- Fav location
- Class
14 Clues: Class • A trap • Fav location • Research or ___ • Founding sponsor • A series of lectures • Fun merch, on theme too • Our passion...of course • Shining star of our logo • Earned in the near future • The awesome director of ACES • A perk of an honors college program • A building that can meet all your basic needs! • Matchmaking...but with a cybersecurity professional
AP (B) Unidad 4 2024-01-23
20 Clues: fuel • drone • screen • weapon • piracy • device • gadget • upload • immerse • browser • download • research • isolation • challenge • scientist • blackhole • development • advancement • cybersecurity • cyberbullying
Cybersecurity 2023-09-14
Across
- ________ settings let you decide who can see what you post.
- A secret word or phrase that may include numbers, letters, or symbols
- _______ card. You can use this instead of money to buy things at a store or online.
- When you don't pay for something and just take it
- when you're on the internet, clicking on a _______ will take you to a new page or location
- Sending a letter through the computer.
- _______ security - the title of this crossword
Down
- Ring, ring. You probably carry this with you in your pocket or purse every day!
- Websites like Facebook, Twitter, Instagram and TikTok are examples of ______ media
- It may look like a real email, but if it's asking you to share your passsword, it's probably ____
- Putting a new software program or app on your phone
- Another word for coins, dollars, loonies, and toonies
- When you post pictures of your cat or tell someone your good news
- Information that you need to keep hidden or private
14 Clues: Sending a letter through the computer. • _______ security - the title of this crossword • When you don't pay for something and just take it • Putting a new software program or app on your phone • Information that you need to keep hidden or private • Another word for coins, dollars, loonies, and toonies • ________ settings let you decide who can see what you post. • ...
Cybersecurity 2025-09-18
Across
- – A system that blocks unauthorized access to a network.
- – Someone who exploits system vulnerabilities.
- – Malware that locks your files and demands payment.
- – Malware disguised as legitimate software.
- – Converting data into a secure code to prevent access.
- – Fraudulent attempt to obtain sensitive information online.
Down
- – Unauthorized access to data or a system.
- – Program that detects and removes malware.
- – Software that secretly monitors your activity.
- – Software designed to harm or exploit a computer.
- – A program that spreads and damages files or systems.
- – Network of infected computers controlled remotely.
- – Secret word or phrase used for authentication.
- – Software update that fixes security issues.
14 Clues: – Unauthorized access to data or a system. • – Program that detects and removes malware. • – Malware disguised as legitimate software. • – Software update that fixes security issues. • – Someone who exploits system vulnerabilities. • – Software that secretly monitors your activity. • – Secret word or phrase used for authentication. • ...
Sales Trivia 2024-11-08
Across
- KnowBe4's HDR product called
- Process of verifying a user's identity
- What snack food shares its name with KnowBe4 local content publisher in SA?
- A popular Cybersecurity regulation (abbr.)
- What do cows drink?
- Type of sale where a customer buys additional products or services
- Common cybersecurity threat that uses deception to gain sensitive information
Down
- What happens in … stays in …?
- What is the name of KnowBe4's virtual cybersecurity awareness event
- What is the only fruit that has its seeds on the outside?
- Which part of your body contains a bone called the ‘Funny Bone’?
- Acronym for Chief Information Security Officer
- What term describes the total value of sales made over a set period?
- What is the term Gen Z uses for someone that has been ignoring/avoiding you?
- If two’s company and three’s a crowd, what do four and five make?
- What is the term for unsolicited emails sent in bulk?
16 Clues: What do cows drink? • KnowBe4's HDR product called • What happens in … stays in …? • Process of verifying a user's identity • A popular Cybersecurity regulation (abbr.) • Acronym for Chief Information Security Officer • What is the term for unsolicited emails sent in bulk? • What is the only fruit that has its seeds on the outside? • ...
CYBERSAFETY 2024-05-02
Across
- What is Cybersecurity?
- What is your best weapon?
- Who can do untold damage to you because of the internet
- What is the second part of CIA
- You must only share confidential data when
- What is the first part of CIA
Down
- What does Malware try to make you download
- What is now as important as real security
- What type of scam involves around playing with emotions to push people into a sense of urgency and fear leaving them more susceptible to being tricked
- what is the third part of CIA
- What security option fights off viruses from your computer
- You must only share confidential data with
- What is good to have as it notifies you of any sign-ins
- What security option makes a barrier between you and danger
- What security option hides your data
- What are the 3 principles of cybersecurity
16 Clues: What is Cybersecurity? • What is your best weapon? • what is the third part of CIA • What is the first part of CIA • What is the second part of CIA • What security option hides your data • What is now as important as real security • What does Malware try to make you download • You must only share confidential data with • You must only share confidential data when • ...
CAB-CBG Madness 2015-02-24
CAB-CBG Madness 2015-03-03
CAB Madness 2015-02-23
Cyber Commons 2025-09-11
Across
- Market incentive for cybersecurity investment
- IAD rule type defining who can participate
- An example of IAD tools
- Cybersecurity ecosystem with shared risk
- IAD outcome measuring long-term viability
- Framework used to analyze institutional governance
- Security standard for credit card data
- Commons resource used to authenticate websites
Down
- Commons resources are non-excludable but…?
- Rules governing daily decisions
- Social capital for AI models
- Example of Cyber Commons
- Threat information sharing institution
- Organization that manages CVEs
- Vulnerability Scoring System
- Property right in IAD
- An outcome analyzed by IAD
- Commons governance scholar who challenged Hardin
- Vulnerability identifier
19 Clues: Property right in IAD • An example of IAD tools • Example of Cyber Commons • Vulnerability identifier • An outcome analyzed by IAD • Social capital for AI models • Vulnerability Scoring System • Organization that manages CVEs • Rules governing daily decisions • Threat information sharing institution • Security standard for credit card data • ...
AI Puzzle 2024-10-15
20 Clues: - Scam • - Test • - Rules • - Device • - Coding • - Network • - Barrier • - Network • - Exploit • - Digital • - Malware • - Physics • - Internet • - Intruder • - Sequence • - Imitation • - Protection • - Efficiency • - Automation • - Information
AI Puzzle 2024-10-15
20 Clues: - Scam • - Test • - Rules • - Device • - Coding • - Exploit • - Digital • - Physics • - Barrier • - Network • - Network • - Malware • - Internet • - Sequence • - Intruder • - Imitation • - Efficiency • - Automation • - Protection • - Information
Cyber Security Awareness Quiz 2024-09-20
Cybersecurity Santiago Yeison Cristian Yefferson 2025-06-25
Across
- This is perhaps the most ubiquitous prefix in the field, indicating anything related to computers, networks, or the internet.
- Criminal activities carried out using computers or the internet.
- The state of being free from danger or threat. In cybersecurity, it refers to the protection of information systems.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- The programs and other operating information used by a computer.
- The quality of being trustworthy or of performing consistently well.
- The use of computers and the internet to conduct warfare in cyberspace.
- Software used to prevent, detect, and remove malicious software.
- The process of encoding information in such a way that only authorized parties can access it.
Down
- Criminal activities carried out using computers or the internet.
- The practice of protecting systems, networks, and programs from digital attacks.
- Software that enables a user to obtain secret information about another's computer activities by secretly transmitting data from their hard drive.
- Characterized by malice; intending or intended to do harm.
- As discussed, malicious software.
- An attempt by hackers to damage or destroy a computer network or system.
- The action of protecting, or the state of being protected. (While not strictly a cybersecurity prefix, it's a foundational concept).
- The process of converting encrypted data back into its original form.
- The state of being exposed to the possibility of being attacked or harmed, either physically or emotionally. In cybersecurity, a weakness that can be exploited.
- Permanent software programmed into a read-only memory.
- The practice of protecting systems, networks, and programs from digital attacks.
- Broader than antivirus, it protects against various forms of malware, not just viruses.
- Short for "malicious software," it's any software intentionally designed to cause damage to a computer, server, client, or computer network.
22 Clues: As discussed, malicious software. • Permanent software programmed into a read-only memory. • Characterized by malice; intending or intended to do harm. • Criminal activities carried out using computers or the internet. • Criminal activities carried out using computers or the internet. • The programs and other operating information used by a computer. • ...
Cybersecurity 2024-03-20
Across
- Irrelevant or inappropriate messages sent on the internet.
- Designed to disrupt, damage, or gain access to a computer.
- Data storage device that includes flash memory. (Contains 2 words for example: Deep fake becomes Deepfake).
- Is a vulnerability in a system or device that has been disclosed but is not yet patched.
- Sending emails to induce individuals to reveal personal information.
- Process of encoding a message or information that only authorized parties can access. (Contains 2 words for example: USB Drive becomes USBDrive).
- Allows users and websites operator to remain anonymous.
