cybersecurity Crossword Puzzles

Cybersecurity 2020-12-22

Cybersecurity crossword puzzle
Across
  1. things that are done to protect a person, organization, or country and their computer information against crime or attacks carried out using the internet
  2. a group of computers, printers and devices that are interconnected and governed as a whole
  3. a harmful computer program that can copy itself and spread across a number of connected computers
  4. to allow secret information to become generally known
  5. someone who makes money using illegal methods, especially by tricking people
  6. kind of malware that allows cybercriminals to remotely control your computer
  7. computer software that is designed to damage the way a computer works
  8. an attempt to trick someone into giving information over the internet or by email that would allow someone else to take money from them, for example by taking money out of their bank account
Down
  1. the process of encoding data to prevent theft by ensuring the data can only be accessed with a key
  2. a technology that allows us to access our files and/or services through the internet from anywhere in the world
  3. software designed by criminals to prevent computer users from getting access to their own computer system or files unless they pay money
  4. an attack that enables an attacker to run malware that allows for the generation of cryptocurrency on the infected computer
  5. a computer program that gets access to a computer or system by appearing to be harmless, but is designed to do something damaging
  6. a defensive technology designed to keep the bad guys out. Firewalls can be hardware or software-based
  7. the process or action of verifying the identity of a user or process

15 Clues: to allow secret information to become generally knownthe process or action of verifying the identity of a user or processcomputer software that is designed to damage the way a computer workssomeone who makes money using illegal methods, especially by tricking peoplekind of malware that allows cybercriminals to remotely control your computer...

CyberSecurity 2025-06-19

CyberSecurity crossword puzzle
Across
  1. The use of physical characteristics, such as fingerprints, to verify identity.
  2. A copy of data stored separately to protect against data loss.
  3. Software that secretly monitors and collects information about users.
  4. A service that encrypts your internet connection and hides your IP address.
  5. A type of malware that threatens to publish or block access to data unless a ransom is paid.
  6. A type of cyber attack that attempts to trick individuals into providing sensitive information.
Down
  1. The process of verifying the identity of a user or device.
  2. The practice of protecting systems, networks, and programs from digital attacks.
  3. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
  4. Software designed to detect and destroy computer viruses.
  5. A secret word or phrase used to gain access to a system.
  6. A network security device that monitors and filters incoming and outgoing network traffic.
  7. The process of converting information or data into a code to prevent unauthorized access.
  8. Unwanted or unsolicited email messages.
  9. An individual who uses technical skills to gain unauthorized access to systems.

15 Clues: Unwanted or unsolicited email messages.A secret word or phrase used to gain access to a system.Software designed to detect and destroy computer viruses.The process of verifying the identity of a user or device.A copy of data stored separately to protect against data loss.Software that secretly monitors and collects information about users....

Cybersecurity 2025-10-20

Cybersecurity crossword puzzle
Across
  1. Software that secretly collects information about you
  2. A scam using fake emails to steal personal information
  3. Installing the latest software fixes and security patches
  4. A system that blocks unauthorized access to a network
  5. Manipulating people into revealing confidential information
  6. An added layer of security requiring a code or device confirmation
  7. The process of verifying a user’s identity
  8. A tool used to securely store and create strong passwords
  9. The process of converting data into code to prevent access
Down
  1. When unauthorized access to data occurs
  2. A copy of important data stored separately for safety
  3. A secret word or phrase used to access an account
  4. A tool that hides your IP address and encrypts your internet traffic
  5. Software that detects and removes malicious programs
  6. Software designed to damage or disrupt systems

15 Clues: When unauthorized access to data occursThe process of verifying a user’s identitySoftware designed to damage or disrupt systemsA secret word or phrase used to access an accountSoftware that detects and removes malicious programsA copy of important data stored separately for safetySoftware that secretly collects information about you...

Cybersecurity 2024-01-19

Cybersecurity crossword puzzle
Across
  1. Malware that attaches itself to other software.
  2. A way to protect a network from incoming and outgoing attacks.
  3. Keeping secret things secret.
  4. An attack that takes place through digital means.
  5. Government agency responsible for Cybersecurity and Infrastructure Security
  6. The national organization which sets standards for technology
  7. Malware that can self-replicate and spread on its own.
  8. A way to secure an account; Something you know.
Down
  1. The right to access systems or networks.
  2. Maintaining access to key technologies.
  3. Verifying someone is who they say they are.
  4. A malicious software
  5. Monitoring who accesses what.
  6. Keeping systems secure and complete.
  7. A cybersecurity competition

15 Clues: A malicious softwareA cybersecurity competitionMonitoring who accesses what.Keeping secret things secret.Keeping systems secure and complete.Maintaining access to key technologies.The right to access systems or networks.Verifying someone is who they say they are.Malware that attaches itself to other software....

Cybersecurity 2023-09-13

Cybersecurity crossword puzzle
Across
  1. Avoid using these public ones
  2. Being harassed or threatened online
  3. Cybersecurity Awareness Month
  4. Frequent software --- fix cybersecurity “loopholes” attackers can exploit
  5. Something you shouldn't share online
  6. This security software company was purchased by Intel in February 2011
  7. Software that is created specifically to help detect, prevent and remove software viruses
  8. Division of the Ministry of Science, Energy, and Technology that addresses cyber threat matters
  9. Made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyber thieves to gain access to the information
Down
  1. The practice of tricking Internet users into revealing personal or confidential information which can then be used illicitly
  2. Cybersecurity Awareness Month Theme 2021
  3. Type of security threat
  4. An attempt by hackers to damage or destroy a computer network or system
  5. Being pursued by someone through the anonymity of social media
  6. Establishes secure and encrypted connections to provide greater privacy

15 Clues: Type of security threatAvoid using these public onesCybersecurity Awareness MonthBeing harassed or threatened onlineSomething you shouldn't share onlineCybersecurity Awareness Month Theme 2021Being pursued by someone through the anonymity of social mediaAn attempt by hackers to damage or destroy a computer network or system...

Cybersecurity 2025-10-13

Cybersecurity crossword puzzle
Across
  1. Istilah umum untuk perisian jahat seperti virus, worm, dan Trojan. (General term for malicious software.)
  2. Kejadian apabila penyerang berjaya menceroboh dan mengakses data sensitif. (An incident where an attacker successfully accesses sensitive data.)
  3. Perisian yang direka untuk mengesan, mencegah, dan membuang perisian jahat. (Software designed to detect and remove malicious programs.)
  4. Individu yang cuba mendapat akses tanpa kebenaran ke dalam sistem komputer. (Individual who seeks unauthorized access to a system.)
  5. Membenarkan pengguna mencipta sambungan yang selamat ke rangkaian lain melalui Internet. (Creates a secure connection over the Internet.)
  6. Kajian tentang teknik komunikasi selamat bagi menghalang pihak ketiga. (Study of secure communication techniques.)
  7. Proses mengesahkan identiti pengguna, cth. melalui kata laluan. (Process of verifying a user's identity.)
  8. Gabungan aksara rahsia yang digunakan untuk melindungi akaun anda. (Secret string of characters to protect your account.)
Down
  1. Sistem keselamatan rangkaian yang memantau dan mengawal trafik masuk dan keluar. (Network security system that monitors and controls traffic.)
  2. Cubaan menipu mangsa melalui e-mel palsu untuk mencuri maklumat sensitif. (Scam attempt, often via email, to steal sensitive info.)
  3. Kemas kini kod yang dikeluarkan oleh pemaju untuk membetulkan bug atau security vulnerability. (Code update to fix bugs or a security vulnerability.)
  4. Kaedah keselamatan yang memerlukan dua jenis pengesahan berbeza. (Security method requiring two different forms of verification.)
  5. Proses menukar data biasa kepada kod yang sukar dibaca untuk keselamatan. (Process of converting data into an unreadable code.)
  6. Malware yang secara senyap memantau aktiviti pengguna dan mencuri data. (Malware that secretly monitors user activity.)
  7. Salinan data yang disimpan di tempat lain, digunakan jika data asal hilang atau rosak. (Copy of data kept elsewhere for recovery.)

15 Clues: Istilah umum untuk perisian jahat seperti virus, worm, dan Trojan. (General term for malicious software.)Proses mengesahkan identiti pengguna, cth. melalui kata laluan. (Process of verifying a user's identity.)Kajian tentang teknik komunikasi selamat bagi menghalang pihak ketiga. (Study of secure communication techniques.)...

Cybersecurity 2022-04-27

Cybersecurity crossword puzzle
Across
  1. coding files to hide their contents
  2. using fraudulent emails to access information
  3. device on a network with no use other use besides tricking bad actors
  4. determining the importance of each item
  5. US law that prohibits avoiding copyright controls
  6. online document that verifies authenticity
Down
  1. to find additional ways to remain within an attack surface for a time
  2. crimes that target and or use computers / computer systems
  3. stores public and private keys
  4. cipher that replaces each letter uniquely through rotation
  5. controls on real world access
  6. weakness in a system, policy, etc.
  7. situation that poses potential dangers
  8. keeping information secret
  9. intentionally bad programs added to devices

15 Clues: keeping information secretcontrols on real world accessstores public and private keysweakness in a system, policy, etc.coding files to hide their contentssituation that poses potential dangersdetermining the importance of each itemonline document that verifies authenticityintentionally bad programs added to devices...

Disruptive Technology 2025-07-24

Disruptive Technology crossword puzzle
Across
  1. Finds weaknesses and risks in applications or computer systems
  2. Public cloud computing architecture
  3. Uses endpoint monitoring to detect potential cybersecurity breaches
  4. A large, virtual world centred around user interactivity
  5. The act of automating everything that a business can automate
  6. A cybersecurity measure that uses security controls to protect users and devices
  7. Uses quantum mechanics and sciences to solve complex computing problems
  8. A user's experience across one website/application
  9. Combines practices and technologies to mitigate business risks
  10. Covers victims in the event of a cybersecurity breach
  11. Abbreviation is (BI)
Down
  1. Abbreviation is (AI)
  2. A form of authentication that provides users with an extra layer of security
  3. Abbreviation is (XaaS)
  4. Encompasses technologies that focus on immersive realities
  5. Technologies that are developed with the thought of lessening environmental impacts

16 Clues: Abbreviation is (AI)Abbreviation is (BI)Abbreviation is (XaaS)Public cloud computing architectureA user's experience across one website/applicationCovers victims in the event of a cybersecurity breachA large, virtual world centred around user interactivityEncompasses technologies that focus on immersive realities...

FISMA Training 2022-01-18

FISMA Training crossword puzzle
Across
  1. Policies and procedures are fully institutionalized, repeatable, automated where appropriate, consistently implemented, and regularly updated
  2. Assessor selects the sample items without intentional bias to include or exclude certain items in the population
  3. the process of the assessor re-preforming the control’s procedures for accuracy
  4. a period of time, normally two weeks, in which specific work has to be completed and made ready for review
  5. supports the ability to limit or contain the impact of a potential cybersecurity event
  6. supports the ability to contain the impact of a potential cybersecurity incident
  7. Based on assessor's sound and seasoned judgement
Down
  1. the process of looking at the entity’s management perform a process outlined in the procedures
  2. relating to or measured by the quality or characteristics
  3. The ____ provides educational guidance materials; develops and grades the Uniform CPA Examination; and monitors and enforces compliance within the profession.
  4. (acronym) provides a detailed step-by-step account of the work the assessor completed
  5. enables timely discovery of cybersecurity events
  6. assists in developing an organizational understanding to managing cybersecurity risk to systems, people, assets, data, and capabilities.
  7. relating to, or involving the measurement of quantity or amount
  8. stands for "Prepared by Client" or "Provided by Client." For assurance engagements, the assessor will issue PBC items to the client. Each item is a request to either hold a meeting or obtain documentation.
  9. Control is designed to put into place when specific requirements for compliance can't be met with existing controls
  10. a framework for developing complex software products in an iterative and incremental fashion and is the most widely recognized Agile framework
  11. identifies appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident

18 Clues: enables timely discovery of cybersecurity eventsBased on assessor's sound and seasoned judgementrelating to or measured by the quality or characteristicsrelating to, or involving the measurement of quantity or amountthe process of the assessor re-preforming the control’s procedures for accuracy...

cybersecurity 2023-01-25

cybersecurity crossword puzzle
Across
  1. an interruption in authorized users access to a computer network, typically one caused with malicious intent
  2. an exchange of keys where the parties involved are not authenticated, meaning fraud can happen.
  3. A form of denial of service attack desgined to overwhelm an inbox or inhibit a server by sending a massive number of emails to a specific person or system
  4. software that generates revenue by throwing ads up on your screen
  5. a software or hardware tool that allows the user to monitor your internet traffic
  6. a situation in which a person or program successfully identifies itself as another by falsifying data
  7. a computer that is connected to the internet and taken over by a computer worm, virus, or other malware
  8. malicious software designed to steal data and harm or destroy computers.
  9. occurs when multiple machines are operating together to attack one target
Down
  1. a malfunction of a hardware or a software component
  2. A computer virus written in the same type of macro language as things like excel or word
  3. ethical hacking
  4. a type of malware that infects your computer and harms its master boot partition
  5. any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
  6. average time between repairable failures of a technology product

15 Clues: ethical hackinga malfunction of a hardware or a software componentaverage time between repairable failures of a technology productsoftware that generates revenue by throwing ads up on your screenmalicious software designed to steal data and harm or destroy computers.occurs when multiple machines are operating together to attack one target...

