cybersecurity Crossword Puzzles

Cybersecurity 2022-11-17

Cybersecurity crossword puzzle
Across
  1. chats for you
  2. irritating
  3. attacks specific servers
  4. covid
  5. rigs elections
Down
  1. forced advertising
  2. knowingly downloaded
  3. ransoms your files
  4. wastes network bandwidth
  5. shops for you

10 Clues: covidirritatingchats for youshops for yourigs electionsforced advertisingransoms your filesknowingly downloadedwastes network bandwidthattacks specific servers

CYBERSECURITY 2020-06-13

CYBERSECURITY crossword puzzle
Across
  1. An occasion when private information can be seen by people who should not be able to see it is called data ... .
  2. A string of characters that allows access to a computer system or service.
  3. A web page or screen that updates often to show the latest information.
  4. The manner in which the components of a computer or computer system are organized and integrated.
Down
  1. A piece of code which is capable of copying itself and can corrupt the system or destroy data.
  2. A software designed to interfere with a computer´s normal functioning.
  3. The action to make something stronger or more important is called ... up.
  4. A type of utility used for scanning and removing viruses from a computer is called anti-virus ... .
  5. An attempt by hackers to damage or destroy a computer network or system.
  6. The practice of examining large pre-existing databases in order to generate new information is called data ...

10 Clues: A software designed to interfere with a computer´s normal functioning.A web page or screen that updates often to show the latest information.An attempt by hackers to damage or destroy a computer network or system.The action to make something stronger or more important is called ... up....

cybersecurity 2023-10-02

cybersecurity crossword puzzle
Across
  1. malware that is designed to steal personal information, such as passwords , CC numbers
  2. A process of identifying, assessing, and mitigating security risks
  3. A set of rules & procedures that govern the security of an organization's information systems.
  4. A system that prevents unauthorized access to a computer network
  5. Type of attack that attempts to trick users into revealing confidential information
  6. The process of verifying the identity of a user or device
Down
  1. process of granting access to resources based on a user's identity and permissions
  2. Encrypts a victim's files and demands payment to decrypt them
  3. Control to protect integrity of information
  4. A system that monitors a network for suspicious activity

10 Clues: Control to protect integrity of informationA system that monitors a network for suspicious activityThe process of verifying the identity of a user or deviceEncrypts a victim's files and demands payment to decrypt themA system that prevents unauthorized access to a computer networkA process of identifying, assessing, and mitigating security risks...

Cybersecurity 2024-02-18

Cybersecurity crossword puzzle
Across
  1. Code red is a type of computer _______.
  2. Its Chakravyuh feature is an end-point anti- malware and antivirus software that creates a virtual layer between the user and the internet, blocking hackers from accessing sensitive data.which OS is refered here.
  3. In ethical hacking and cyber security, there are ______types of scanning.
  4. what is transformed with the help of a cipher algorithm.
  5. The technique used to hide information inside a picture.
Down
  1. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the
  2. Oldest phone hacking technique used by hackers to make free calls.
  3. The malware which does not replicate or clone through an infection.
  4. The debian based OS which has 2 virtual machines and focuses on preserving user's data.
  5. A type of attack which uses a fraudulent server with a relay address.

10 Clues: Code red is a type of computer _______.what is transformed with the help of a cipher algorithm.The technique used to hide information inside a picture.Oldest phone hacking technique used by hackers to make free calls.The malware which does not replicate or clone through an infection....

CyberSecurity 2024-02-24

CyberSecurity crossword puzzle
Across
  1. What first changed?
  2. What else did the attackers turn off?
  3. How did the attacker get into the car computer?
  4. How to prevent this from happening
  5. What type of breech was it?
Down
  1. What did the hackers want to do?
  2. What did the video call the car?
  3. Was the car new or old?
  4. who attacked him?
  5. What was he in?

10 Clues: What was he in?who attacked him?What first changed?Was the car new or old?What type of breech was it?What did the hackers want to do?What did the video call the car?How to prevent this from happeningWhat else did the attackers turn off?How did the attacker get into the car computer?

Cybersecurity 2024-03-19

Cybersecurity crossword puzzle
Across
  1. Secret code used to access a device or network
  2. Process of verifying identity
  3. Software designed to harm a device or network
  4. Unauthorized access to a device or network
Down
  1. Criminal activity carried out using technology
  2. Malicious attempt to damage or disrupt a computer system
  3. Weakness in a system that can be exploited
  4. Fraudulent attempt to gain sensitive information
  5. System designed to prevent unauthorized access
  6. Method of protecting information

10 Clues: Process of verifying identityMethod of protecting informationWeakness in a system that can be exploitedUnauthorized access to a device or networkSoftware designed to harm a device or networkCriminal activity carried out using technologySecret code used to access a device or networkSystem designed to prevent unauthorized access...

cybersecurity 2024-02-21

cybersecurity crossword puzzle
Across
  1. Cyber-attack
  2. Action that guarantee the identity of a computer
  3. Error checking method
  4. Hash function
Down
  1. Unpredictable number generated by an algorithm
  2. Systems that are connected by each others
  3. Technological process for telling a computer which tasks to perform in order to solve problems
  4. One way encryption
  5. Internet protocol part of the transport layer
  6. Reference model of system interconnection

10 Clues: Cyber-attackHash functionOne way encryptionError checking methodSystems that are connected by each othersReference model of system interconnectionInternet protocol part of the transport layerUnpredictable number generated by an algorithmAction that guarantee the identity of a computer...

