cybersecurity Crossword Puzzles

Cybersecurity 2022-11-28

Cybersecurity crossword puzzle
Across
  1. Code that replicates itself
  2. Someone who tries to take your data online
  3. Replicating code that moves through your network
  4. Software that appears useful but is not
  5. Forced advertisement
  6. Safety online
Down
  1. Something that might harm your computer
  2. Tricking someone into giving you data
  3. Unwanted software that reads your data
  4. Someone who is young and "testing out their skills" online
  5. A scam that holds your money hostage
  6. Infectious software

12 Clues: Safety onlineInfectious softwareForced advertisementCode that replicates itselfA scam that holds your money hostageTricking someone into giving you dataUnwanted software that reads your dataSomething that might harm your computerSoftware that appears useful but is notSomeone who tries to take your data online...

Cybersecurity 2023-04-01

Cybersecurity crossword puzzle
Across
  1. Cyber criminals find and use these ______ for their malicious intents.
  2. The magic number of characters for a strong password
  3. _____ knowledge of recent threats as well as softwares
  4. A Strong ______ ensure security by making it harder to access your accounts
  5. Using uppercase and lowercase, numbers and symbols to add _______ in your passwords
  6. Most users interact with their mobile devices more often than computers.
Down
  1. Software that eliminates and mitigates malicious software
  2. Computer _____ are a type of malware meant to damage a computer by corrupting or destroying data
  3. Type of security when surfing the ____
  4. Process of converting data into an unreadable form for data protection.
  5. Do not include your ______ in your passwords such as your name or birthdate
  6. Do not _____ your password with others

12 Clues: Type of security when surfing the ____Do not _____ your password with othersThe magic number of characters for a strong password_____ knowledge of recent threats as well as softwaresSoftware that eliminates and mitigates malicious softwareCyber criminals find and use these ______ for their malicious intents....

fop 2023-04-03

fop crossword puzzle
Across
  1. 13
  2. 9
  3. 6
  4. 2
  5. 8
  6. 11
  7. 12
  8. 3
Down
  1. 15
  2. 5
  3. 14
  4. 1
  5. 4
  6. 10
  7. 7

15 Clues: 514962783151314101112

Cybersecurity 2022-11-16

Cybersecurity crossword puzzle
Across
  1. Responsible for designing, building, testing, and implementing security infrastructure and security systems for the organization they work for.
  2. The Sarbanes Oxly Act covers which type of activity?
  3. Measures designed to deter, prevent, detect or alert unauthorized real-world access to a site or material item.
  4. Defined as an intense and selfish desire for something, especially wealth or power.
  5. Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
  6. One common error when considering people in Cybersecurity is using TRUST instead of
  7. In a cryptosystem, Alice and Bob both use the same key value to communicate with each other.
Down
  1. Falsifying header information is a serious violation of the _ Act.
  2. Computer and Abuse in cyber law, which act is most frequently used to create the crime of Computer Trespass?
  3. Allows the user to determine how to trust the keys, so its a trust model.
  4. Financial regulations
  5. Mark sends an email to John, but says it is from the Boss, Tim. This is a loss of?

12 Clues: Financial regulationsThe Sarbanes Oxly Act covers which type of activity?Falsifying header information is a serious violation of the _ Act.Allows the user to determine how to trust the keys, so its a trust model.Defined as an intense and selfish desire for something, especially wealth or power....

Cybersecurity 2023-03-11

Cybersecurity crossword puzzle
Across
  1. Is an encrypted connection over the Internet from a device to a network
  2. Is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of internet security weaknesses
  3. A form of malware that hijacks your system and encrypts your files, denying you access to them until you send money to unlock everything
  4. A form of malware used by hackers to spy on you and your computer activities
  5. A scam where a hacker poses as a legitimate business or organization in order to fool the victim into giving them sensitive personal information
  6. A portmanteau of “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system
Down
  1. While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking
  2. Malware which changes, corrupts, or destroys information, and is then passed on to other systems
  3. Yet another form of malware, this one a misleading computer program that looks innocent, but in fact allows the hacker into your system via a back door.
  4. A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data
  5. Any technology, be it software or hardware, used to keep intruders out
  6. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network

12 Clues: Any technology, be it software or hardware, used to keep intruders outIs an encrypted connection over the Internet from a device to a networkA form of malware used by hackers to spy on you and your computer activitiesMalware which changes, corrupts, or destroys information, and is then passed on to other systems...

Cybersecurity 2023-09-07

Cybersecurity crossword puzzle
Across
  1. Once hijackers obtain your personal details, they can make _______ transactions.
  2. This is the protection of computers from information theft.
  3. Turning on two-step ____ in whatsapp is advisable.
  4. Stay calm and do not reveal any personal _____.
  5. What are @, $, &, % called?
Down
  1. Always enable ____ updates for whatsapp.
  2. Only visit websites that feature a _____ icon.
  3. In whatsapp, to go to Fingerprint lock, you need to select _____.
  4. Use only _____ websites.
  5. Always alert a _____ adult if you are unsure.
  6. One of the most common types of cyberattacks are ____ attacks.
  7. One of the strong passwords.

12 Clues: Use only _____ websites.What are @, $, &, % called?One of the strong passwords.Always enable ____ updates for whatsapp.Always alert a _____ adult if you are unsure.Only visit websites that feature a _____ icon.Stay calm and do not reveal any personal _____.Turning on two-step ____ in whatsapp is advisable....

December 2020 Crossword Puzzle Answer Key 2020-12-01

December 2020 Crossword Puzzle Answer Key crossword puzzle
Across
  1. An unsecure network where you can connect to the internet such as from a café
  2. a popular tool for hosting video calls
  3. All commercial transactions conducted electronically on the internet
  4. The Cybersecurity project that pulled Forest Service out of a material weakness
  5. The top method of cyberattack that most attacks begin with usually via email
  6. Educating management on the potential threats of unsecure systems
  7. The 3 core tenants of cybersecurity include confidentiality, integrity, and…
Down
  1. Who can be a target of a cyberattack?
  2. A site that cybercriminals create to steal your information
  3. Any software, hardware, or systems that cybersecurity is not aware of
  4. The country where most of the fake and fraudulent ecommerce sites are coming from

11 Clues: Who can be a target of a cyberattack?a popular tool for hosting video callsA site that cybercriminals create to steal your informationEducating management on the potential threats of unsecure systemsAll commercial transactions conducted electronically on the internetAny software, hardware, or systems that cybersecurity is not aware of...

Cyber1 2023-01-27

Cyber1 crossword puzzle
Across
  1. Award-winning cybersecurity startup in Portland, ME
  2. Vanilla flavored programming language of choice
  3. AKA Software as a Service
  4. Modern runtime environment, rhymes with "code"
  5. Relational and ephemeral
Down
  1. White hot tech sector
  2. Today's flexible workforce; preferred by many
  3. Seasoned developer, front to back
  4. Code ninja and solver of problems
  5. A great place to live and work
  6. AKA Small and Midsized Businesses
  7. AKA Application Programming Interface

12 Clues: White hot tech sectorRelational and ephemeralAKA Software as a ServiceA great place to live and workSeasoned developer, front to backCode ninja and solver of problemsAKA Small and Midsized BusinessesAKA Application Programming InterfaceToday's flexible workforce; preferred by manyModern runtime environment, rhymes with "code"...

Cybersecurity 2022-07-08

Cybersecurity crossword puzzle
Across
  1. A basic security feature that protects your network by acting as an intermediary between your internal network and outside traffic. It monitors attempts to gain access to your operating system and blocks unwanted incoming traffic and unrecognized sources
  2. Type of assessments that are the cornerstone of every program for cybersecurity
  3. A basic security software used to prevent, scan, detect and delete viruses from a computer
  4. Protecting information is vital for the normal functioning of organizations
  5. Is an advanced security control that reduces the chance of it being stolen
Down
  1. Systems that are no longer supported by the manufacturer
  2. is a significant threat to the confidentiality, integrity and availability of information
  3. A key stakeholder that may not recognize how to securely communicate with their provider
  4. The abbreviation of a federal requirement restricting electronic transmission of health information
  5. Type of phishing email specific employee within an organization
  6. Most significant security incident
  7. This stakeholder may have lax security policies compromising your system

12 Clues: Most significant security incidentSystems that are no longer supported by the manufacturerType of phishing email specific employee within an organizationThis stakeholder may have lax security policies compromising your systemIs an advanced security control that reduces the chance of it being stolen...

CyberSecurity 2022-11-28

CyberSecurity crossword puzzle
Across
  1. these replicate themselves but do not attach themselves to files as a virus does.
  2. a cyberattack in which multiple devices make a network resource unavailable to its intended users.
  3. software that is designed to gain access to your computer with bad intent.
  4. the term for when human users of a system are tricked into providing confidential information
  5. a large collection of malware-infected devices
Down
  1. hackers who use tools downloaded from the internet that allow them to hack with little technical knowledge.
  2. a key to a website or account.
  3. unwanted software that monitors and gathers information on a person and how they use their computer.
  4. can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
  5. a piece of software that appears to perform a useful function, but it also performs malicious actions.
  6. self replicating software.
  7. Something that checks incoming and outgoing network traffic.

12 Clues: self replicating software.a key to a website or account.a large collection of malware-infected devicesSomething that checks incoming and outgoing network traffic.software that is designed to gain access to your computer with bad intent.these replicate themselves but do not attach themselves to files as a virus does....

CYBERSECURITY 2017-04-13

CYBERSECURITY crossword puzzle
Across
  1. information
  2. software that is secretly installed into a system
  3. capability to limit network traffic between networks
  4. measures to reduce the likelihood of an unwanted occurence
  5. software that tracks keystrokes and keyboard events
Down
  1. the abuse of email to send unsolicited bulk messages
  2. a person who breaks into a computer or network
  3. a program that can infect a computer and spread to another computer
  4. a string of characters used to verify access authorization
  5. the process of transforming plaintext into cipher text
  6. software that compromises the operation of a system
  7. self replicating program that uses networking mechanisms to spread itself

12 Clues: informationa person who breaks into a computer or networksoftware that is secretly installed into a systemsoftware that compromises the operation of a systemsoftware that tracks keystrokes and keyboard eventsthe abuse of email to send unsolicited bulk messagescapability to limit network traffic between networks...

Cybersecurity 2023-03-30

Cybersecurity crossword puzzle
Across
  1. / Harmful computer program
  2. / Secret characters for authentication
  3. / Strong, unique password practice
  4. / Encoding information for authorized access only
  5. / Fraudulent emails to get personal information
  6. / Cyberattack encrypting data for ransom
Down
  1. / Software protecting against viruses
  2. / Fake website or email to deceive users
  3. / Method requiring multiple evidence for identity
  4. / Gaining unauthorized system access
  5. / Settings controlling information visibility
  6. / Network of infected computers controlled unknowingly

12 Clues: / Harmful computer program/ Strong, unique password practice/ Gaining unauthorized system access/ Software protecting against viruses/ Secret characters for authentication/ Fake website or email to deceive users/ Cyberattack encrypting data for ransom/ Settings controlling information visibility/ Fraudulent emails to get personal information...

Cybersecurity 2023-04-28

Cybersecurity crossword puzzle
Across
  1. influencing or deceiving a victim in order to gain control
  2. self replicate other computers
  3. thieves attempt to steal personal info
  4. looking at information over a shoulder
  5. use of own knowledge to secure organzinations
  6. steals anything they want
Down
  1. processing data by the computer
  2. non-threatening traffic in to keep dangerous stuff out
  3. inventing a specific scenario
  4. unintentional actions
  5. robot network
  6. form that is efficient for movement or processing

12 Clues: robot networkunintentional actionssteals anything they wantinventing a specific scenarioself replicate other computersprocessing data by the computerthieves attempt to steal personal infolooking at information over a shoulderuse of own knowledge to secure organzinationsform that is efficient for movement or processing...

Cybersecurity 2023-09-13

Cybersecurity crossword puzzle
Across
  1. Cyber criminals find and use these ______ for their malicious intents.
  2. The magic number of characters for a strong password
  3. _____ knowledge of recent threats as well as softwares
  4. A Strong ______ ensure security by making it harder to access your accounts
  5. Using uppercase and lowercase, numbers and symbols to add _______ in your passwords
  6. Most users interact with their mobile devices more often than computers.
Down
  1. Software that eliminates and mitigates malicious software
  2. Computer _____ are a type of malware meant to damage a computer by corrupting or destroying data
  3. Type of security when surfing the ____
  4. Process of converting data into an unreadable form for data protection.
  5. Do not include your ______ in your passwords such as your name or birthdate
  6. Do not _____ your password with others

12 Clues: Type of security when surfing the ____Do not _____ your password with othersThe magic number of characters for a strong password_____ knowledge of recent threats as well as softwaresSoftware that eliminates and mitigates malicious softwareCyber criminals find and use these ______ for their malicious intents....

Cybersecurity Terms 2017-05-29

Cybersecurity Terms crossword puzzle
Across
  1. Warfare with a physical element such as shooting people, dropping bombs, and other physical attacks.
  2. "Good” hackers who use their tools for the public good – this can include identifying security holes.
  3. Executable programs, or programs that cause a computer to perform a task, that is bad. What it does can vary, but usually it will try to remain hidden and perform a malicious action. It will also usually attempt to replicate itself and infect other systems.
  4. The most common type of Industrial Control System.
  5. Tiny computers that allow us to digitize processes
  6. A person or company selling something
  7. A person who uses computers to gain unauthorized access to data.
  8. A network of private computers infected with malware and controlled as a group without the owners' knowledge. The word comes from the combination of “robot” and “network.”
  9. Usually means the use of ICT to aid in development projects.
  10. The process that decides whether a vulnerability will be stockpiled or given to the vendor responsible for the product.
  11. A security hole in software that the vendor does not know about.
  12. Can do all kinds of things. For example, give someone the ability to spy on you, steal your data, gain a backdoor into your system. Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves
  13. Code attackers use to exploit a software problem.
  14. Something that uses a combo of tactics (also can include social engineering).
  15. Getting someone to give up confidential or personal information by tricking them into telling you freely.
  16. Software that can do a number of things, such as disrupt the normal operations of computers, steal information, gain access to a system, sabotage the system.
  17. A security hole in software
  18. Malware that installs covertly on a victim's device usually encrypting everything and refusing to decrypt it unless a ransom is paid.
  19. An email that are designed to appear to be from someone the recipient knows and trusts and can include a subject line or content that is specifically tailored to the victim’s known interests or industry.
  20. Hackers who use multiple phases to break into a network, avoid detection, and harvest valuable information over the long term.
  21. A team of experts who manage computer emergencies. Usually government based initiatives. Often used as a baseline for understanding a country’s cybersecurity readiness.
Down
  1. Hackers with malicious intentions working to steal, exploit, and sell data. They are usually motivated by personal gain.
  2. A program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
  3. Electronic wallet services that allow users to store, send, and receive money using mobile phones. It is often used in places without banking infrastructure and is a common tool for remittances.
  4. Can either work for the public good or for their own gain.
  5. Used in industrial production - a way to automate the process of receiving data from remote stations and then issue supervisory commands.
  6. Generally anything that stores, retrieves, manipulates, transmits, information electronically in a digital form. Computers, smart phones, software, etc.
  7. Under DHS, created in 2015, meant to fill the gaps where ISACs don’t exist
  8. Independent actors working to accomplish political or social change through the use of hacking or other related techniques such as DDOS. Hacker + activist.
  9. 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.
  10. An attempt to make a machine or other resource unavailable to valid users. An actor will flood the targeted resource with requests to overload the system and make it crash.
  11. Sector specific organizations meant to collect, analyze, and disseminate threat information to their members.
  12. First known case of a cyberweapon impacting physical infrastructure. It was created by the US and Israeli governments to target the Iranian nuclear facility Natanz.
  13. Where the requests come from a variety of sources. Activists and cybercriminals use this technique. Activists argue it is the equivalent of an online “sit-in.”
  14. It’s phishing, but with a high level target such as an executive or, John Podesta.
  15. Separation of your network from others, particularly the public Internet.
  16. Basically something that is there logging what you are doing and sending it back to the person who initiated the attack.
  17. The practice of sending emails meant to get people to reveal personal information, such as passwords and credit card numbers.