Cybersecurity 2023-09-13

Cybersecurity crossword puzzle
Across
  1. royal Canadian mounted police
  2. fraudulent practice of sending emails
  3. software designed to block computer access until money is paid
  4. belief in reliability and truth
  5. defense
  6. weakness or flaw
Down
  1. converting data into code
  2. secret word or phrase
  3. being kept secret or private
  4. make full use and benefit
  5. malicious software
  6. verifying identity
  7. electronic device for storing/processing data
  8. being free from danger or threat
  9. system designed to block unauthorized access

15 Clues: defenseweakness or flawmalicious softwareverifying identitysecret word or phraseconverting data into codemake full use and benefitbeing kept secret or privateroyal Canadian mounted policebelief in reliability and truthbeing free from danger or threatfraudulent practice of sending emailssystem designed to block unauthorized access...

Cybersecurity Fundamentals Chapter 1 2024-06-02

Cybersecurity Fundamentals Chapter 1 crossword puzzle
Across
  1. Identifies and explains various cybersecurity threats that affect individuals, businesses, and organizations. It covers the nature of these threats and their potential impact .
  2. Involves the collaboration between businesses, government agencies, and countries to share information about serious cyberattacks.
  3. Professionals dedicated to protecting information systems and networks from cyber threats.
  4. refers to the broad scope of cybersecurity, which includes understanding the history and evolution of hacking, the role of cyber criminals, and the ongoing need for cybersecurity professionals to protect data and systems .
  5. The various areas within cybersecurity, such as big data, data analytics, and the responsibilities of businesses to protect data.
Down
  1. Industry-recognized credentials that validate the knowledge and skills of cybersecurity professionals.
  2. Individuals or groups who use computers, networks, and the internet to commit illegal activities.
  3. The frameworks and guidelines, such as the ISO 27000 series, that help organizations implement effective cybersecurity measures.

8 Clues: Professionals dedicated to protecting information systems and networks from cyber threats.Individuals or groups who use computers, networks, and the internet to commit illegal activities.Industry-recognized credentials that validate the knowledge and skills of cybersecurity professionals....

Hackers, Scams, and Online Safety 2023-04-22

Hackers, Scams, and Online Safety crossword puzzle
Across
  1. Online Harassment
  2. Security Protects against unauthorized access
  3. Media manipulation to change image
  4. Designs, Builds, and tests cybersecurity
  5. Cyber "kidnapping" for payment
  6. Tricks for getting private information
  7. Protects info from cyber attacks
  8. Harmful Software
  9. Collects private info without consent
  10. work that uses personal devices
Down
  1. Seemlessly harmful Malware until downloaded
  2. Detects, prevents, and removes malware
  3. Monitors networks for possible threats
  4. Software for securing cloud data
  5. Identifies device by internet connection
  6. Compromised computers used for cyberattacks
  7. Designer of data networks
  8. Paid testers of cybersecurity
  9. Scrambling date to restrict access

19 Clues: Harmful SoftwareOnline HarassmentDesigner of data networksPaid testers of cybersecurityCyber "kidnapping" for paymentwork that uses personal devicesSoftware for securing cloud dataProtects info from cyber attacksMedia manipulation to change imageScrambling date to restrict accessCollects private info without consent...

Cybersecurity 2024-08-08

Cybersecurity crossword puzzle
Across
  1. A type of server that allows the access of data and programs over the Internet instead of your computer’s hard drive.
  2. The amount of data that can pass through a network or part of a network per second.
  3. Protects against code injection attacks and other malicious content on trusted web pages.
  4. Malware that locks access to files and demands a ransom to release them.
  5. Monitors and restricts the sharing of sensitive information to prevent data breaches.
  6. Software that collects user data without consent and sends it to third parties.
  7. Encodes data to keep it safe from unauthorized access.
  8. Software that stops known malware. It’s crucial for catching viruses before they can cause trouble.
Down
  1. Software designed to infect and damage a system or network, including viruses, worms, and trojans.
  2. Malware disguised as harmless software to gain access to a system.
  3. A specific type of cyberattack that exploits the fraudulent use of electronic communications to take advantage of users and collect personal information.
  4. Ensures secure access to cloud apps and keeps an eye on unsanctioned activities.
  5. Any unauthorized attempt to access, alter, steal, or block system or user information.
  6. Acts as a barrier between the network and incoming/outgoing traffic, analyzing and managing web activities.

14 Clues: Encodes data to keep it safe from unauthorized access.Malware disguised as harmless software to gain access to a system.Malware that locks access to files and demands a ransom to release them.Software that collects user data without consent and sends it to third parties....

Cybersecurity 2025-10-08

Cybersecurity crossword puzzle
Across
  1. The regular message before it’s turned into a secret:
  2. Turning the secret code back into the original message:
  3. A type of malware that attaches itself to a host file and spreads when the infected file is executed:
  4. The practice of protecting systems, networks, and programs from digital attacks:
  5. Hiding a secret message inside something else so no one knows the message is even there:
  6. Unlike viruses, this can spread independently and across computer networks:
  7. This type of machine looked like a typewriter. The Germans used it to send secret military messages:
  8. The secret version of the message after encryption:
  9. A type of cipher where each letter in the message is shifted a certain number of places down or up the alphabet:
Down
  1. Changing a message into a secret code so no one else can read it:
  2. The science of writing and solving secret codes:
  3. This is a type of malware that encrypts files or locks systems and demands payment to restore access:
  4. The art of writing and solving secret codes to keep information safe:
  5. This disguises itself as a real program (maybe even something fun) but performs very bad activities:
  6. This secretly monitors a user’s activities without the user's consent:

15 Clues: The science of writing and solving secret codes:The secret version of the message after encryption:The regular message before it’s turned into a secret:Turning the secret code back into the original message:Changing a message into a secret code so no one else can read it:The art of writing and solving secret codes to keep information safe:...

boundless 2022-01-13

boundless crossword puzzle
Across
  1. Pay or else
  2. best cybersecurity vendor
  3. Bad software
  4. your goal in 2022
  5. Patented real-time AI security
  6. how SonicWall goes to market
Down
  1. who you are
  2. what you sell
  3. theme of this event
  4. Who you protect
  5. Wall of protection
  6. Pen & Teller's tricks

12 Clues: who you arePay or elseBad softwarewhat you sellWho you protectyour goal in 2022Wall of protectiontheme of this eventPen & Teller's tricksbest cybersecurity vendorhow SonicWall goes to marketPatented real-time AI security

Crossword Day 2024-12-16

Crossword Day crossword puzzle
Across
  1. Founding sponsor
  2. Shining star of our logo
  3. The awesome director of ACES
  4. A series of lectures
  5. A building that can meet all your basic needs!
  6. A trap
Down
  1. A perk of an honors college program
  2. Fun merch, on theme too
  3. Research or ___
  4. Our passion...of course
  5. Matchmaking...but with a cybersecurity professional
  6. Earned in the near future
  7. Fav location
  8. Class

14 Clues: ClassA trapFav locationResearch or ___Founding sponsorA series of lecturesFun merch, on theme tooOur passion...of courseShining star of our logoEarned in the near futureThe awesome director of ACESA perk of an honors college programA building that can meet all your basic needs!Matchmaking...but with a cybersecurity professional

AP (B) Unidad 4 2024-01-23

AP (B) Unidad 4 crossword puzzle
Across
  1. weapon
  2. piracy
  3. cybersecurity
  4. upload
  5. drone
  6. cyberbullying
  7. advancement
  8. blackhole
  9. research
Down
  1. immerse
  2. isolation
  3. screen
  4. development
  5. fuel
  6. device
  7. download
  8. gadget
  9. challenge
  10. browser
  11. scientist

20 Clues: fueldronescreenweaponpiracydevicegadgetuploadimmersebrowserdownloadresearchisolationchallengescientistblackholedevelopmentadvancementcybersecuritycyberbullying

Cybersecurity 2023-09-14

Cybersecurity crossword puzzle
Across
  1. ________ settings let you decide who can see what you post.
  2. A secret word or phrase that may include numbers, letters, or symbols
  3. _______ card. You can use this instead of money to buy things at a store or online.
  4. When you don't pay for something and just take it
  5. when you're on the internet, clicking on a _______ will take you to a new page or location
  6. Sending a letter through the computer.
  7. _______ security - the title of this crossword
Down
  1. Ring, ring. You probably carry this with you in your pocket or purse every day!
  2. Websites like Facebook, Twitter, Instagram and TikTok are examples of ______ media
  3. It may look like a real email, but if it's asking you to share your passsword, it's probably ____
  4. Putting a new software program or app on your phone
  5. Another word for coins, dollars, loonies, and toonies
  6. When you post pictures of your cat or tell someone your good news
  7. Information that you need to keep hidden or private

14 Clues: Sending a letter through the computer._______ security - the title of this crosswordWhen you don't pay for something and just take itPutting a new software program or app on your phoneInformation that you need to keep hidden or privateAnother word for coins, dollars, loonies, and toonies________ settings let you decide who can see what you post....

Cybersecurity 2025-09-18

Cybersecurity crossword puzzle
Across
  1. – A system that blocks unauthorized access to a network.
  2. – Someone who exploits system vulnerabilities.
  3. – Malware that locks your files and demands payment.
  4. – Malware disguised as legitimate software.
  5. – Converting data into a secure code to prevent access.
  6. – Fraudulent attempt to obtain sensitive information online.
Down
  1. – Unauthorized access to data or a system.
  2. – Program that detects and removes malware.
  3. – Software that secretly monitors your activity.
  4. – Software designed to harm or exploit a computer.
  5. – A program that spreads and damages files or systems.
  6. – Network of infected computers controlled remotely.
  7. – Secret word or phrase used for authentication.
  8. – Software update that fixes security issues.

14 Clues: – Unauthorized access to data or a system.– Program that detects and removes malware.– Malware disguised as legitimate software.– Software update that fixes security issues.– Someone who exploits system vulnerabilities.– Software that secretly monitors your activity.– Secret word or phrase used for authentication....

Sales Trivia 2024-11-08

Sales Trivia crossword puzzle
Across
  1. KnowBe4's HDR product called
  2. Process of verifying a user's identity
  3. What snack food shares its name with KnowBe4 local content publisher in SA?
  4. A popular Cybersecurity regulation (abbr.)
  5. What do cows drink?
  6. Type of sale where a customer buys additional products or services
  7. Common cybersecurity threat that uses deception to gain sensitive information
Down
  1. What happens in … stays in …?
  2. What is the name of KnowBe4's virtual cybersecurity awareness event
  3. What is the only fruit that has its seeds on the outside?
  4. Which part of your body contains a bone called the ‘Funny Bone’?
  5. Acronym for Chief Information Security Officer
  6. What term describes the total value of sales made over a set period?
  7. What is the term Gen Z uses for someone that has been ignoring/avoiding you?
  8. If two’s company and three’s a crowd, what do four and five make?
  9. What is the term for unsolicited emails sent in bulk?

16 Clues: What do cows drink?KnowBe4's HDR product calledWhat happens in … stays in …?Process of verifying a user's identityA popular Cybersecurity regulation (abbr.)Acronym for Chief Information Security OfficerWhat is the term for unsolicited emails sent in bulk?What is the only fruit that has its seeds on the outside?...

CYBERSAFETY 2024-05-02

CYBERSAFETY crossword puzzle
Across
  1. What is Cybersecurity?
  2. What is your best weapon?
  3. Who can do untold damage to you because of the internet
  4. What is the second part of CIA
  5. You must only share confidential data when
  6. What is the first part of CIA
Down
  1. What does Malware try to make you download
  2. What is now as important as real security
  3. What type of scam involves around playing with emotions to push people into a sense of urgency and fear leaving them more susceptible to being tricked
  4. what is the third part of CIA
  5. What security option fights off viruses from your computer
  6. You must only share confidential data with
  7. What is good to have as it notifies you of any sign-ins
  8. What security option makes a barrier between you and danger
  9. What security option hides your data
  10. What are the 3 principles of cybersecurity

16 Clues: What is Cybersecurity?What is your best weapon?what is the third part of CIAWhat is the first part of CIAWhat is the second part of CIAWhat security option hides your dataWhat is now as important as real securityWhat does Malware try to make you downloadYou must only share confidential data withYou must only share confidential data when...