IEM's December Social Media Crossword Puzzle 2021-12-20

IEM's December Social Media Crossword Puzzle crossword puzzle
Across
  1. United States Space Force
  2. State Association of Counties Annual Meeting
  3. IEMer who moderated a discussion on wildfire resilience & prevention at #NDRC21 (last name)
  4. Follow Cybersecurity and Infrastructure Security Agency’s ______ best practices
  5. IEM’s innovative GIS ______
  6. IEMer who moderated the panel, Best Practice Programs at the State Level (last name)
  7. FEMA’s interactive Program Planning Toolkit
  8. FEMA’s 2022-2026 ____ ____
  9. Our thoughts are with the communities in Kentucky and the Midwest impacted by
Down
  1. AshBritt-IEM Health had the pleasure of meeting First Lady _____
  2. The IEM family would like to wish you and yours
  3. New FEMA Deputy Administrator (last name)
  4. Have you gotten you flu _____?
  5. It’s time to get into the holiday spirit by breaking out your…
  6. New COVID-19 variant

15 Clues: New COVID-19 variantUnited States Space ForceFEMA’s 2022-2026 ____ ____IEM’s innovative GIS ______Have you gotten you flu _____?New FEMA Deputy Administrator (last name)FEMA’s interactive Program Planning ToolkitState Association of Counties Annual MeetingThe IEM family would like to wish you and yours...

Cybersecurity Awareness 2021-10-27

Cybersecurity Awareness crossword puzzle
Across
  1. records keystrokes and sends its info to a hacker
  2. (three words) a term used to describe everyday objects that connect to the internet (such as fridges, thermostats, and smart speakers)
  3. verifying your identity with a username, password, or other piece of information
  4. hackers demand a ransom for the return of information after deploying this
  5. an audio or video clip that has been edited and changed to seem believable
  6. malware disguised as legitimate software
  7. the most common form of cryptocurrency
Down
  1. (two words) manipulating and deceiving people to get sensitive and private info; lying
  2. the practice of protecting critical systems and sensitive information from digital attacks
  3. emails, text messages, or other communication designed to convince you to give the sender personal information
  4. sends information from your computer to a third party without your knowledge
  5. short for malicious software
  6. use this to protect your information
  7. a way of hiding information
  8. a network security device that filters incoming and outgoing websites
  9. displays unauthorized ads on a user's screen
  10. short for virtual private network

17 Clues: a way of hiding informationshort for malicious softwareshort for virtual private networkuse this to protect your informationthe most common form of cryptocurrencymalware disguised as legitimate softwaredisplays unauthorized ads on a user's screenrecords keystrokes and sends its info to a hacker...

INF Crossword Puzzle 2024-01-24

INF Crossword Puzzle crossword puzzle
Across
  1. Game Changers
  2. Safety Protocol
  3. Private
  4. Machinery
  5. Code
  6. Man-Made
Down
  1. Design
  2. Storage
  3. Connections
  4. Computer Procedure
  5. Login

11 Clues: CodeLoginDesignStoragePrivateMan-MadeMachineryConnectionsGame ChangersSafety ProtocolComputer Procedure

Cybersecurity 2022-11-28

Cybersecurity crossword puzzle
Across
  1. manipulation of people into performing actions or give up confidential information.
  2. causes your computer to download or display malicious adverts or pop-ups
  3. a group of Internet-connected devices, each of which runs one or more bots. can be used to perform Distributed Denial-of-Service (DDoS)
  4. Designed to gain access to your computer with malicious intent.
  5. a type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information to the attacker
Down
  1. When infected, they locks/encrypted your computer or files, and demand money or else they will delete or publish it.
  2. replicate itself by maliciously modifying other computer programs and inserting code.
  3. Any malware that misleads users of its true intent. The term is derived from the Ancient Greek story.
  4. replicate itself in order to create traffic and slowing down the system.
  5. describes a social engineering act of obtaining someone else's personal information without their consent.

10 Clues: Designed to gain access to your computer with malicious intent.causes your computer to download or display malicious adverts or pop-upsreplicate itself in order to create traffic and slowing down the system.manipulation of people into performing actions or give up confidential information....

Cybersecurity 2022-11-18

Cybersecurity crossword puzzle
Across
  1. the protection of internet-connected systems such as hardware, software and data from cyberthreats
  2. engineering the term used for a broad range of malicious activities accomplished through human interactions.
  3. testing an authorized simulated attack performed on a computer system to evaluate its security
  4. category of malicious cyber-attacks that hackers or cybercriminals employ
  5. information such as facts and numbers used to analyze something or make decisions
  6. network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
  1. the measurement and statistical analysis of people's unique physical and behavioral characteristics
  2. when attackers send malicious emails designed to trick people into falling for a scam
  3. allow users to keep their software programs updated without having to check for and install available updates manually
  4. software designed to interfere with a computer's normal functioning

10 Clues: software designed to interfere with a computer's normal functioningcategory of malicious cyber-attacks that hackers or cybercriminals employinformation such as facts and numbers used to analyze something or make decisionswhen attackers send malicious emails designed to trick people into falling for a scam...