Down
- Software designed to block access to a computer system until money is paid.
- Access to a centralized resource or service.
- Computer program that records every keystroke.
- A standard cable connection interface for personal computers.
- Web World wide web that is not discoverable. (Contains 2 words for example: USB Drive becomes USBDrive.
- A video or sound recording that replaces someone's face or voice with someone else's, in a way that looks real.(Contains 2 words for example: USB Drive becomes USBDrive).
13 Clues: Access to a centralized resource or service. • Computer program that records every keystroke. • Allows users and websites operator to remain anonymous. • Irrelevant or inappropriate messages sent on the internet. • Designed to disrupt, damage, or gain access to a computer. • A standard cable connection interface for personal computers. • ...
Cybersecurity 2025-08-22
Across
- A term that defines when a system is accessed by an unauthorized person.
- Hackers that are authorized by companies to find flaws in systems in order to patch them.
- Protection of computer systems, networks, and data from attacks.
- Information that can be identified as belonging to someone or information that can be used to identify someone.
- The person in charge of maintaining a network.
- Hackers that maliciously violate computer security for personal gain.
Down
- Where data is stored.
- Digitally harassing, humiliating, embarrassing, and/or threatening someone.
- Information stored digitally.
- A person who attempts to use things in a way other than it's original intention.
- Revealing, or threatening to reveal, a person's personal data in order to harass and/or intimidate.
- A flaw in a computer system, operating system, or software.
- Hackers that may sometimes violate laws and are socially or politically motivative.
13 Clues: Where data is stored. • Information stored digitally. • The person in charge of maintaining a network. • A flaw in a computer system, operating system, or software. • Protection of computer systems, networks, and data from attacks. • Hackers that maliciously violate computer security for personal gain. • ...
OT Cybersecurity Awareness 2024-07-25
Across
- Certified Industrial Cybersecurity Professional
- Infamous malware that was used to attack a Uranium enrichment facility
- Malware that encrypts data and demands payment to unlock it
- This gasoline pipeline company in US was the victim of a cyberattack in the year 2021
Down
- Acronym for a management system that is used to manage Cybersecurity in an organization
- For better cybersecurity, OT networks are partitioned into
- A malicious email sent to only the top management personnel of an organization
- A set of standards and technical reports for OT cybersecurity
- This brand of Safety PLC (Logic Solver) was attacked in the TRITON incident
- Device that allows communication only in one direction via hardware
10 Clues: Certified Industrial Cybersecurity Professional • For better cybersecurity, OT networks are partitioned into • Malware that encrypts data and demands payment to unlock it • A set of standards and technical reports for OT cybersecurity • Device that allows communication only in one direction via hardware • ...
Cybersecurity 2022-02-14
Across
- method go through all the files or network elements with an intention to detect something unusual
- activities endanger the sovereignty and integrity of nation
- unsoliciated commercial email
- Compromising confidential Information
- collective terms of malicious software, such as viruses, worms and trojans.
- attempt to harm, damage or cause threat to a system or network
Down
- harassing aperson or following a person
- Periodic assessment of security vulnerability in computer systems is called _______audit.
- monitor user activity on someone else and transfer information to someone else
- existence of weakness in a system or network
- Viruses are
- Script files sent mostly through email attachment to attack host computer
- Doesnot belong to privacy threat
- The person using vulnerability in operating system or application software or IT infrastructure to intrude in to the computer of a victim
14 Clues: Viruses are • unsoliciated commercial email • Doesnot belong to privacy threat • Compromising confidential Information • harassing aperson or following a person • existence of weakness in a system or network • activities endanger the sovereignty and integrity of nation • attempt to harm, damage or cause threat to a system or network • ...
Cybersecurity 2022-05-10
Across
- the process of taking plaintext and converting it into a format that is not human-readable
- any potential change or disruption of a computer network.
- Any crime committed over a connected device, such as a cellphone,
- prevent undesirable traffic from entering into a network.
- protected strings of characters in unique combinations that no one can easily guess.
- Phishing is a technique used to gain personal or sensitive information from a user
- theft the process of stealing your personal information such as your social security number or driver's license to open a bank account or apply for a credit card.
Down
- a user's physical characteristics.
- protect networked systems and all of the data from unauthorized use or harm
- software designed to harm or exploit any programmable device, service, or network.
- insulting, harassing, or threatening anyone using the Internet via email, instant messaging, and so on.
- the code of responsible behavior on the computer as well as on the Internet.
- an activity that intrudes into your system or gains unauthorized access to your accounts.
13 Clues: a user's physical characteristics. • any potential change or disruption of a computer network. • prevent undesirable traffic from entering into a network. • Any crime committed over a connected device, such as a cellphone, • protect networked systems and all of the data from unauthorized use or harm • ...
CYBERSECURITY 2024-12-14
Across
- the activity of tricking people into providing personal or financial information by sending emails, texts, etc. that seem to be from companies that the person knows, often in order to steal money from them
- a computer program that is a type of virus and that spreads across a network by copying itself
- a series of letters, numbers, etc. that you must type into a computer or computer system in order to be able to use it
- software that is used to demand money from an individual or organization
- a document that you send to somebody using email
- a number of computers and other devices that are connected together so that equipment and information can be shared
Down
- a weakness in software programs that can be exploited by hackers to compromise computers.
- a mistake in something that means that it is not correct or does not work correctly
- a set of programs that controls the way a computer works and runs other programs
- attacks manipulate people into sharing information that they shouldn’t share, downloading software that they shouldn’t download, visiting websites they shouldn’t visit, sending money to criminals or making other mistakes that compromise their personal or organizational security.
- a small memory device that can be used to store data from a computer or digital camera and to move it from one device to another
- any security incident in which unauthorized parties access sensitive or confidential information
- a collection of software tools or a program that gives a hacker remote access to, and control over, a computer or network.
13 Clues: a document that you send to somebody using email • software that is used to demand money from an individual or organization • a set of programs that controls the way a computer works and runs other programs • a mistake in something that means that it is not correct or does not work correctly • ...
Security Squares - Simple 2023-08-08
Across
- Deceptive Text Messages
- Trained professional who specializes in IT infrastructure security
- Role-Based Access Control
- A digital form of payment
- A device that provides two-factor for users to prove their identity
- The art of protecting networks, devices and data from unauthorized access
- The use of a fabricated story to gain someone's trust
- National Institute of Standards and Technology
- The process of giving a user permission to access resources
- A Cybersecurity ----- is an attempt to gain unauthorized access to information
- A Cybersecurity -------- is a violation of computer security policies
Down
- Also know as MFA
- Security that manages digital identities and user access to data and systems
- Something you know, something you have, something you are
- Sets of documents describing guidelines, standards and best practices
- Something that helps an organization to do as much as possible to remain proactively prepared to move quickly to remediate any issues
- Illegal activity carried out on a digital network
- ----- coding, the process of designing code that adheres to best practices and safeguards
- The application of policies, technologies and procedures to reduce the overall impact and risk
- Voice Phishing
20 Clues: Voice Phishing • Also know as MFA • Deceptive Text Messages • Role-Based Access Control • A digital form of payment • National Institute of Standards and Technology • Illegal activity carried out on a digital network • The use of a fabricated story to gain someone's trust • Something you know, something you have, something you are • ...
Media 2023-03-30
24 Clues: lol • joks • lola • dati • oklo • kola • kola • kole • paper • aniki • koooo • klips • hzkas • radiji • kompis • roboti • pteikt • softijs • zurnals • publicet • mehaniki • jaunieshi • nepareizi • probgramma
Cyber Security Awareness Month 2021-10-08
Across
- Results in the loss of contact details if it were stolen
- What does cybersecurity have in common with Halloween?
- _____ is best known for Halloween and happens to be National Cybersecurity Awareness Month
- What you will cause IT to have if you get a virus on your computer
- Here’s a spooky cybersecurity fact, Google blocks 18 million ____ related phishing emails a day!
- Hackers ____ their identity.
- This type of harmful computer program can be easily installed on your computer while you’re downloading unknown programs or files off the Internet.
- A hardware/software device or a software program that limits network traffic according to a set of rules of what access is and is not allowed or authorized.
- What to use if you need to connect to wifi while picking up your pumpkin spice latte.
Down
- This software is installed on a network of computers without the owner's knowledge. It can monitor activities and pick up information like credit card numbers, usernames, and passwords.
- You don't want to be the business with the most _____ network on the block.
- These programs protect your computer from Internet viruses or codes that can quickly disable your computer.
- How your computer might act once infected by a virus.
- Happens on Halloween night
- If you click on a phishing email you might want to ____ your job
- For hackers, it’s all about the _____ and it’s their treat they succeed
- These Internet scam programs often contact unsuspecting people via e-mail, urging them to visit fake websites designed to look like those run by well-known banks or other financial institutions.