38 Clues: A security hole in softwareA person or company selling somethingCode attackers use to exploit a software problem.The most common type of Industrial Control System.Tiny computers that allow us to digitize processesCan either work for the public good or for their own gain.Usually means the use of ICT to aid in development projects....

Cybersecurity Crossword 2021-05-06

Cybersecurity Crossword crossword puzzle
Across
  1. The use of ____ off-the-shelf products have weakened security of ICS.
  2. Network device designed to control the flow of traffic between networks.
  3. Support component that contributes to ICS vulnerabilities.
  4. Total amount of loss or damage that can be expected from a successful attack
  5. Four-step process of taking action to reduce or eliminate risk.
  6. Doing ____ is not a viable option for securing ICS.
  7. has led to workforce downsizing and cost reducing measures in ICS.
  8. Intrusion, attack, and ____ are the three stages of an attack.
  9. The majority of attackers are _____.
Down
  1. Weakness in a system that can be exploited.
  2. The equation for ____ is threat x vulnerability x consequence
  3. A copy of your password should NOT be left on your ___.
  4. _____ should be at least 8 alphanumeric characters long.
  5. The most common social engineering method.
  6. The possibility for an insider with authorized access or understanding of an organization to use that access or knowledge to harm that organization.
  7. Along with intent and opportunity, ____ is needed for threats to succeed.
  8. 22% of breaches involved some form of ___ ___.
  9. ____% of attacks are financially motivated.
  10. _____ is rummaging through business or residential trash for the purpose of finding useful information.
  11. An attack that is used to make computer resources unavailable.
  12. Malicious software.

21 Clues: Malicious software.The majority of attackers are _____.The most common social engineering method.Weakness in a system that can be exploited.____% of attacks are financially motivated.22% of breaches involved some form of ___ ___.Doing ____ is not a viable option for securing ICS.A copy of your password should NOT be left on your ___....

Cybersecurity crossword 2022-05-18

Cybersecurity crossword crossword puzzle
Across
  1. company security policy that allows for employees’ personal devices to be used in business.
  2. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others
  3. malware that functions by spying on user activity without their knowledge.
  4. technology that allows access to files/services through the internet from anywhere in the world.
  5. acronym that stands for distributed denial of service – a form of cyber attack.
  6. malicious application or script that can be used to take advantage of a computer’s vulnerability.
  7. A piece of malware that often allows a hacker to gain remote access to a computer through a back door
  8. software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer
  9. udio or video clip that has been edited and manipulated to seem real or believable
  10. internet version of a home address for your computer
  11. hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
  12. defensive technology designed to keep the bad guys out
  13. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and networ
  14. umbrella term that describes all forms of malicious software
  15. tool that allows the user to remain anonymous while using the internet
  16. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
Down
  1. malware that allows cybercriminals to remotely control your computer.
  2. technique used to manipulate and deceive people to gain sensitive and private information
  3. form of malware that deliberately prevents you from accessing files on your computer – holding your data hostag
  4. group of computers, printers and devices that are interconnected and governed as a whole
  5. set of programs that tell a computer to perform a task
  6. Breaches the network to gain sensitive information with the owner’s consent
  7. this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
  8. technique used by hackers to obtain sensitive information.
  9. piece of malware that can replicate itself in order to spread the infection to other connected computers

25 Clues: internet version of a home address for your computerset of programs that tell a computer to perform a taskdefensive technology designed to keep the bad guys outtechnique used by hackers to obtain sensitive information.umbrella term that describes all forms of malicious softwaremalware that allows cybercriminals to remotely control your computer....

Cybersecurity Crossword 2023-11-17

Cybersecurity Crossword crossword puzzle
Across
  1. a collection of networks that communicate with one another
  2. A unique number that identifies a computer, and it is used to send messages and receive responses when visiting a website
  3. The first wide-area packet-switched network with distributed control and one of the first computer networks to implement the TCP/IP protocol suite
  4. A
  5. Criminal activity that involves the use of computers or networks such as the internet
  6. An unauthorized user who attempts to or gains access to an information system
  7. A well-known set of rules and standards that allow reliable communication between networks and network devices
  8. A global network of computers using internet protocol (IP) to communicate globally via switches and routers
  9. Smallest unit of data in a computer
Down
  1. Two or more computers that are linked in order to share resources
  2. Wireless networking technology that allows devices to interface with the Internet
  3. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
  4. a communications protocol primarily used for establishing low-latency and loss-tolerant connections between applications on the internet, typically used for video streaming
  5. and deliberate attempt to breach an information system
  6. An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
  7. Device or software application that requests services from a server
  8. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation
  9. A protocol that specifies how data is exchanged over the internet by providing end-to-end communications that identify how it should be broken into packets, addressed, transmitted, routed and received at the destination
  10. A networking device that forwards data packets between computer networks
  11. Resolves the common names of Web sites with their underlying IP addresses, adding efficiency and even security in the process

20 Clues: ASmallest unit of data in a computerand deliberate attempt to breach an information systema collection of networks that communicate with one anotherTwo or more computers that are linked in order to share resourcesDevice or software application that requests services from a server...

Cybersecurity Terms 2023-09-10

Cybersecurity Terms crossword puzzle
Across
  1. The act of being in accordance with established guidelines.
  2. When someone is using another person's information maliciously.
  3. A security method that encodes data to make it more secure.
  4. A valuable tool for developing applications.
  5. A group of connected computers that share user account information and a security policy.
  6. This must be protected from unauthorized access.
  7. A special computer designed for technical or scientific applications.
  8. Establishing something as genuine.
  9. In technology, this means maintaining hardware and software.
  10. Relating to software,a company that develops and sells products.
Down
  1. Programs on hardware.
  2. When you open a malicious email or text that is disguised as a legitimate one.
  3. A service that provides technology-related help.
  4. A type of secure connection.
  5. A type of coverage that insures in case of a cyber attack.
  6. When data is stolen from a system without the system's owner noticing.
  7. A string of letters, numbers, and/or symbols used for verifying identity.
  8. A person who commits fraud and/or is involved in fraudulent schemes.
  9. Malicious software that holds data hostage until a ransom is paid.
  10. Disguising an unknown source as a known source.

20 Clues: Programs on hardware.A type of secure connection.Establishing something as genuine.A valuable tool for developing applications.Disguising an unknown source as a known source.A service that provides technology-related help.This must be protected from unauthorized access.A type of coverage that insures in case of a cyber attack....

Cybersecurity 2023 2023-10-18

Cybersecurity 2023 crossword puzzle
Across
  1. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  2. A security process that uses an additional factor for verification is called "______-Factor Authentication"
  3. An individual that is authorized to access a system
  4. A _____ email falsely claims to be from a legitimate source, usually with a threat or request for information
  5. Designed to detect and destroy computer viruses
  6. Junk email
  7. Your digital ______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  8. The gaining of unauthorized access to data in a system or computer
  9. Converting information and data into code to protect unauthorized access to sensitive data
  10. Tech used to keep intruders out
  11. Online harassment
  12. A set of changes that fix or improve a software or application
Down
  1. Cybersecurity awareness month
  2. Weakness in a system
  3. A sequence of words used for authentication
  4. Storage for infected files and emails
  5. The fraudulent practice of sending a text message impersonating the head of school in order to induce individuals to reveal personal information or purchase a gift card
  6. Software demanding money to unlock personal information
  7. Uses hand, voice and face recognition
  8. A piece of software that allows a user to remain anonymous while using the internet by masking the location and encrypting traffic
  9. _____ settings help control things like your profile, contact, and other information relating to your account
  10. Bring Your Own Device

22 Clues: Junk emailOnline harassmentWeakness in a systemBring Your Own DeviceCybersecurity awareness monthTech used to keep intruders outStorage for infected files and emailsUses hand, voice and face recognitionA sequence of words used for authenticationDesigned to detect and destroy computer virusesAn individual that is authorized to access a system...

Cybersecurity puzzle 2023-12-04

Cybersecurity puzzle crossword puzzle
Across
  1. A common tactic in scams, creating a sense of immediate action needed.
  2. Online harassment that can breach your mental health
  3. Malware that encrypts files, demanding payment for decryption.
  4. A scam method using emails to trick users into revealing personal information
  5. The process of confirming a user's identity in a security system.
  6. A general term for deceitful practices to gain financial or personal gain.
  7. adding a unique string to a password before hashing it for added security.
  8. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  9. A safer payment method for online purchases due to fraud protection.
  10. A type of malware that attaches itself to programs and corrupts or modifies files.
  11. Data-tracking files that should be disabled to enhance online privacy
  12. Deceptive malware appearing legitimate, often giving remote access to cybercriminals.
Down
  1. A method where hardware is used to record keystrokes and steal passwords.
  2. Malware that secretly observes the user's actions.
  3. Company that mitigated a record-breaking cyberattack, underlining the need for robust online defenses.
  4. Platform where the Python application gateway for malware was distributed, highlighting vigilance in downloading software.
  5. Everything you do on the internet that stays with you, even when you turn off your devices
  6. Harmful software that scammers might install through tech support scams.
  7. Name of the group associated with the intrusion into cryptocurrency platforms, showing the importance of caution with software downloads.
  8. Autonomous malware that replicates and spreads through network vulnerabilities.
  9. Software designed to detect and remove malicious software like viruses and malware.
  10. A popular brand of antivirus software.
  11. Using more than one method of authentication for enhanced security.
  12. When personal information is accessed and stolen by unauthorized individuals
  13. The method of converting passwords into gibberish to protect them in password files.
  14. A tool that encrypts internet traffic and masks IP addresses for enhanced online privacy.

26 Clues: A popular brand of antivirus software.Malware that secretly observes the user's actions.Online harassment that can breach your mental healthMalware that encrypts files, demanding payment for decryption.The process of confirming a user's identity in a security system.Using more than one method of authentication for enhanced security....

Cybersecurity Crossword 2024-03-15

Cybersecurity Crossword crossword puzzle
Across
  1. social engineering to steal data
  2. Hacker that attacks for self-interests
  3. malware designed to acquire money
  4. malicious software
  5. malware that changes and corrupts
  6. convert encrypted data to plain text
  7. monitors network traffic
  8. 2+ computers sharing resources
  9. network of computers for attacks
  10. seemingly harmless malware for infection
  11. unauthorized access to a system
  12. process of identifying a user
Down
  1. internet protocol address
  2. Hacker that defends others
  3. malware that's designed for monitoring
  4. leverage a vulnerability for cyberattack
  5. testing system without prior information
  6. gaining as much info before penetration
  7. gathering of hackers for practice
  8. flood bandwidth of targeted system

20 Clues: malicious softwaremonitors network trafficinternet protocol addressHacker that defends othersprocess of identifying a user2+ computers sharing resourcesunauthorized access to a systemsocial engineering to steal datanetwork of computers for attacksmalware designed to acquire moneymalware that changes and corruptsgathering of hackers for practice...

Spanish 25 words 2021-04-30

Spanish 25 words crossword puzzle
Across
  1. Settings
  2. Cyber
  3. Commit
  4. Else
  5. Machine learning
  6. Integer
  7. If
  8. Function
  9. If else
  10. For loop
  11. Variable
  12. Print
  13. Loop
Down
  1. Sprite
  2. cybersecurity
  3. Autonomous
  4. nueral networks
  5. Uptime
  6. Tap
  7. Binary numbers
  8. Float
  9. Python
  10. While loop
  11. List
  12. Array

25 Clues: IfTapElseListLoopCyberFloatArrayPrintSpriteCommitUptimePythonIntegerIf elseSettingsFunctionFor loopVariableAutonomousWhile loopcybersecurityBinary numbersnueral networksMachine learning

December 2020 Crossword Puzzle 2020-12-01

December 2020 Crossword Puzzle crossword puzzle
Across
  1. An unsecure network where you can connect to the internet such as from a café
  2. a popular tool for hosting video calls
  3. All commercial transactions conducted electronically on the internet
  4. The Cybersecurity project that pulled Forest Service out of a material weakness
  5. The top method of cyberattack that most attacks begin with usually via email
  6. Educating management on the potential threats of unsecure systems
  7. The 3 core tenants of cybersecurity include confidentiality, integrity, and…
Down
  1. Who can be a target of a cyberattack?
  2. A site that cybercriminals create to steal your information
  3. Any software, hardware, or systems that cybersecurity is not aware of
  4. The country where most of the fake and fraudulent ecommerce sites are coming from

11 Clues: Who can be a target of a cyberattack?a popular tool for hosting video callsA site that cybercriminals create to steal your informationEducating management on the potential threats of unsecure systemsAll commercial transactions conducted electronically on the internetAny software, hardware, or systems that cybersecurity is not aware of...

CyberSecurity Crossword 2022-09-22

CyberSecurity Crossword crossword puzzle
Across
  1. method through which information is converted into secret code through a special algorithm that hides information's true meaning
  2. program or hardware device that filters information coming through an internet connection to a network or computer system.
  3. This attack is carried out by repeatedly trying password combinations till the password match is found.
  4. URLs that lead user to visit an harmful website or to download a virus
  5. This is a worm which came in mid-2010 and was responsible for huge damage to Iran's Nuclear Program.
  6. programs that are used to track or record users keystroke
  7. Centralized Monitoring, analysis, detection/prevention & response to cybersecurity incidents.
  8. The malicious program malware that downloads onto a computer disguised as a legitimate program. Named after an ancient greek story.
  9. I am not a robot
  10. Weaknesses that can be exploited
  11. Packets of data sent from server to browser used to identify the browser
  12. Framework that is a set of guidelines for mitigating organizational cybersecurity risks, published by the US National Institute of Standards and Technology
  13. Malicious software that is installed on the device without the end user's knowledge and is used to monitor activity without the user's permission.
  14. information about a file
  15. The process of transforming the data from unreadable format to the original message.
  16. You are sending one confidential document to your colleague. In transmission, data gets tampered & content was changed. Which part of security was lost here
  17. Used to commit financial crimes. The attack in which a small amount is taken out every day so that attack goes unnoticed. The name of the attack resembles closely to a chicken dish.
  18. Special viruses that replicate from computer to computer in a network without human interaction
Down
  1. Group of malware-infected computers that form a network to attack
  2. The device or application that monitors a network for malicious activities and has the ability to protect from or stop the incidents from taking place.
  3. this is a vital information resource under siege
  4. the system that shows the location of the person or places through satellites.
  5. The authentication method in which requires two or more verification methods to gain access to the system.
  6. This is the world's first virus(Boot-Sector Virus)
  7. This method is used to hide information inside the picture.
  8. network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts to gain unauthorized access.
  9. The attack that is done to bring down the system or to hinder the normal function of the website or other network resources.
  10. process of giving permission to someone of doing something
  11. science of collecting and analyzing information from information and communication technologies as evidence in a legal case.
  12. Process of being friends builds trust and emotional connection with a young person with future intentions of sexual abuse, exploitation or traficking.