CyberSecurity 2023-01-05

CyberSecurity crossword puzzle
Across
  1. Should be constructed of upper and lower case letters, numbers, and special characters
  2. A flawed or weakness in computer system that could be exploited to violate the system's security.
  3. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  4. Hardware or software designed to prevent unauthorized access to or from a private network.
  5. Unauthorized access to a network, information systems, or application.
Down
  1. Verifying identity
  2. Fraudulent email purportedly from a reputable company attempting to get a personal information.
  3. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  4. The address of a webpage. Check the validity of it before clicking on it.
  5. A sequence of words or text used to control access to a computer; similar to a password.

10 Clues: Verifying identityUnauthorized access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it.Should be constructed of upper and lower case letters, numbers, and special charactersA sequence of words or text used to control access to a computer; similar to a password....

Cybersecurity 2021-03-08

Cybersecurity crossword puzzle
Across
  1. making a copy of original data
  2. software that causes harm to a computer
  3. a malicious computer program that is hidden in an application
  4. software that tracks the key strokes on the keyboard
  5. defrauding an online account holder of financial information by posing as a legitimate company
Down
  1. software that lets a user obtain covert information on your computer activities
  2. someone who exploits weaknesses in a computer system
  3. Software designed to detect and destroy a virus
  4. a standalone malicious computer program that replicates and spreads on a computer system
  5. software that encodes data and requires a key to decode

10 Clues: making a copy of original datasoftware that causes harm to a computerSoftware designed to detect and destroy a virussomeone who exploits weaknesses in a computer systemsoftware that tracks the key strokes on the keyboardsoftware that encodes data and requires a key to decodea malicious computer program that is hidden in an application...

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. data dater that has personal information such as your maiden name or your date of birth
  2. a person who uses computers to gain unauthorized access to data.
  3. you use it to login to websites and files
  4. Need to be attached to a file
  5. not known or seen or not meant to be known or seen by others.
Down
  1. what you do without getting permission to do it first
  2. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. Opens a back door which allows more malware to be loaded
  4. Uses vulnerabilities to move into your machine.
  5. when somebody sends an email giving you false information to make you give them something

10 Clues: Need to be attached to a fileyou use it to login to websites and filesUses vulnerabilities to move into your machine.what you do without getting permission to do it firstOpens a back door which allows more malware to be loadednot known or seen or not meant to be known or seen by others....

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. data dater that has personal information such as your maiden name or your date of birth
  2. a person who uses computers to gain unauthorized access to data.
  3. you use it to login to websites and files
  4. Need to be attached to a file
  5. not known or seen or not meant to be known or seen by others.
Down
  1. what you do without getting permission to do it first
  2. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. Opens a back door which allows more malware to be loaded
  4. Uses vulnerabilities to move into your machine.
  5. when somebody sends an email giving you false information to make you give them something

10 Clues: Need to be attached to a fileyou use it to login to websites and filesUses vulnerabilities to move into your machine.what you do without getting permission to do it firstOpens a back door which allows more malware to be loadednot known or seen or not meant to be known or seen by others....

CYBERSECURITY 2021-10-18

CYBERSECURITY crossword puzzle
Across
  1. The short form of malicious software - Malware
  2. A software that covertly monitors your online behavior
  3. A software or hardware device designed to protect your private data
  4. A tool that helps mask to location of the user to guarantee anonymity
  5. The practice of sending fraudulent communications that appear to come from a reputable source
Down
  1. HORSE A piece of malware that often allows a hacker to gain remote access to a computer through a back door
  2. A piece of malicious code that can replicate itself in order to spread the infection to other connected computers
  3. A technology that enables us to access our files through the internet remotely
  4. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
  5. An incident where a hacker gains unauthorized access to a computer or device

10 Clues: The short form of malicious software - MalwareA software that covertly monitors your online behaviorA software or hardware device designed to protect your private dataA tool that helps mask to location of the user to guarantee anonymityAn incident where a hacker gains unauthorized access to a computer or device...

cybersecurity 2023-04-02

cybersecurity crossword puzzle
Across
  1. worm A type of malware that spreads itself by copying itself to other computers on the same network (9 letters): _________ worm
  2. Malicious software that is designed to gain access to a computer system without the user's consent (7 letters): ________
  3. A technique used to trick users into revealing sensitive information, such as passwords or credit card numbers (9 letters): _________ing
  4. A type of attack that involves intercepting and altering communication between two parties (10 letters): _________-in-the-middle attack
  5. of Service A type of attack that attempts to make a computer or network resource unavailable to its intended users (8 letters): _________ of Service
Down
  1. exploit A type of attack that targets vulnerabilities in software or hardware to gain unauthorized access (8 letters): _________ exploit
  2. force A type of attack that involves guessing a password by trying many different combinations (9 letters): _________ force attack
  3. The process of converting data into an unreadable format to prevent unauthorized access (8 letters): _________tion
  4. A security protocol used to encrypt internet traffic (4 letters): ______
  5. A type of authentication that uses physical characteristics, such as fingerprints or facial

10 Clues: A security protocol used to encrypt internet traffic (4 letters): ______A type of authentication that uses physical characteristics, such as fingerprints or facialThe process of converting data into an unreadable format to prevent unauthorized access (8 letters): _________tion...