- A bridge between two computer networks.
- In cybersecurity, the evil entity is black hats, people associate Halloween with black ____
- The process of translating plaintext into ciphertext.
20 Clues: Happens on Halloween night • Hackers ____ their identity. • A bridge between two computer networks. • How your computer might act once infected by a virus. • The process of translating plaintext into ciphertext. • What does cybersecurity have in common with Halloween? • Results in the loss of contact details if it were stolen • ...
Cybersecurity 2025-05-16
Across
- weaponized software
- trying to "hook" sensitive data
- used to run untrusted code
- protects device against digital infections
- apart of the login process
- monitors user activity
Down
- converts data into code
- can capture passwords
- network protector
- strong, long, and unique
- masks IP address
- security update
- software disguised to look safe
13 Clues: security update • masks IP address • network protector • weaponized software • can capture passwords • monitors user activity • converts data into code • strong, long, and unique • used to run untrusted code • apart of the login process • trying to "hook" sensitive data • software disguised to look safe • protects device against digital infections
Cybersecurity 2025-08-22
Across
- collecting a user's private information.
- A collection of organized data.
- uses information illegally to harm and gain personal info
- Protecting computer systems.
- A weakness in a system that can be made use of by a threat actor.
- Someone who uses advanced computer skills to gain access to computer systems.
- uses information with permission for good reasons such as improving security.
Down
- a collection of connected computers that can share resources
- Any data that can identify a person directly or by collecting other data.
- The process to manage, maintain and secure computer.
- A security event where sensitive info is being stolen.
- discover vulnerabilities in systems without the person's permission.
- information processed by a computer.
13 Clues: Protecting computer systems. • A collection of organized data. • information processed by a computer. • collecting a user's private information. • The process to manage, maintain and secure computer. • A security event where sensitive info is being stolen. • uses information illegally to harm and gain personal info • ...
CTM CROSSWORD PUZZLE 2021-03-18
EW Howell Crossword May 2024 2024-05-09
Across
- ____ Point Brewery
- Amusement park project
- Examples include Manhattanville, Brooklyn, Touro
- Far Rockaway Library LEED Level
- Town of Jones Beach Theater
- List of incomplete items during final project inspection
- Sector for mall, hospitality, big box projects
- ________ Living
- Month of Jones Beach Topping Off Ceremony
- Worn During PS I Love You Day
- ______ 2030
- Verification Battery Park Project received
- __________ Shopping Center
Down
- Organization focused on green/sustainable building
- MFA tool
- Cybersecurity tool
- Architectural design tool
- _______ User and Support Center
- Examples include Walt Whitman, Smith Haven
- __________ Maximum Price
- Cybersecurity scam
- _______ Care Pavilion
- Organization promoting women leaders in construction
- _____ Animal Care Center
- Training to recognize and prevent workplace hazards
25 Clues: MFA tool • ______ 2030 • ________ Living • ____ Point Brewery • Cybersecurity tool • Cybersecurity scam • _______ Care Pavilion • Amusement park project • __________ Maximum Price • _____ Animal Care Center • Architectural design tool • __________ Shopping Center • Town of Jones Beach Theater • Worn During PS I Love You Day • _______ User and Support Center • Far Rockaway Library LEED Level • ...
Working in a company 2021-02-16
23 Clues: Lager • Berater • Vertrag • Einkauf • Forschung • Techniker • Fertigung • Verwaltung • Controlling • Kalkulation • Arbeitnehmer • Großraumbüro • Schichtarbeit • Bestandsliste • Geschäftsreise • Kleiderordnung • Vertriebsleiter • Vertriebsleiter • Zusatzleistungen • Internetsicherheit • Qualitätssicherung • Personal(abteilung) • Kaufmännischer Leiter
Cyberdise Crossword 2024-11-24
Across
- Secure connection over the internet
- Extra layer of security for logins
- Someone who breaks into systems
- Fixes vulnerabilities in software
- Malicious software
- Software to detect and remove viruses
- Small data files stored on your browser
- A deceptive scheme to steal information
- Software that spies on your activities
- Unauthorized access to data
- The best cybersecurity awareness company
Down
- Converts data into a secure format
- Knowledge about cybersecurity threats
- Fake emails to steal information
- Copy of data for recovery
- Keeps software current and secure
- Protects a network from unauthorized access
- Malware disguised as legitimate software
- Demands payment to unlock your data
- A secret word or phrase for access
- Uses the internet to harm others
21 Clues: Malicious software • Copy of data for recovery • Unauthorized access to data • Someone who breaks into systems • Fake emails to steal information • Uses the internet to harm others • Keeps software current and secure • Fixes vulnerabilities in software • Converts data into a secure format • Extra layer of security for logins • A secret word or phrase for access • ...
Cybersecurity 2024-02-28
Happy National Crossword Day from Frontline! 2020-12-08
Across
- Holds your data hostage.
- Place people sell your sensitive info.
- Is greater than your struggle.
- ____ data you store to reduce risk of exposure.
- First step in Centurion360 package.
- Protects your data on public Wi-Fi.
- Who we are.
Down
- Next-Gen versions use artificial intelligence.
- Practices to protect what's connected to the internet.
- When an account double checks your identity.
- A password _____ will help store and generate secure ones.
- Cause of over 2/3 of cybersecurity incidents.
- How most ransomware gets to small businesses.
- We Keep IT ____.
- Already know your weak points.
- Who cyberattacks target.
16 Clues: Who we are. • We Keep IT ____. • Holds your data hostage. • Who cyberattacks target. • Is greater than your struggle. • Already know your weak points. • First step in Centurion360 package. • Protects your data on public Wi-Fi. • Place people sell your sensitive info. • When an account double checks your identity. • Cause of over 2/3 of cybersecurity incidents. • ...
puzzle making 2015-03-02
TEST1 2020-09-14
HUMANITIES 2024-11-04
Emerging Technologies 2025-01-16
Cybersecurity Terms 2022-04-27
Across
- scrambled data
- security incident where confidential data is accessed
- a key that can be used by anyone to encrypt messages
- key only used by one individual to decrypt
- person who has permission to hack
- layers of control
- using the same keys
- person who does not have permission to hack
- readable data
Down
- command to make a directory
- access point that is susceptible to hacking
- copy of data
- field to protect information on the internet
- a trap for cybersecurity criminals
- command to create a file
15 Clues: copy of data • readable data • scrambled data • layers of control • using the same keys • command to create a file • command to make a directory • person who has permission to hack • a trap for cybersecurity criminals • key only used by one individual to decrypt • access point that is susceptible to hacking • person who does not have permission to hack • ...
Cybersecurity 2025-04-17
Across
- Redirecting users to fake websites to steal personal information.
- programs disguised as legitimate software.
- A type of cyber attack tricking you into revealing personal information.
- The act of spying over someone's shoulder to steal information.
- Software that shows unwanted ads.
Down
- A network security system that monitors and controls incoming and outgoing network traffic.
- A program that can replicate itself to spread.
- software that locks your files and demands payment.
- Security authentication using unique biological traits like fingerprints or facial recognition.
- Lying or deceiving to gain information online.
- A program that replicates itself to spread across computers without human interaction.
- software that secretly gathers user information.
12 Clues: Software that shows unwanted ads. • programs disguised as legitimate software. • A program that can replicate itself to spread. • Lying or deceiving to gain information online. • software that secretly gathers user information. • software that locks your files and demands payment. • The act of spying over someone's shoulder to steal information. • ...
CyberSecurity 2024-09-05
Across
- Software designed to disrupt, damage, or gain unauthorized access to a computer system
- A service that encrypts users' data and masks their IP addresses
- Taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
- A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- The process of converting information into ciphertext
- Where the recruitment, retention and advancement of women in cybersecurity happens.
Down
- The process of decoding cipher text to plain text
- The practice of sending fraudulent communications that appear to come from a legitimate source
- Contains items that are temporarily blocked until an additional step is performed
- A term used to describe a person who tries to gain unauthorized access to a network or computer system
- A vulnerability exploited before developers release a fix
- Malware that self-replicates and spreads without human interaction
12 Clues: The process of decoding cipher text to plain text • The process of converting information into ciphertext • A vulnerability exploited before developers release a fix • A service that encrypts users' data and masks their IP addresses • Malware that self-replicates and spreads without human interaction • ...