30 Clues: I am not a robotinformation about a fileWeaknesses that can be exploitedthis is a vital information resource under siegeThis is the world's first virus(Boot-Sector Virus)programs that are used to track or record users keystrokeprocess of giving permission to someone of doing somethingThis method is used to hide information inside the picture....

Cybersecurity Words 2020-11-18

Cybersecurity Words crossword puzzle
Across
  1. a common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct malicious or unauthorized activity.
  2. An observable occurrence or sign that an attacker may be preparing to cause an incident.
  3. uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
  4. set of instructions to help IT staff detect, respond to, and recover from network security incidents.
  5. a type of cyber attack that disrupts its normal functions and prevents other users from accessing it.
  6. a situation in which a person or program successfully identifies as another by falsifying data, to gain and illegitimate advantage.
  7. ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization’s information systems.
  8. strategy used to make sure users do not send critical information outside of a corporate network.
  9. an automated program that runs over the Internet. Some bots run automatically, while others only execute commands when they receive specific input.
  10. integrated collection of security measures to prevent unauthorized access to a networked computer system
  11. a cyberattack on a server, service, website, or network floods it with Internet traffic.
  12. identifying your risks and vulnerabilities and applying administrative actions and comprehensive solutions to make sure your organization is adequately protected.
  13. the unauthorized movement of information being spread throughout the internet.
  14. Authentication via group
  15. a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.
  16. used to detect malware.
  17. a system that allows web hosts to distinguish between human and automated access to websites.
  18. Someone or Something that authenticates
  19. a standalone malware computer program that replicates itself in order to spread to other computers.
  20. science concerned with data communication and storage in secure and usually secret form.
  21. related to cloud computing, in which it can hold information and photos.
  22. to successfully escape from an area under enemy control.
  23. Source code that is free to copy and modify.
  24. an emerging online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies.
  25. Hacker who violates computer security for personal gain or malice.
  26. is the method where knowledge of internal and external information weakness of a particular organization are tested against real-world cyberattacks.
  27. The attack of a Software environment where an unauthorized user can try to enter data to or extract data from said environment.
  28. a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
Down
  1. an evaluation of events that can adversely affect operations and/or specific assets
  2. a type of monitoring software designed to record keystrokes made by a user.
  3. Source code that is not available
  4. the psychological manipulation of people into performing actions or divulging confidential information.
  5. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  6. software that displays unwanted advertisements on your computer.
  7. the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
  8. code that takes advantage of a vulnerability of flaw.
  9. a set of changes to a computer program or its supporting data designed to update, fix, or improve it
  10. an advanced attack method, where attackers intrude their target organization through small companies that work with the target company.
  11. List of people under suspicion, disfavor, etc.
  12. internet protocol address, which identifies the number associated with a specific computer or network.
  13. an individual or group that acts, or has the power, to exploit a vulnerability or conduct other damaging activities.
  14. are hackers who use automated techniques to scan specific network ranges and find vulnerable systems, such as machines without current security patches, on which to install their bot program.
  15. any malware which misleads users of its true intent.
  16. A thing that supports another thing
  17. Someone who breaks into someone else’s computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
  18. an attack on the internet that is used to steal usernames and passwords from the network.
  19. a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.
  20. a deceptive activity where a person creates a sockpuppet presence or fake identity on a social networking service, usually targeting a specific victim for abuse or fraud.
  21. keeping data safe
  22. process of collecting and searching through a database to discover information.
  23. a computer network that provides online privacy by creating an encrypted connection on the Internet.
  24. it ensures a person’s identity matches with who they are.
  25. a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one of more of them with malware.
  26. a person who operates the command and control of botnets for remote process execution.
  27. when data is coded a certain way to disallow others from seeing that information.
  28. a collection of internet-connected devices infected by malware that allow hackers to control them.
  29. offensive security professionals who are experts in attacking systems and breaking into defenses.
  30. a type of malware that is often disguised as legitimate software.
  31. unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
  32. identifies the information assets that could be affected by a cyber attack, such as hardware, systems, laptops, customer data and intellectual property.
  33. the methods that adversaries use to breach or infiltrate your network.
  34. Number generated from a string of text
  35. malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
  36. to convert information into cipher
  37. short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information.

65 Clues: keeping data safeused to detect malware.Authentication via groupSource code that is not availableto convert information into cipherA thing that supports another thingNumber generated from a string of textSomeone or Something that authenticatesSource code that is free to copy and modify.List of people under suspicion, disfavor, etc....

Cybersecurity Risk 2021-08-30

Cybersecurity Risk crossword puzzle
Across
  1. Short for malicious software
  2. A conversion of something (such as data) into a code or cipher.
  3. measures taken to protect computer systems.
  4. Text files with small pieces of data used to identify a computer.
  5. Similar to a password but much longer.
  6. The fraudulent practice of sending text messages pretending to be from reputable companies
  7. Legitimate or innocent-looking emails asking you to respond with personal data or to click on a link.
  8. False or inaccurate information,
  9. An acronym for Pause, Ask, Think.
  10. Type of data that should be protected from public view.
Down
  1. Convert data from one system of communication into another.
  2. The enciphering and deciphering of messages in secret code or cipher.
  3. Refers to the range of activities that determine how we manage digital data.
  4. Type of data that is recorded publicly and can be found as part of public record.
  5. Software that encrypts data on someone's device until that person agrees to pay to regain access.
  6. Open to attack or damage.
  7. Software written to damage a computer’s performance, steal or alter data.
  8. Pieces of data left behind when a person moves around on the internet.
  9. A social identity established by an internet user.
  10. Someone disguises an email address, sender name, phone number, or website URL to convince you that you are interacting with a trusted source.
  11. abbreviation for personal identifiable information
  12. To engage in activity online that could result in something bad or unpleasant.
  13. Large data sets analyzed to reveal patterns

23 Clues: Open to attack or damage.Short for malicious softwareFalse or inaccurate information,An acronym for Pause, Ask, Think.Similar to a password but much longer.measures taken to protect computer systems.Large data sets analyzed to reveal patternsA social identity established by an internet user.abbreviation for personal identifiable information...

Cybersecurity Crossword 2023-07-24

Cybersecurity Crossword crossword puzzle
Across
  1. A process or measure used to verify a users identity.
  2. A type of malware that denies a user's access to a system or data until a sum of money is paid.
  3. An unauthorized user who attempts to or gains access to an information system.
  4. A computer program that can spread by making copies of itself.
  5. Software that compromises the operation of a system by performing an unauthorized function or process
  6. A flaw or weakness in the design or implementation of an information system or its environment that could be exploited to adversely affect an organization's assets or operations.
  7. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  8. A collection of computers compromised by malicious code and controlled across a network
  9. The ability of individuals to understand and exercise control over how information about themselves may be used by others.
  10. Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
  11. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
  12. The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
  13. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
Down
  1. A software program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents
  2. A security barrier placed between two networks that controls the amount and kinds of traffic that may pass between the two.
  3. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
  4. The activities that address the short-term, direct effects of an incident and may also support short-term recovery
  5. Converting data into a form that cannot be easily understood by unauthorized people.
  6. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information
  7. An attempt by a third party to solicit confidential information from an individual, group, or organization by mimicking or spoofing a specific, usually well-known brand, usually for financial gain.

20 Clues: A process or measure used to verify a users identity.A computer program that can spread by making copies of itself.An unauthorized user who attempts to or gains access to an information system.Converting data into a form that cannot be easily understood by unauthorized people....

Cybersecurity Crossword 2023-07-25

Cybersecurity Crossword crossword puzzle
Across
  1. Extra copies of computer files that can be used to restore files that are lost or damaged.
  2. Computer programs that can block, detect, and remove viruses and other malware.
  3. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
  4. Part of the internet that isn't indexed by search engines.
  5. Unsolicited emails sent to many addresses.
  6. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization.
  7. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  8. Converting data into a form that cannot be easily understood by unauthorized people.
Down
  1. A mechanism for creating a secure connection between a computing device and a computer network
  2. A collection of computers compromised by malicious code and controlled across a network.
  3. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
  4. Faking the sending address of a transmission to gain illegal entry into a secure system.
  5. A cybersecurity risk that originates from within an organization.
  6. A process or measure used to verify a user’s identity.
  7. A string of characters used to authenticate an identity.
  8. A flaw or weakness in an information system that could be exploited.
  9. A type of malware that denies a user's access to a system or data until a sum of money is paid.
  10. Software that compromises the operation of a system by performing an unauthorized function or process.
  11. Software designed to block malware from entering protected networks.
  12. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  13. A replacement for passwords that provide more secure sign-ins to websites and apps across a user’s devices.
  14. An unauthorized user who attempts to or gains access to an information system.
  15. Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
  16. The ability of individuals to understand and exercise control over how information about themselves may be used by others.

24 Clues: Unsolicited emails sent to many addresses.A process or measure used to verify a user’s identity.A string of characters used to authenticate an identity.Part of the internet that isn't indexed by search engines.A cybersecurity risk that originates from within an organization.A flaw or weakness in an information system that could be exploited....

Equity: Cybersecurity 2023-10-10

Equity: Cybersecurity crossword puzzle
Across
  1. A sequence of words or text used to control access to a computer; similar to a password
  2. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  3. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  4. Hardware or software designed to prevent unauthorized access to or from a private network.
  5. The address of a webpage. Check the validity of it before clicking on it.
  6. The process of taking plain text and scrambling it into an unreadable format.
  7. The “A” in the C-I-A Triad. It ensures authorized users have access.
  8. A fraudulent email purportedly from a reputable company attempting to get personal information.
  9. Verifying identity.
  10. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  11. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
Down
  1. Facebook, Twitter, Instagram, etc. (Two words)
  2. Threatening behavior facilitated through electronic means such as texting.
  3. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  4. The “I” in the C-I-A Triad; protection from unauthorized changes.
  5. Unauthorized access to a network, information systems, or application.
  6. Should be constructed of upper and lower case letters, numbers, and special characters.
  7. A wireless technology standard used over short distances using short-wavelength UHF radio waves.
  8. Security tool that creates a secure, encrypted connection between you and the Internet (acronym)
  9. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.

20 Clues: Verifying identity.Facebook, Twitter, Instagram, etc. (Two words)The “I” in the C-I-A Triad; protection from unauthorized changes.The “A” in the C-I-A Triad. It ensures authorized users have access.Unauthorized access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it....

Cybersecurity Awareness 2023-09-22

Cybersecurity Awareness crossword puzzle
Across
  1. Cybersecurity awareness month
  2. Bring Your Own Device
  3. Software demanding money to unlock personal information
  4. An individual that is authorized to access a system
  5. Coding used to protect sensitive data
  6. A sequence of words used for authentication
  7. An employee is automatically enrolled in ______ training, if our simulated phishing campaign determines employee requires further training
  8. Weakness in a system
  9. Unauthorized intrusion
  10. A security process that uses an additional factor for verification is called "______-Factor Authentication"
Down
  1. Online harrassment
  2. Malicious "horse" software
  3. Email protection company that notifies Buckley users when questionable emails are quarantined
  4. Email that falsely claims to be from a legitimate source, usually with a threat or request for information
  5. Storage for infected files
  6. Junk email
  7. Your digital ______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  8. Altered audio/video to trick users into gaining access to a system
  9. Tech used to keep intruders out
  10. The fraudulent practice of sending a text message impersonating the head of school in order to induce individuals to reveal personal information or purchase a gift card
  11. A piece of software that allows a user to remain anonymous while using the internet by masking the location and encrypting traffic (infamously used to circumvent a web filter)
  12. Outlook button used to report suspicious emails to your IT department "Phish ______ button"

22 Clues: Junk emailOnline harrassmentWeakness in a systemBring Your Own DeviceUnauthorized intrusionMalicious "horse" softwareStorage for infected filesCybersecurity awareness monthTech used to keep intruders outCoding used to protect sensitive dataA sequence of words used for authenticationAn individual that is authorized to access a system...

Cybersecurity Vocab 2024-04-08

Cybersecurity Vocab crossword puzzle
Across
  1. A self-replicating type of malware that spreads across networks without human intervention, often causing damage or disruption.
  2. the fraudulent practice of sending emails or text messages purpretending porting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  3. Good practices and habits for maintaining cybersecurity, such as keeping software up to date, using strong passwords, and being cautious of suspicious emails or links.
  4. A type of malware disguised as legitimate software, which appears harmless but actually performs malicious actions when executed.
  5. The process of converting encrypted data back into its original form using a decryption key or algorithm.
  6. A strong, complex password that is difficult for attackers to guess or crack, typically consisting of a combination of letters, numbers, and special characters.
  7. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  8. The ethical principles and guidelines governing acceptable behavior and conduct in cyberspace, including respect for privacy, intellectual property rights, and online safety.
  9. Short for malicious software, malware is any software intentionally designed to cause damage to computer systems, steal data, or disrupt operations.
  10. The practice of protecting computer systems, networks, and data from digital attacks, theft, and damage.
  11. The process of reacting to and managing cybersecurity incidents, such as data breaches or cyberattacks, to minimize damage and restore normal operations.
  12. A security process that requires users to provide two different forms of identification before accessing an account or system, typically a password and a unique code sent to a mobile device.
Down
  1. A type of malware that infects computer systems by attaching itself to files or programs and replicating when executed.
  2. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  3. Measures and practices implemented to protect computer networks from unauthorized access, misuse, or disruption.
  4. The process of verifying the identity of users or devices attempting to access a system or network.
  5. the process of converting information or data into secret code, especially to prevent unauthorized access
  6. A person who uses technical skills to gain unauthorized access to computer systems or networks, often for malicious purposes.
  7. Software designed to detect, prevent, and remove malicious software (malware) from computer systems.
  8. A weakness or flaw in computer systems, networks, or software that could be exploited by attackers to gain unauthorized access or cause harm.
  9. The trail of digital information or data left behind by an individual's online activities, including social media posts, website visits, and online purchases.
  10. The use of digital communication technologies to harass, intimidate, or bully individuals or groups, often through social media, messaging apps, or online forums.
  11. The process of granting or denying access to specific resources or services based on user credentials and permissions.
  12. attack an attempt by a hacker or hackers to infiltrate or damage a computer network or system
  13. Awareness Knowledge and understanding of cybersecurity risks, best practices, and strategies for protecting against digital threats.
  14. the gaining of unauthorized access to data in a system or computer
  15. A software update intended to fix vulnerabilities or bugs in computer programs, often issued by software vendors to improve security.