Cybersecurity 2023-08-23

Cybersecurity crossword puzzle
Across
  1. A string of characters that allows access to a computer system or service.
  2. Before an application goes live, it needs to go through a security ___.
  3. Process of updating to address security vulnerabilities.
  4. If a cyber attack is suspected, it should be reported to the ___ response team.
  5. SIEM tool from IBM.
Down
  1. A type of social engineering attack involving communication that pretends to be legitimate.
  2. We are all cyber ___.
  3. Used in cryptography to prove authenticity of a device, server, or user.
  4. FIM checks OS, database, and application software files to uncover tampering. What is the I in FIM?
  5. Linux distro used for ethical hacking.

10 Clues: SIEM tool from IBM.We are all cyber ___.Linux distro used for ethical hacking.Process of updating to address security vulnerabilities.Before an application goes live, it needs to go through a security ___.Used in cryptography to prove authenticity of a device, server, or user....

Cybersecurity 2023-11-24

Cybersecurity crossword puzzle
Across
  1. when your data is confidential, available and keeps it's integrity
  2. a special way of decrypting a cipher such as pigpen, morse code, or caesar
  3. internet of things
  4. hacker that does bad
  5. words or text that needs a key to decode
  6. hacker that does good but without permission
Down
  1. hiding a file or text in a picture
  2. hacking people without code
  3. authentication that is something you are, know or have
  4. hacker that does good

10 Clues: internet of thingshacker that does badhacker that does goodhacking people without codehiding a file or text in a picturewords or text that needs a key to decodehacker that does good but without permissionauthentication that is something you are, know or havewhen your data is confidential, available and keeps it's integrity...

Cybersecurity 2024-03-20

Cybersecurity crossword puzzle
Across
  1. A scam where a hacker poses as a legitimate business or organization in order to fool the victim into giving them sensitive personal information
  2. shield users against viruses, spyware, trojans, and worms that can damage computer hardware through email or web browsing.
  3. a network security device that monitors traffic to or from your network.
  4. Coding used to protect your information from hackers.
Down
  1. A hacker who is invited to test out computer systems and servers, looking for vulnerabilities "hacker ____ __ "
  2. The process of identifying a user’s identity
  3. malicious attempt to disrupt normal traffic to a web property.
  4. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
  5. a method of connecting a series of computers and devices in a private encrypted network,
  6. A piece of audio or video that has been altered and changed to make it seem authentic or credible.

10 Clues: The process of identifying a user’s identityCoding used to protect your information from hackers.malicious attempt to disrupt normal traffic to a web property.a network security device that monitors traffic to or from your network.a method of connecting a series of computers and devices in a private encrypted network,...

IT Cybersecurity 2023-03-29

IT Cybersecurity crossword puzzle
Across
  1. Wireless network that requires no authentication.
  2. A method that allows the frequency of the wireless network to be fine-tuned. Each channel is approximately 20 MHz wide.
  3. Wireless communication technology that allows two devices to connect to each other over a short distance.
  4. Combines multiple channels—or lanes—to increase the amount of traffic that a modem's highway can comfortably support.
  5. A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
  6. Wireless authentication method that allows for automatic connection between a device and the wireless access point.
  7. The wireless access point provides access to a wireless network.
  8. An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices.
  9. A communication method that allows two-way communication between two devices within a few centimeters of each other.
  10. Wireless authentication method that uses a passphrase to authenticate users.
  11. A method that combines channels into one to increase bandwidth.
Down
  1. Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest versions in use.
  2. Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
  3. An enhancement that allows multiple antennas to use the same radio frequency.
  4. The expected number of times an event will occur in a given time frame.
  5. Conceals the data's original meaning to prevent it from being known or used.
  6. An Ethernet cable provides the connection between a device connected to the network port and the switch.
  7. The interface between a computer's hardware and software.

18 Clues: Wireless network that requires no authentication.The interface between a computer's hardware and software.A method that combines channels into one to increase bandwidth.The wireless access point provides access to a wireless network.The expected number of times an event will occur in a given time frame....

Lucas' Graduation-Day Crossword 2021-10-14

Lucas' Graduation-Day Crossword crossword puzzle
Across
  1. Grand _ University
  2. Type of Ceremony
  3. GCU Street
  4. Years in School
  5. Type of Degree
  6. Lucas's Employer
  7. Graduate
  8. GCU Color
  9. Black Beans
Down
  1. Name of GCU Mascot
  2. Go...
  3. Lucas's Major
  4. Pomp
  5. group of people
  6. Hat Decoration
  7. A builder
  8. Best type of Tree

17 Clues: PompGo...GraduateA builderGCU ColorGCU StreetBlack BeansLucas's MajorHat DecorationType of DegreeYears in Schoolgroup of peopleType of CeremonyLucas's EmployerBest type of TreeName of GCU MascotGrand _ University

TECHNOLOGY 2024-02-14

TECHNOLOGY crossword puzzle
Across
  1. ACHEINM
  2. CITYSECUREBYR
  3. BISTROCOO
  4. Rivaltu LAYTIRE
  5. GUMCONPIT
  6. NONECOGYNAHTOL
  7. TINRENET
Down
  1. CIANEDSETCA
  2. RATTAILIFIC GENTLENICELIT
  3. CRYCUERAPTORNY

10 Clues: ACHEINMTINRENETBISTROCOOGUMCONPITCIANEDSETCACITYSECUREBYRCRYCUERAPTORNYNONECOGYNAHTOLRivaltu LAYTIRERATTAILIFIC GENTLENICELIT