Cybersecurity 2025-10-21
Across
- Fraudulent messages sent to trick users into revealing sensitive information
- Unintentional user actions that cause data loss or damage
- Granting permissions to a user based on their role
- Restricting who can view or use resources in a system
- Software designed to damage or gain unauthorised access to a system
- A copy of data stored to prevent loss in case of system failure
- Verifying a user’s identity before granting access
- Malware disguised as legitimate software to trick users
Down
- A security system that monitors and controls incoming and outgoing network traffic
- Deliberate actions aimed at harming IT systems or stealing data
- Malware that encrypts files and demands payment to restore access
- A malware that attaches to files or programs and spreads when shared
12 Clues: Granting permissions to a user based on their role • Verifying a user’s identity before granting access • Restricting who can view or use resources in a system • Malware disguised as legitimate software to trick users • Unintentional user actions that cause data loss or damage • Deliberate actions aimed at harming IT systems or stealing data • ...
General Regulatory Compliance Cryptic Crossword 2024-01-26
Across
- DoD standard for implementing cybersecurity
- security device to control traffic
- deceptive practices to fraudulently steal data
- measures to protect against network attack
- group of interconnected computers and devices
- series of actions leading to a result
- simulated cyber attack
- potential loss of assets
- process of verifying identity of a user
Down
- protection of information technology on ships and port facilities
- Experts in safeguarding business from evil
- security measure of pre-approved IP addresses
- process of establishing encrypted links
- converting data to coded format
- malicious software
- digital information created by computer systems
- centralized unit and team continuously monitoring security posture
- measures and practices to protect digital systems
18 Clues: malicious software • simulated cyber attack • potential loss of assets • converting data to coded format • security device to control traffic • series of actions leading to a result • process of establishing encrypted links • process of verifying identity of a user • Experts in safeguarding business from evil • measures to protect against network attack • ...
Cybersecurity 2024-06-04
Across
- This malicious software holds your data hostage until a ransom is paid
- The process of verifying a user's identity
- A deceptive email attempt to steal personal information
- Malicious software designed to harm a computer system
- Scrambling data to make it unreadable without a key
- Process of identifying and correcting security vulnerabilities in a
Down
- A security incident where sensitive data is exposed
- Software program designed to block unauthorized access while
- An attack that overwhelms a server with traffic, making it unavailable
- Software that scans for and neutralizes viruses and other malicious
- system.
- authorized communications.
12 Clues: system. • authorized communications. • The process of verifying a user's identity • A security incident where sensitive data is exposed • Scrambling data to make it unreadable without a key • Malicious software designed to harm a computer system • A deceptive email attempt to steal personal information • Software program designed to block unauthorized access while • ...
Course Codes - C & D 2025-10-13
Working in a company 2021-02-18
23 Clues: Lager • Vertrag • Einkauf • Berater • Fertigung • Techniker • Forschung • Verwaltung • Kalkulation • Controlling • Großraumbüro • Arbeitnehmer • Schichtarbeit • Bestandsliste • Kleiderordnung • Geschäftsreise • Finanzvorstand • Vertriebsleiter • Zusatzleistungen • Qualitätssicherung • Internetsicherheit • Personal(abteilung) • Kaufmännischer Leiter
Wedding 2023-07-04
24 Clues: dog • dating • mascot • Street • newname • bridehs • groomhs • bridesor • groomcomp • honeymoon • GroomFrat • bridecomp • TheirCity • groomdrink • bridedrink • Groomzodiac • bridemiddle • bridemaiden • bridezodiac • Groommiddle • groomproposal • saidilove you • yearstogether • sharedcollegemajor
Cybersecurity 2022-11-16
Across
- Responsible for designing, building, testing, and implementing security infrastructure and security systems for the organization they work for.
- The Sarbanes Oxly Act covers which type of activity?
- Measures designed to deter, prevent, detect or alert unauthorized real-world access to a site or material item.
- Defined as an intense and selfish desire for something, especially wealth or power.
- Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
- One common error when considering people in Cybersecurity is using TRUST instead of
- In a cryptosystem, Alice and Bob both use the same key value to communicate with each other.
Down
- Falsifying header information is a serious violation of the _ Act.
- Computer and Abuse in cyber law, which act is most frequently used to create the crime of Computer Trespass?
- Allows the user to determine how to trust the keys, so its a trust model.
- Financial regulations
- Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?
12 Clues: Financial regulations • The Sarbanes Oxly Act covers which type of activity? • Falsifying header information is a serious violation of the _ Act. • Allows the user to determine how to trust the keys, so its a trust model. • Defined as an intense and selfish desire for something, especially wealth or power. • ...
Cybersecurity 2023-09-07
Across
- Once hijackers obtain your personal details, they can make _______ transactions.
- This is the protection of computers from information theft.
- Turning on two-step ____ in whatsapp is advisable.
- Stay calm and do not reveal any personal _____.
- What are @, $, &, % called?
Down
- Always enable ____ updates for whatsapp.
- Only visit websites that feature a _____ icon.
- In whatsapp, to go to Fingerprint lock, you need to select _____.
- Use only _____ websites.
- Always alert a _____ adult if you are unsure.
- One of the most common types of cyberattacks are ____ attacks.
- One of the strong passwords.
12 Clues: Use only _____ websites. • What are @, $, &, % called? • One of the strong passwords. • Always enable ____ updates for whatsapp. • Always alert a _____ adult if you are unsure. • Only visit websites that feature a _____ icon. • Stay calm and do not reveal any personal _____. • Turning on two-step ____ in whatsapp is advisable. • ...
Cybersecurity 2023-03-11
Across
- Is an encrypted connection over the Internet from a device to a network
- Is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of internet security weaknesses
- A form of malware that hijacks your system and encrypts your files, denying you access to them until you send money to unlock everything
- A form of malware used by hackers to spy on you and your computer activities
- A scam where a hacker poses as a legitimate business or organization in order to fool the victim into giving them sensitive personal information
- A portmanteau of “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system
Down
- While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking
- Malware which changes, corrupts, or destroys information, and is then passed on to other systems
- Yet another form of malware, this one a misleading computer program that looks innocent, but in fact allows the hacker into your system via a back door.
- A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data
- Any technology, be it software or hardware, used to keep intruders out
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
12 Clues: Any technology, be it software or hardware, used to keep intruders out • Is an encrypted connection over the Internet from a device to a network • A form of malware used by hackers to spy on you and your computer activities • Malware which changes, corrupts, or destroys information, and is then passed on to other systems • ...
Cybersecurity 2025-05-30
Across
- _________ access is the act of gaining access to a computer system or physical location without proper permission.
- it's a social engineering technique when an attacker lures a victim with a false promise that maipulates their greed or curiosity.
- brute _____ attack is is a method of breaking encryption code by trying all possible encryption keys.
- _______ password is a correct password.
- the pieces of information you need to prove your identity and gain access to a specific system or service, typically a username and a password.
- a type of malware that disguises itself as a legitimate program or file to fool users into downloading and running it.
Down
- _________ data is any valuable or private information that requires protection, including financial, personal, or health-related details.
- _________ phishing is a type of phishing attack that targets a specific person or group.
- a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
- social _______ is a manipulation technique that exploits human weaknesses to get private information, access or money.
- it is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information.
- a type of malware that can replicate itself and spread rapidly across a network, without requiring user interaction or attachment to a host program.
12 Clues: _______ password is a correct password. • _________ phishing is a type of phishing attack that targets a specific person or group. • brute _____ attack is is a method of breaking encryption code by trying all possible encryption keys. • _________ access is the act of gaining access to a computer system or physical location without proper permission. • ...
CyberSecurity 2021-12-16
12 Clues: Order • Owns data • Uses Data • uneven bars • responsible for data • Secures digital data • Protects your Privacy • describes a computer network • proof that a package is sented • technique used to validate messages • shared key used to encrypt or decrypt text • bits created to unscramble and scramble data
Cybersecurity 2023-04-01
Across
- Cyber criminals find and use these ______ for their malicious intents.
- The magic number of characters for a strong password
- _____ knowledge of recent threats as well as softwares
- A Strong ______ ensure security by making it harder to access your accounts
- Using uppercase and lowercase, numbers and symbols to add _______ in your passwords
- Most users interact with their mobile devices more often than computers.
Down
- Software that eliminates and mitigates malicious software
- Computer _____ are a type of malware meant to damage a computer by corrupting or destroying data
- Type of security when surfing the ____
- Process of converting data into an unreadable form for data protection.
- Do not include your ______ in your passwords such as your name or birthdate
- Do not _____ your password with others
12 Clues: Type of security when surfing the ____ • Do not _____ your password with others • The magic number of characters for a strong password • _____ knowledge of recent threats as well as softwares • Software that eliminates and mitigates malicious software • Cyber criminals find and use these ______ for their malicious intents. • ...
Cybersecurity 2022-11-28
Across
- Code that replicates itself
- Someone who tries to take your data online
- Replicating code that moves through your network
- Software that appears useful but is not
- Forced advertisement
- Safety online
Down
- Something that might harm your computer
- Tricking someone into giving you data
- Unwanted software that reads your data
- Someone who is young and "testing out their skills" online
- A scam that holds your money hostage
- Infectious software
12 Clues: Safety online • Infectious software • Forced advertisement • Code that replicates itself • A scam that holds your money hostage • Tricking someone into giving you data • Unwanted software that reads your data • Something that might harm your computer • Software that appears useful but is not • Someone who tries to take your data online • ...