27 Clues: the gaining of unauthorized access to data in a system or computerattack an attempt by a hacker or hackers to infiltrate or damage a computer network or systemThe process of verifying the identity of users or devices attempting to access a system or network....

Cybersecurity crossword 2023-04-22

Cybersecurity crossword crossword puzzle
Across
  1. unaware software vulnerability attacked
  2. computer damaging, harmful software
  3. website shutdown using multiple devices
  4. security during initial production stages
  5. seemingly harmless but malicious malware
  6. locks computer until random paid
  7. scrambling data method
  8. slows computer with unwanted ads
  9. required identification changing system settings
  10. Online repeated harassment
Down
  1. implements security for computer system
  2. access blocked for unauthorized users
  3. click hidden element, opening malware
  4. work policy for personal device
  5. misleading edited picture or video
  6. program designed to remove malware
  7. compromised system infecting other systems
  8. service for remotely connected wifi
  9. the guarding against unauthorized access
  10. personal information stealing tactic

20 Clues: scrambling data methodOnline repeated harassmentwork policy for personal devicelocks computer until random paidslows computer with unwanted adsmisleading edited picture or videoprogram designed to remove malwarecomputer damaging, harmful softwareservice for remotely connected wifipersonal information stealing tactic...

Cybersecurity Terms 2023-07-24

Cybersecurity Terms crossword puzzle
Across
  1. trustable storage of sensitive information
  2. prevents attacks to computer
  3. debris from electronic devices
  4. voice, face, retina, fingerprint
  5. acronym for uninterruptible power supply
  6. providing validation for access
  7. changes device's address
  8. cyber attackers with no knowledge
Down
  1. emails designed for advertisement
  2. dangerous software that will duplicate
  3. believe they're doing right
  4. dangerous software that causes corruption
  5. theft "is not a joke Jim"
  6. threats to security
  7. result in loss or injury
  8. makes authentication more powerful
  9. another term: black hat hackers
  10. looks harmless, infects device
  11. searching data to uncover information
  12. how much cybersecurity costs annually

20 Clues: threats to securityresult in loss or injurychanges device's addresstheft "is not a joke Jim"believe they're doing rightprevents attacks to computerdebris from electronic deviceslooks harmless, infects deviceanother term: black hat hackersproviding validation for accessvoice, face, retina, fingerprintemails designed for advertisement...

Cybersecurity vocabulary 2023-07-30

Cybersecurity vocabulary crossword puzzle
Across
  1. The potential for an unwanted or adverse outcome resulting from an incident, event, or occurrence, as determined by the likelihood that a particular threat will exploit a particular vulnerability, with the associated consequences.
  2. The process of transforming plaintext into ciphertext.
  3. The application of one or more measures to reduce the likelihood of an unwanted occurrence and/or lessen its consequences.
  4. malicious code
  5. A person, structure, facility, information, and records, information technology systems and resources, material, process, relationships, or reputation that has value.
  6. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
  7. A set of software tools with administrator-level access privileges installed on an information system and designed to hide the presence of the tools, maintain the access privileges, and conceal the activities conducted by the tools.
  8. A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
  9. A digital form of social engineering to deceive individuals into providing sensitive information.
  10. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
  11. A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.
  12. An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
  13. Qualify a cryptographic key that may be widely published and is used to enable the operation of an asymmetric cryptographic algorithm.
Down
  1. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
  2. A capability to limit network traffic between networks and/or information systems.
  3. The property whereby information, an information system, or a component of a system has not been modified or destroyed in an unauthorized manner.
  4. The property of being accessible and usable upon demand.
  5. Qualify public key cryptography
  6. Determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.
  7. Verifying the identity or other attributes of an entity (user, process, or device).
  8. A collection of computers compromised by malicious code and controlled across a network.
  9. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  10. The assurance that the confidentiality of, and access to, certain information about an entity is protected.
  11. Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
  12. An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.

25 Clues: malicious codeQualify public key cryptographyThe process of transforming plaintext into ciphertext.The property of being accessible and usable upon demand.A capability to limit network traffic between networks and/or information systems.Verifying the identity or other attributes of an entity (user, process, or device)....

Cybersecurity Terms 2023-01-28

Cybersecurity Terms crossword puzzle
Across
  1. One's own device for work
  2. Cybersecurity career peak
  3. Security for malware
  4. Mastery of Network defense
  5. Protection for user account
  6. Destructive single malware
  7. Online harassment
  8. Disguised cyber attack
  9. Malicious hackers
  10. Network device identity
  11. Plans security measures
Down
  1. Entry level certification
  2. Pay to release lockout
  3. Secure remote private network
  4. Network traffic control
  5. cloud security certification
  6. Malicious altered media
  7. Secure scrambled data
  8. Intermediate hacker mastery
  9. Surveillance malware

20 Clues: Online harassmentMalicious hackersSecurity for malwareSurveillance malwareSecure scrambled dataPay to release lockoutDisguised cyber attackNetwork traffic controlMalicious altered mediaNetwork device identityPlans security measuresEntry level certificationOne's own device for workCybersecurity career peakMastery of Network defense...

CyberSecurity Crossword 2023-09-07

CyberSecurity Crossword crossword puzzle
Across
  1. An attack that floods a server with useless messages until it crashes
  2. A scheme to steal information or money
  3. Finding information about hardware or software that could be evidence of an attack
  4. A request for data or code
  5. Software that allows programmers to connect to third party applications
  6. A cable that connects devices to networks and the internet
  7. The computer that accesses information from a server
  8. The collection and analysis of publicly available data
  9. A method of authentication that requires multiple steps, usually using something that the person knows and something that the person has
  10. A string of characters that someone knows in order to authenticate themselves.
  11. A trick using a company or person that a victim is familiar with to steal information or scam the victim
Down
  1. The name of a website
  2. A window that automatically opens, often for advertising
  3. An operating system kernel used on many servers, embedded systems, and even desktop computers.
  4. A computer that hosts files, software, or websites
  5. A local device that creates a personal area network for devices to connect to the internet
  6. Checking that the user is who they say they are
  7. Scrambling characters or code up so that it can’t be read
  8. A copy of files or software that is kept in case of an error with the device.
  9. The current wireless encryption standard

20 Clues: The name of a websiteA request for data or codeA scheme to steal information or moneyThe current wireless encryption standardChecking that the user is who they say they areA computer that hosts files, software, or websitesThe computer that accesses information from a serverThe collection and analysis of publicly available data...

Cybersecurity Crossword 2023-10-06

Cybersecurity Crossword crossword puzzle
Across
  1. A process or measure used to verify a user's identity.
  2. A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
  3. Software that compromises the operation of a system by performing an unauthorized function or process.
  4. Converting data into a form that cannot be easily understood by unauthorized people.
  5. A flaw or weakness in an information system that could be exploited.
  6. A string of characters used to authenticate an identity.
  7. Extra copies of computer files that can be used to restore files that are lost or damaged.
  8. A mechanism for creating a secure connection between a computing device and a computer network
  9. A type of malware that denies a user's access to a system or data until a sum of money is paid.
  10. A collection of computers compromised by malicious code and controlled across a network.
  11. Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
Down
  1. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization.
  2. The ability of individuals to understand and exercise control over how information about themselves may be used by others.
  3. Software designed to block malware from entering protected networks.
  4. Faking the sending address of a transmission to gain illegal entry into a secure system.
  5. Part of the internet that isn't indexed by search engines.
  6. An unauthorized user who attempts to or gains access to an information system.
  7. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
  8. Computer programs that can block, detect, and remove viruses and other malware.
  9. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  10. A cybersecurity risk that originates from within an organization.
  11. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
  12. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  13. Unsolicited emails sent to many addresses.

24 Clues: Unsolicited emails sent to many addresses.A process or measure used to verify a user's identity.A string of characters used to authenticate an identity.Part of the internet that isn't indexed by search engines.A cybersecurity risk that originates from within an organization.Software designed to block malware from entering protected networks....

Cybersecurity Terminology 2024-03-14

Cybersecurity Terminology crossword puzzle
Across
  1. Software that prevents malicious software
  2. Programs that simulates human activity.
  3. Masks malicious software.
  4. Distinguishes between humans and bots.
  5. A false warning.
  6. Being free from public attention.
  7. A type of cryptocurrency.
  8. An error in a program.
  9. Unwanted email messages.
  10. Unlocking encrypted data.
  11. Software for blackmailing.
  12. Website file that stores information.
  13. Software that corrupts files.
Down
  1. Confirms a user's identity.
  2. A way to access software.
  3. A fake online identity
  4. Techniques for safeguarding computers.
  5. Devices that mines cryptocurrency.
  6. Software that automatically displays advertisements.
  7. Entering an account requires a.
  8. Harmful computer codes that spread.

21 Clues: A false warning.A fake online identityAn error in a program.Unwanted email messages.Masks malicious software.A way to access software.A type of cryptocurrency.Unlocking encrypted data.Software for blackmailing.Confirms a user's identity.Software that corrupts files.Entering an account requires a.Being free from public attention....

dasd 2021-04-30

dasd crossword puzzle
Across
  1. Settings
  2. Cyber
  3. Commit
  4. Else
  5. Machine learning
  6. Integer
  7. If
  8. Function
  9. If else
  10. For loop
  11. Variable
  12. Print
  13. Loop
Down
  1. Sprite
  2. cybersecurity
  3. Autonomous
  4. nueral networks
  5. Uptime
  6. Tap
  7. Binary numbers
  8. Float
  9. Python
  10. While loop
  11. List
  12. Array

25 Clues: IfTapElseListLoopCyberFloatArrayPrintSpriteCommitUptimePythonIntegerIf elseSettingsFunctionFor loopVariableAutonomousWhile loopcybersecurityBinary numbersnueral networksMachine learning

CEC 2023 #1 2023-06-09

CEC 2023 #1 crossword puzzle
Across
  1. Maxava
  2. Fresche
  3. XoruX
  4. Rocket Software
  5. Profound Logic
  6. Service Express
  7. Infor
  8. OmniScience
  9. Dynamic Solutions
  10. Fortra
  11. Arcad Software
  12. LANSA
  13. Infoview
  14. Falconstor
  15. TSP
Down
  1. Axians
  2. Connectria
  3. CNX
  4. M81
  5. IBM
  6. iVolution
  7. Metrixware
  8. Raz-Lee
  9. Taskforce
  10. Remain Software

25 Clues: CNXM81IBMTSPXoruXInforLANSAAxiansMaxavaFortraFrescheRaz-LeeInfoviewiVolutionTaskforceConnectriaMetrixwareFalconstorOmniScienceProfound LogicArcad SoftwareRocket SoftwareService ExpressRemain SoftwareDynamic Solutions

Cybersecurity Terms 2022-11-22

Cybersecurity Terms crossword puzzle
Across
  1. A set of software tools used by an attacker to hide the actions or presence of other types of malicious software.
  2. Software that is a cumulative package of all patches and feature updates.
  3. Malware that prevents a user's device from properly operating until a fee is paid.
  4. An attacker who controls a botnet.
  5. An infected computer that is under the remote control of an attacker.
  6. Computer code that lies dormant until it is triggered by a specific logical event.
  7. Software that helps prevent computers from becoming infected by different types of spyware.
  8. A malicious program designed to enter a computer via a network to take advantage of a vulnerability in an application or an operating system.
  9. Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action.
  10. A publicly released software security update intended to repair a vulnerability.
  11. Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.
Down
  1. A logical computer network of zombies under the control of an attacker.
  2. Enhancements to the software to provide new or expanded functionality, but do not address security vulnerability.
  3. Hardware or software designed to limit the spread of malware.
  4. A copy of files from a computer's hard drive saved on other digital media that is stored in a secure location.
  5. Software code that gives access to a program or a service that circumvents normal security protections.
  6. An executable program that is advertised as performing one activity but which actually performs a malicious activity.
  7. Software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus.
  8. A general term used to describe software that spies on users by gathering information without consent.
  9. A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

20 Clues: An attacker who controls a botnet.Hardware or software designed to limit the spread of malware.An infected computer that is under the remote control of an attacker.A logical computer network of zombies under the control of an attacker.Software that is a cumulative package of all patches and feature updates....

Cybersecurity Crossword 2023-03-14

Cybersecurity Crossword crossword puzzle
Across
  1. using multiple bots to overload a program
  2. Hijacks your device until they get paid
  3. A file that stores your online preferences
  4. A AI generated photo or video
  5. A means of attack on computer
  6. The process of identifing youself
  7. Hides personal information from hackers
  8. A device for spreading wireless signal
Down
  1. Technology that watches your online actions
  2. Technology used to keep hackers out
  3. Someone who gains unauthorized access to a website
  4. total loss of power
  5. Malware that can reproduce itself
  6. A software that can delete or corrupt files
  7. The URL is changed to show something trustable
  8. A system of commputers connected as one
  9. A loss in power for minutes or hours
  10. A fake person asks for information
  11. Malware that changes and corrupts devices
  12. A digital storage place

20 Clues: total loss of powerA digital storage placeA AI generated photo or videoA means of attack on computerMalware that can reproduce itselfThe process of identifing youselfA fake person asks for informationTechnology used to keep hackers outA loss in power for minutes or hoursA device for spreading wireless signalHijacks your device until they get paid...

CyberSecurity Words 2023-09-07

CyberSecurity Words crossword puzzle
Across
  1. tells other servers which servers are allowed to send emails using your business’s domain name
  2. protection from data theft
  3. a data copy of files
  4. an text encryption used to protect data
  5. email authentication technology to help prevent phishing emails
  6. getting email that asks that they have your data
  7. a way of stealing data usually by emails or phone calls
  8. the service you choose should include TLS, which will help to protect your customers’ privacy.
  9. puts a digital signature on outgoing mail
  10. Accessing that another device safely
  11. People who help you with technological issues.
Down
  1. Something which can be exploited by hackers
  2. that automatically download malicious software onto your computer.
  3. Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy data
  4. Someone else using your identity
  5. a file or code that infects or steal data
  6. a new version of data of the system
  7. Usually comes from malware in the system
  8. the process or action of verifying the identity of a user or process.
  9. Information that was stolen

20 Clues: a data copy of filesprotection from data theftInformation that was stolenSomeone else using your identitya new version of data of the systemAccessing that another device safelyan text encryption used to protect dataUsually comes from malware in the systema file or code that infects or steal dataputs a digital signature on outgoing mail...