Panther Cross Word 2022-04-29

Panther Cross Word crossword puzzle
Across
  1. The largest End Point Detection vendor on the market
  2. The fastest growing area to store company data
  3. A computer or system that mimics a target that a hacker would go after. It is used as a way to collect data on different attack patterns
  4. The word used to describe the adding of additional contextual data to alerts in order to cut down on noise. Greynoise helped us with this.
  5. The acronym used to describe a fully outsourced solution for threat detection
  6. A 3rd party vendor who acts as a middleman to distribute software
  7. Refers to data exiting a network
  8. Refers to data entering into a network
  9. A receipt of any action performed within a system
  10. A compliance-driven evaluation that reveals where you're susceptible to an attack
  11. The acronym used to describe a solution type that detections user behavior for anything malicious
Down
  1. This compliance is imposed on companies that do business in within the EMEA
  2. The most utilized cybersecurity framework in the world
  3. A phrase coined by Panther to describe one of our biggest differentiators
  4. This compliance is imposed on companies that collect health care data
  5. The practice of protecting systems, networks, and programs from cyber attacks
  6. The largest SIEM vendor in the world
  7. This compliance is imposed on companies that collect credit card data
  8. A solution that aggregates logs
  9. Acronym that describes Endpoint detection combined with Threat Detection
  10. This compliance is imposed on companies that collect other companies information
  11. Refers to different events being interconnected that paint a conclusion
  12. A 3rd party vendor who you can outsource your cybersecurity to
  13. This is typically the gatekeeper for your network and the first line of cyber defense

24 Clues: A solution that aggregates logsRefers to data exiting a networkThe largest SIEM vendor in the worldRefers to data entering into a networkThe fastest growing area to store company dataA receipt of any action performed within a systemThe largest End Point Detection vendor on the marketThe most utilized cybersecurity framework in the world...

test 2022-10-25

test crossword puzzle
Across
  1. djfglijd hfgikjf
  2. fdgsdgsd
  3. gfdsgds
Down
  1. gdfgfs
  2. sgfdsgsdrg
  3. gfdsgdsg
  4. gfdsgd
  5. fdgdfsgfds
  6. gdsgsdgfd
  7. gdfsgds

10 Clues: gdfgfsgfdsgdgdfsgdsgfdsgdsgfdsgdsgfdgsdgsdgdsgsdgfdsgfdsgsdrgfdgdfsgfdsdjfglijd hfgikjf

Cybersecurity Month 2023-07-24

Cybersecurity Month crossword puzzle
Across
  1. (Hint: Make a copy of your important files for safety)
  2. (Hint: Your data is well-protected and out of harm's way)
  3. (Hint: Being informed and cautious about online risks)
  4. (Hint: Keep your personal information confidential)
  5. (Hint: A secret code you create to protect your accounts)
  6. (Hint: Ensure your online accounts and devices are protected)
  7. (Hint: Converting data into secret code to keep it safe)
Down
  1. (Hint: Relating to computers and the internet)
  2. (Hint: Regularly install software improvements for better security)
  3. (Hint: A protective barrier that keeps hackers out)
  4. (Hint: Secure your device with a digital key)
  5. (Hint: Harmful software that can damage your computer)
  6. (Hint: Tricky schemes to deceive you online)
  7. (Hint: A harmful computer program that can spread)
  8. (Hint: Only rely on reputable sources and websites)
  9. (Hint: Deceptive emails or messages trying to steal your info)

16 Clues: (Hint: Tricky schemes to deceive you online)(Hint: Secure your device with a digital key)(Hint: Relating to computers and the internet)(Hint: A harmful computer program that can spread)(Hint: A protective barrier that keeps hackers out)(Hint: Keep your personal information confidential)(Hint: Only rely on reputable sources and websites)...

청당 빠바 구문독해 6-22 2023-01-18

청당 빠바 구문독해 6-22 crossword puzzle
Across
  1. 실직한, 실업자인
  2. (자동차 앞창에 있는)유리 닦개(와이퍼)
  3. 공동의
  4. 흔히, 보통
  5. (범죄, 사고 등) 사건
  6. 입증하다
  7. 사이버 보안
Down
  1. 자동차의
  2. (연료, 에너지, 시간을)소모하다
  3. 절도
  4. 자동차
  5. 대리점
  6. 혜택, 이득; 득을 보다
  7. 임차하다, 빌리다
  8. 취약한, 연약한
  9. 조정[조절]하다; 적응하다

16 Clues: 절도자동차대리점공동의자동차의입증하다흔히, 보통사이버 보안취약한, 연약한실직한, 실업자인임차하다, 빌리다혜택, 이득; 득을 보다(범죄, 사고 등) 사건조정[조절]하다; 적응하다(연료, 에너지, 시간을)소모하다(자동차 앞창에 있는)유리 닦개(와이퍼)

Cybersecurity Vocabulary 2023-01-25

Cybersecurity Vocabulary crossword puzzle
Across
  1. A bug where user input is passed as the format argument to printf
  2. This is when an application reveals sensitive data
  3. determines strength and validity of passwords.
  4. A secret entry point into a program.
  5. can undermine the controls that secure the data of millions
  6. The result of a mismatch between arithmetic and mathematical arithmetic
  7. The web server account is incorrectly given access to the system files
  8. Is the manipulation of people to divulge information or performing actions.
Down
  1. Somebody who gains illegal access to a phones system.
  2. An attempt to crack a password by using every combination of letters and digits until a password is cracked.
  3. bypassing standard authentication or encryption in a computer.
  4. Mother Nature's actions
  5. A trapdoor in software that allows easy maintenance
  6. A subset of the Trojan horse malware.
  7. A system used to gain authentications by cracking a password hash.
  8. when a hacker exploits the vulnerability before its fixed.