NCPD FCU vs Cybercrime 2024-01-31
Across
- In terms of Cybersecurity, always avoid a ______ play.
- To score 1 of these _____ always "Think Before You Click".
- We intend to _________ phishing emails.
- The LooksPhishy mailbox can serve as this ________ for suspicious email.
- Cybersecurity is a team ________.
- Our goal is to ____ social engineering scams.
- Malware can do this to file names __________.
- At our Credit Union, we're all on the same winning ________.
- Anyone on our team can be the ______ of phishing emails.
- Threat actors can make this type of move once they get on a network _______.
- Forwarding email to LooksPhishy mailbox, is similar to an __________.
Down
- Reporting phishing emails properly will earn you an _______ with Wayon.
- Our Friday Operations meeting is called "The ________".
- When you get a phishing email, never do this ______.
- We are all _________ on the NCPD FCU team.
- Technology is incapable of _________ all suspicious email.
- You can be a _______ star by always following our Credit Unions Policies & Procedures.
- Our team forms this to protect our Credit Union _______.
- We never want to do this ______ with a phishing email.
- Never make a _____ judgement with questionable email.
- ________ is a motivator behind phishing emails.
- Phishing emails can be similar to this type of football play _______.
- The goal of Cybersecurity is _______.
- Don't do this _______ when examining a suspicious email.
24 Clues: Cybersecurity is a team ________. • The goal of Cybersecurity is _______. • We intend to _________ phishing emails. • We are all _________ on the NCPD FCU team. • Our goal is to ____ social engineering scams. • Malware can do this to file names __________. • ________ is a motivator behind phishing emails. • When you get a phishing email, never do this ______. • ...
Privacy,Cybersecurity e NIS2 2025-08-09
Across
- programma malevolo che blocca i file chiedendo un riscatto
- truffa via email per rubare dati
- miglior azienda di privacy e cybersecurity bepsolution
- identificativo per accedere a un sistema
- software contro virus
- file usato per tracciare la navigazione
- condizioni d’uso di un servizio
Down
- norma europea sulla protezione dei dati personali (sigla)
- accesso non autorizzato a un sistema
- comunicazione di una violazione dati
- documento che valuta l’impatto della protezione dati (sigla)
- sicurezza informatica (in inglese)
- sistema di nomi di dominio
- test di penetrazione per sicurezza
- procedura di verifica dell’identità
- copia di sicurezza dei dati
- sistema di filtraggio del traffico di rete
- tecnica di codifica per proteggere le informazioni
- direttiva ue sulla sicurezza delle reti e sistemi informativi (sigla)
19 Clues: software contro virus • sistema di nomi di dominio • copia di sicurezza dei dati • condizioni d’uso di un servizio • truffa via email per rubare dati • sicurezza informatica (in inglese) • test di penetrazione per sicurezza • procedura di verifica dell’identità • accesso non autorizzato a un sistema • comunicazione di una violazione dati • ...
Cyber Crime 2023-12-26
15 Clues: เมล์ขยะ • บิตคอยน์ • บล๊อกเชน • สปายแวร์ • ม้าโทรจัน • การล่อหลอก • ปัญญาประดิษฐ์ • โปรแกรมอันตราย • ข้อมูลขนาดใหญ่ • ไวรัสทำลายข้อมูล • หนอนอินเทอร์เน็ต • ไวรัสเรียกค่าไถ่ • การระรานทางไซเบอร์ • ดักจับข้อมูลการพิมพ์ • ความมั่นคงปลอดภัยไซเบอร์
HUMANITIES 2024-11-04
EW Howell Crossword Puzzle - April 2024 2024-04-11
Across
- Cybersecurity scam
- Organization focused on green/sustainable building
- Cybersecurity tool
- Examples include Iona, Manhattanville, Touro
- ______ 2030
- MFA tool
- Amusement park project
- Verification Battery Park Project received
- Sector for mall, hospitality, big box projects
- _____ Animal Care Center
- Design method used to visualize construction
Down
- _______ Care Pavilion
- __________ Maximum Price
- Agreement outlining specific work services for a project
- Organization promoting women leaders in construction
- ____ Point Brewery
- Month of Jones Beach Topping Off Ceremony
- Worn During PS I Love You Day
- Far Rockaway Library LEED Level
- __________ Shopping Center
- Town of Jones Beach Theater
- _______ User and Support Center
- List of incomplete items during final project inspection
- Training to recognize and prevent workplace hazards
- Work management software
- ________ Living
- Examples include Westfield, Smith Haven
27 Clues: MFA tool • ______ 2030 • ________ Living • Cybersecurity scam • ____ Point Brewery • Cybersecurity tool • _______ Care Pavilion • Amusement park project • __________ Maximum Price • Work management software • _____ Animal Care Center • __________ Shopping Center • Town of Jones Beach Theater • Worn During PS I Love You Day • Far Rockaway Library LEED Level • _______ User and Support Center • ...
General Regulatory Compliance Cryptic Crossword 2024-01-26
Across
- DoD standard for implementing cybersecurity
- security device to control traffic
- deceptive practices to fraudulently steal data
- measures to protect against network attack
- group of interconnected computers and devices
- series of actions leading to a result
- simulated cyber attack
- potential loss of assets
- process of verifying identity of a user
Down
- protection of information technology on ships and port facilities
- Experts in safeguarding business from evil
- security measure of pre-approved IP addresses
- process of establishing encrypted links
- converting data to coded format
- malicious software
- digital information created by computer systems
- centralized unit and team continuously monitoring security posture
- measures and practices to protect digital systems
18 Clues: malicious software • simulated cyber attack • potential loss of assets • converting data to coded format • security device to control traffic • series of actions leading to a result • process of establishing encrypted links • process of verifying identity of a user • Experts in safeguarding business from evil • measures to protect against network attack • ...
Computer science 2023-03-30
Common Europe Congress 2023 2023-05-10
22 Clues: CNX • TSP • Xorux • Lansa • Infor • Fortra • Maxava • Axians • Raz-Lee • Infoview • iVolution • Taskforce • Metrixware • Connectria • Falconstor • Omniscience • Arcad Software • Profound Logic • Service Express • Remain Software • Rocket software • Dynamic Solutions
CEC2023 - 1 2023-06-03
22 Clues: CNX • TSP • Xorux • Lansa • Infor • Fortra • Maxava • Axians • Raz-Lee • Infoview • iVolution • Taskforce • Metrixware • Connectria • Falconstor • Omniscience • Arcad Software • Profound Logic • Service Express • Remain Software • Rocket software • Dynamic Solutions
CBL World 2023-05-05
Across
- Your Cyber Security Partner
- Kidnapped & hold for ransom
- Burning walls, keep intruders away
- Most critical element in CyberSecurity
- Locked with a key, for data security
Down
- Weakness that can be exploited
- Make it strong, complex, and change frequently
- Plug and play your Apps on the cloud
- Assessed, Validated, and Certified
- Rhymes with fishing
- Vaccine for your systems
- Weakest link in CyberSecurity (Human factor)
12 Clues: Rhymes with fishing • Vaccine for your systems • Your Cyber Security Partner • Kidnapped & hold for ransom • Weakness that can be exploited • Assessed, Validated, and Certified • Burning walls, keep intruders away • Plug and play your Apps on the cloud • Locked with a key, for data security • Most critical element in CyberSecurity • Weakest link in CyberSecurity (Human factor) • ...
Cyber1 2023-01-27
Across
- Award-winning cybersecurity startup in Portland, ME
- Vanilla flavored programming language of choice
- AKA Software as a Service
- Modern runtime environment, rhymes with "code"
- Relational and ephemeral
Down
- White hot tech sector
- Today's flexible workforce; preferred by many
- Seasoned developer, front to back
- Code ninja and solver of problems
- A great place to live and work
- AKA Small and Midsized Businesses
- AKA Application Programming Interface
12 Clues: White hot tech sector • Relational and ephemeral • AKA Software as a Service • A great place to live and work • Seasoned developer, front to back • Code ninja and solver of problems • AKA Small and Midsized Businesses • AKA Application Programming Interface • Today's flexible workforce; preferred by many • Modern runtime environment, rhymes with "code" • ...
AI in Cybersecurity 2025-10-20
Across
- – What cybersecurity teams do.
- – What deepfakes can break online.
- – Helps detect or block fake content.
- – Something that looks real but isn’t.
- – A short video that can be altered.
Down
- – What happens when AI misidentifies something.
- – A warning about possible threats.