CAB-CBG Madness 2015-02-24

CAB-CBG Madness crossword puzzle
Across
  1. 15
  2. 11
  3. 18
  4. 16
  5. 4
  6. 12
  7. 10
  8. 6
  9. 14
  10. 9
Down
  1. 19
  2. 8
  3. 1
  4. 17
  5. 13
  6. 7
  7. 2
  8. 5
  9. 3

19 Clues: 81742563919151713111816121014

CAB-CBG Madness 2015-03-03

CAB-CBG Madness crossword puzzle
Across
  1. 9
  2. 7
  3. 12
  4. 16
  5. 1
  6. 10
  7. 6
  8. 18
  9. 14
  10. 15
  11. 3
Down
  1. 5
  2. 2
  3. 11
  4. 4
  5. 17
  6. 13
  7. 8
  8. 19

19 Clues: 52947168311171312161019181415

CAB Madness 2015-02-23

CAB Madness crossword puzzle
Across
  1. 9
  2. 16
  3. 18
  4. 13
  5. 3
  6. 4
  7. 6
  8. 10
  9. 1
  10. 2
  11. 15
Down
  1. 14
  2. 17
  3. 7
  4. 19
  5. 11
  6. 8
  7. 5
  8. 12

19 Clues: 79835461214171916181113121015

Cyber Commons 2025-09-11

Cyber Commons crossword puzzle
Across
  1. Market incentive for cybersecurity investment
  2. IAD rule type defining who can participate
  3. An example of IAD tools
  4. Cybersecurity ecosystem with shared risk
  5. IAD outcome measuring long-term viability
  6. Framework used to analyze institutional governance
  7. Security standard for credit card data
  8. Commons resource used to authenticate websites
Down
  1. Commons resources are non-excludable but…?
  2. Rules governing daily decisions
  3. Social capital for AI models
  4. Example of Cyber Commons
  5. Threat information sharing institution
  6. Organization that manages CVEs
  7. Vulnerability Scoring System
  8. Property right in IAD
  9. An outcome analyzed by IAD
  10. Commons governance scholar who challenged Hardin
  11. Vulnerability identifier

19 Clues: Property right in IADAn example of IAD toolsExample of Cyber CommonsVulnerability identifierAn outcome analyzed by IADSocial capital for AI modelsVulnerability Scoring SystemOrganization that manages CVEsRules governing daily decisionsThreat information sharing institutionSecurity standard for credit card data...

AI Puzzle 2024-10-15

AI Puzzle crossword puzzle
Across
  1. - Internet
  2. - Intruder
  3. - Device
  4. - Rules
  5. - Test
  6. - Exploit
  7. - Digital
  8. - Imitation
  9. - Physics
  10. - Coding
Down
  1. - Scam
  2. - Network
  3. - Protection
  4. - Sequence
  5. - Barrier
  6. - Network
  7. - Efficiency
  8. - Information
  9. - Malware
  10. - Automation

20 Clues: - Scam- Test- Rules- Device- Coding- Network- Barrier- Network- Exploit- Digital- Malware- Physics- Internet- Intruder- Sequence- Imitation- Protection- Efficiency- Automation- Information

AI Puzzle 2024-10-15

AI Puzzle crossword puzzle
Across
  1. - Digital
  2. - Barrier
  3. - Information
  4. - Test
  5. - Network
  6. - Sequence
  7. - Coding
  8. - Rules
  9. - Malware
Down
  1. - Exploit
  2. - Imitation
  3. - Scam
  4. - Physics
  5. - Internet
  6. - Network
  7. - Device
  8. - Efficiency
  9. - Automation
  10. - Intruder
  11. - Protection

20 Clues: - Scam- Test- Rules- Device- Coding- Exploit- Digital- Physics- Barrier- Network- Network- Malware- Internet- Sequence- Intruder- Imitation- Efficiency- Automation- Protection- Information

Cyber Security Awareness Quiz 2024-09-20

Cyber Security Awareness Quiz crossword puzzle
Across
  1. 10
  2. 15
  3. 17
  4. 7
  5. 16
  6. 12
  7. 9
  8. 11
  9. 8
  10. 14
  11. 4
  12. 3
Down
  1. 1
  2. 19
  3. 5
  4. 13
  5. 20
  6. 18
  7. 2
  8. 6

20 Clues: 1579286431019151713162018121114

Cybersecurity Santiago Yeison Cristian Yefferson 2025-06-25

Cybersecurity Santiago Yeison Cristian Yefferson crossword puzzle
Across
  1. This is perhaps the most ubiquitous prefix in the field, indicating anything related to computers, networks, or the internet.
  2. Criminal activities carried out using computers or the internet.
  3. The state of being free from danger or threat. In cybersecurity, it refers to the protection of information systems.
  4. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  5. The programs and other operating information used by a computer.
  6. The quality of being trustworthy or of performing consistently well.
  7. The use of computers and the internet to conduct warfare in cyberspace.
  8. Software used to prevent, detect, and remove malicious software.
  9. The process of encoding information in such a way that only authorized parties can access it.
Down
  1. Criminal activities carried out using computers or the internet.
  2. The practice of protecting systems, networks, and programs from digital attacks.
  3. Software that enables a user to obtain secret information about another's computer activities by secretly transmitting data from their hard drive.
  4. Characterized by malice; intending or intended to do harm.
  5. As discussed, malicious software.
  6. An attempt by hackers to damage or destroy a computer network or system.
  7. The action of protecting, or the state of being protected. (While not strictly a cybersecurity prefix, it's a foundational concept).
  8. The process of converting encrypted data back into its original form.
  9. The state of being exposed to the possibility of being attacked or harmed, either physically or emotionally. In cybersecurity, a weakness that can be exploited.
  10. Permanent software programmed into a read-only memory.
  11. The practice of protecting systems, networks, and programs from digital attacks.
  12. Broader than antivirus, it protects against various forms of malware, not just viruses.
  13. Short for "malicious software," it's any software intentionally designed to cause damage to a computer, server, client, or computer network.

22 Clues: As discussed, malicious software.Permanent software programmed into a read-only memory.Characterized by malice; intending or intended to do harm.Criminal activities carried out using computers or the internet.Criminal activities carried out using computers or the internet.The programs and other operating information used by a computer....

Cybersecurity 2024-03-20

Cybersecurity crossword puzzle
Across
  1. Irrelevant or inappropriate messages sent on the internet.
  2. Designed to disrupt, damage, or gain access to a computer.
  3. Data storage device that includes flash memory. (Contains 2 words for example: Deep fake becomes Deepfake).
  4. Is a vulnerability in a system or device that has been disclosed but is not yet patched.
  5. Sending emails to induce individuals to reveal personal information.
  6. Process of encoding a message or information that only authorized parties can access. (Contains 2 words for example: USB Drive becomes USBDrive).
  7. Allows users and websites operator to remain anonymous.
Down
  1. Software designed to block access to a computer system until money is paid.
  2. Access to a centralized resource or service.
  3. Computer program that records every keystroke.
  4. A standard cable connection interface for personal computers.
  5. Web World wide web that is not discoverable. (Contains 2 words for example: USB Drive becomes USBDrive.
  6. A video or sound recording that replaces someone's face or voice with someone else's, in a way that looks real.(Contains 2 words for example: USB Drive becomes USBDrive).

13 Clues: Access to a centralized resource or service.Computer program that records every keystroke.Allows users and websites operator to remain anonymous.Irrelevant or inappropriate messages sent on the internet.Designed to disrupt, damage, or gain access to a computer.A standard cable connection interface for personal computers....

Cybersecurity 2025-08-22

Cybersecurity crossword puzzle
Across
  1. A term that defines when a system is accessed by an unauthorized person.
  2. Hackers that are authorized by companies to find flaws in systems in order to patch them.
  3. Protection of computer systems, networks, and data from attacks.
  4. Information that can be identified as belonging to someone or information that can be used to identify someone.
  5. The person in charge of maintaining a network.
  6. Hackers that maliciously violate computer security for personal gain.
Down
  1. Where data is stored.
  2. Digitally harassing, humiliating, embarrassing, and/or threatening someone.
  3. Information stored digitally.
  4. A person who attempts to use things in a way other than it's original intention.
  5. Revealing, or threatening to reveal, a person's personal data in order to harass and/or intimidate.
  6. A flaw in a computer system, operating system, or software.
  7. Hackers that may sometimes violate laws and are socially or politically motivative.

13 Clues: Where data is stored.Information stored digitally.The person in charge of maintaining a network.A flaw in a computer system, operating system, or software.Protection of computer systems, networks, and data from attacks.Hackers that maliciously violate computer security for personal gain....

OT Cybersecurity Awareness 2024-07-25

OT Cybersecurity Awareness crossword puzzle
Across
  1. Certified Industrial Cybersecurity Professional
  2. Infamous malware that was used to attack a Uranium enrichment facility
  3. Malware that encrypts data and demands payment to unlock it
  4. This gasoline pipeline company in US was the victim of a cyberattack in the year 2021
Down
  1. Acronym for a management system that is used to manage Cybersecurity in an organization
  2. For better cybersecurity, OT networks are partitioned into
  3. A malicious email sent to only the top management personnel of an organization
  4. A set of standards and technical reports for OT cybersecurity
  5. This brand of Safety PLC (Logic Solver) was attacked in the TRITON incident
  6. Device that allows communication only in one direction via hardware

10 Clues: Certified Industrial Cybersecurity ProfessionalFor better cybersecurity, OT networks are partitioned intoMalware that encrypts data and demands payment to unlock itA set of standards and technical reports for OT cybersecurityDevice that allows communication only in one direction via hardware...

Cybersecurity 2022-02-14

Cybersecurity crossword puzzle
Across
  1. method go through all the files or network elements with an intention to detect something unusual
  2. activities endanger the sovereignty and integrity of nation
  3. unsoliciated commercial email
  4. Compromising confidential Information
  5. collective terms of malicious software, such as viruses, worms and trojans.
  6. attempt to harm, damage or cause threat to a system or network
Down
  1. harassing aperson or following a person
  2. Periodic assessment of security vulnerability in computer systems is called _______audit.
  3. monitor user activity on someone else and transfer information to someone else
  4. existence of weakness in a system or network
  5. Viruses are
  6. Script files sent mostly through email attachment to attack host computer
  7. Doesnot belong to privacy threat
  8. The person using vulnerability in operating system or application software or IT infrastructure to intrude in to the computer of a victim

14 Clues: Viruses areunsoliciated commercial emailDoesnot belong to privacy threatCompromising confidential Informationharassing aperson or following a personexistence of weakness in a system or networkactivities endanger the sovereignty and integrity of nationattempt to harm, damage or cause threat to a system or network...

Cybersecurity 2022-05-10

Cybersecurity crossword puzzle
Across
  1. the process of taking plaintext and converting it into a format that is not human-readable
  2. any potential change or disruption of a computer network.
  3. Any crime committed over a connected device, such as a cellphone,
  4. prevent undesirable traffic from entering into a network.
  5. protected strings of characters in unique combinations that no one can easily guess.
  6. Phishing is a technique used to gain personal or sensitive information from a user
  7. theft the process of stealing your personal information such as your social security number or driver's license to open a bank account or apply for a credit card.
Down
  1. a user's physical characteristics.
  2. protect networked systems and all of the data from unauthorized use or harm
  3. software designed to harm or exploit any programmable device, service, or network.
  4. insulting, harassing, or threatening anyone using the Internet via email, instant messaging, and so on.
  5. the code of responsible behavior on the computer as well as on the Internet.
  6. an activity that intrudes into your system or gains unauthorized access to your accounts.

13 Clues: a user's physical characteristics.any potential change or disruption of a computer network.prevent undesirable traffic from entering into a network.Any crime committed over a connected device, such as a cellphone,protect networked systems and all of the data from unauthorized use or harm...

CYBERSECURITY 2024-12-14

CYBERSECURITY crossword puzzle
Across
  1. the activity of tricking people into providing personal or financial information by sending emails, texts, etc. that seem to be from companies that the person knows, often in order to steal money from them
  2. a computer program that is a type of virus and that spreads across a network by copying itself
  3. a series of letters, numbers, etc. that you must type into a computer or computer system in order to be able to use it
  4. software that is used to demand money from an individual or organization
  5. a document that you send to somebody using email
  6. a number of computers and other devices that are connected together so that equipment and information can be shared
Down
  1. a weakness in software programs that can be exploited by hackers to compromise computers.
  2. a mistake in something that means that it is not correct or does not work correctly
  3. a set of programs that controls the way a computer works and runs other programs
  4. attacks manipulate people into sharing information that they shouldn’t share, downloading software that they shouldn’t download, visiting websites they shouldn’t visit, sending money to criminals or making other mistakes that compromise their personal or organizational security.
  5. a small memory device that can be used to store data from a computer or digital camera and to move it from one device to another
  6. any security incident in which unauthorized parties access sensitive or confidential information
  7. a collection of software tools or a program that gives a hacker remote access to, and control over, a computer or network.

13 Clues: a document that you send to somebody using emailsoftware that is used to demand money from an individual or organizationa set of programs that controls the way a computer works and runs other programsa mistake in something that means that it is not correct or does not work correctly...

Security Squares - Simple 2023-08-08

Security Squares - Simple crossword puzzle
Across
  1. Deceptive Text Messages
  2. Trained professional who specializes in IT infrastructure security
  3. Role-Based Access Control
  4. A digital form of payment
  5. A device that provides two-factor for users to prove their identity
  6. The art of protecting networks, devices and data from unauthorized access
  7. The use of a fabricated story to gain someone's trust
  8. National Institute of Standards and Technology
  9. The process of giving a user permission to access resources
  10. A Cybersecurity ----- is an attempt to gain unauthorized access to information
  11. A Cybersecurity -------- is a violation of computer security policies
Down
  1. Also know as MFA
  2. Security that manages digital identities and user access to data and systems
  3. Something you know, something you have, something you are
  4. Sets of documents describing guidelines, standards and best practices
  5. Something that helps an organization to do as much as possible to remain proactively prepared to move quickly to remediate any issues
  6. Illegal activity carried out on a digital network
  7. ----- coding, the process of designing code that adheres to best practices and safeguards
  8. The application of policies, technologies and procedures to reduce the overall impact and risk
  9. Voice Phishing

20 Clues: Voice PhishingAlso know as MFADeceptive Text MessagesRole-Based Access ControlA digital form of paymentNational Institute of Standards and TechnologyIllegal activity carried out on a digital networkThe use of a fabricated story to gain someone's trustSomething you know, something you have, something you are...