16 Clues: Mother Nature's actionsA secret entry point into a program.A subset of the Trojan horse malware.determines strength and validity of passwords.This is when an application reveals sensitive dataA trapdoor in software that allows easy maintenanceSomebody who gains illegal access to a phones system....

CyberSecurity Crossword 2023-08-07

CyberSecurity Crossword crossword puzzle
Across
  1. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction
  2. Should be constructed of upper and lower case letters, numbers, and special characters
  3. verifying identity
  4. a type of software that is designed to display advertisements on a user's computer or device.
  5. a type of software or hardware device that is designed to capture and record keystrokes made on a computer or other device
  6. The “I” in the C-I-A Triad; protection from unauthorized changes
  7. The “A” in the C-I-A Triad. It ensures authorized users have access
  8. A fraudulent email purportedly from a reputable company attempting to get personal information
Down
  1. Threatening behavior facilitated through electronic means such as texting
  2. A type of malicious software designed to block access to a computer system until a sum of money is paid
  3. weakness in a computer system that could be exploited to violate the system’s security
  4. Software that scans a device or a network to detect security threats, alert the user, and neutralize malicious code
  5. Facebook, Twitter, Instagram, etc. (Two words)
  6. The process of taking plain text and scrambling it into an unreadable format
  7. the act of secretly listening to or monitoring the conversations or communications of others without their knowledge or consent
  8. enables a user to connect securely from outside to their business network, even though they are not located on their office premises

16 Clues: verifying identityFacebook, Twitter, Instagram, etc. (Two words)The “I” in the C-I-A Triad; protection from unauthorized changesThe “A” in the C-I-A Triad. It ensures authorized users have accessThreatening behavior facilitated through electronic means such as textingThe process of taking plain text and scrambling it into an unreadable format...

CYBERSECURITY DECEMBER 2, 2023 2023-12-03

CYBERSECURITY DECEMBER 2, 2023 crossword puzzle
Across
  1. A deceptive practice where a person or program successfully masquerades as another.
  2. A field within cybersecurity that uses investigative techniques to identify and store evidence from a computer device (2 words).
  3. Describes data that requires power to maintain its contents.
  4. a fundamental unit of data in computer networking and data communication.
  5. An authentication method that requires the user to provide two or more verification factors to gain access to a resource. MFA
  6. an advanced security technology that builds upon the functionality of an IDS. It not only detects suspicious or malicious activities but also takes proactive measures to block or mitigate them in real-time.
  7. A documented, structured approach for handling security breaches, and cyber threats. (3 words)
  8. A technology that allows you to create a secure connection over a less secure network, such as the internet. It can also mask your connection origin, making it appear that you are connecting via a different location than where you physically are located.
  9. _______ Modeling, Risk Modeling, or Risk Analysis is a systematic way of thinking where a system may be vulnerable in order to best defend against possible attacks.
  10. A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system.
  11. A phishing attack transmitted by SMS (text) message.
  12. The world's most famous hacker.
  13. From Day 1, cybersecurity is built upon a foundation of three principles – private data is kept private.
  14. Model that describes how data is transmitted through a network.
  15. a decoy system or resource set up to monitor and analyze the behavior of attackers.
  16. This cipher was the first documented form of encryption and involves shifting each letter of a message by 3.
  17. A public-key cryptography algorithm
Down
  1. Relies on human interaction and often involves tricking people into breaking normal security procedures.
  2. This color team is made up of offensive security experts who try to (ethically) attack an organization’s cybersecurity defenses.
  3. An attack in which an attacker injects malicious executable scripts into the code of a trusted application or website.
  4. In this kind of cipher, both the encryption and decryption process use the same key,
  5. From Day 1,cybersecurity is built upon a foundation of three principles. This is one of them which means that data can be used by any authorized parties.
  6. This term (2 words) refers to limiting who (subjects) can read or write which resources (objects: e.g. files)
  7. A SQL_______ vulnerability arises when the original SQL query can be altered to form an altogether different query.
  8. From Day 1, cybersecurity is built upon a foundation of three principles. This is one of them which means that data is modified only by authorized parties.
  9. Software tool that allows users to capture and inspect data packets on a computer network.
  10. This software examines requests to access the network and determines if it should pass through.
  11. A number used to identify specific services or processes running on a computer or network device.