Cybersecurity Awareness 2023-10-11

Cybersecurity Awareness crossword puzzle
Across
  1. Term commonly used to describe junk e-mail on the Internet
  2. ________ software is designed to detect, prevent, and remove malware infections on computers and other devices
  3. Malicious or harmful software designed to damage or disrupt a computer system
  4. A security tool, which may be a hardware or software solution that is used to filter network traffic
  5. Unauthorized intrusion
  6. A type of media manipulation to trick users, where bad actors alter an image or video to create a false perception of reality
  7. The process of proving an individual is a claimed identity
  8. Small files which are stored on a user’s computer
  9. Software demanding money to unlock personal information
  10. A piece of software that allows a user to remain anonymous while using the internet by masking the location and encrypting traffic (infamously used to circumvent our web filter)
  11. Bring Your Own Device
  12. A network of compromised computers used to carry out cyberattacks on other systems
  13. Online harassment
  14. Email that falsely claims to be from a legitimate source, usually with a threat or request for information
Down
  1. Storage for infected files
  2. A _______ attack involves the use of multiple devices to flood a website or server with traffic, resulting in its temporary shutdown
  3. malicious software that is imbedded inside of a benign host file
  4. Coding used to protect sensitive data
  5. Creating a duplicate copy of data onto a separate physical storage device or online/cloud storage solution
  6. Tricking users into clicking on hidden elements in order to perform unwanted actions
  7. Weakness in a system
  8. A layered security system that requires more than one means of authentication to grant access to an account or device
  9. Encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
  10. Coding used to protect sensitive data
  11. A sequence of words used for authentication
  12. Cybersecurity awareness month

26 Clues: Online harassmentWeakness in a systemBring Your Own DeviceUnauthorized intrusionStorage for infected filesCybersecurity awareness monthCoding used to protect sensitive dataCoding used to protect sensitive dataA sequence of words used for authenticationSmall files which are stored on a user’s computer...

cybersecurity crossword 2024-03-15

cybersecurity crossword crossword puzzle
Across
  1. connected together to share resources
  2. identifying a user’s identity
  3. bad software
  4. barrier between
  5. A scam
  6. numbers allocated to computers routers
  7. all connected as one entity
  8. Bring Your Own Device
  9. group of applications
  10. Coding used to protect
Down
  1. spy on you
  2. tricked into clicking
  3. attack on a computer system
  4. video that has been altered
  5. destroys information
  6. shield users against viruses
  7. security violation
  8. overwhelming the target
  9. collection of programs or software
  10. infected

20 Clues: A scaminfectedspy on youbad softwarebarrier betweensecurity violationdestroys informationtricked into clickingBring Your Own Devicegroup of applicationsCoding used to protectoverwhelming the targetattack on a computer systemvideo that has been alteredall connected as one entityshield users against virusesidentifying a user’s identity...

Cybersecurity Crossword 2024-04-23

Cybersecurity Crossword crossword puzzle
Across
  1. The practice of sending fraudulent emails resembling emails from reputable sources to steal sensitive information.
  2. Persistent Threats A set of stealthy and continuous computer hacking processes, often orchestrated by persons targeting a specific entity.
  3. A person who uses computers to gain unauthorized access to data.
  4. Any malicious computer program which misleads users of its true intent.
  5. Engineering The process of extracting knowledge or design information from anything manmade and reproducing it or reproducing anything based on the extracted information.
  6. A collection of software tools that enable unauthorized access to a computer or areas of its software.
  7. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  8. A piece of data that is used in network communications to identify a session.
  9. A set of changes to a computer program or its supporting data designed to update, fix, or improve it.
  10. A means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
  11. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  12. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  13. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
  14. A type of surveillance technology used to record keystrokes made by a user.
  15. The art of manipulating people so they give up confidential information.
  16. Trust Architecture A security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.
  17. Weaknesses or flaws in software that can be exploited by a threat actor to gain unauthorized access to a system.
  18. A criminal act of obtaining sexual acts, images, or videos from a person by coercing them through threats to release existing intimate content.
Down
  1. Information Management The practice of collecting, monitoring, and analyzing security related data from computer logs.
  2. Malicious software designed to harm or exploit any programmable device or network.
  3. The study of analyzing information systems in order to study the hidden aspects of the systems.
  4. Authentication A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.
  5. An attack that aims to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.
  6. Testing A method for gaining assurance in the security of an information system by attempting to breach some or all of that system's security, using the same tools and techniques an attacker might use.
  7. The act of disguising a communication from an unknown source as being from a known, trusted source.
  8. An algorithm for performing encryption or decryption.
  9. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  10. Exfiltration The unauthorized transfer of data from a computer or server.
  11. Forensics The practice of uncovering and interpreting electronic data for use in a court of law.
  12. Artificial intelligencegenerated videos or audio recordings that seem to show real people saying and doing things they never did.
  13. Response The methodology an organization uses to respond to and manage a cyberattack.
  14. Operations Center A centralized unit that deals with security issues on an organizational and technical level.
  15. Extends a private network across a public network, allowing users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
  16. Sockets Layer A standard security technology for establishing an encrypted link between a server and a client. Often abbreviated to a three letter acronym.
  17. The method by which information is converted into secret code that hides the information's true meaning.

35 Clues: An algorithm for performing encryption or decryption.A person who uses computers to gain unauthorized access to data.Any malicious computer program which misleads users of its true intent.The art of manipulating people so they give up confidential information.Exfiltration The unauthorized transfer of data from a computer or server....

Cybersecurity Crossword 2022-12-06

Cybersecurity Crossword crossword puzzle
Across
  1. any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission
  2. establishes a barrier between a trusted network and an untrusted network
  3. An undocumented way of gaining access to computer system
  4. an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy
  5. a system where hackers can see your keystrokes
  6. a set of changes to a computer program designed to update, fix, or improve it
  7. a computer program used to prevent, detect, and remove malware
  8. software that is designed to damage a PC
  9. a mandatory access control enforcement feature
  10. a collection of computer software, typically malicious, designed to enable access to a computer
Down
  1. is software that generates revenue for its developer
  2. contain not only security and quality revisions, but also significant feature additions and changes
  3. blocker and system to block unwanted screen popups
  4. a type of program designed to prevent and detect unwanted spyware program installations
  5. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
  6. a type of malware from cryptovirology that threatens to publish the victim's personal data
  7. a copy of computer data taken and stored elsewhere
  8. a piece of code intentionally inserted into a software system that will set off a malicious function
  9. a malicious program that is installed on a device that transforms it
  10. a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system

20 Clues: software that is designed to damage a PCa system where hackers can see your keystrokesa mandatory access control enforcement featureblocker and system to block unwanted screen popupsa copy of computer data taken and stored elsewhereis software that generates revenue for its developerAn undocumented way of gaining access to computer system...

Cybersecurity Crossword 2020-09-13

Cybersecurity Crossword crossword puzzle
Across
  1. Pretending to be somebody else online.
  2. A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program
  3. A type of attack that uses trial and error over and over to guess a password until it is correct.
  4. Small files that are saved on your computer that store information that help websites track your visits
  5. A virus that can replicate without the user doing anything such as opening a program.
  6. Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
  7. Stealing another person's information to use for criminal activity.
  8. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  9. A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands money if the victim wants his or her files back.
  10. The amount of data that can pass through a network or part of a network per second.
  11. Computer programs that can block, detect, and remove viruses and other malware.
  12. Creating a web address that purposely fools people into thinking it is another person or company's website.
  13. The process of making extra copies of computer files that can be used to restore files that are lost or damaged.
  14. Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
Down
  1. The process of using codes to make readable information unreadable. Encrypted information cannot be read until it is decrypted using a secret key.
  2. Two or more interconnected devices that can exchange data.
  3. A "good guy" hacker; one who hacks to help find vulnerabilities to make a system more secure.
  4. Software designed to block malware from entering protected networks.
  5. The use of something in a way different from what it was intended for in order to solve a problem.
  6. A general name for software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs.
  7. A computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
  8. Malware that records every key struck on a keyboard and sends that information to an attacker.
  9. A way of shutting down or slowing down a website by overwhelming it with a flood of traffic from a team of computers.
  10. Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
  11. A flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.

25 Clues: Pretending to be somebody else online.Two or more interconnected devices that can exchange data.Stealing another person's information to use for criminal activity.Software designed to block malware from entering protected networks.Computer programs that can block, detect, and remove viruses and other malware....

Cybersecurity Terms 2023-03-17

Cybersecurity Terms crossword puzzle
Across
  1. While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking.
  2. Attack Any attempt to breach a logical environment's security boundary. An attack may concentrate on intelligence gathering, disrupting company operations, exploiting weaknesses, keeping track of targets, stopping work, obtaining value, harming logical or physical assets, or leveraging system resources to enable assaults against other targets.
  3. The newest virus detection technology is integrated into anti-virus systems to shield users against viruses, spyware, trojans, and worms that can damage computer hardware through email or web browsing.
  4. A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data
  5. You already utilize cloud computing if you use Gmail for email, Google Drive for document storage, or Netflix to stream your favorite movies.
  6. A combination of the words “robot” and “network”, a botnet is a network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.
  7. A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity.
  8. is a method of connecting a series of computers and devices in a private encrypted network
  9. Engineering Instead of breaking in or utilizing technical hacking techniques, social engineering is a growingly popular way to access restricted resources
  10. Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications make up a network.
  11. Horse Yet another form of malware, this one a misleading computer program that looks innocent, but in fact allows the hacker into your system via a back door, allowing them to control your computer.
Down
  1. it’s when a hacker changes the IP address of an email so that it seems to come from a trusted source.
  2. A portmanteau of “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system.
  3. The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
  4. is used to protect your information from hackers.
  5. is a series of numbers allocated to computers routers servers, and pretty much anything connected to the Internet
  6. A form of malware used by hackers to spy on you and your computer activities
  7. also referred to as two-factor authentication, makes it more difficult for hackers to access your account by requiring you to provide at least two different credentials
  8. Any technology, be it software or hardware, used to keep intruders out.
  9. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network

20 Clues: is used to protect your information from hackers.Any technology, be it software or hardware, used to keep intruders out.A form of malware used by hackers to spy on you and your computer activitiesis a method of connecting a series of computers and devices in a private encrypted network...

Cybersecurity Month 2023-05-19

Cybersecurity Month crossword puzzle
Across
  1. creating a fake identity on a social network account or dating website
  2. an error, flaw, failure, or fault in a computer or system
  3. programs that automatically execute tasks as ordered by the creator of the program that has infected them
  4. after these are downloaded, opened, or executed, your data becomes corrupt
  5. programs and other operating systems used by a computer
  6. a type of malicious software that disguises itself as a harmless program
  7. a cyber attacker
  8. private network VPN
  9. an attack when a person or program disguises themselves as another
  10. malware used to gain access to a user's system or data
  11. authentication attaching a phone number or email to an account for extra security
  12. short for malicious software
  13. breach when sensitive, protected, or confidential information is intentionally released to an untrusted environment
  14. engineering taking advantage of human trust to gain access to private information
Down
  1. customizable additions to software for extra functionality
  2. secret word or phrase used to gain access
  3. method of obtaining user info through fraudulent communications targeted directly at people
  4. a technique for protecting computers, networks, programs, and data from unauthorized access or hackers
  5. the way in which the identity of a user is confirmed
  6. cryptocurrency
  7. software that automatically displays or downloads material when a user if offline
  8. a form of malware used to threaten victims by blocking, publishing, or corrupting their data unless a ransom is paid
  9. technology IT
  10. an internet traffic filter meant to stop unauthorized traffic
  11. the physical and tangible parts of a computer

25 Clues: technology ITcryptocurrencya cyber attackerprivate network VPNshort for malicious softwaresecret word or phrase used to gain accessthe physical and tangible parts of a computerthe way in which the identity of a user is confirmedmalware used to gain access to a user's system or dataprograms and other operating systems used by a computer...

Cybersecurity Crossword 2023-06-29

Cybersecurity Crossword crossword puzzle
Across
  1. Security tool that creates a secure, encrypted connection between you and the Internet (acronym)
  2. Hardware or software designed to prevent unauthorized access to or from a private network.
  3. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  4. Should be constructed of upper and lower case letters, numbers, and special characters.
  5. The address of a webpage. Check the validity of it before clicking on it.
  6. Unauthorized access to a network, information systems, or application.
  7. A sequence of words or text used to control access to a computer; similar to a password.
  8. The process of taking plain text and scrambling it into an unreadable format.
  9. Threatening behavior facilitated through electronic means such as texting.
  10. MEDIA Facebook, Twitter, Instagram, etc. (Two words)
  11. Verifying identity.
  12. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
  13. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
Down
  1. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  2. A fraudulent email purportedly from a reputable company attempting to get personal information.
  3. 1. A wireless technology standard used over short distances using short-wavelength UHF radio waves.
  4. The “A” in the C-I-A Triad. It ensures authorized users have access.
  5. The “I” in the C-I-A Triad; protection from unauthorized changes.
  6. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  7. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.

20 Clues: Verifying identity.MEDIA Facebook, Twitter, Instagram, etc. (Two words)The “I” in the C-I-A Triad; protection from unauthorized changes.The “A” in the C-I-A Triad. It ensures authorized users have access.Unauthorized access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it....

Cybersecurity Crossword 2023-09-01

Cybersecurity Crossword crossword puzzle
Across
  1. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  2. The “A” in the C-I-A Triad. It ensures authorized users have access.
  3. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
  4. Verifying identity.
  5. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  6. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  7. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  8. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
Down
  1. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  2. Facebook, Twitter, Instagram, etc. (Two words)
  3. Hardware or software designed to prevent unauthorized access to or from a private network.
  4. The address of a webpage. Check the validity of it before clicking on it.
  5. A sequence of words and text used to access to computer; similar to a password
  6. A wireless technology standard used over short distances using short-wavelength UHF radio waves.
  7. Threatening behavior facilitated through electronic means such as texting.
  8. The process of taking plain text and scrambling it into an unreadable format.
  9. Unauthorized access to a network, information systems, or application.
  10. The “I” in the C-I-A Triad; protection from unauthorized changes.
  11. Should be constructed of upper and lower case letters, numbers, and special characters.
  12. A fraudulent email purportedly from a reputable company attempting to get personal information.

20 Clues: Verifying identity.Facebook, Twitter, Instagram, etc. (Two words)The “I” in the C-I-A Triad; protection from unauthorized changes.The “A” in the C-I-A Triad. It ensures authorized users have access.Unauthorized access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it....

Cybersecurity Terms 2024-03-07

Cybersecurity Terms crossword puzzle
Across
  1. Secure network connection
  2. Harmful software
  3. Unique human identifiers
  4. Wireless network connection
  5. Secure Socket Layer
  6. Software update fix
  7. Keystroke monitoring software
  8. Data recovery copy
Down
  1. Malicious data encryption
  2. Network of compromised devices
  3. Malicious software
  4. Denial of Service attack
  5. Engineering Manipulating users for access
  6. Malicious software disguised
  7. Intrusion Detection System
  8. Secure data encoding
  9. Deceptive email attacks
  10. Unsolicited email messages
  11. Unauthorized access seeker
  12. Network security barrier

20 Clues: Harmful softwareMalicious softwareData recovery copySecure Socket LayerSoftware update fixSecure data encodingDeceptive email attacksDenial of Service attackUnique human identifiersNetwork security barrierMalicious data encryptionSecure network connectionIntrusion Detection SystemUnsolicited email messagesUnauthorized access seeker...