- – What cybersecurity helps us stay.
- – A harmful cyber action.
- – Used by AI to learn patterns.
- – The technology behind deepfakes.
- – Deepfakes can also be made from this.
12 Clues: – A harmful cyber action. • – What cybersecurity teams do. • – Used by AI to learn patterns. • – What deepfakes can break online. • – The technology behind deepfakes. • – A warning about possible threats. • – What cybersecurity helps us stay. • – A short video that can be altered. • – Helps detect or block fake content. • – Something that looks real but isn’t. • ...
Cybersecurity 2022-07-08
Across
- A basic security feature that protects your network by acting as an intermediary between your internal network and outside traffic. It monitors attempts to gain access to your operating system and blocks unwanted incoming traffic and unrecognized sources
- Type of assessments that are the cornerstone of every program for cybersecurity
- A basic security software used to prevent, scan, detect and delete viruses from a computer
- Protecting information is vital for the normal functioning of organizations
- Is an advanced security control that reduces the chance of it being stolen
Down
- Systems that are no longer supported by the manufacturer
- is a significant threat to the confidentiality, integrity and availability of information
- A key stakeholder that may not recognize how to securely communicate with their provider
- The abbreviation of a federal requirement restricting electronic transmission of health information
- Type of phishing email specific employee within an organization
- Most significant security incident
- This stakeholder may have lax security policies compromising your system
12 Clues: Most significant security incident • Systems that are no longer supported by the manufacturer • Type of phishing email specific employee within an organization • This stakeholder may have lax security policies compromising your system • Is an advanced security control that reduces the chance of it being stolen • ...
CyberSecurity 2022-11-28
Across
- these replicate themselves but do not attach themselves to files as a virus does.
- a cyberattack in which multiple devices make a network resource unavailable to its intended users.
- software that is designed to gain access to your computer with bad intent.
- the term for when human users of a system are tricked into providing confidential information
- a large collection of malware-infected devices
Down
- hackers who use tools downloaded from the internet that allow them to hack with little technical knowledge.
- a key to a website or account.
- unwanted software that monitors and gathers information on a person and how they use their computer.
- can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- a piece of software that appears to perform a useful function, but it also performs malicious actions.
- self replicating software.
- Something that checks incoming and outgoing network traffic.
12 Clues: self replicating software. • a key to a website or account. • a large collection of malware-infected devices • Something that checks incoming and outgoing network traffic. • software that is designed to gain access to your computer with bad intent. • these replicate themselves but do not attach themselves to files as a virus does. • ...
Cybersecurity 2023-03-30
Across
- / Harmful computer program
- / Secret characters for authentication
- / Strong, unique password practice
- / Encoding information for authorized access only
- / Fraudulent emails to get personal information
- / Cyberattack encrypting data for ransom
Down
- / Software protecting against viruses
- / Fake website or email to deceive users
- / Method requiring multiple evidence for identity
- / Gaining unauthorized system access
- / Settings controlling information visibility
- / Network of infected computers controlled unknowingly
12 Clues: / Harmful computer program • / Strong, unique password practice • / Gaining unauthorized system access • / Software protecting against viruses • / Secret characters for authentication • / Fake website or email to deceive users • / Cyberattack encrypting data for ransom • / Settings controlling information visibility • / Fraudulent emails to get personal information • ...
Cybersecurity 2023-04-28
Across
- influencing or deceiving a victim in order to gain control
- self replicate other computers
- thieves attempt to steal personal info
- looking at information over a shoulder
- use of own knowledge to secure organzinations
- steals anything they want
Down
- processing data by the computer
- non-threatening traffic in to keep dangerous stuff out
- inventing a specific scenario
- unintentional actions
- robot network
- form that is efficient for movement or processing
12 Clues: robot network • unintentional actions • steals anything they want • inventing a specific scenario • self replicate other computers • processing data by the computer • thieves attempt to steal personal info • looking at information over a shoulder • use of own knowledge to secure organzinations • form that is efficient for movement or processing • ...
Cybersecurity 2023-09-13
Across
- Cyber criminals find and use these ______ for their malicious intents.
- The magic number of characters for a strong password
- _____ knowledge of recent threats as well as softwares
- A Strong ______ ensure security by making it harder to access your accounts
- Using uppercase and lowercase, numbers and symbols to add _______ in your passwords
- Most users interact with their mobile devices more often than computers.
Down
- Software that eliminates and mitigates malicious software
- Computer _____ are a type of malware meant to damage a computer by corrupting or destroying data
- Type of security when surfing the ____
- Process of converting data into an unreadable form for data protection.
- Do not include your ______ in your passwords such as your name or birthdate
- Do not _____ your password with others
12 Clues: Type of security when surfing the ____ • Do not _____ your password with others • The magic number of characters for a strong password • _____ knowledge of recent threats as well as softwares • Software that eliminates and mitigates malicious software • Cyber criminals find and use these ______ for their malicious intents. • ...
CYBERSECURITY 2017-04-13
Across
- the abuse of email to send unsolicited bulk messages
- information
- capability to limit network traffic between networks
- a person who breaks into a computer or network
- a string of characters used to verify access authorization
- the process of transforming plaintext into cipher text
- software that compromises the operation of a system
Down
- measures to reduce the likelihood of an unwanted occurence
- a program that can infect a computer and spread to another computer
- software that tracks keystrokes and keyboard events
- self replicating program that uses networking mechanisms to spread itself
- software that is secretly installed into a system
12 Clues: information • a person who breaks into a computer or network • software that is secretly installed into a system • software that tracks keystrokes and keyboard events • software that compromises the operation of a system • the abuse of email to send unsolicited bulk messages • capability to limit network traffic between networks • ...
Cybersecurity 2025-05-30
Across
- Keeping data safe from unauthorized access (6)
- An algorithm for encryption or decryption (6)
- A barrier designed to prevent unauthorized access (8)
- A secret word or phrase for access (8)
- The practice of protecting networks and data (11)
- To protect systems from attack (6)
Down
- Verification of a user's identity (14)
- A program that replicates itself and spreads to other computers (5)
- A malicious software (7)
- The process of converting information or data into a code (10)
- An attempt to trick users into revealing sensitive information (7)
- A set of rules for communication (8)
12 Clues: A malicious software (7) • To protect systems from attack (6) • A set of rules for communication (8) • Verification of a user's identity (14) • A secret word or phrase for access (8) • An algorithm for encryption or decryption (6) • Keeping data safe from unauthorized access (6) • The practice of protecting networks and data (11) • ...
CyberSecurity 2025-05-19
Across
- Malware that disguises itself as legitimate software (6)
- A team or center that monitors and defends against cyber threats (3)
- A person who gains unauthorized access to systems (6)
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity (8)
- Software update to fix vulnerabilities (5)
- Malicious code that replicates itself by attaching to files (5)
- Malware that encrypts files and demands payment to restore access (10)
Down
- Technique used to convert data into unreadable form for security (10)
- A network of infected devices used for cyber attacks (6)
- Software that secretly gathers user information without consent (7)
- Security system that monitors and controls incoming and outgoing network traffic (8)
- Security method requiring multiple verification steps (3)
12 Clues: Software update to fix vulnerabilities (5) • A person who gains unauthorized access to systems (6) • Malware that disguises itself as legitimate software (6) • A network of infected devices used for cyber attacks (6) • Security method requiring multiple verification steps (3) • Malicious code that replicates itself by attaching to files (5) • ...
Cybersecurity Terms 2017-05-29
Across
- Warfare with a physical element such as shooting people, dropping bombs, and other physical attacks.
- "Good” hackers who use their tools for the public good – this can include identifying security holes.
- Executable programs, or programs that cause a computer to perform a task, that is bad. What it does can vary, but usually it will try to remain hidden and perform a malicious action. It will also usually attempt to replicate itself and infect other systems.
- The most common type of Industrial Control System.
- Tiny computers that allow us to digitize processes
- A person or company selling something
- A person who uses computers to gain unauthorized access to data.
- A network of private computers infected with malware and controlled as a group without the owners' knowledge. The word comes from the combination of “robot” and “network.”
- Usually means the use of ICT to aid in development projects.
- The process that decides whether a vulnerability will be stockpiled or given to the vendor responsible for the product.
- A security hole in software that the vendor does not know about.
- Can do all kinds of things. For example, give someone the ability to spy on you, steal your data, gain a backdoor into your system. Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves
- Code attackers use to exploit a software problem.
- Something that uses a combo of tactics (also can include social engineering).
- Getting someone to give up confidential or personal information by tricking them into telling you freely.
- Software that can do a number of things, such as disrupt the normal operations of computers, steal information, gain access to a system, sabotage the system.
- A security hole in software
- Malware that installs covertly on a victim's device usually encrypting everything and refusing to decrypt it unless a ransom is paid.