28 Clues: The world's most famous hacker.A public-key cryptography algorithmA phishing attack transmitted by SMS (text) message.Describes data that requires power to maintain its contents.Model that describes how data is transmitted through a network.a fundamental unit of data in computer networking and data communication....

cybersecurity awareness 2017-09-28

cybersecurity awareness crossword puzzle
Across
  1. is a string of characters used for authenticating a user on acomputer system
  2. A small, portable flash memory card that plugs into a computer s USB port and functions as a portable hard drive.
  3. is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  4. refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
  5. A criminal act that involves malicious threats intended to cause injury to an individual to compel him or her to do an act against his or her will.
  6. a local or restricted communications network, especially a private network created using World Wide Web software.
  7. an electronic device for storing and processing data
  8. is a type of malware that is often disguised as legitimate software
Down
  1. is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner's private information
  2. is a standalone malware computerprogram that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the targetcomputer to access it.
  3. is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.Feb
  4. is a form of malware in which rogue software code effectively holds a user's computer hostage until a "ransom" fee is paid.
  5. The translation of data into a secret code.The most effective way to achieve data security.
  6. The global communication network that allows almost allcomputers worldwide to connect and exchange information.
  7. the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.
  8. software that is intended to damage or disable computers and computer systems.

16 Clues: an electronic device for storing and processing datais a type of malware that is often disguised as legitimate softwareis a string of characters used for authenticating a user on acomputer systemsoftware that is intended to damage or disable computers and computer systems....

Cybersecurity Vocab 2021-09-28

Cybersecurity Vocab crossword puzzle
Across
  1. Secret unknown access point into a system
  2. Flaw or potential for harm
  3. Virus that infects a computer before the operating system loads
  4. Following the rules or standards that have been established
  5. Software that is embedded in hardware
  6. Computer code intentially written to cause some form of harm
  7. Using a lie or scam to obtain private information
  8. Physical token inserted into a computer's usb port
Down
  1. Measurement and analysis of a biological feature
  2. Condition of being pricate or secret
  3. Something that takes a vulnerability to a level where it can be exploited
  4. Encrypts data do user connot access it intil a fee is paid to hacker only
  5. Acions of ,alicous code
  6. Proccess by which something becomes harder it is made harder to hack
  7. State of being complete or uncorrupted
  8. Technology that thracks a users' keystokes on the keyboard

16 Clues: Acions of ,alicous codeFlaw or potential for harmCondition of being pricate or secretSoftware that is embedded in hardwareState of being complete or uncorruptedSecret unknown access point into a systemMeasurement and analysis of a biological featureUsing a lie or scam to obtain private informationPhysical token inserted into a computer's usb port...

Cybersecurity Crossword 2022-09-07

Cybersecurity Crossword crossword puzzle
Across
  1. umbrella term for malicious software
  2. a software tool used to take advantage of a software or hardware vulnerabilities
  3. self replicating malware that does not require human interaction
  4. software that lets you browse the internet
  5. small files that track browser usage and preferences
  6. email based scamming
  7. software that scans a device to detect threats
Down
  1. day of the week most vendors release patches
  2. malware that encrypts files and demands payment
  3. software that secretly captures info as it is typed
  4. text message based scamming
  5. another word for a software update
  6. copy of computer data for data loss prevention
  7. phone based scamming
  8. any kind of unwanted, unsolicited digital communication
  9. filters unwanted traffic on a network

16 Clues: phone based scammingemail based scammingtext message based scamminganother word for a software updateumbrella term for malicious softwarefilters unwanted traffic on a networksoftware that lets you browse the internetday of the week most vendors release patchescopy of computer data for data loss prevention...

NVH September Trivia 2022-08-24

NVH September Trivia crossword puzzle
Across
  1. Ext. 7060
  2. Policy keeper
  3. NVH Lab blood supplier
  4. Personal ______ Equipment
  5. Cybersecurity Training
  6. Code Call for Combative Person
  7. Coffee Shop
  8. Extended Care "Family"
  9. John Caitlynn & Liz Therapy
Down
  1. TFMC ARNP
  2. Zzz Service
  3. payroll software
  4. BOC Meeting Day
  5. Purchaser
  6. Resuscitation Quality Improvement
  7. Drs. Dhillon & Jex Service
  8. The next EHR
  9. New mammo system

18 Clues: TFMC ARNPExt. 7060PurchaserZzz ServiceCoffee ShopThe next EHRPolicy keeperBOC Meeting Daypayroll softwareNew mammo systemNVH Lab blood supplierCybersecurity TrainingExtended Care "Family"Personal ______ EquipmentDrs. Dhillon & Jex ServiceJohn Caitlynn & Liz TherapyCode Call for Combative PersonResuscitation Quality Improvement

Dbl AA November 16! 2022-11-16

Dbl AA November 16! crossword puzzle
Across
  1. Favorite TV
  2. Favorite outdoor hobby
  3. Older vehicle
  4. Zoom zoom
  5. Grodhaus Family game
  6. Cute youngster
  7. Sisters of mom
  8. Grandma appreciated Aaron’s
  9. Walking with cat in
  10. Fun with Lizzy’s hair
Down
  1. Love spark established
  2. Kit for picking
  3. Impressive talent
  4. special older woman
  5. Cute girl
  6. Favorite indoor hobby
  7. Work interest
  8. Teal Team
  9. Quail Hollow
  10. Your mama

20 Clues: Zoom zoomCute girlTeal TeamYour mamaFavorite TVQuail HollowOlder vehicleWork interestCute youngsterSisters of momKit for pickingImpressive talentspecial older womanWalking with cat inGrodhaus Family gameFavorite indoor hobbyFun with Lizzy’s hairLove spark establishedFavorite outdoor hobbyGrandma appreciated Aaron’s