Cybersecurity 2023-04-28

Cybersecurity crossword puzzle
Across
  1. facts about something
  2. steals other peoples information
  3. malware
  4. obtaining private info
  5. making a purchase
  6. error an action which isn't intended
Down
  1. authorisation
  2. facts and statistics
  3. a network security device
  4. something only you can see
  5. standalone malware

11 Clues: malwareauthorisationmaking a purchasestandalone malwarefacts and statisticsfacts about somethingobtaining private infoa network security devicesomething only you can seesteals other peoples informationerror an action which isn't intended

Cybersecurity Crossword 2023-05-10

Cybersecurity Crossword crossword puzzle
Across
  1. BOTNET
  2. MALWARE
  3. IP ADDRESS
  4. DATA BREACH
  5. VPN
Down
  1. HACKER
  2. PENTESTING
  3. SPOOFING
  4. PHISHING
  5. DEFENSE
  6. CLOUD
  7. TROJAN HORSE
  8. VULNERABILITY

13 Clues: VPNCLOUDHACKERBOTNETDEFENSEMALWARESPOOFINGPHISHINGPENTESTINGIP ADDRESSDATA BREACHTROJAN HORSEVULNERABILITY

la tecnología #2 2022-04-01

la tecnología #2 crossword puzzle
Across
  1. knowledge
  2. worsen
  3. screen
  4. delete
  5. cybersecurity
Down
  1. storage
  2. Web
  3. improve
  4. profile
  5. privacy
  6. apps
  7. printer

12 Clues: Webappsworsenscreendeletestorageimproveprofileprivacyprinterknowledgecybersecurity

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. refers to the permission to use
  2. a type of malicious code that looks legitimate
  3. a way of preventing errors
  4. information about yourself such as name
  5. the protection of computer systems and networks
  6. type of malware that spreads copies of itself from computer to computer
  7. unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
Down
  1. malicious software designed to block access to a computer system
  2. be aware of people trying to steal your information
  3. a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.
  4. software that automatically displays or downloads advertising material

11 Clues: a way of preventing errorsrefers to the permission to useinformation about yourself such as namea type of malicious code that looks legitimatethe protection of computer systems and networksbe aware of people trying to steal your informationmalicious software designed to block access to a computer system...

Cybersecurity Crossword 2023-09-15

Cybersecurity Crossword crossword puzzle
Across
  1. Input device that imports digital images and video
  2. drive Located inside the tower or case and used to store programs and most data
  3. Used to get spoken input
  4. Input device used to import images and doucments into the computer
  5. Deletes text to the left of insertion point (the cursor)
  6. The case that the parts of the computer reside
  7. Drive Reads CD disks
  8. Bar Inserts space between words and sentences
  9. Lock Capitilizes all letters when locked down
  10. Computer A computer that has several parts attached to it, is heavy and not usually moved
Down
  1. The screen on your computer or laptop
  2. Produces printed copies of the computer output
  3. The rows of letters and numbers that you press to type
  4. Used to produce audio output (sound)
  5. A pointing device used to make on screen selections
  6. Makes captial letters and symbols at the top of the keys
  7. A small and portable computer
  8. Central Processing Unit, the computer brain
  9. Moves to the next line or is used to execute a command (make it work)

19 Clues: Drive Reads CD disksUsed to get spoken inputA small and portable computerUsed to produce audio output (sound)The screen on your computer or laptopCentral Processing Unit, the computer brainBar Inserts space between words and sentencesLock Capitilizes all letters when locked downProduces printed copies of the computer output...

Cybersecurity 2021-03-01

Cybersecurity crossword puzzle
Across
  1. Click every traffic light in this image.
  2. Encrypt files to extort money.
  3. Fake email link bait.
  4. Proving your identity.
  5. Sneaky peek a password.
Down
  1. Brute force uses many attempts to guess it.
  2. Denial of Service attacks this.
  3. Blocks incoming and outgoing connections.
  4. Automated internet task software.
  5. Unauthorised access to computer systems.
  6. Horse with a hidden suprise.

11 Clues: Fake email link bait.Proving your identity.Sneaky peek a password.Horse with a hidden suprise.Encrypt files to extort money.Denial of Service attacks this.Automated internet task software.Click every traffic light in this image.Unauthorised access to computer systems.Blocks incoming and outgoing connections....

CyberSecurity 2024-03-09

CyberSecurity crossword puzzle
Across
  1. pairs a public key for encryption and a private key for decryption
  2. software intended to damage a computing system or to take partial control over its operation
  3. a malicious program that can copy itself and gain access to a computer in an unauthorized way
  4. encryption involves one key for both encryption and decryption
  5. a technique that attempts to trick a user into providing personal information
  6. infomration about an individual that identifies, links, relates or describes them
Down
  1. a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentification mechanism
  2. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  3. the process of decoding data
  4. the process of encoding data to prevent unauthorized access
  5. a wireless access point that give unauthorized access to to secure networks

11 Clues: the process of decoding datathe process of encoding data to prevent unauthorized accessencryption involves one key for both encryption and decryptionpairs a public key for encryption and a private key for decryptiona wireless access point that give unauthorized access to to secure networks...

CSAM 2020 2020-09-03

CSAM 2020 crossword puzzle
Across
  1. A month dedicated to all things cybersecurity (acronym)
  2. TIAA's cybersecurity mascot
  3. Label often assigned to devices that are on a network; can be static or dynamic
  4. The protection of internet connected systems and devices
  5. A tactic often used by cyber criminals to lure in susceptible individuals in the form of urgency or consequence
  6. TIAA's one stop shop for computer and technical issues
  7. Malicious software which often requires payment in the form of cryptocurrency in order to decrypt data/files
  8. Ethical hacking; hacking for the greater good
  9. A type of phishing that is more personalized to the end user
  10. A concept where all devices are connected to the internet, such as household items
  11. Authentication that requires more than just a passcode; usually in the form of a token or generated access code
Down
  1. Unique hardware identifier; physical layer in the OSI model
  2. _ Routing: type of protocol that allows people to communicate anonymously; also a vegetable
  3. An attempt at getting gaining vital information from an individual utilizing a variety of social engineering tactics; notoriously in emails
  4. What does VPN stand for
  5. Someone with elevated access
  6. Last name of TIAA's CISO
  7. Software with malicious characteristics; often used to compromise a system
  8. In December 2017, one of the most popular credit bureaus in the world that was exposed to a data breach that resulted in over 147 million Americans' information
  9. An algorithmic method which hides characteristics of communication by converting it into various codes

20 Clues: What does VPN stand forLast name of TIAA's CISOTIAA's cybersecurity mascotSomeone with elevated accessEthical hacking; hacking for the greater goodTIAA's one stop shop for computer and technical issuesA month dedicated to all things cybersecurity (acronym)The protection of internet connected systems and devices...

CSAM 2020 2020-09-03

CSAM 2020 crossword puzzle
Across
  1. Someone with elevated access
  2. Authentication that requires more than just a passcode; usually in the form of a token or generated access code
  3. Software with malicious characteristics; often used to compromise a system
  4. A type of phishing that is more personalized to the end user
  5. Last name of TIAA's CISO
  6. An attempt at getting gaining vital information from an individual utilizing a variety of social engineering tactics; notoriously in emails
  7. The protection of internet connected systems and devices
  8. Label often assigned to devices that are on a network; can be static or dynamic
  9. An algorithmic method which hides characteristics of communication by converting it into various codes
  10. TIAA's one stop shop for computer and technical issues
Down
  1. Ethical hacking; hacking for the greater good
  2. A tactic often used by cyber criminals to lure in susceptible individuals in the form of urgency or consequence
  3. In December 2017, one of the most popular credit bureaus in the world that was exposed to a data breach that resulted in over 147 million Americans' information
  4. Unique hardware identifier; physical layer in the OSI model
  5. TIAA's cybersecurity mascot
  6. _ Routing: type of protocol that allows people to communicate anonymously; also a vegetable
  7. Malicious software which often requires payment in the form of cryptocurrency in order to decrypt data/files
  8. A concept where all devices are connected to the internet, such as household items
  9. What does VPN stand for
  10. A month dedicated to all things cybersecurity (acronym)

20 Clues: What does VPN stand forLast name of TIAA's CISOTIAA's cybersecurity mascotSomeone with elevated accessEthical hacking; hacking for the greater goodTIAA's one stop shop for computer and technical issuesA month dedicated to all things cybersecurity (acronym)The protection of internet connected systems and devices...

Cybersecurity 2023-10-31

Cybersecurity crossword puzzle
Across
  1. when you personal data is available (another word for available)
  2. a hacker that is doing good
  3. a hacker that works without permission
  4. when your personal data is kept secret, another word for secret
Down
  1. Multi-Factor________ something you have, know, and are
  2. a kind of human engineering with no coding
  3. the art of protecting devices and data from unauthorized access
  4. malicious coding that can be a virus, worm, trojan etc
  5. Internet of __________ (network of connected devices)
  6. an unusual way to solve a problem
  7. a hacker that is malicious

11 Clues: a hacker that is maliciousa hacker that is doing goodan unusual way to solve a problema hacker that works without permissiona kind of human engineering with no codingInternet of __________ (network of connected devices)Multi-Factor________ something you have, know, and aremalicious coding that can be a virus, worm, trojan etc...

CyF Chapter 1 2023-10-08

CyF Chapter 1 crossword puzzle
Across
  1. What is the acronym for the intermediate level certification offered by EC-Council that the cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.
  2. Attacks that originate from within an organization are known as ___________ security threats.
  3. Which type of cyber attack can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
  4. Script _____ are teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill.
  5. DDoS in cyber security means "Distributed ______-of-Service.
  6. The acronym of this technology which enable people to connect billions of devices to the Internet.
  7. Criminals can also use rogue devices, such as _____ Wi-Fi access points.
  8. Information _______ Management Standards provide a framework for implementing cybersecurity measures within an organization.
  9. Cybersecurity ______ possess the insight to recognize the influence of data and harness that power to build great organizations, provide services and protect people from cyberattacks.
Down
  1. Criminals use this tool to capture data streams over a network.
  2. Federated identity management refers to ______ enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
  3. What is another word used to describe the speed of data.
  4. A group of grey hat hackers who rally and protest against different political and social ideas.
  5. At which level are the employees responsible to protect the organization’s reputation, data, and customers.
  6. Cyber ______ is a weakness that makes a target susceptible to an attack
  7. The acronym of the practice where people used their own devices to access enterprise information.
  8. This group of criminals breaks into computers or networks to gain access for various reasons.
  9. A cybersecurity ______ is the possibility that a harmful event, such as an attack, will occur.
  10. State _____ Hackers are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
  11. _____ hat attackers are unethical criminals who violate computer and network security for personal gain.

20 Clues: What is another word used to describe the speed of data.DDoS in cyber security means "Distributed ______-of-Service.Criminals use this tool to capture data streams over a network.Cyber ______ is a weakness that makes a target susceptible to an attackCriminals can also use rogue devices, such as _____ Wi-Fi access points....

cybersecurity crossword 2022-12-02

cybersecurity crossword crossword puzzle
Across
  1. software that that enters a computer system without the users knowledge or consent and makes the comuter go bad
  2. software that prevents you from getting unwanted viruses on your device
  3. software that runs as a program on the local computer
  4. an attacker who controls a botnet
  5. a logical computer network of zombies under the control of an attacker
  6. software made to stop the spread of malware
  7. a malicious program designed to enter a computer via a network to take advantage of a vulnerability in a application or an operating system
  8. a new software made that was better the old one and fixes things that were bad or old in the old software
  9. software that prevents you from getting infected from differents spyware
  10. a set of software tools used by an attacker to hide the actions or presence of other types of malware
  11. software code that gives access to a program or service
Down
  1. a software program that gives advertising content that is unwanted by the user
  2. a microsoft windows function that provides info to users and obtains their approval before a program can make a change to the computers settings
  3. a undate that makes the software better or more efficient
  4. an infected computer that is under the remote control of an attacker
  5. getting information from a device without the owner knowing
  6. a backup of your data saved on a hard
  7. software that keeps data on where you hit the keyboard
  8. data that is compromised and wont be given back unless a fee is paid

19 Clues: an attacker who controls a botneta backup of your data saved on a hardsoftware made to stop the spread of malwaresoftware that runs as a program on the local computersoftware that keeps data on where you hit the keyboardsoftware code that gives access to a program or servicea undate that makes the software better or more efficient...

Cybersecurity Awareness 2022-10-21

Cybersecurity Awareness crossword puzzle
Across
  1. ___ is a type of software designed to help the user's computer detect viruses and avoid them.
  2. ___ is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  3. The terms "bug" and "debugging" are popularly attributed to ___.
  4. Malicious actors can also use ____ to capture your personal and financial information such as credit card number, CVV, PIN, password and other sensitive information.
  5. Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.
  6. ___ is when attackers send malicious emails designed to trick people into falling for a scam.
  7. ___is a type of software designed to gain unauthorized access or to cause damage to a computer.
Down
  1. ___ National nodal agency for all measures to protect nation's critical information infrastructure.
  2. ___ Advertising software can be used to spread malware.
  3. ___ is actually considered the first computer virus?
  4. ___ is an authorization protocol being a standard designed to allow a website or application to access resources hosted by other web apps on behalf of a user.
  5. ___ is a program that secretly records what a user does so that cybercriminals can make use of this information.
  6. ___ is a cryptographic protocol for encrypting data to be transferred over a network which uses protocol to sets up implicit connection.
  7. ___ is a type of malware that is disguised as legitimate software.
  8. ___ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  9. ___ locks and encrypts the victim's data, important files and then demands a payment to unlock and decrypt the data.
  10. In-order to ensure the security of the data/information, we need to ___ the data.
  11. ___ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
  12. ___ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
  13. Which Wi-Fi communication protocol is more Secure?

20 Clues: Which Wi-Fi communication protocol is more Secure?___ is actually considered the first computer virus?___ Advertising software can be used to spread malware.The terms "bug" and "debugging" are popularly attributed to ___.___ is a type of malware that is disguised as legitimate software....

Cybersecurity Crossword 2023-01-26

Cybersecurity Crossword crossword puzzle
Across
  1. altered video to spread disinformation
  2. unique string that identifies device
  3. helps protect system
  4. malware that transmits private data
  5. helps prevent unauthorized network access
  6. flood website/server until crash
  7. codes that protect data
  8. cybersecurity professionals
  9. designs data communications network
Down
  1. unauthorized access to sensitive info
  2. software designed to disrupt system
  3. plans and implements security
  4. remote encrypted network access
  5. helps prevent unauthorized access
  6. criminal hackers
  7. requests payment to unlock
  8. malware hidden inside legitimate file
  9. mimics legitimate websites/emails
  10. network of computers used for cyber attacks

19 Clues: criminal hackershelps protect systemcodes that protect datarequests payment to unlockcybersecurity professionalsplans and implements securityremote encrypted network accessflood website/server until crashhelps prevent unauthorized accessmimics legitimate websites/emailssoftware designed to disrupt systemmalware that transmits private data...