- An email that are designed to appear to be from someone the recipient knows and trusts and can include a subject line or content that is specifically tailored to the victim’s known interests or industry.
- Hackers who use multiple phases to break into a network, avoid detection, and harvest valuable information over the long term.
- A team of experts who manage computer emergencies. Usually government based initiatives. Often used as a baseline for understanding a country’s cybersecurity readiness.
Down
- Hackers with malicious intentions working to steal, exploit, and sell data. They are usually motivated by personal gain.
- A program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
- Electronic wallet services that allow users to store, send, and receive money using mobile phones. It is often used in places without banking infrastructure and is a common tool for remittances.
- Can either work for the public good or for their own gain.
- Used in industrial production - a way to automate the process of receiving data from remote stations and then issue supervisory commands.
- Generally anything that stores, retrieves, manipulates, transmits, information electronically in a digital form. Computers, smart phones, software, etc.
- Under DHS, created in 2015, meant to fill the gaps where ISACs don’t exist
- Independent actors working to accomplish political or social change through the use of hacking or other related techniques such as DDOS. Hacker + activist.
- 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.
- An attempt to make a machine or other resource unavailable to valid users. An actor will flood the targeted resource with requests to overload the system and make it crash.
- Sector specific organizations meant to collect, analyze, and disseminate threat information to their members.
- First known case of a cyberweapon impacting physical infrastructure. It was created by the US and Israeli governments to target the Iranian nuclear facility Natanz.
- Where the requests come from a variety of sources. Activists and cybercriminals use this technique. Activists argue it is the equivalent of an online “sit-in.”
- It’s phishing, but with a high level target such as an executive or, John Podesta.
- Separation of your network from others, particularly the public Internet.
- Basically something that is there logging what you are doing and sending it back to the person who initiated the attack.
- The practice of sending emails meant to get people to reveal personal information, such as passwords and credit card numbers.
38 Clues: A security hole in software • A person or company selling something • Code attackers use to exploit a software problem. • The most common type of Industrial Control System. • Tiny computers that allow us to digitize processes • Can either work for the public good or for their own gain. • Usually means the use of ICT to aid in development projects. • ...
Cybersecurity Terms 2023-09-10
Across
- The act of being in accordance with established guidelines.
- When someone is using another person's information maliciously.
- A security method that encodes data to make it more secure.
- A valuable tool for developing applications.
- A group of connected computers that share user account information and a security policy.
- This must be protected from unauthorized access.
- A special computer designed for technical or scientific applications.
- Establishing something as genuine.
- In technology, this means maintaining hardware and software.
- Relating to software,a company that develops and sells products.
Down
- Programs on hardware.
- When you open a malicious email or text that is disguised as a legitimate one.
- A service that provides technology-related help.
- A type of secure connection.
- A type of coverage that insures in case of a cyber attack.
- When data is stolen from a system without the system's owner noticing.
- A string of letters, numbers, and/or symbols used for verifying identity.
- A person who commits fraud and/or is involved in fraudulent schemes.
- Malicious software that holds data hostage until a ransom is paid.
- Disguising an unknown source as a known source.
20 Clues: Programs on hardware. • A type of secure connection. • Establishing something as genuine. • A valuable tool for developing applications. • Disguising an unknown source as a known source. • A service that provides technology-related help. • This must be protected from unauthorized access. • A type of coverage that insures in case of a cyber attack. • ...
Cybersecurity Crossword 2023-11-17
Across
- a collection of networks that communicate with one another
- A unique number that identifies a computer, and it is used to send messages and receive responses when visiting a website
- The first wide-area packet-switched network with distributed control and one of the first computer networks to implement the TCP/IP protocol suite
- A
- Criminal activity that involves the use of computers or networks such as the internet
- An unauthorized user who attempts to or gains access to an information system
- A well-known set of rules and standards that allow reliable communication between networks and network devices
- A global network of computers using internet protocol (IP) to communicate globally via switches and routers
- Smallest unit of data in a computer
Down
- Two or more computers that are linked in order to share resources
- Wireless networking technology that allows devices to interface with the Internet
- A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
- a communications protocol primarily used for establishing low-latency and loss-tolerant connections between applications on the internet, typically used for video streaming
- and deliberate attempt to breach an information system
- An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
- Device or software application that requests services from a server
- The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation
- A protocol that specifies how data is exchanged over the internet by providing end-to-end communications that identify how it should be broken into packets, addressed, transmitted, routed and received at the destination
- A networking device that forwards data packets between computer networks
- Resolves the common names of Web sites with their underlying IP addresses, adding efficiency and even security in the process
20 Clues: A • Smallest unit of data in a computer • and deliberate attempt to breach an information system • a collection of networks that communicate with one another • Two or more computers that are linked in order to share resources • Device or software application that requests services from a server • ...
Cybersecurity Terms 2024-08-07
Across
- an identity and access management security method that requires two forms of identification to access resources and data
- an arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet
- a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages
- any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
- software and operating system (OS) updates that address security vulnerabilities within a program or product
- the act of disguising a communication from an unknown source as being from a known, trusted source
- the process of converting information or data into a code, especially to prevent unauthorized access
- a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
- the collection of secure information and communication techniques employing mathematical concepts and algorithms used to disguise the content of messages
- a typically covert method of bypassing normal authentication or encryption in a computer
- any piece of software or application that displays advertisements, usually through pop-up or pop-under windows
- an ethical hacker whose job involves hacking into computer systems to detect security risks
- a type of malware program that enables cyber criminals to gain access to and infiltrate data from machines without being detected
Down
- the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information
- a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware
- a program designed to breach the security of a computer system while ostensibly performing some innocuous function
- a type of malicious software designed to block access to a computer system until a sum of money is paid
- a form of malware or hardware that keeps track of and records your keystrokes as you type
- a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys
- verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
- a program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself
- an attack in which an attacker is positioned between two communicating parties in order to intercept and/or alter data traveling between them
- a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system
25 Clues: a typically covert method of bypassing normal authentication or encryption in a computer • a form of malware or hardware that keeps track of and records your keystrokes as you type • an ethical hacker whose job involves hacking into computer systems to detect security risks • ...
Cybersecurity Crossword 2024-09-03
Across
- the practice of securing information and communication through writing and solving codes
- a code that gives you access to a site
- a group of connected computers
- cyberattack that fools people into revealing personal info
- a type of cryptocurrency that is well-known
- malware that tricks users by thinking they are clicking safe links
- software that holds your data hostage in return for something they want
- network of compromised computers used in a cyberattack
- manipulated media images usually used to scam people
- a program that encrypts your internet traffic by scrambling your IP address
- method of scrambling data, only an authorized user can use
- a string of numbers used to identify a computer
- a person who infiltrates a computer
- a place where data can be stored but it is not on an internal hard drive
Down
- software that infects and destroys computers' data
- software used to detect, prevent, and remove malware
- computerized intelligence that forms to make and execute life-like decisions
- an unintended hardware or software problem
- an attack on somebody in a digital way of force
- the act of data being leaked from a source
- a set of software tools that gives user access without being detected
- malware that collects and transmits your private data
22 Clues: a group of connected computers • a person who infiltrates a computer • a code that gives you access to a site • an unintended hardware or software problem • the act of data being leaked from a source • a type of cryptocurrency that is well-known • an attack on somebody in a digital way of force • a string of numbers used to identify a computer • ...
Cybersecurity Crossword 2021-05-06
Across
- The use of ____ off-the-shelf products have weakened security of ICS.
- Network device designed to control the flow of traffic between networks.
- Support component that contributes to ICS vulnerabilities.
- Total amount of loss or damage that can be expected from a successful attack
- Four-step process of taking action to reduce or eliminate risk.
- Doing ____ is not a viable option for securing ICS.
- has led to workforce downsizing and cost reducing measures in ICS.
- Intrusion, attack, and ____ are the three stages of an attack.
- The majority of attackers are _____.
Down
- Weakness in a system that can be exploited.
- The equation for ____ is threat x vulnerability x consequence
- A copy of your password should NOT be left on your ___.
- _____ should be at least 8 alphanumeric characters long.
- The most common social engineering method.
- The possibility for an insider with authorized access or understanding of an organization to use that access or knowledge to harm that organization.
- Along with intent and opportunity, ____ is needed for threats to succeed.
- 22% of breaches involved some form of ___ ___.
- ____% of attacks are financially motivated.
- _____ is rummaging through business or residential trash for the purpose of finding useful information.
- An attack that is used to make computer resources unavailable.
- Malicious software.
21 Clues: Malicious software. • The majority of attackers are _____. • The most common social engineering method. • Weakness in a system that can be exploited. • ____% of attacks are financially motivated. • 22% of breaches involved some form of ___ ___. • Doing ____ is not a viable option for securing ICS. • A copy of your password should NOT be left on your ___. • ...