Media 2023-03-30

Media crossword puzzle
Across
  1. lola
  2. jaunieshi
  3. publicet
  4. lol
  5. aniki
  6. oklo
  7. zurnals
  8. probgramma
  9. kompis
  10. roboti
  11. kola
  12. pteikt
  13. hzkas
Down
  1. joks
  2. paper
  3. mehaniki
  4. dati
  5. softijs
  6. radiji
  7. koooo
  8. kola
  9. nepareizi
  10. klips
  11. kole

24 Clues: loljoksloladatioklokolakolakolepaperanikikooooklipshzkasradijikompisrobotipteiktsoftijszurnalspublicetmehanikijaunieshinepareiziprobgramma

Cyber Security Awareness Month 2021-10-08

Cyber Security Awareness Month crossword puzzle
Across
  1. Results in the loss of contact details if it were stolen
  2. What does cybersecurity have in common with Halloween?
  3. _____ is best known for Halloween and happens to be National Cybersecurity Awareness Month
  4. What you will cause IT to have if you get a virus on your computer
  5. Here’s a spooky cybersecurity fact, Google blocks 18 million ____ related phishing emails a day!
  6. Hackers ____ their identity.
  7. This type of harmful computer program can be easily installed on your computer while you’re downloading unknown programs or files off the Internet.
  8. A hardware/software device or a software program that limits network traffic according to a set of rules of what access is and is not allowed or authorized.
  9. What to use if you need to connect to wifi while picking up your pumpkin spice latte.
Down
  1. This software is installed on a network of computers without the owner's knowledge. It can monitor activities and pick up information like credit card numbers, usernames, and passwords.
  2. You don't want to be the business with the most _____ network on the block.
  3. These programs protect your computer from Internet viruses or codes that can quickly disable your computer.
  4. How your computer might act once infected by a virus.
  5. Happens on Halloween night
  6. If you click on a phishing email you might want to ____ your job
  7. For hackers, it’s all about the _____ and it’s their treat they succeed
  8. These Internet scam programs often contact unsuspecting people via e-mail, urging them to visit fake websites designed to look like those run by well-known banks or other financial institutions.
  9. A bridge between two computer networks.
  10. In cybersecurity, the evil entity is black hats, people associate Halloween with black ____
  11. The process of translating plaintext into ciphertext.

20 Clues: Happens on Halloween nightHackers ____ their identity.A bridge between two computer networks.How your computer might act once infected by a virus.The process of translating plaintext into ciphertext.What does cybersecurity have in common with Halloween?Results in the loss of contact details if it were stolen...

Cybersecurity 2025-05-16

Cybersecurity crossword puzzle
Across
  1. weaponized software
  2. trying to "hook" sensitive data
  3. used to run untrusted code
  4. protects device against digital infections
  5. apart of the login process
  6. monitors user activity
Down
  1. converts data into code
  2. can capture passwords
  3. network protector
  4. strong, long, and unique
  5. masks IP address
  6. security update
  7. software disguised to look safe

13 Clues: security updatemasks IP addressnetwork protectorweaponized softwarecan capture passwordsmonitors user activityconverts data into codestrong, long, and uniqueused to run untrusted codeapart of the login processtrying to "hook" sensitive datasoftware disguised to look safeprotects device against digital infections

Cybersecurity 2025-08-22

Cybersecurity crossword puzzle
Across
  1. collecting a user's private information.
  2. A collection of organized data.
  3. uses information illegally to harm and gain personal info
  4. Protecting computer systems.
  5. A weakness in a system that can be made use of by a threat actor.
  6. Someone who uses advanced computer skills to gain access to computer systems.
  7. uses information with permission for good reasons such as improving security.
Down
  1. a collection of connected computers that can share resources
  2. Any data that can identify a person directly or by collecting other data.
  3. The process to manage, maintain and secure computer.
  4. A security event where sensitive info is being stolen.
  5. discover vulnerabilities in systems without the person's permission.
  6. information processed by a computer.

13 Clues: Protecting computer systems.A collection of organized data.information processed by a computer.collecting a user's private information.The process to manage, maintain and secure computer.A security event where sensitive info is being stolen.uses information illegally to harm and gain personal info...

CTM CROSSWORD PUZZLE 2021-03-18

CTM CROSSWORD PUZZLE crossword puzzle
Across
  1. BO
  2. PH
  3. CY
  4. HK
  5. AD
  6. MC
  7. BK
  8. IN
  9. VR
  10. WO
Down
  1. IN
  2. CO
  3. EN
  4. SP
  5. BA
  6. AT
  7. FI
  8. AV

18 Clues: INCOENBOSPPHCYBAHKADATFIMCBKAVINVRWO

EW Howell Crossword May 2024 2024-05-09

EW Howell Crossword May 2024 crossword puzzle
Across
  1. ____ Point Brewery
  2. Amusement park project
  3. Examples include Manhattanville, Brooklyn, Touro
  4. Far Rockaway Library LEED Level
  5. Town of Jones Beach Theater
  6. List of incomplete items during final project inspection
  7. Sector for mall, hospitality, big box projects
  8. ________ Living
  9. Month of Jones Beach Topping Off Ceremony
  10. Worn During PS I Love You Day
  11. ______ 2030
  12. Verification Battery Park Project received
  13. __________ Shopping Center
Down
  1. Organization focused on green/sustainable building
  2. MFA tool
  3. Cybersecurity tool
  4. Architectural design tool
  5. _______ User and Support Center
  6. Examples include Walt Whitman, Smith Haven
  7. __________ Maximum Price
  8. Cybersecurity scam
  9. _______ Care Pavilion
  10. Organization promoting women leaders in construction
  11. _____ Animal Care Center
  12. Training to recognize and prevent workplace hazards

25 Clues: MFA tool______ 2030________ Living____ Point BreweryCybersecurity toolCybersecurity scam_______ Care PavilionAmusement park project__________ Maximum Price_____ Animal Care CenterArchitectural design tool__________ Shopping CenterTown of Jones Beach TheaterWorn During PS I Love You Day_______ User and Support CenterFar Rockaway Library LEED Level...

Working in a company 2021-02-16

Working in a company crossword puzzle
Across
  1. Personal(abteilung)
  2. Kaufmännischer Leiter
  3. Geschäftsreise
  4. Qualitätssicherung
  5. Vertriebsleiter
  6. Kleiderordnung
  7. Bestandsliste
  8. Vertrag
  9. Kalkulation
  10. Großraumbüro
  11. Fertigung
  12. Verwaltung
Down
  1. Controlling
  2. Forschung
  3. Internetsicherheit
  4. Schichtarbeit
  5. Berater
  6. Vertriebsleiter
  7. Zusatzleistungen
  8. Arbeitnehmer
  9. Techniker
  10. Lager
  11. Einkauf

23 Clues: LagerBeraterVertragEinkaufForschungTechnikerFertigungVerwaltungControllingKalkulationArbeitnehmerGroßraumbüroSchichtarbeitBestandslisteGeschäftsreiseKleiderordnungVertriebsleiterVertriebsleiterZusatzleistungenInternetsicherheitQualitätssicherungPersonal(abteilung)Kaufmännischer Leiter

Cyberdise Crossword 2024-11-24

Cyberdise Crossword crossword puzzle
Across
  1. Secure connection over the internet
  2. Extra layer of security for logins
  3. Someone who breaks into systems
  4. Fixes vulnerabilities in software
  5. Malicious software
  6. Software to detect and remove viruses
  7. Small data files stored on your browser
  8. A deceptive scheme to steal information
  9. Software that spies on your activities
  10. Unauthorized access to data
  11. The best cybersecurity awareness company
Down
  1. Converts data into a secure format
  2. Knowledge about cybersecurity threats
  3. Fake emails to steal information
  4. Copy of data for recovery
  5. Keeps software current and secure
  6. Protects a network from unauthorized access
  7. Malware disguised as legitimate software
  8. Demands payment to unlock your data
  9. A secret word or phrase for access
  10. Uses the internet to harm others

21 Clues: Malicious softwareCopy of data for recoveryUnauthorized access to dataSomeone who breaks into systemsFake emails to steal informationUses the internet to harm othersKeeps software current and secureFixes vulnerabilities in softwareConverts data into a secure formatExtra layer of security for loginsA secret word or phrase for access...

Cybersecurity 2024-02-28

Cybersecurity crossword puzzle
Across
  1. (Addiction)
  2. (Violation)
  3. (Firewall)
  4. (Cyberbullying)
Down
  1. (Phishing)
  2. (Password)
  3. (Malware)
  4. (Cybersecurity)

8 Clues: (Malware)(Phishing)(Password)(Firewall)(Addiction)(Violation)(Cybersecurity)(Cyberbullying)

Happy National Crossword Day from Frontline! 2020-12-08

Happy National Crossword Day from Frontline! crossword puzzle
Across
  1. Holds your data hostage.
  2. Place people sell your sensitive info.
  3. Is greater than your struggle.
  4. ____ data you store to reduce risk of exposure.
  5. First step in Centurion360 package.
  6. Protects your data on public Wi-Fi.
  7. Who we are.
Down
  1. Next-Gen versions use artificial intelligence.
  2. Practices to protect what's connected to the internet.
  3. When an account double checks your identity.
  4. A password _____ will help store and generate secure ones.
  5. Cause of over 2/3 of cybersecurity incidents.
  6. How most ransomware gets to small businesses.
  7. We Keep IT ____.
  8. Already know your weak points.
  9. Who cyberattacks target.

16 Clues: Who we are.We Keep IT ____.Holds your data hostage.Who cyberattacks target.Is greater than your struggle.Already know your weak points.First step in Centurion360 package.Protects your data on public Wi-Fi.Place people sell your sensitive info.When an account double checks your identity.Cause of over 2/3 of cybersecurity incidents....

puzzle making 2015-03-02

puzzle making crossword puzzle
Across
  1. 6
  2. 3
  3. 2
  4. 12
  5. 14
  6. 4
  7. 11
Down
  1. 15
  2. 13
  3. 7
  4. 8
  5. 1
  6. 9
  7. 5
  8. 10

15 Clues: 637821954151312141011

TEST1 2020-09-14

TEST1 crossword puzzle
Across
  1. 26
  2. 16
  3. 7
  4. 6
  5. 2
  6. 11
  7. 9
  8. 18
  9. 19
  10. 22
  11. 10
  12. 23
Down
  1. 14
  2. 24
  3. 21
  4. 17
  5. 13
  6. 27
  7. 8
  8. 20
  9. 15
  10. 25
  11. 12
  12. 5

24 Clues: 768295142624162117132720111518251219221023

HUMANITIES 2024-11-04

HUMANITIES crossword puzzle
Across
  1. NOODLE
  2. CLAY
  3. BOOK
  4. GAME
  5. MEAT
  6. BOAT
Down
  1. MUSIC
  2. CAR
  3. DAIRY
  4. ART
  5. FRUIT
  6. WORK
  7. SPORT
  8. BREAD
  9. VEGGIE

15 Clues: CARARTCLAYWORKBOOKGAMEMEATBOATMUSICDAIRYFRUITSPORTBREADNOODLEVEGGIE

Emerging Technologies 2025-01-16

Emerging Technologies crossword puzzle
Across
  1. m
  2. f
  3. h
  4. g
  5. o
  6. c
Down
  1. j
  2. i
  3. e
  4. a
  5. k
  6. d
  7. l
  8. b
  9. n

15 Clues: jimeafkdhlgbnoc

Cybersecurity Terms 2022-04-27

Cybersecurity Terms crossword puzzle
Across
  1. scrambled data
  2. security incident where confidential data is accessed
  3. a key that can be used by anyone to encrypt messages
  4. key only used by one individual to decrypt
  5. person who has permission to hack
  6. layers of control
  7. using the same keys
  8. person who does not have permission to hack
  9. readable data
Down
  1. command to make a directory
  2. access point that is susceptible to hacking
  3. copy of data
  4. field to protect information on the internet
  5. a trap for cybersecurity criminals
  6. command to create a file

15 Clues: copy of datareadable datascrambled datalayers of controlusing the same keyscommand to create a filecommand to make a directoryperson who has permission to hacka trap for cybersecurity criminalskey only used by one individual to decryptaccess point that is susceptible to hackingperson who does not have permission to hack...

Cybersecurity 2025-04-17

Cybersecurity crossword puzzle
Across
  1. Redirecting users to fake websites to steal personal information.
  2. programs disguised as legitimate software.
  3. A type of cyber attack tricking you into revealing personal information.
  4. The act of spying over someone's shoulder to steal information.
  5. Software that shows unwanted ads.
Down
  1. A network security system that monitors and controls incoming and outgoing network traffic.
  2. A program that can replicate itself to spread.
  3. software that locks your files and demands payment.
  4. Security authentication using unique biological traits like fingerprints or facial recognition.
  5. Lying or deceiving to gain information online.
  6. A program that replicates itself to spread across computers without human interaction.
  7. software that secretly gathers user information.

12 Clues: Software that shows unwanted ads.programs disguised as legitimate software.A program that can replicate itself to spread.Lying or deceiving to gain information online.software that secretly gathers user information.software that locks your files and demands payment.The act of spying over someone's shoulder to steal information....