Introduction to Cybersecurity 2024-02-22

Introduction to Cybersecurity crossword puzzle
Across
  1. is the act of skirting or breaking through security boundaries.
  2. a type of hacker that is generally ethical and law-abiding.
  3. focuses on keeping applications or programs secure throughout their lifecycle.
  4. certification validates the holders have met the baseline of understanding required by all cybersecurity job positions.
Down
  1. is based on the key concepts of information assurance.
  2. an attack in which the attacker is connectedto a network and monitors an authenticated session.
  3. a set of policies and procedures meant to improve and guide anorganization’s cybersecurity practices.
  4. Is the protection of digital devices and their connected networks from danger and threats.
  5. a process in which organizations determine the information about themselves which should be kept private versus what can be shared with the public.
  6. prevents and protects unauthorized intrusions into the network.
  7. which is a set of security controls designed to protect payment account security.
  8. includes threats such as viruses, worms, Trojan horses.

12 Clues: is based on the key concepts of information assurance.includes threats such as viruses, worms, Trojan horses.a type of hacker that is generally ethical and law-abiding.is the act of skirting or breaking through security boundaries.prevents and protects unauthorized intrusions into the network....

cybersecurity terms 2022-12-16

cybersecurity terms crossword puzzle
Across
  1. a computer connected to a network that has been compromised by a hacker
  2. a kind of software used to prevent, scan, detect and delete viruses from a computer
  3. software that enables a user to covert information from another computer by transmitting data from their hard drive
  4. software that allows an unauthorized user to access a computer
  5. a type of malware that self replicates and infects other computers
  6. a class of cyberattacks in which attackers remotely execute commands to place malware or other malicious code on your computer or network
  7. a type of malware that disguises itself as legitimate code or software\
  8. software that displays advertising material
  9. A software-based firewall installed on a desktop or laptop computer to monitor and control its incoming and outgoing network traffic
Down
  1. a network security device that monitors and filters incoming and outgoing network traffic
  2. a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages
  3. malicious software that blocks access to a computer until a sum of money is paid
  4. an undocumented way of gaining access to a computer system
  5. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  6. a network of computers with malicious software
  7. any program that prohibits a pop-up at some point in time
  8. hackers who use automated techniques to scan specific network ranges and find vulnerable systems
  9. software updates that address security vulnerabilities

18 Clues: software that displays advertising materiala network of computers with malicious softwaresoftware updates that address security vulnerabilitiesany program that prohibits a pop-up at some point in timean undocumented way of gaining access to a computer systemsoftware that allows an unauthorized user to access a computer...

AI TECHNOLOGY AND SOCIETY 2024-03-06

AI TECHNOLOGY AND SOCIETY crossword puzzle
Across
  1. Computing
  2. Talkbot
  3. Artificial
  4. 3Dimensional
  5. Automation
Down
  1. Instructions
  2. Information
  3. Protection
  4. Learning
  5. Network
  6. CyberSpace

11 Clues: TalkbotNetworkLearningComputingProtectionArtificialCyberSpaceAutomationInformationInstructions3Dimensional

dasd 2021-04-30

dasd crossword puzzle
Across
  1. List
  2. flotante, Float
  3. entero, Integer
  4. Sprite
  5. Loop
  6. Variable
  7. Autonomous
  8. binarios Binary numbers
  9. Else
  10. If
  11. Cyber
  12. automático, Machine learning
  13. If else
  14. neuronales, nueral networks
Down
  1. Settings
  2. cybersecurity
  3. Function
  4. Python
  5. el lazo, For loop
  6. Print
  7. Commit
  8. Array
  9. while, While loop
  10. activo, Uptime
  11. Tap

25 Clues: IfTapListLoopElsePrintArrayCyberSpritePythonCommitIf elseSettingsFunctionVariableAutonomouscybersecurityactivo, Uptimeflotante, Floatentero, Integerel lazo, For loopwhile, While loopbinarios Binary numbersneuronales, nueral networksautomático, Machine learning

dasd 2021-04-30

dasd crossword puzzle
Across
  1. List
  2. flotante, Float
  3. entero, Integer
  4. Sprite
  5. Loop
  6. Variable
  7. Autonomous
  8. binarios Binary numbers
  9. Else
  10. If
  11. Cyber
  12. automático Machine learning
  13. If else
  14. neuronales nueral networks
Down
  1. Settings
  2. cybersecurity
  3. Function
  4. Python
  5. el lazo, For loop
  6. Print
  7. Commit
  8. Array
  9. while, While loop
  10. activo, Uptime
  11. Tap

25 Clues: IfTapListLoopElsePrintArrayCyberSpritePythonCommitIf elseSettingsFunctionVariableAutonomouscybersecurityactivo, Uptimeflotante, Floatentero, Integerel lazo, For loopwhile, While loopbinarios Binary numbersneuronales nueral networksautomático Machine learning

Year 12 Cybersecurity 2023-08-16

Year 12 Cybersecurity crossword puzzle
Across
  1. A hacker who operates between ethical and unethical boundaries, often exposing vulnerabilities without permission.
  2. An individual who simulates cyberattacks to evaluate the security of a system.
  3. A hacker who uses their skills to help organizations identify and fix security vulnerabilities.
  4. Measures taken to protect physical assets and facilities from unauthorized access or harm.
  5. The accuracy and reliability of data, protected from unauthorized alteration.
  6. A hacker who engages in malicious activities for personal gain or to cause harm.
  7. Mistakes made by individuals that can lead to security breaches.
  8. Creating multiple security layers to prevent unauthorized access at different levels.
  9. Covert agents who gather information on behalf of a government or organization.
  10. An individual or group that uses cyberattacks to create fear and chaos for political or ideological reasons.
Down
  1. Ensuring that sensitive information is accessible only to authorized individuals.
  2. The ability to identify and recognize cybersecurity threats and incidents.
  3. Making sure that data is accessible when needed, without unauthorized disruptions.
  4. Individuals with advanced computer skills who manipulate software or systems for various purposes.
  5. Covert activities aimed at gathering confidential information from competitors or enemies.
  6. Individuals who engage in illegal activities on the internet for financial gain.
  7. People within an organization who have access to sensitive information and can pose security risks.
  8. Implementing measures to discourage potential attackers from targeting a system or organization.
  9. Introducing obstacles and barriers to slow down attackers' progress.
  10. The process of restoring systems and data after a cybersecurity breach or incident.
  11. Taking swift actions to address and mitigate cybersecurity incidents.

21 Clues: Mistakes made by individuals that can lead to security breaches.Introducing obstacles and barriers to slow down attackers' progress.Taking swift actions to address and mitigate cybersecurity incidents.The ability to identify and recognize cybersecurity threats and incidents....

Cybersecurity Awareness 2023-09-06

Cybersecurity Awareness crossword puzzle
Across
  1. Method of secure communication (12 letters).
  2. Malware that demands payment to restore access (10 letters).
  3. Software that collects information without consent (7 letters).
  4. A group of interconnected devices (7 letters).
  5. A potential danger or risk (6 letters).
  6. Software that can infect your computer. (5 letters).
  7. Information stored on a computer (4 letters).
  8. Unauthorized access to a computer system (7 letters).
Down
  1. Process of converting data into a code (11 letters).
  2. A fraudulent scheme to deceive people (4 letters).
  3. The practice of using two different authentication methods (10 letters).
  4. A person who creates software.
  5. Weakness in a system that can be exploited (13 letters).
  6. Measures taken to protect against cyber threats (8 letters).
  7. A person interacting with a computer system (4 letters).
  8. A network security software. (8 letters).
  9. A common email-based attack (8 letters).
  10. Software to protect against malware (9 letters).

18 Clues: A person who creates software.A potential danger or risk (6 letters).A common email-based attack (8 letters).A network security software. (8 letters).Method of secure communication (12 letters).Information stored on a computer (4 letters).A group of interconnected devices (7 letters).Software to protect against malware (9 letters)....

Cybersecurity terms 2024-03-12

Cybersecurity terms crossword puzzle
Across
  1. horse Malicious software disguised innocuously.
  2. Identity verification using traits.
  3. Malicious software threat
  4. Malicious code component.
  5. security Device-specific protection measures.
  6. policy Guidelines for security measures.
  7. Applying software updates regularly.
  8. Weakness in system security.
Down
  1. Deceptive email communication.
  2. testing Ethical hacking simulation.
  3. Malware with system-level access.
  4. hygiene Good digital security practices.
  5. incident Breach or violation event.
  6. Identity verification using traits.
  7. Malicious digital intrusion attempt.
  8. Network security barrier.
  9. Data protection through scrambling.
  10. Secure communication technique.
  11. Software against malicious programs.
  12. hat Ethical security expert.

20 Clues: Network security barrier.Malicious software threatMalicious code component.Weakness in system security.Deceptive email communication.Secure communication technique.Malware with system-level access.testing Ethical hacking simulation.Identity verification using traits.Identity verification using traits.Data protection through scrambling....

Cybersecurity Awareness 2023-10-03

Cybersecurity Awareness crossword puzzle
Across
  1. A process by which a system verifies the identity of a user who wishes to access it.
  2. Small piece of data stored on a user's computer by the web browser while browsing a website.
  3. A set of static analysis tools for investigating and comparing phishing kit content within single or multiple kits.
  4. Manipulating individuals into divulging confidential information through psychological tactics.
  5. A type of malicious software that blocks access to a user's data until a sum of money is paid.
  6. A secure bridge between your device and the internet, often used to keep browsing activity private.
  7. AI-generated fake content, often video, that looks convincingly real.
  8. A collection of software and tools to make phishing campaigns easier for attackers.
  9. Software designed to harm or exploit any device, network, service, or program.
Down
  1. Targeted phishing attempts directed at specific individuals or companies.
  2. A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
  3. Malicious code that's activated by a specific condition or event.
  4. Information used to understand the enemy's strengths and weaknesses.
  5. Phishing attacks that are executed via SMS.
  6. Malicious software that records every keystroke to secretly gather personal information.
  7. Ensuring operations and data adhere to established rules and regulations.
  8. A network of private computers infected with malicious software and controlled as a group.
  9. A secret combination, often alphanumeric, used for authentication.

18 Clues: Phishing attacks that are executed via SMS.Malicious code that's activated by a specific condition or event.A secret combination, often alphanumeric, used for authentication.Information used to understand the enemy's strengths and weaknesses.AI-generated fake content, often video, that looks convincingly real....

Cybersecurity Scramble 2023-10-24

Cybersecurity Scramble crossword puzzle
Across
  1. Multiple sources sending an overwhelming amount of packets to crash the device.
  2. Holds computer data hostage in exchange for money.
  3. Requires end-user initiation.
  4. Sending an overwhelming amount of packets to crash the device.
  5. Phishing by impersonating businesses.
  6. A _ attack that attacks a vulnerability on a network unknown to the vendor.
  7. Triggers malicious code.
  8. Creates backdoors in the operating system.
  9. Replicates using network vulnerabilities
  10. Sending unauthorized messages to another bluetooth device.
Down
  1. Scares the victim into infecting their system.
  2. Phishing using calls.
  3. Creates ad-popups for the authors to generate revenue.
  4. Copying a victims information from bluetooth.
  5. Malware that carries out operations pretending to be something else.
  6. Phishing using texts.
  7. Lets the attacker view the actions of the user and their data.
  8. Phishing that targets high profile individuals.

18 Clues: Phishing using calls.Phishing using texts.Triggers malicious code.Requires end-user initiation.Phishing by impersonating businesses.Replicates using network vulnerabilitiesCreates backdoors in the operating system.Copying a victims information from bluetooth.Scares the victim into infecting their system....

Internal Audit Holiday Fun 2023-12-14

Internal Audit Holiday Fun crossword puzzle
Across
  1. TEST
  2. UNLOCK
  3. SWEET
  4. TECH SAFETY
  5. CHEAT
  6. CHEAT
  7. WENDY'S TREAT
Down
  1. PROCESS SAFETY MEASURES
  2. MEAN ONE
  3. PROBABILITY
  4. JOLLY
  5. APPROVAL
  6. RED NOSE

13 Clues: TESTJOLLYSWEETCHEATCHEATUNLOCKMEAN ONEAPPROVALRED NOSEPROBABILITYTECH SAFETYWENDY'S TREATPROCESS SAFETY MEASURES

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. An unwanted software that monitors and gathers information on a person and how they use their computer, for example monitoring your internet usage to send you harmless but annoying adverts.
  2. A series of letters, numbers or symbols that protect data in your computer.
  3. A type of malware that exploits vulnerabilities in the a computer’s operating system and once in uses the system’s resources.
  4. A person that tries to access your data by getting into your computer, for example by figuring our your passwords.
  5. Locks a computer, encrypts files, and prevents the user from being able to access the data.
Down
  1. A more sinister spyware that records every keystroke made by a user.
  2. It infects a computer and causes it to download or display adverts or pop-ups when the victim is online.
  3. Being able to edit and view personal files like photos or videos.
  4. A self-replicating software, to get into the computer it has to be downloaded as part of another file which is then executed on the computer.
  5. A specific type of computer virus that tricks you into downloading it onto your computer. Once in your computer it might open a ‘back door’ to give an attacker remote access to your computer.

10 Clues: Being able to edit and view personal files like photos or videos.A more sinister spyware that records every keystroke made by a user.A series of letters, numbers or symbols that protect data in your computer.Locks a computer, encrypts files, and prevents the user from being able to access the data....

Cybersecurity 2021-06-02

Cybersecurity crossword puzzle
Across
  1. Intention to damage a person.
  2. The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  3. Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
  4. It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
  5. Ability of a user to access information or resources in a specified location and in the correct format.
  6. Illegal access to a computer system for the purpose od causing damage.
Down
  1. Malicious software designed to damage.
  2. Without permission or authorization
  3. Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
  4. It's the protection of personal information.

10 Clues: Intention to damage a person.Without permission or authorizationMalicious software designed to damage.It's the protection of personal information.Illegal access to a computer system for the purpose od causing damage.It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses....