Cybersecurity crossword 2022-05-18
Across
- company security policy that allows for employees’ personal devices to be used in business.
- type of malware aimed to corrupt, erase or modify information on a computer before spreading to others
- malware that functions by spying on user activity without their knowledge.
- technology that allows access to files/services through the internet from anywhere in the world.
- acronym that stands for distributed denial of service – a form of cyber attack.
- malicious application or script that can be used to take advantage of a computer’s vulnerability.
- A piece of malware that often allows a hacker to gain remote access to a computer through a back door
- software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer
- udio or video clip that has been edited and manipulated to seem real or believable
- internet version of a home address for your computer
- hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- defensive technology designed to keep the bad guys out
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and networ
- umbrella term that describes all forms of malicious software
- tool that allows the user to remain anonymous while using the internet
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
Down
- malware that allows cybercriminals to remotely control your computer.
- technique used to manipulate and deceive people to gain sensitive and private information
- form of malware that deliberately prevents you from accessing files on your computer – holding your data hostag
- group of computers, printers and devices that are interconnected and governed as a whole
- set of programs that tell a computer to perform a task
- Breaches the network to gain sensitive information with the owner’s consent
- this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
- technique used by hackers to obtain sensitive information.
- piece of malware that can replicate itself in order to spread the infection to other connected computers
25 Clues: internet version of a home address for your computer • set of programs that tell a computer to perform a task • defensive technology designed to keep the bad guys out • technique used by hackers to obtain sensitive information. • umbrella term that describes all forms of malicious software • malware that allows cybercriminals to remotely control your computer. • ...
Cybersecurity Puzzle 2025-03-11
Across
- Self-replicating malicious software
- Fixes security vulnerabilities
- Acts as an intermediary server
- Fake emails to steal info
- Attack using trial and error
- Program that spreads and harms
- Remote storage and computing
- Harmful software for attacks
- Access to an account or system
- Device used for entering codes
- Payment demanded for files
- Secretly monitors user activity
Down
- Superuser access level
- Method for encrypting information
- Disguised harmful software
- Protection against cyber threats
- Secret entry point for attacks
- Permission to use a system
- Unauthorized access to systems
- Encrypts data for protection
20 Clues: Superuser access level • Fake emails to steal info • Disguised harmful software • Permission to use a system • Payment demanded for files • Attack using trial and error • Remote storage and computing • Harmful software for attacks • Encrypts data for protection • Fixes security vulnerabilities • Acts as an intermediary server • Program that spreads and harms • ...
Cybersecurity 2023 2023-10-18
Across
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- A security process that uses an additional factor for verification is called "______-Factor Authentication"
- An individual that is authorized to access a system
- A _____ email falsely claims to be from a legitimate source, usually with a threat or request for information
- Designed to detect and destroy computer viruses
- Junk email
- Your digital ______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
- The gaining of unauthorized access to data in a system or computer
- Converting information and data into code to protect unauthorized access to sensitive data
- Tech used to keep intruders out
- Online harassment
- A set of changes that fix or improve a software or application
Down
- Cybersecurity awareness month
- Weakness in a system
- A sequence of words used for authentication
- Storage for infected files and emails
- The fraudulent practice of sending a text message impersonating the head of school in order to induce individuals to reveal personal information or purchase a gift card
- Software demanding money to unlock personal information
- Uses hand, voice and face recognition
- A piece of software that allows a user to remain anonymous while using the internet by masking the location and encrypting traffic
- _____ settings help control things like your profile, contact, and other information relating to your account
- Bring Your Own Device
22 Clues: Junk email • Online harassment • Weakness in a system • Bring Your Own Device • Cybersecurity awareness month • Tech used to keep intruders out • Storage for infected files and emails • Uses hand, voice and face recognition • A sequence of words used for authentication • Designed to detect and destroy computer viruses • An individual that is authorized to access a system • ...
Cybersecurity puzzle 2023-12-04
Across
- A common tactic in scams, creating a sense of immediate action needed.
- Online harassment that can breach your mental health
- Malware that encrypts files, demanding payment for decryption.
- A scam method using emails to trick users into revealing personal information
- The process of confirming a user's identity in a security system.
- A general term for deceitful practices to gain financial or personal gain.
- adding a unique string to a password before hashing it for added security.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A safer payment method for online purchases due to fraud protection.
- A type of malware that attaches itself to programs and corrupts or modifies files.
- Data-tracking files that should be disabled to enhance online privacy
- Deceptive malware appearing legitimate, often giving remote access to cybercriminals.
Down
- A method where hardware is used to record keystrokes and steal passwords.
- Malware that secretly observes the user's actions.
- Company that mitigated a record-breaking cyberattack, underlining the need for robust online defenses.
- Platform where the Python application gateway for malware was distributed, highlighting vigilance in downloading software.
- Everything you do on the internet that stays with you, even when you turn off your devices
- Harmful software that scammers might install through tech support scams.
- Name of the group associated with the intrusion into cryptocurrency platforms, showing the importance of caution with software downloads.
- Autonomous malware that replicates and spreads through network vulnerabilities.
- Software designed to detect and remove malicious software like viruses and malware.
- A popular brand of antivirus software.
- Using more than one method of authentication for enhanced security.
- When personal information is accessed and stolen by unauthorized individuals
- The method of converting passwords into gibberish to protect them in password files.
- A tool that encrypts internet traffic and masks IP addresses for enhanced online privacy.
26 Clues: A popular brand of antivirus software. • Malware that secretly observes the user's actions. • Online harassment that can breach your mental health • Malware that encrypts files, demanding payment for decryption. • The process of confirming a user's identity in a security system. • Using more than one method of authentication for enhanced security. • ...
Cybersecurity Practices 2024-10-07
Across
- | A security measure that requires more than one form of verification.
- | An attempt to steal personal information by pretending to be a trustworthy entity.
- | A software update that fixes security vulnerabilities.
- | Software designed to detect and remove malware.
- | A vulnerability that is exploited before it is publicly known or patched.
- | A network of infected devices used in cyber attacks.
- | A type of malware that records keystrokes to steal sensitive information.
- Breach | The unauthorized release of confidential information.
- | The process of converting data into a code to prevent unauthorized access.
- Engineering | Manipulating people into giving up confidential information.
- | A type of malware that demands payment to restore data.
- | A security system that monitors and controls incoming and outgoing network traffic.
- | Software that is harmful to a computer system.
Down
- | An attack that overwhelms a system by sending an excessive amount of requests.
- | A weakness in a system that can be exploited by a cyber attacker.
- | An attempt to damage or disrupt a computer system or network.
- | The process of verifying the identity of a user or device.
- | A decoy system set up to attract cyber attackers and study their behavior.
- | Malware disguised as legitimate software.
- | Software that gathers user information without their knowledge.
20 Clues: | Malware disguised as legitimate software. • | Software that is harmful to a computer system. • | Software designed to detect and remove malware. • | A network of infected devices used in cyber attacks. • | A software update that fixes security vulnerabilities. • | A type of malware that demands payment to restore data. • ...
Cybersecurity Crossword 2024-03-15
Across
- social engineering to steal data
- Hacker that attacks for self-interests
- malware designed to acquire money
- malicious software
- malware that changes and corrupts
- convert encrypted data to plain text
- monitors network traffic
- 2+ computers sharing resources
- network of computers for attacks
- seemingly harmless malware for infection
- unauthorized access to a system
- process of identifying a user
Down
- internet protocol address
- Hacker that defends others
- malware that's designed for monitoring
- leverage a vulnerability for cyberattack
- testing system without prior information
- gaining as much info before penetration
- gathering of hackers for practice
- flood bandwidth of targeted system
20 Clues: malicious software • monitors network traffic • internet protocol address • Hacker that defends others • process of identifying a user • 2+ computers sharing resources • unauthorized access to a system • social engineering to steal data • network of computers for attacks • malware designed to acquire money • malware that changes and corrupts • gathering of hackers for practice • ...
Cybersecurity 101 2025-08-29
Across
- Program that fight bugs
- files saved on computers
- Save copy of device data
- bad software affecting computers
- Fake email asking for info
- secret code to access data
- hackers asking for money
- Software that discreetly watches you
- New version of software
- clickable website address
Down
- wireless internet connection
- code + password
- secret word to log in
- online mail version
- signing out of an account
- Individual who breaks into computers
- Hides internet location
- blocks internet traffic
- online storage space
- junk email
20 Clues: junk email • code + password • online mail version • online storage space • secret word to log in • Program that fight bugs • Hides internet location • blocks internet traffic • New version of software • files saved on computers • Save copy of device data • hackers asking for money • signing out of an account • clickable website address • Fake email asking for info • ...