CyberSecurity 2024-09-05

CyberSecurity crossword puzzle
Across
  1. Software designed to disrupt, damage, or gain unauthorized access to a computer system
  2. A service that encrypts users' data and masks their IP addresses
  3. Taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
  4. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
  5. The process of converting information into ciphertext
  6. Where the recruitment, retention and advancement of women in cybersecurity happens.
Down
  1. The process of decoding cipher text to plain text
  2. The practice of sending fraudulent communications that appear to come from a legitimate source
  3. Contains items that are temporarily blocked until an additional step is performed
  4. A term used to describe a person who tries to gain unauthorized access to a network or computer system
  5. A vulnerability exploited before developers release a fix
  6. Malware that self-replicates and spreads without human interaction

12 Clues: The process of decoding cipher text to plain textThe process of converting information into ciphertextA vulnerability exploited before developers release a fixA service that encrypts users' data and masks their IP addressesMalware that self-replicates and spreads without human interaction...

Cybersecurity 2025-10-21

Cybersecurity crossword puzzle
Across
  1. Fraudulent messages sent to trick users into revealing sensitive information
  2. Unintentional user actions that cause data loss or damage
  3. Granting permissions to a user based on their role
  4. Restricting who can view or use resources in a system
  5. Software designed to damage or gain unauthorised access to a system
  6. A copy of data stored to prevent loss in case of system failure
  7. Verifying a user’s identity before granting access
  8. Malware disguised as legitimate software to trick users
Down
  1. A security system that monitors and controls incoming and outgoing network traffic
  2. Deliberate actions aimed at harming IT systems or stealing data
  3. Malware that encrypts files and demands payment to restore access
  4. A malware that attaches to files or programs and spreads when shared

12 Clues: Granting permissions to a user based on their roleVerifying a user’s identity before granting accessRestricting who can view or use resources in a systemMalware disguised as legitimate software to trick usersUnintentional user actions that cause data loss or damageDeliberate actions aimed at harming IT systems or stealing data...

General Regulatory Compliance Cryptic Crossword 2024-01-26

General Regulatory Compliance Cryptic Crossword crossword puzzle
Across
  1. DoD standard for implementing cybersecurity
  2. security device to control traffic
  3. deceptive practices to fraudulently steal data
  4. measures to protect against network attack
  5. group of interconnected computers and devices
  6. series of actions leading to a result
  7. simulated cyber attack
  8. potential loss of assets
  9. process of verifying identity of a user
Down
  1. protection of information technology on ships and port facilities
  2. Experts in safeguarding business from evil
  3. security measure of pre-approved IP addresses
  4. process of establishing encrypted links
  5. converting data to coded format
  6. malicious software
  7. digital information created by computer systems
  8. centralized unit and team continuously monitoring security posture
  9. measures and practices to protect digital systems

18 Clues: malicious softwaresimulated cyber attackpotential loss of assetsconverting data to coded formatsecurity device to control trafficseries of actions leading to a resultprocess of establishing encrypted linksprocess of verifying identity of a userExperts in safeguarding business from evilmeasures to protect against network attack...

Cybersecurity 2024-06-04

Cybersecurity crossword puzzle
Across
  1. This malicious software holds your data hostage until a ransom is paid
  2. The process of verifying a user's identity
  3. A deceptive email attempt to steal personal information
  4. Malicious software designed to harm a computer system
  5. Scrambling data to make it unreadable without a key
  6. Process of identifying and correcting security vulnerabilities in a
Down
  1. A security incident where sensitive data is exposed
  2. Software program designed to block unauthorized access while
  3. An attack that overwhelms a server with traffic, making it unavailable
  4. Software that scans for and neutralizes viruses and other malicious
  5. system.
  6. authorized communications.

12 Clues: system.authorized communications.The process of verifying a user's identityA security incident where sensitive data is exposedScrambling data to make it unreadable without a keyMalicious software designed to harm a computer systemA deceptive email attempt to steal personal informationSoftware program designed to block unauthorized access while...

Course Codes - C & D 2025-10-13

Course Codes - C & D crossword puzzle
Across
  1. BIO
  2. BCS
  3. BSRT
  4. CAC
  5. CHM
  6. COM
  7. BUS
  8. CHN
Down
  1. CST
  2. CTE
  3. CIS
  4. BHS
  5. CRM
  6. CSC
  7. CUL
  8. CYB

16 Clues: CSTCTECISBHSBIOBCSCRMCSCCULCYBCACCHMCOMBUSCHNBSRT

Working in a company 2021-02-18

Working in a company crossword puzzle
Across
  1. Schichtarbeit
  2. Techniker
  3. Vertriebsleiter
  4. Großraumbüro
  5. Geschäftsreise
  6. Arbeitnehmer
  7. Bestandsliste
  8. Personal(abteilung)
  9. Controlling
  10. Berater
  11. Finanzvorstand
Down
  1. Fertigung
  2. Kleiderordnung
  3. Lager
  4. Kaufmännischer Leiter
  5. Qualitätssicherung
  6. Forschung
  7. Zusatzleistungen
  8. Vertrag
  9. Internetsicherheit
  10. Einkauf
  11. Kalkulation
  12. Verwaltung

23 Clues: LagerVertragEinkaufBeraterFertigungTechnikerForschungVerwaltungKalkulationControllingGroßraumbüroArbeitnehmerSchichtarbeitBestandslisteKleiderordnungGeschäftsreiseFinanzvorstandVertriebsleiterZusatzleistungenQualitätssicherungInternetsicherheitPersonal(abteilung)Kaufmännischer Leiter

Wedding 2023-07-04

Wedding crossword puzzle
Across
  1. bridedrink
  2. dating
  3. mascot
  4. groomhs
  5. groomproposal
  6. GroomFrat
  7. bridecomp
  8. bridemiddle
  9. bridemaiden
  10. bridezodiac
  11. Groommiddle
  12. TheirCity
Down
  1. groomdrink
  2. newname
  3. groomcomp
  4. sharedcollegemajor
  5. bridehs
  6. honeymoon
  7. Street
  8. Groomzodiac
  9. bridesor
  10. dog
  11. saidilove you
  12. yearstogether

24 Clues: dogdatingmascotStreetnewnamebridehsgroomhsbridesorgroomcomphoneymoonGroomFratbridecompTheirCitygroomdrinkbridedrinkGroomzodiacbridemiddlebridemaidenbridezodiacGroommiddlegroomproposalsaidilove youyearstogethersharedcollegemajor

Cybersecurity 2022-11-16

Cybersecurity crossword puzzle
Across
  1. Responsible for designing, building, testing, and implementing security infrastructure and security systems for the organization they work for.
  2. The Sarbanes Oxly Act covers which type of activity?
  3. Measures designed to deter, prevent, detect or alert unauthorized real-world access to a site or material item.
  4. Defined as an intense and selfish desire for something, especially wealth or power.
  5. Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
  6. One common error when considering people in Cybersecurity is using TRUST instead of
  7. In a cryptosystem, Alice and Bob both use the same key value to communicate with each other.
Down
  1. Falsifying header information is a serious violation of the _ Act.
  2. Computer and Abuse in cyber law, which act is most frequently used to create the crime of Computer Trespass?
  3. Allows the user to determine how to trust the keys, so its a trust model.
  4. Financial regulations
  5. Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?

12 Clues: Financial regulationsThe Sarbanes Oxly Act covers which type of activity?Falsifying header information is a serious violation of the _ Act.Allows the user to determine how to trust the keys, so its a trust model.Defined as an intense and selfish desire for something, especially wealth or power....

Cybersecurity 2023-09-07

Cybersecurity crossword puzzle
Across
  1. Once hijackers obtain your personal details, they can make _______ transactions.
  2. This is the protection of computers from information theft.
  3. Turning on two-step ____ in whatsapp is advisable.
  4. Stay calm and do not reveal any personal _____.
  5. What are @, $, &, % called?
Down
  1. Always enable ____ updates for whatsapp.
  2. Only visit websites that feature a _____ icon.
  3. In whatsapp, to go to Fingerprint lock, you need to select _____.
  4. Use only _____ websites.
  5. Always alert a _____ adult if you are unsure.
  6. One of the most common types of cyberattacks are ____ attacks.
  7. One of the strong passwords.

12 Clues: Use only _____ websites.What are @, $, &, % called?One of the strong passwords.Always enable ____ updates for whatsapp.Always alert a _____ adult if you are unsure.Only visit websites that feature a _____ icon.Stay calm and do not reveal any personal _____.Turning on two-step ____ in whatsapp is advisable....

Cybersecurity 2023-03-11

Cybersecurity crossword puzzle
Across
  1. Is an encrypted connection over the Internet from a device to a network
  2. Is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of internet security weaknesses
  3. A form of malware that hijacks your system and encrypts your files, denying you access to them until you send money to unlock everything
  4. A form of malware used by hackers to spy on you and your computer activities
  5. A scam where a hacker poses as a legitimate business or organization in order to fool the victim into giving them sensitive personal information
  6. A portmanteau of “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system
Down
  1. While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking
  2. Malware which changes, corrupts, or destroys information, and is then passed on to other systems
  3. Yet another form of malware, this one a misleading computer program that looks innocent, but in fact allows the hacker into your system via a back door.
  4. A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data
  5. Any technology, be it software or hardware, used to keep intruders out
  6. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network

12 Clues: Any technology, be it software or hardware, used to keep intruders outIs an encrypted connection over the Internet from a device to a networkA form of malware used by hackers to spy on you and your computer activitiesMalware which changes, corrupts, or destroys information, and is then passed on to other systems...

Cybersecurity 2025-05-30

Cybersecurity crossword puzzle
Across
  1. _________ access is the act of gaining access to a computer system or physical location without proper permission.
  2. it's a social engineering technique when an attacker lures a victim with a false promise that maipulates their greed or curiosity.
  3. brute _____ attack is is a method of breaking encryption code by trying all possible encryption keys.
  4. _______ password is a correct password.
  5. the pieces of information you need to prove your identity and gain access to a specific system or service, typically a username and a password.
  6. a type of malware that disguises itself as a legitimate program or file to fool users into downloading and running it.
Down
  1. _________ data is any valuable or private information that requires protection, including financial, personal, or health-related details.
  2. _________ phishing is a type of phishing attack that targets a specific person or group.
  3. a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
  4. social _______ is a manipulation technique that exploits human weaknesses to get private information, access or money.
  5. it is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information.
  6. a type of malware that can replicate itself and spread rapidly across a network, without requiring user interaction or attachment to a host program.

12 Clues: _______ password is a correct password._________ phishing is a type of phishing attack that targets a specific person or group.brute _____ attack is is a method of breaking encryption code by trying all possible encryption keys._________ access is the act of gaining access to a computer system or physical location without proper permission....

CyberSecurity 2021-12-16

CyberSecurity crossword puzzle
Across
  1. Protects your Privacy
  2. bits created to unscramble and scramble data
  3. responsible for data
  4. Secures digital data
  5. Owns data
  6. proof that a package is sented
  7. describes a computer network
Down
  1. Order
  2. shared key used to encrypt or decrypt text
  3. uneven bars
  4. technique used to validate messages
  5. Uses Data

12 Clues: OrderOwns dataUses Datauneven barsresponsible for dataSecures digital dataProtects your Privacydescribes a computer networkproof that a package is sentedtechnique used to validate messagesshared key used to encrypt or decrypt textbits created to unscramble and scramble data

Cybersecurity 2023-04-01

Cybersecurity crossword puzzle
Across
  1. Cyber criminals find and use these ______ for their malicious intents.
  2. The magic number of characters for a strong password
  3. _____ knowledge of recent threats as well as softwares
  4. A Strong ______ ensure security by making it harder to access your accounts
  5. Using uppercase and lowercase, numbers and symbols to add _______ in your passwords
  6. Most users interact with their mobile devices more often than computers.
Down
  1. Software that eliminates and mitigates malicious software
  2. Computer _____ are a type of malware meant to damage a computer by corrupting or destroying data
  3. Type of security when surfing the ____
  4. Process of converting data into an unreadable form for data protection.
  5. Do not include your ______ in your passwords such as your name or birthdate
  6. Do not _____ your password with others

12 Clues: Type of security when surfing the ____Do not _____ your password with othersThe magic number of characters for a strong password_____ knowledge of recent threats as well as softwaresSoftware that eliminates and mitigates malicious softwareCyber criminals find and use these ______ for their malicious intents....

Cybersecurity 2022-11-28

Cybersecurity crossword puzzle
Across
  1. Code that replicates itself
  2. Someone who tries to take your data online
  3. Replicating code that moves through your network
  4. Software that appears useful but is not
  5. Forced advertisement
  6. Safety online
Down
  1. Something that might harm your computer
  2. Tricking someone into giving you data
  3. Unwanted software that reads your data
  4. Someone who is young and "testing out their skills" online
  5. A scam that holds your money hostage
  6. Infectious software

12 Clues: Safety onlineInfectious softwareForced advertisementCode that replicates itselfA scam that holds your money hostageTricking someone into giving you dataUnwanted software that reads your dataSomething that might harm your computerSoftware that appears useful but is notSomeone who tries to take your data online...