Cybersecurity 2022-06-29

Cybersecurity crossword puzzle
Across
  1. Purchasing of asset
  2. hardware and software
  3. Longeststage of asset lifecycle
  4. Tangible asset
  5. Intangible asset
  6. tangible asset
Down
  1. physical asset
  2. Digital media and content
  3. Wear and tear situation
  4. Costlier than traditional
  5. plumbing installation

11 Clues: physical assetTangible assettangible assetIntangible assetPurchasing of assethardware and softwareplumbing installationWear and tear situationDigital media and contentCostlier than traditionalLongeststage of asset lifecycle

Cybersecurity 2023-10-31

Cybersecurity crossword puzzle
Across
  1. a hacker that is malicious
  2. the art of protecting devices and data from unauthorized access
  3. a hacker that is doing good
  4. when your personal data is kept secret
Down
  1. a hacker that works without permission
  2. when you personal data is available
  3. Multi-Factor________ something you have, know, and are
  4. Internet of __________
  5. a kind of human engineering
  6. an unusual way to solve a problem

10 Clues: Internet of __________a hacker that is maliciousa hacker that is doing gooda kind of human engineeringan unusual way to solve a problemwhen you personal data is availablea hacker that works without permissionwhen your personal data is kept secretMulti-Factor________ something you have, know, and are...

IEM July SM Crossword 2022-07-26

IEM July SM Crossword crossword puzzle
Across
  1. Each year, over 500,000 ____ are affected by house fires.
  2. ________ is creating a common baseline for cybersecurity performance goals in critical infrastructure.
  3. National Oceanic & Atmospheric Administration released a _______ Community Guide Tool for community planners and decision makers.
  4. On July 17th is also known as what?
Down
  1. People who regularly have ____ interactions with others tend to live longer, boost their mood, and have a sense of purpose.
  2. The US Postal Service processes and delivers 425.3 ______ pieces of mail each day.
  3. NIST is updating its _____ Framework (CSF) to keep pace with the evolving cybersecurity landscape.
  4. The ___ app provides access to weather alerts, disaster resources and preparedness tips.
  5. ______ bring the risk of fires, injuries, and death.
  6. July 25th is National Hire a _____ day.

10 Clues: On July 17th is also known as what?July 25th is National Hire a _____ day.______ bring the risk of fires, injuries, and death.Each year, over 500,000 ____ are affected by house fires.The US Postal Service processes and delivers 425.3 ______ pieces of mail each day....

Cybersecurity 2022-09-16

Cybersecurity crossword puzzle
Across
  1. update to an operating system to repair an bug or vulnerability
  2. tool installed to give an attacker easier access to the compromised system
  3. Electronic junk mail or junk newsgroup postings.
  4. generic term for a number of different types of malicious code.
  5. User acting with malicious intent to compromise a system
  6. term to describe connecting multiple separate networks together.
Down
  1. use a computer to gain unauthorized access to data in a system
  2. program that can retrieve and display information from servers on the World Wide Web
  3. Malware that locks/encrypts computers
  4. e-mails that try to trick a user into entering valid credentials at a fake website

10 Clues: Malware that locks/encrypts computersElectronic junk mail or junk newsgroup postings.User acting with malicious intent to compromise a systemuse a computer to gain unauthorized access to data in a systemupdate to an operating system to repair an bug or vulnerabilitygeneric term for a number of different types of malicious code....

Cybersecurity 2023-10-31

Cybersecurity crossword puzzle
Across
  1. a hacker that is malicious
  2. the art of protecting devices and data from unauthorized access
  3. a hacker that is doing good
  4. when your personal data is kept secret, another word for secret
Down
  1. a hacker that works without permission
  2. when you personal data is available (another word for available)
  3. Multi-Factor________ something you have, know, and are
  4. Internet of __________ (network of connected devices)
  5. a kind of human engineering with no coding
  6. an unusual way to solve a problem

10 Clues: a hacker that is maliciousa hacker that is doing goodan unusual way to solve a problema hacker that works without permissiona kind of human engineering with no codingInternet of __________ (network of connected devices)Multi-Factor________ something you have, know, and arethe art of protecting devices and data from unauthorized access...

Cybersecurity 2023-11-15

Cybersecurity crossword puzzle
Across
  1. A cryptographic attack on hash collisions
  2. A sudden unplanned event.
  3. Something built in to or used in a system to address gaps or weaknesses in the controls that could otherwise lead to an exploit.
  4. An attack that seeks to obtain personal or private financial information through domain spoofing
  5. The action of multiple attackers planning a cyberattack
Down
  1. The art of exploiting bugs and weaknesses that exist in the telephone system
  2. A process of changing hardware and software configurations to make computers and devices as secure as possible.
  3. The capture and monitoring of network IP packets using a packet sniffer
  4. A type of fraud in which an attacker attempts to trick the victim into providing private information.
  5. The act of unscrambling ciphertext into plaintext

10 Clues: A sudden unplanned event.A cryptographic attack on hash collisionsThe act of unscrambling ciphertext into plaintextThe action of multiple attackers planning a cyberattackThe capture and monitoring of network IP packets using a packet snifferThe art of exploiting bugs and weaknesses that exist in the telephone system...

CYBERSECURITY 2024-01-14

CYBERSECURITY crossword puzzle
Across
  1. Online storage.
  2. Decryption necessity.
  3. Securely lock files.
  4. Harmful software.
  5. Fake software tactic.
Down
  1. Ransomware type.
  2. Encrypting malware.
  3. Ensuring privacy.
  4. Data preservation.
  5. Remote access method.

10 Clues: Online storage.Ransomware type.Harmful software.Ensuring privacy.Data preservation.Encrypting malware.Securely lock files.Decryption necessity.Fake software tactic.Remote access method.

Cybersecurity 2024-04-03

Cybersecurity crossword puzzle
Across
  1. A computer attack aimed at making a service unavailable.
  2. A program/device that protects a network.
  3. A type of malware that looks like a legimate program and is undetected by the anti-virus
  4. A network of computers infected by malware that are under the control of a single attacking party.
  5. A technique for protecting data by transforming it irreversibly.
Down
  1. A technique of symmetric encryption.
  2. A hashing algorithm which is the most used in secret-keys transfert.
  3. A known certfication authority who offers free certificates.
  4. A brand that makes cybersecurity devices especially for companies.
  5. A technique used by fraudsters to obtain personal information with the aim of committing identity theft.

10 Clues: A technique of symmetric encryption.A program/device that protects a network.A computer attack aimed at making a service unavailable.A known certfication authority who offers free certificates.A technique for protecting data by transforming it irreversibly.A brand that makes cybersecurity devices especially for companies....

IEM's December Social Media Crossword Puzzle 2021-12-20

IEM's December Social Media Crossword Puzzle crossword puzzle
Across
  1. United States Space Force
  2. State Association of Counties Annual Meeting
  3. IEMer who moderated a discussion on wildfire resilience & prevention at #NDRC21 (last name)
  4. Follow Cybersecurity and Infrastructure Security Agency’s ______ best practices
  5. IEM’s innovative GIS ______
  6. IEMer who moderated the panel, Best Practice Programs at the State Level (last name)
  7. FEMA’s interactive Program Planning Toolkit
  8. FEMA’s 2022-2026 ____ ____
  9. Our thoughts are with the communities in Kentucky and the Midwest impacted by
Down
  1. AshBritt-IEM Health had the pleasure of meeting First Lady _____
  2. The IEM family would like to wish you and yours
  3. New FEMA Deputy Administrator (last name)
  4. Have you gotten you flu _____?
  5. It’s time to get into the holiday spirit by breaking out your…
  6. New COVID-19 variant

15 Clues: New COVID-19 variantUnited States Space ForceFEMA’s 2022-2026 ____ ____IEM’s innovative GIS ______Have you gotten you flu _____?New FEMA Deputy Administrator (last name)FEMA’s interactive Program Planning ToolkitState Association of Counties Annual MeetingThe IEM family would like to wish you and yours...

Cybersecurity 2021-02-28

Cybersecurity crossword puzzle
Across
  1. Your data was not corrupted even though it crashed due to which feature of your NTFS system drive?
  2. The type of operating system that is permanently programmed into a hardware device.
  3. A _____ determines how memory is used.
  4. The most common Mobile OS.
Down
  1. The type of software license that allows a predetermined number of people to use the account at the same time.
  2. What is saved even when in private browsing?
  3. Your web browser is showing an outdated picture on a website that you visit often. Which of the following would be the best choice for attempting to fix this issue? Clear _____
  4. The most popular OS for desktops and laptops.
  5. An alert pops up on your screen informing you of a possible vulnerability in your system. Which security method is most likely responsible for sending this alert? _____ software
  6. The ____ accounts are responsible for creating new user accounts and setting permissions.

10 Clues: The most common Mobile OS.A _____ determines how memory is used.What is saved even when in private browsing?The most popular OS for desktops and laptops.The type of operating system that is permanently programmed into a hardware device.The ____ accounts are responsible for creating new user accounts and setting permissions....

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. Needs to be downloaded as part of another file which is then executed on the computer.
  2. It can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts
  3. Much similar to phishing but uses an SMS message
  4. Is software that is designed to gain access to your computer with malicious intent.
  5. Locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
Down
  1. Specific type of computer virus that tricks you into downloading it onto your computer.
  2. Unwanted software that monitors and gathers information on a person and how they use their computer.
  3. Replicate themselves but do not attach themselves to files as a virus does.
  4. Is a cybercrime in which a target/s are contacted by email, text message or telephone by posing as a legitimate institution.
  5. A secret word/phrase used to protect important log-in info on different websites

10 Clues: Much similar to phishing but uses an SMS messageReplicate themselves but do not attach themselves to files as a virus does.A secret word/phrase used to protect important log-in info on different websitesIs software that is designed to gain access to your computer with malicious intent....

Cybersecurity! 2022-09-22

Cybersecurity! crossword puzzle
Across
  1. person who uses computers to gain access to computers without consent
  2. stopping something from happening
  3. a type of malicious software that is installed without the user knowing to gain sensitive information on a system.
  4. protects your computer from attacks
  5. something a user clicks on to go to another page
Down
  1. guidelines for workplace procedures
  2. an attempt to damage or destroy a network
  3. keep safe from harm
  4. knowing of a situation or fact
  5. emails or texts sent to try and get personal information

10 Clues: keep safe from harmknowing of a situation or factstopping something from happeningguidelines for workplace proceduresprotects your computer from attacksan attempt to damage or destroy a networksomething a user clicks on to go to another pageemails or texts sent to try and get personal information...

Cybersecurity 2022-12-05

Cybersecurity crossword puzzle
Across
  1. it’s when a hacker changes the IP address of an email so that it seems to come from a trusted source.
  2. A wiper is a type of malware with a single purpose: to erase user data and ensure it can’t be recovered.
  3. While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking.
  4. A rootkit is software that gives malicious actors remote control of a victim’s computer with full administrative privileges.
  5. A form of malware used by hackers to spy on you and your computer activities.
Down
  1. a wide variety of bad software used to infect and/or damage a system, most often delivered via spam emails.
  2. Worms target vulnerabilities in operating systems to install themselves into networks.
  3. A scam where a hacker poses as a legitimate business or organization (especially credit card companies, banks, charities, Internet providers, other utilities) in order to fool the victim
  4. it kidnaps your computer and holds it for ransom, hence the clever name.
  5. disguises itself as desirable code

10 Clues: disguises itself as desirable codeit kidnaps your computer and holds it for ransom, hence the clever name.A form of malware used by hackers to spy on you and your computer activities.Worms target vulnerabilities in operating systems to install themselves into networks....

INF Crossword Puzzle 2024-01-24

INF Crossword Puzzle crossword puzzle
Across
  1. Game Changers
  2. Safety Protocol
  3. Private
  4. Machinery
  5. Code
  6. Man-Made
Down
  1. Design
  2. Storage
  3. Connections
  4. Computer Procedure
  5. Login

11 Clues: CodeLoginDesignStoragePrivateMan-MadeMachineryConnectionsGame ChangersSafety ProtocolComputer Procedure

Cybersecurity 2021-06-02

Cybersecurity crossword puzzle
Across
  1. Intention to damage a person
  2. The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  3. Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
  4. It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
  5. Ability of a user to access information or resources in a specified location and in the correct format.
  6. Illegal access to a computer system for the purpose od causing damage.
Down
  1. Malicious software designed to damage.
  2. Without permission or authorization
  3. Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
  4. It's the protection of personal information.

10 Clues: Intention to damage a personWithout permission or authorizationMalicious software designed to damage.It's the protection of personal information.Illegal access to a computer system for the purpose od causing damage.It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses....

cybersecurity 2022-05-06

cybersecurity crossword puzzle
Across
  1. eg.: 192.160.81.1
  2. A network security system
  3. background process of stealing data
  4. Virtual Private Network
  5. A man who hacks
Down
  1. sharing negative content about someone else
  2. denial of internet service attack
  3. baiting to reveal personal information
  4. A type of malware that steals data
  5. privileged acces managemen (or a brawl stars character)

10 Clues: A man who hackseg.: 192.160.81.1Virtual Private NetworkA network security systemdenial of internet service attackA type of malware that steals databackground process of stealing databaiting to reveal personal informationsharing negative content about someone elseprivileged acces managemen (or a brawl stars character)

Cybersecurity 2022-11-17

Cybersecurity crossword puzzle
Across
  1. chats for you
  2. irritating
  3. attacks specific servers
  4. covid
  5. rigs elections
Down
  1. forced advertising
  2. knowingly downloaded
  3. ransoms your files
  4. wastes network bandwidth
  5. shops for you

10 Clues: covidirritatingchats for youshops for yourigs electionsforced advertisingransoms your filesknowingly downloadedwastes network bandwidthattacks specific servers

CYBERSECURITY 2020-06-13

CYBERSECURITY crossword puzzle
Across
  1. An occasion when private information can be seen by people who should not be able to see it is called data ... .
  2. A string of characters that allows access to a computer system or service.
  3. A web page or screen that updates often to show the latest information.
  4. The manner in which the components of a computer or computer system are organized and integrated.
Down
  1. A piece of code which is capable of copying itself and can corrupt the system or destroy data.
  2. A software designed to interfere with a computer´s normal functioning.
  3. The action to make something stronger or more important is called ... up.
  4. A type of utility used for scanning and removing viruses from a computer is called anti-virus ... .
  5. An attempt by hackers to damage or destroy a computer network or system.
  6. The practice of examining large pre-existing databases in order to generate new information is called data ...

10 Clues: A software designed to interfere with a computer´s normal functioning.A web page or screen that updates often to show the latest information.An attempt by hackers to damage or destroy a computer network or system.The action to make something stronger or more important is called ... up....

cybersecurity 2023-10-02

cybersecurity crossword puzzle
Across
  1. malware that is designed to steal personal information, such as passwords , CC numbers
  2. A process of identifying, assessing, and mitigating security risks
  3. A set of rules & procedures that govern the security of an organization's information systems.
  4. A system that prevents unauthorized access to a computer network
  5. Type of attack that attempts to trick users into revealing confidential information
  6. The process of verifying the identity of a user or device
Down
  1. process of granting access to resources based on a user's identity and permissions
  2. Encrypts a victim's files and demands payment to decrypt them
  3. Control to protect integrity of information
  4. A system that monitors a network for suspicious activity

10 Clues: Control to protect integrity of informationA system that monitors a network for suspicious activityThe process of verifying the identity of a user or deviceEncrypts a victim's files and demands payment to decrypt themA system that prevents unauthorized access to a computer networkA process of identifying, assessing, and mitigating security risks...