NCPD FCU vs Cybercrime 2024-01-31

NCPD FCU vs Cybercrime crossword puzzle
Across
  1. In terms of Cybersecurity, always avoid a ______ play.
  2. To score 1 of these _____ always "Think Before You Click".
  3. We intend to _________ phishing emails.
  4. The LooksPhishy mailbox can serve as this ________ for suspicious email.
  5. Cybersecurity is a team ________.
  6. Our goal is to ____ social engineering scams.
  7. Malware can do this to file names __________.
  8. At our Credit Union, we're all on the same winning ________.
  9. Anyone on our team can be the ______ of phishing emails.
  10. Threat actors can make this type of move once they get on a network _______.
  11. Forwarding email to LooksPhishy mailbox, is similar to an __________.
Down
  1. Reporting phishing emails properly will earn you an _______ with Wayon.
  2. Our Friday Operations meeting is called "The ________".
  3. When you get a phishing email, never do this ______.
  4. We are all _________ on the NCPD FCU team.
  5. Technology is incapable of _________ all suspicious email.
  6. You can be a _______ star by always following our Credit Unions Policies & Procedures.
  7. Our team forms this to protect our Credit Union _______.
  8. We never want to do this ______ with a phishing email.
  9. Never make a _____ judgement with questionable email.
  10. ________ is a motivator behind phishing emails.
  11. Phishing emails can be similar to this type of football play _______.
  12. The goal of Cybersecurity is _______.
  13. Don't do this _______ when examining a suspicious email.

24 Clues: Cybersecurity is a team ________.The goal of Cybersecurity is _______.We intend to _________ phishing emails.We are all _________ on the NCPD FCU team.Our goal is to ____ social engineering scams.Malware can do this to file names __________.________ is a motivator behind phishing emails.When you get a phishing email, never do this ______....

Privacy,Cybersecurity e NIS2 2025-08-09

Privacy,Cybersecurity e NIS2 crossword puzzle
Across
  1. programma malevolo che blocca i file chiedendo un riscatto
  2. truffa via email per rubare dati
  3. miglior azienda di privacy e cybersecurity bepsolution
  4. identificativo per accedere a un sistema
  5. software contro virus
  6. file usato per tracciare la navigazione
  7. condizioni d’uso di un servizio
Down
  1. norma europea sulla protezione dei dati personali (sigla)
  2. accesso non autorizzato a un sistema
  3. comunicazione di una violazione dati
  4. documento che valuta l’impatto della protezione dati (sigla)
  5. sicurezza informatica (in inglese)
  6. sistema di nomi di dominio
  7. test di penetrazione per sicurezza
  8. procedura di verifica dell’identità
  9. copia di sicurezza dei dati
  10. sistema di filtraggio del traffico di rete
  11. tecnica di codifica per proteggere le informazioni
  12. direttiva ue sulla sicurezza delle reti e sistemi informativi (sigla)

19 Clues: software contro virussistema di nomi di dominiocopia di sicurezza dei daticondizioni d’uso di un serviziotruffa via email per rubare datisicurezza informatica (in inglese)test di penetrazione per sicurezzaprocedura di verifica dell’identitàaccesso non autorizzato a un sistemacomunicazione di una violazione dati...

Cyber Crime 2023-12-26

Cyber Crime crossword puzzle
Across
  1. บิตคอยน์
  2. ไวรัสทำลายข้อมูล
  3. โปรแกรมอันตราย
  4. การล่อหลอก
  5. การระรานทางไซเบอร์
  6. ข้อมูลขนาดใหญ่
  7. ไวรัสเรียกค่าไถ่
Down
  1. ความมั่นคงปลอดภัยไซเบอร์
  2. เมล์ขยะ
  3. ดักจับข้อมูลการพิมพ์
  4. บล๊อกเชน
  5. ปัญญาประดิษฐ์
  6. ม้าโทรจัน
  7. สปายแวร์
  8. หนอนอินเทอร์เน็ต

15 Clues: เมล์ขยะบิตคอยน์บล๊อกเชนสปายแวร์ม้าโทรจันการล่อหลอกปัญญาประดิษฐ์โปรแกรมอันตรายข้อมูลขนาดใหญ่ไวรัสทำลายข้อมูลหนอนอินเทอร์เน็ตไวรัสเรียกค่าไถ่การระรานทางไซเบอร์ดักจับข้อมูลการพิมพ์ความมั่นคงปลอดภัยไซเบอร์

HUMANITIES 2024-11-04

HUMANITIES crossword puzzle
Across
  1. NOODLE
  2. CLAY
  3. BOOK
  4. GAME
  5. MEAT
  6. BOAT
Down
  1. MUSIC
  2. CAR
  3. DAIRY
  4. ART
  5. FRUIT
  6. WORK
  7. SPORT
  8. BREAD
  9. VEGGIE

15 Clues: CARARTCLAYWORKBOOKGAMEMEATBOATMUSICDAIRYFRUITSPORTBREADNOODLEVEGGIE

EW Howell Crossword Puzzle - April 2024 2024-04-11

EW Howell Crossword Puzzle - April 2024 crossword puzzle
Across
  1. Cybersecurity scam
  2. Organization focused on green/sustainable building
  3. Cybersecurity tool
  4. Examples include Iona, Manhattanville, Touro
  5. ______ 2030
  6. MFA tool
  7. Amusement park project
  8. Verification Battery Park Project received
  9. Sector for mall, hospitality, big box projects
  10. _____ Animal Care Center
  11. Design method used to visualize construction
Down
  1. _______ Care Pavilion
  2. __________ Maximum Price
  3. Agreement outlining specific work services for a project
  4. Organization promoting women leaders in construction
  5. ____ Point Brewery
  6. Month of Jones Beach Topping Off Ceremony
  7. Worn During PS I Love You Day
  8. Far Rockaway Library LEED Level
  9. __________ Shopping Center
  10. Town of Jones Beach Theater
  11. _______ User and Support Center
  12. List of incomplete items during final project inspection
  13. Training to recognize and prevent workplace hazards
  14. Work management software
  15. ________ Living
  16. Examples include Westfield, Smith Haven

27 Clues: MFA tool______ 2030________ LivingCybersecurity scam____ Point BreweryCybersecurity tool_______ Care PavilionAmusement park project__________ Maximum PriceWork management software_____ Animal Care Center__________ Shopping CenterTown of Jones Beach TheaterWorn During PS I Love You DayFar Rockaway Library LEED Level_______ User and Support Center...

General Regulatory Compliance Cryptic Crossword 2024-01-26

General Regulatory Compliance Cryptic Crossword crossword puzzle
Across
  1. DoD standard for implementing cybersecurity
  2. security device to control traffic
  3. deceptive practices to fraudulently steal data
  4. measures to protect against network attack
  5. group of interconnected computers and devices
  6. series of actions leading to a result
  7. simulated cyber attack
  8. potential loss of assets
  9. process of verifying identity of a user
Down
  1. protection of information technology on ships and port facilities
  2. Experts in safeguarding business from evil
  3. security measure of pre-approved IP addresses
  4. process of establishing encrypted links
  5. converting data to coded format
  6. malicious software
  7. digital information created by computer systems
  8. centralized unit and team continuously monitoring security posture
  9. measures and practices to protect digital systems

18 Clues: malicious softwaresimulated cyber attackpotential loss of assetsconverting data to coded formatsecurity device to control trafficseries of actions leading to a resultprocess of establishing encrypted linksprocess of verifying identity of a userExperts in safeguarding business from evilmeasures to protect against network attack...

Computer science 2023-03-30

Computer science crossword puzzle
Across
  1. ushehs
  2. Sky
  3. Hdhwbe
  4. Benenbe
  5. Bsbsbs
  6. Hdkams
  7. Hahsgsjs
Down
  1. S snns
  2. Bdhshsb
  3. Behene
  4. Bsjsgga
  5. Bdbsbsb
  6. Bshshbs
  7. Yeheheh

14 Clues: SkyS snnsBeheneushehsHdhwbeBsbsbsHdkamsBdhshsbBsjsggaBdbsbsbBshshbsBenenbeYehehehHahsgsjs

Common Europe Congress 2023 2023-05-10

Common Europe Congress 2023 crossword puzzle
Across
  1. Fortra
  2. Omniscience
  3. Lansa
  4. Infor
  5. Raz-Lee
  6. Remain Software
  7. Rocket software
  8. Metrixware
  9. Arcad Software
  10. Taskforce
  11. Maxava
  12. Falconstor
  13. Axians
Down
  1. CNX
  2. Dynamic Solutions
  3. Xorux
  4. Service Express
  5. iVolution
  6. Infoview
  7. Profound Logic
  8. Connectria
  9. TSP

22 Clues: CNXTSPXoruxLansaInforFortraMaxavaAxiansRaz-LeeInfoviewiVolutionTaskforceMetrixwareConnectriaFalconstorOmniscienceArcad SoftwareProfound LogicService ExpressRemain SoftwareRocket softwareDynamic Solutions

CEC2023 - 1 2023-06-03

CEC2023 - 1 crossword puzzle
Across
  1. Fortra
  2. Omniscience
  3. Lansa
  4. Infor
  5. Raz-Lee
  6. Remain Software
  7. Rocket software
  8. Metrixware
  9. Arcad Software
  10. Taskforce
  11. Maxava
  12. Falconstor
  13. Axians
Down
  1. CNX
  2. Dynamic Solutions
  3. Xorux
  4. Service Express
  5. iVolution
  6. Infoview
  7. Profound Logic
  8. Connectria
  9. TSP

22 Clues: CNXTSPXoruxLansaInforFortraMaxavaAxiansRaz-LeeInfoviewiVolutionTaskforceMetrixwareConnectriaFalconstorOmniscienceArcad SoftwareProfound LogicService ExpressRemain SoftwareRocket softwareDynamic Solutions

CBL World 2023-05-05

CBL World crossword puzzle
Across
  1. Your Cyber Security Partner
  2. Kidnapped & hold for ransom
  3. Burning walls, keep intruders away
  4. Most critical element in CyberSecurity
  5. Locked with a key, for data security
Down
  1. Weakness that can be exploited
  2. Make it strong, complex, and change frequently
  3. Plug and play your Apps on the cloud
  4. Assessed, Validated, and Certified
  5. Rhymes with fishing
  6. Vaccine for your systems
  7. Weakest link in CyberSecurity (Human factor)

12 Clues: Rhymes with fishingVaccine for your systemsYour Cyber Security PartnerKidnapped & hold for ransomWeakness that can be exploitedAssessed, Validated, and CertifiedBurning walls, keep intruders awayPlug and play your Apps on the cloudLocked with a key, for data securityMost critical element in CyberSecurityWeakest link in CyberSecurity (Human factor)...

Cyber1 2023-01-27

Cyber1 crossword puzzle
Across
  1. Award-winning cybersecurity startup in Portland, ME
  2. Vanilla flavored programming language of choice
  3. AKA Software as a Service
  4. Modern runtime environment, rhymes with "code"
  5. Relational and ephemeral
Down
  1. White hot tech sector
  2. Today's flexible workforce; preferred by many
  3. Seasoned developer, front to back
  4. Code ninja and solver of problems
  5. A great place to live and work
  6. AKA Small and Midsized Businesses
  7. AKA Application Programming Interface

12 Clues: White hot tech sectorRelational and ephemeralAKA Software as a ServiceA great place to live and workSeasoned developer, front to backCode ninja and solver of problemsAKA Small and Midsized BusinessesAKA Application Programming InterfaceToday's flexible workforce; preferred by manyModern runtime environment, rhymes with "code"...

AI in Cybersecurity 2025-10-20

AI in Cybersecurity crossword puzzle
Across
  1. – What cybersecurity teams do.
  2. – What deepfakes can break online.
  3. – Helps detect or block fake content.
  4. – Something that looks real but isn’t.
  5. – A short video that can be altered.
Down
  1. – What happens when AI misidentifies something.
  2. – A warning about possible threats.
  3. – What cybersecurity helps us stay.
  4. – A harmful cyber action.
  5. – Used by AI to learn patterns.
  6. – The technology behind deepfakes.
  7. – Deepfakes can also be made from this.

12 Clues: – A harmful cyber action.– What cybersecurity teams do.– Used by AI to learn patterns.– What deepfakes can break online.– The technology behind deepfakes.– A warning about possible threats.– What cybersecurity helps us stay.– A short video that can be altered.– Helps detect or block fake content.– Something that looks real but isn’t....

Cybersecurity 2022-07-08

Cybersecurity crossword puzzle
Across
  1. A basic security feature that protects your network by acting as an intermediary between your internal network and outside traffic. It monitors attempts to gain access to your operating system and blocks unwanted incoming traffic and unrecognized sources
  2. Type of assessments that are the cornerstone of every program for cybersecurity
  3. A basic security software used to prevent, scan, detect and delete viruses from a computer
  4. Protecting information is vital for the normal functioning of organizations
  5. Is an advanced security control that reduces the chance of it being stolen
Down
  1. Systems that are no longer supported by the manufacturer
  2. is a significant threat to the confidentiality, integrity and availability of information
  3. A key stakeholder that may not recognize how to securely communicate with their provider
  4. The abbreviation of a federal requirement restricting electronic transmission of health information
  5. Type of phishing email specific employee within an organization
  6. Most significant security incident
  7. This stakeholder may have lax security policies compromising your system

12 Clues: Most significant security incidentSystems that are no longer supported by the manufacturerType of phishing email specific employee within an organizationThis stakeholder may have lax security policies compromising your systemIs an advanced security control that reduces the chance of it being stolen...

CyberSecurity 2022-11-28

CyberSecurity crossword puzzle
Across
  1. these replicate themselves but do not attach themselves to files as a virus does.
  2. a cyberattack in which multiple devices make a network resource unavailable to its intended users.
  3. software that is designed to gain access to your computer with bad intent.
  4. the term for when human users of a system are tricked into providing confidential information
  5. a large collection of malware-infected devices
Down
  1. hackers who use tools downloaded from the internet that allow them to hack with little technical knowledge.
  2. a key to a website or account.
  3. unwanted software that monitors and gathers information on a person and how they use their computer.
  4. can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
  5. a piece of software that appears to perform a useful function, but it also performs malicious actions.
  6. self replicating software.
  7. Something that checks incoming and outgoing network traffic.

12 Clues: self replicating software.a key to a website or account.a large collection of malware-infected devicesSomething that checks incoming and outgoing network traffic.software that is designed to gain access to your computer with bad intent.these replicate themselves but do not attach themselves to files as a virus does....

Cybersecurity 2023-03-30

Cybersecurity crossword puzzle
Across
  1. / Harmful computer program
  2. / Secret characters for authentication
  3. / Strong, unique password practice
  4. / Encoding information for authorized access only
  5. / Fraudulent emails to get personal information
  6. / Cyberattack encrypting data for ransom
Down
  1. / Software protecting against viruses
  2. / Fake website or email to deceive users
  3. / Method requiring multiple evidence for identity
  4. / Gaining unauthorized system access
  5. / Settings controlling information visibility
  6. / Network of infected computers controlled unknowingly

12 Clues: / Harmful computer program/ Strong, unique password practice/ Gaining unauthorized system access/ Software protecting against viruses/ Secret characters for authentication/ Fake website or email to deceive users/ Cyberattack encrypting data for ransom/ Settings controlling information visibility/ Fraudulent emails to get personal information...

Cybersecurity 2023-04-28

Cybersecurity crossword puzzle
Across
  1. influencing or deceiving a victim in order to gain control
  2. self replicate other computers
  3. thieves attempt to steal personal info
  4. looking at information over a shoulder
  5. use of own knowledge to secure organzinations
  6. steals anything they want
Down
  1. processing data by the computer
  2. non-threatening traffic in to keep dangerous stuff out
  3. inventing a specific scenario
  4. unintentional actions
  5. robot network
  6. form that is efficient for movement or processing

12 Clues: robot networkunintentional actionssteals anything they wantinventing a specific scenarioself replicate other computersprocessing data by the computerthieves attempt to steal personal infolooking at information over a shoulderuse of own knowledge to secure organzinationsform that is efficient for movement or processing...

Cybersecurity 2023-09-13

Cybersecurity crossword puzzle
Across
  1. Cyber criminals find and use these ______ for their malicious intents.
  2. The magic number of characters for a strong password
  3. _____ knowledge of recent threats as well as softwares
  4. A Strong ______ ensure security by making it harder to access your accounts
  5. Using uppercase and lowercase, numbers and symbols to add _______ in your passwords
  6. Most users interact with their mobile devices more often than computers.
Down
  1. Software that eliminates and mitigates malicious software
  2. Computer _____ are a type of malware meant to damage a computer by corrupting or destroying data
  3. Type of security when surfing the ____
  4. Process of converting data into an unreadable form for data protection.
  5. Do not include your ______ in your passwords such as your name or birthdate
  6. Do not _____ your password with others

12 Clues: Type of security when surfing the ____Do not _____ your password with othersThe magic number of characters for a strong password_____ knowledge of recent threats as well as softwaresSoftware that eliminates and mitigates malicious softwareCyber criminals find and use these ______ for their malicious intents....

CYBERSECURITY 2017-04-13

CYBERSECURITY crossword puzzle
Across
  1. the abuse of email to send unsolicited bulk messages
  2. information
  3. capability to limit network traffic between networks
  4. a person who breaks into a computer or network
  5. a string of characters used to verify access authorization
  6. the process of transforming plaintext into cipher text
  7. software that compromises the operation of a system
Down
  1. measures to reduce the likelihood of an unwanted occurence
  2. a program that can infect a computer and spread to another computer
  3. software that tracks keystrokes and keyboard events
  4. self replicating program that uses networking mechanisms to spread itself
  5. software that is secretly installed into a system

12 Clues: informationa person who breaks into a computer or networksoftware that is secretly installed into a systemsoftware that tracks keystrokes and keyboard eventssoftware that compromises the operation of a systemthe abuse of email to send unsolicited bulk messagescapability to limit network traffic between networks...

Cybersecurity 2025-05-30

Cybersecurity crossword puzzle
Across
  1. Keeping data safe from unauthorized access (6)
  2. An algorithm for encryption or decryption (6)
  3. A barrier designed to prevent unauthorized access (8)
  4. A secret word or phrase for access (8)
  5. The practice of protecting networks and data (11)
  6. To protect systems from attack (6)
Down
  1. Verification of a user's identity (14)
  2. A program that replicates itself and spreads to other computers (5)
  3. A malicious software (7)
  4. The process of converting information or data into a code (10)
  5. An attempt to trick users into revealing sensitive information (7)
  6. A set of rules for communication (8)

12 Clues: A malicious software (7)To protect systems from attack (6)A set of rules for communication (8)Verification of a user's identity (14)A secret word or phrase for access (8)An algorithm for encryption or decryption (6)Keeping data safe from unauthorized access (6)The practice of protecting networks and data (11)...

CyberSecurity 2025-05-19

CyberSecurity crossword puzzle
Across
  1. Malware that disguises itself as legitimate software (6)
  2. A team or center that monitors and defends against cyber threats (3)
  3. A person who gains unauthorized access to systems (6)
  4. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity (8)
  5. Software update to fix vulnerabilities (5)
  6. Malicious code that replicates itself by attaching to files (5)
  7. Malware that encrypts files and demands payment to restore access (10)
Down
  1. Technique used to convert data into unreadable form for security (10)
  2. A network of infected devices used for cyber attacks (6)
  3. Software that secretly gathers user information without consent (7)
  4. Security system that monitors and controls incoming and outgoing network traffic (8)
  5. Security method requiring multiple verification steps (3)

12 Clues: Software update to fix vulnerabilities (5)A person who gains unauthorized access to systems (6)Malware that disguises itself as legitimate software (6)A network of infected devices used for cyber attacks (6)Security method requiring multiple verification steps (3)Malicious code that replicates itself by attaching to files (5)...

Cybersecurity Terms 2017-05-29

Cybersecurity Terms crossword puzzle
Across
  1. Warfare with a physical element such as shooting people, dropping bombs, and other physical attacks.
  2. "Good” hackers who use their tools for the public good – this can include identifying security holes.
  3. Executable programs, or programs that cause a computer to perform a task, that is bad. What it does can vary, but usually it will try to remain hidden and perform a malicious action. It will also usually attempt to replicate itself and infect other systems.
  4. The most common type of Industrial Control System.
  5. Tiny computers that allow us to digitize processes
  6. A person or company selling something
  7. A person who uses computers to gain unauthorized access to data.
  8. A network of private computers infected with malware and controlled as a group without the owners' knowledge. The word comes from the combination of “robot” and “network.”
  9. Usually means the use of ICT to aid in development projects.
  10. The process that decides whether a vulnerability will be stockpiled or given to the vendor responsible for the product.
  11. A security hole in software that the vendor does not know about.
  12. Can do all kinds of things. For example, give someone the ability to spy on you, steal your data, gain a backdoor into your system. Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves
  13. Code attackers use to exploit a software problem.
  14. Something that uses a combo of tactics (also can include social engineering).
  15. Getting someone to give up confidential or personal information by tricking them into telling you freely.
  16. Software that can do a number of things, such as disrupt the normal operations of computers, steal information, gain access to a system, sabotage the system.
  17. A security hole in software
  18. Malware that installs covertly on a victim's device usually encrypting everything and refusing to decrypt it unless a ransom is paid.
  19. An email that are designed to appear to be from someone the recipient knows and trusts and can include a subject line or content that is specifically tailored to the victim’s known interests or industry.
  20. Hackers who use multiple phases to break into a network, avoid detection, and harvest valuable information over the long term.
  21. A team of experts who manage computer emergencies. Usually government based initiatives. Often used as a baseline for understanding a country’s cybersecurity readiness.
Down
  1. Hackers with malicious intentions working to steal, exploit, and sell data. They are usually motivated by personal gain.
  2. A program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
  3. Electronic wallet services that allow users to store, send, and receive money using mobile phones. It is often used in places without banking infrastructure and is a common tool for remittances.
  4. Can either work for the public good or for their own gain.
  5. Used in industrial production - a way to automate the process of receiving data from remote stations and then issue supervisory commands.
  6. Generally anything that stores, retrieves, manipulates, transmits, information electronically in a digital form. Computers, smart phones, software, etc.
  7. Under DHS, created in 2015, meant to fill the gaps where ISACs don’t exist
  8. Independent actors working to accomplish political or social change through the use of hacking or other related techniques such as DDOS. Hacker + activist.
  9. 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.
  10. An attempt to make a machine or other resource unavailable to valid users. An actor will flood the targeted resource with requests to overload the system and make it crash.
  11. Sector specific organizations meant to collect, analyze, and disseminate threat information to their members.
  12. First known case of a cyberweapon impacting physical infrastructure. It was created by the US and Israeli governments to target the Iranian nuclear facility Natanz.
  13. Where the requests come from a variety of sources. Activists and cybercriminals use this technique. Activists argue it is the equivalent of an online “sit-in.”
  14. It’s phishing, but with a high level target such as an executive or, John Podesta.
  15. Separation of your network from others, particularly the public Internet.
  16. Basically something that is there logging what you are doing and sending it back to the person who initiated the attack.
  17. The practice of sending emails meant to get people to reveal personal information, such as passwords and credit card numbers.

38 Clues: A security hole in softwareA person or company selling somethingCode attackers use to exploit a software problem.The most common type of Industrial Control System.Tiny computers that allow us to digitize processesCan either work for the public good or for their own gain.Usually means the use of ICT to aid in development projects....

Cybersecurity Terms 2023-09-10

Cybersecurity Terms crossword puzzle
Across
  1. The act of being in accordance with established guidelines.
  2. When someone is using another person's information maliciously.
  3. A security method that encodes data to make it more secure.
  4. A valuable tool for developing applications.
  5. A group of connected computers that share user account information and a security policy.
  6. This must be protected from unauthorized access.
  7. A special computer designed for technical or scientific applications.
  8. Establishing something as genuine.
  9. In technology, this means maintaining hardware and software.
  10. Relating to software,a company that develops and sells products.
Down
  1. Programs on hardware.
  2. When you open a malicious email or text that is disguised as a legitimate one.
  3. A service that provides technology-related help.
  4. A type of secure connection.
  5. A type of coverage that insures in case of a cyber attack.
  6. When data is stolen from a system without the system's owner noticing.
  7. A string of letters, numbers, and/or symbols used for verifying identity.
  8. A person who commits fraud and/or is involved in fraudulent schemes.
  9. Malicious software that holds data hostage until a ransom is paid.
  10. Disguising an unknown source as a known source.

20 Clues: Programs on hardware.A type of secure connection.Establishing something as genuine.A valuable tool for developing applications.Disguising an unknown source as a known source.A service that provides technology-related help.This must be protected from unauthorized access.A type of coverage that insures in case of a cyber attack....

Cybersecurity Crossword 2023-11-17

Cybersecurity Crossword crossword puzzle
Across
  1. a collection of networks that communicate with one another
  2. A unique number that identifies a computer, and it is used to send messages and receive responses when visiting a website
  3. The first wide-area packet-switched network with distributed control and one of the first computer networks to implement the TCP/IP protocol suite
  4. A
  5. Criminal activity that involves the use of computers or networks such as the internet
  6. An unauthorized user who attempts to or gains access to an information system
  7. A well-known set of rules and standards that allow reliable communication between networks and network devices
  8. A global network of computers using internet protocol (IP) to communicate globally via switches and routers
  9. Smallest unit of data in a computer
Down
  1. Two or more computers that are linked in order to share resources
  2. Wireless networking technology that allows devices to interface with the Internet
  3. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
  4. a communications protocol primarily used for establishing low-latency and loss-tolerant connections between applications on the internet, typically used for video streaming
  5. and deliberate attempt to breach an information system
  6. An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
  7. Device or software application that requests services from a server
  8. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation
  9. A protocol that specifies how data is exchanged over the internet by providing end-to-end communications that identify how it should be broken into packets, addressed, transmitted, routed and received at the destination
  10. A networking device that forwards data packets between computer networks
  11. Resolves the common names of Web sites with their underlying IP addresses, adding efficiency and even security in the process

20 Clues: ASmallest unit of data in a computerand deliberate attempt to breach an information systema collection of networks that communicate with one anotherTwo or more computers that are linked in order to share resourcesDevice or software application that requests services from a server...

Cybersecurity Terms 2024-08-07

Cybersecurity Terms crossword puzzle
Across
  1. an identity and access management security method that requires two forms of identification to access resources and data
  2. an arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet
  3. a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages
  4. any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
  5. software and operating system (OS) updates that address security vulnerabilities within a program or product
  6. the act of disguising a communication from an unknown source as being from a known, trusted source
  7. the process of converting information or data into a code, especially to prevent unauthorized access
  8. a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network
  9. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
  10. the collection of secure information and communication techniques employing mathematical concepts and algorithms used to disguise the content of messages
  11. a typically covert method of bypassing normal authentication or encryption in a computer
  12. any piece of software or application that displays advertisements, usually through pop-up or pop-under windows
  13. an ethical hacker whose job involves hacking into computer systems to detect security risks
  14. a type of malware program that enables cyber criminals to gain access to and infiltrate data from machines without being detected
Down
  1. the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information
  2. a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
  3. a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware
  4. a program designed to breach the security of a computer system while ostensibly performing some innocuous function
  5. a type of malicious software designed to block access to a computer system until a sum of money is paid
  6. a form of malware or hardware that keeps track of and records your keystrokes as you type
  7. a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys
  8. verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
  9. a program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself
  10. an attack in which an attacker is positioned between two communicating parties in order to intercept and/or alter data traveling between them
  11. a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system

25 Clues: a typically covert method of bypassing normal authentication or encryption in a computera form of malware or hardware that keeps track of and records your keystrokes as you typean ethical hacker whose job involves hacking into computer systems to detect security risks...

Cybersecurity Crossword 2024-09-03

Cybersecurity Crossword crossword puzzle
Across
  1. the practice of securing information and communication through writing and solving codes
  2. a code that gives you access to a site
  3. a group of connected computers
  4. cyberattack that fools people into revealing personal info
  5. a type of cryptocurrency that is well-known
  6. malware that tricks users by thinking they are clicking safe links
  7. software that holds your data hostage in return for something they want
  8. network of compromised computers used in a cyberattack
  9. manipulated media images usually used to scam people
  10. a program that encrypts your internet traffic by scrambling your IP address
  11. method of scrambling data, only an authorized user can use
  12. a string of numbers used to identify a computer
  13. a person who infiltrates a computer
  14. a place where data can be stored but it is not on an internal hard drive
Down
  1. software that infects and destroys computers' data
  2. software used to detect, prevent, and remove malware
  3. computerized intelligence that forms to make and execute life-like decisions
  4. an unintended hardware or software problem
  5. an attack on somebody in a digital way of force
  6. the act of data being leaked from a source
  7. a set of software tools that gives user access without being detected
  8. malware that collects and transmits your private data

22 Clues: a group of connected computersa person who infiltrates a computera code that gives you access to a sitean unintended hardware or software problemthe act of data being leaked from a sourcea type of cryptocurrency that is well-knownan attack on somebody in a digital way of forcea string of numbers used to identify a computer...

Cybersecurity Crossword 2021-05-06

Cybersecurity Crossword crossword puzzle
Across
  1. The use of ____ off-the-shelf products have weakened security of ICS.
  2. Network device designed to control the flow of traffic between networks.
  3. Support component that contributes to ICS vulnerabilities.
  4. Total amount of loss or damage that can be expected from a successful attack
  5. Four-step process of taking action to reduce or eliminate risk.
  6. Doing ____ is not a viable option for securing ICS.
  7. has led to workforce downsizing and cost reducing measures in ICS.
  8. Intrusion, attack, and ____ are the three stages of an attack.
  9. The majority of attackers are _____.
Down
  1. Weakness in a system that can be exploited.
  2. The equation for ____ is threat x vulnerability x consequence
  3. A copy of your password should NOT be left on your ___.
  4. _____ should be at least 8 alphanumeric characters long.
  5. The most common social engineering method.
  6. The possibility for an insider with authorized access or understanding of an organization to use that access or knowledge to harm that organization.
  7. Along with intent and opportunity, ____ is needed for threats to succeed.
  8. 22% of breaches involved some form of ___ ___.
  9. ____% of attacks are financially motivated.
  10. _____ is rummaging through business or residential trash for the purpose of finding useful information.
  11. An attack that is used to make computer resources unavailable.
  12. Malicious software.

21 Clues: Malicious software.The majority of attackers are _____.The most common social engineering method.Weakness in a system that can be exploited.____% of attacks are financially motivated.22% of breaches involved some form of ___ ___.Doing ____ is not a viable option for securing ICS.A copy of your password should NOT be left on your ___....

Cybersecurity crossword 2022-05-18

Cybersecurity crossword crossword puzzle
Across
  1. company security policy that allows for employees’ personal devices to be used in business.
  2. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others
  3. malware that functions by spying on user activity without their knowledge.
  4. technology that allows access to files/services through the internet from anywhere in the world.
  5. acronym that stands for distributed denial of service – a form of cyber attack.
  6. malicious application or script that can be used to take advantage of a computer’s vulnerability.
  7. A piece of malware that often allows a hacker to gain remote access to a computer through a back door
  8. software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer
  9. udio or video clip that has been edited and manipulated to seem real or believable
  10. internet version of a home address for your computer
  11. hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
  12. defensive technology designed to keep the bad guys out
  13. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and networ
  14. umbrella term that describes all forms of malicious software
  15. tool that allows the user to remain anonymous while using the internet
  16. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
Down
  1. malware that allows cybercriminals to remotely control your computer.
  2. technique used to manipulate and deceive people to gain sensitive and private information
  3. form of malware that deliberately prevents you from accessing files on your computer – holding your data hostag
  4. group of computers, printers and devices that are interconnected and governed as a whole
  5. set of programs that tell a computer to perform a task
  6. Breaches the network to gain sensitive information with the owner’s consent
  7. this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
  8. technique used by hackers to obtain sensitive information.
  9. piece of malware that can replicate itself in order to spread the infection to other connected computers

25 Clues: internet version of a home address for your computerset of programs that tell a computer to perform a taskdefensive technology designed to keep the bad guys outtechnique used by hackers to obtain sensitive information.umbrella term that describes all forms of malicious softwaremalware that allows cybercriminals to remotely control your computer....

Cybersecurity Puzzle 2025-03-11

Cybersecurity Puzzle crossword puzzle
Across
  1. Self-replicating malicious software
  2. Fixes security vulnerabilities
  3. Acts as an intermediary server
  4. Fake emails to steal info
  5. Attack using trial and error
  6. Program that spreads and harms
  7. Remote storage and computing
  8. Harmful software for attacks
  9. Access to an account or system
  10. Device used for entering codes
  11. Payment demanded for files
  12. Secretly monitors user activity
Down
  1. Superuser access level
  2. Method for encrypting information
  3. Disguised harmful software
  4. Protection against cyber threats
  5. Secret entry point for attacks
  6. Permission to use a system
  7. Unauthorized access to systems
  8. Encrypts data for protection

20 Clues: Superuser access levelFake emails to steal infoDisguised harmful softwarePermission to use a systemPayment demanded for filesAttack using trial and errorRemote storage and computingHarmful software for attacksEncrypts data for protectionFixes security vulnerabilitiesActs as an intermediary serverProgram that spreads and harms...

Cybersecurity 2023 2023-10-18

Cybersecurity 2023 crossword puzzle
Across
  1. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  2. A security process that uses an additional factor for verification is called "______-Factor Authentication"
  3. An individual that is authorized to access a system
  4. A _____ email falsely claims to be from a legitimate source, usually with a threat or request for information
  5. Designed to detect and destroy computer viruses
  6. Junk email
  7. Your digital ______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  8. The gaining of unauthorized access to data in a system or computer
  9. Converting information and data into code to protect unauthorized access to sensitive data
  10. Tech used to keep intruders out
  11. Online harassment
  12. A set of changes that fix or improve a software or application
Down
  1. Cybersecurity awareness month
  2. Weakness in a system
  3. A sequence of words used for authentication
  4. Storage for infected files and emails
  5. The fraudulent practice of sending a text message impersonating the head of school in order to induce individuals to reveal personal information or purchase a gift card
  6. Software demanding money to unlock personal information
  7. Uses hand, voice and face recognition
  8. A piece of software that allows a user to remain anonymous while using the internet by masking the location and encrypting traffic
  9. _____ settings help control things like your profile, contact, and other information relating to your account
  10. Bring Your Own Device

22 Clues: Junk emailOnline harassmentWeakness in a systemBring Your Own DeviceCybersecurity awareness monthTech used to keep intruders outStorage for infected files and emailsUses hand, voice and face recognitionA sequence of words used for authenticationDesigned to detect and destroy computer virusesAn individual that is authorized to access a system...

Cybersecurity puzzle 2023-12-04

Cybersecurity puzzle crossword puzzle
Across
  1. A common tactic in scams, creating a sense of immediate action needed.
  2. Online harassment that can breach your mental health
  3. Malware that encrypts files, demanding payment for decryption.
  4. A scam method using emails to trick users into revealing personal information
  5. The process of confirming a user's identity in a security system.
  6. A general term for deceitful practices to gain financial or personal gain.
  7. adding a unique string to a password before hashing it for added security.
  8. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  9. A safer payment method for online purchases due to fraud protection.
  10. A type of malware that attaches itself to programs and corrupts or modifies files.
  11. Data-tracking files that should be disabled to enhance online privacy
  12. Deceptive malware appearing legitimate, often giving remote access to cybercriminals.
Down
  1. A method where hardware is used to record keystrokes and steal passwords.
  2. Malware that secretly observes the user's actions.
  3. Company that mitigated a record-breaking cyberattack, underlining the need for robust online defenses.
  4. Platform where the Python application gateway for malware was distributed, highlighting vigilance in downloading software.
  5. Everything you do on the internet that stays with you, even when you turn off your devices
  6. Harmful software that scammers might install through tech support scams.
  7. Name of the group associated with the intrusion into cryptocurrency platforms, showing the importance of caution with software downloads.
  8. Autonomous malware that replicates and spreads through network vulnerabilities.
  9. Software designed to detect and remove malicious software like viruses and malware.
  10. A popular brand of antivirus software.
  11. Using more than one method of authentication for enhanced security.
  12. When personal information is accessed and stolen by unauthorized individuals
  13. The method of converting passwords into gibberish to protect them in password files.
  14. A tool that encrypts internet traffic and masks IP addresses for enhanced online privacy.

26 Clues: A popular brand of antivirus software.Malware that secretly observes the user's actions.Online harassment that can breach your mental healthMalware that encrypts files, demanding payment for decryption.The process of confirming a user's identity in a security system.Using more than one method of authentication for enhanced security....

Cybersecurity Practices 2024-10-07

Cybersecurity Practices crossword puzzle
Across
  1. | A security measure that requires more than one form of verification.
  2. | An attempt to steal personal information by pretending to be a trustworthy entity.
  3. | A software update that fixes security vulnerabilities.
  4. | Software designed to detect and remove malware.
  5. | A vulnerability that is exploited before it is publicly known or patched.
  6. | A network of infected devices used in cyber attacks.
  7. | A type of malware that records keystrokes to steal sensitive information.
  8. Breach | The unauthorized release of confidential information.
  9. | The process of converting data into a code to prevent unauthorized access.
  10. Engineering | Manipulating people into giving up confidential information.
  11. | A type of malware that demands payment to restore data.
  12. | A security system that monitors and controls incoming and outgoing network traffic.
  13. | Software that is harmful to a computer system.
Down
  1. | An attack that overwhelms a system by sending an excessive amount of requests.
  2. | A weakness in a system that can be exploited by a cyber attacker.
  3. | An attempt to damage or disrupt a computer system or network.
  4. | The process of verifying the identity of a user or device.
  5. | A decoy system set up to attract cyber attackers and study their behavior.
  6. | Malware disguised as legitimate software.
  7. | Software that gathers user information without their knowledge.

20 Clues: | Malware disguised as legitimate software.| Software that is harmful to a computer system.| Software designed to detect and remove malware.| A network of infected devices used in cyber attacks.| A software update that fixes security vulnerabilities.| A type of malware that demands payment to restore data....

Cybersecurity Crossword 2024-03-15

Cybersecurity Crossword crossword puzzle
Across
  1. social engineering to steal data
  2. Hacker that attacks for self-interests
  3. malware designed to acquire money
  4. malicious software
  5. malware that changes and corrupts
  6. convert encrypted data to plain text
  7. monitors network traffic
  8. 2+ computers sharing resources
  9. network of computers for attacks
  10. seemingly harmless malware for infection
  11. unauthorized access to a system
  12. process of identifying a user
Down
  1. internet protocol address
  2. Hacker that defends others
  3. malware that's designed for monitoring
  4. leverage a vulnerability for cyberattack
  5. testing system without prior information
  6. gaining as much info before penetration
  7. gathering of hackers for practice
  8. flood bandwidth of targeted system

20 Clues: malicious softwaremonitors network trafficinternet protocol addressHacker that defends othersprocess of identifying a user2+ computers sharing resourcesunauthorized access to a systemsocial engineering to steal datanetwork of computers for attacksmalware designed to acquire moneymalware that changes and corruptsgathering of hackers for practice...

Cybersecurity 101 2025-08-29

Cybersecurity 101 crossword puzzle
Across
  1. Program that fight bugs
  2. files saved on computers
  3. Save copy of device data
  4. bad software affecting computers
  5. Fake email asking for info
  6. secret code to access data
  7. hackers asking for money
  8. Software that discreetly watches you
  9. New version of software
  10. clickable website address
Down
  1. wireless internet connection
  2. code + password
  3. secret word to log in
  4. online mail version
  5. signing out of an account
  6. Individual who breaks into computers
  7. Hides internet location
  8. blocks internet traffic
  9. online storage space
  10. junk email

20 Clues: junk emailcode + passwordonline mail versiononline storage spacesecret word to log inProgram that fight bugsHides internet locationblocks internet trafficNew version of softwarefiles saved on computersSave copy of device datahackers asking for moneysigning out of an accountclickable website addressFake email asking for info...