Cyber Security 2023-09-08

Cyber Security crossword puzzle
Across
  1. data encryption ransom
  2. compromised computer network
  3. psychological manipulation
  4. system manager
  5. identifying threats
  6. unwanted advertisements
  7. multiple verification layers
  8. secret access keys
  9. protecting digital systems.
  10. interconnected devices
Down
  1. stolen identity
  2. data encrypt
  3. secure network connection
  4. wireless technology
  5. unauthorized access point
  6. internet address
  7. malicious digital actions
  8. digital information
  9. malicious software
  10. computer programs

20 Clues: data encryptsystem managerstolen identityinternet addresscomputer programsmalicious softwaresecret access keyswireless technologyidentifying threatsdigital informationdata encryption ransominterconnected devicesunwanted advertisementssecure network connectionunauthorized access pointmalicious digital actionspsychological manipulation...

revision 2022-09-14

revision crossword puzzle
Across
  1. захист
  2. злиття_акцій
  3. комплексні_рішення
  4. штаб-квартира
  5. власники_акцій
Down
  1. проривні_технології
  2. під_керівництвом
  3. кібербезпека
  4. розсувати кордони
  5. виявляти_загрози

10 Clues: захисткібербезпеказлиття_акційштаб-квартиравласники_акційпід_керівництвомвиявляти_загрозирозсувати кордоникомплексні_рішенняпроривні_технології

Cybersecurity 2022-05-16

Cybersecurity crossword puzzle
Across
  1. the location a hacker typically want to get access to
  2. An activity which is carried out over or through the Internet.
  3. a method to get sensitive data
  4. when you create something according to a plan
  5. target of an SQL-Injection
  6. the most famous programming language for web applications
Down
  1. a famous whistleblower
  2. the good kind of hacker
  3. an activity which is carried out over or through the Internet.
  4. a word which describes a relative geographic location

10 Clues: a famous whistleblowerthe good kind of hackertarget of an SQL-Injectiona method to get sensitive datawhen you create something according to a planthe location a hacker typically want to get access toa word which describes a relative geographic locationthe most famous programming language for web applications...

Cybersecurity 2023-03-08

Cybersecurity crossword puzzle
Across
  1. the use of a computer to gain unauthorized access to data in a system.
  2. The state of being protected against the criminal or unauthorized use of electronic data.
  3. a person who uses computers to gain unauthorized access to data.
  4. Tells a computer what actions to take
  5. what movie character was on the signs?
Down
  1. Where did this story take place?
  2. A broad range of information, or an opinion, that could identify an individual.
  3. breach results in information being accessed without authorization.
  4. What was hacked in this story?
  5. A part of a computer system or network which is designed to block unauthorized access

10 Clues: What was hacked in this story?Where did this story take place?Tells a computer what actions to takewhat movie character was on the signs?a person who uses computers to gain unauthorized access to data.breach results in information being accessed without authorization.the use of a computer to gain unauthorized access to data in a system....

Cybersecurity 2024-03-13

Cybersecurity crossword puzzle
Across
  1. A computer attack aimed at making a service unavailable.
  2. A brand that makes cybersecurity devices especially for companies.
  3. A program/device that protects a network.
  4. A technique for protecting data by transforming it irreversibly.
  5. A technique used by fraudsters to obtain personal information with the aim of committing identity theft.
  6. A network of computers infected by malware that are under the control of a single attacking party.
Down
  1. A technique of symmetric encryption.
  2. A hashing algorithm which is the most used in secret-keys transfert.
  3. A known certfication authority who offers free certificates.

9 Clues: A technique of symmetric encryption.A program/device that protects a network.A computer attack aimed at making a service unavailable.A known certfication authority who offers free certificates.A technique for protecting data by transforming it irreversibly.A brand that makes cybersecurity devices especially for companies....

Cybersecurity 2024-02-21

Cybersecurity crossword puzzle
Across
  1. Find hidden messages or attacks within innocent-looking files.
  2. Malware that collects information about you
  3. A wall or partition designed to inhibit or prevent the spread of fire.
  4. Manifestation signifying hostile intention, the plan to cause harm.
  5. The practice of sending emails to reveal personal information, such as passwords and credit card numbers.
Down
  1. Malware that blocks access and demands ransom
  2. A cyber security professional who deal with testing vulnerabilities to help owners of application or website
  3. A type of malware that is often masked as genuine software
  4. Improve or correct by inserting a patch. It's a synonym of update

9 Clues: Malware that collects information about youMalware that blocks access and demands ransomA type of malware that is often masked as genuine softwareFind hidden messages or attacks within innocent-looking files.Improve or correct by inserting a patch. It's a synonym of updateManifestation signifying hostile intention, the plan to cause harm....

Chris's Crossword 2023-11-29

Chris's Crossword crossword puzzle
Across
  1. Coat closet
  2. Number of senators
  3. Yearly certification
  4. NATO Drafter?
  5. @_
  6. Kentucky Derby Lover?
  7. Chuckles, say
  8. Reporter's tool
  9. Legislative roundup
Down
  1. Green Thing
  2. Motion for _
  3. Type of fruit and fearless leader
  4. Ending, say
  5. A General and employer

14 Clues: @_Coat closetGreen ThingEnding, sayMotion for _NATO Drafter?Chuckles, sayReporter's toolNumber of senatorsLegislative roundupYearly certificationKentucky Derby Lover?A General and employerType of fruit and fearless leader

Women in Tech 2023-02-22

Women in Tech crossword puzzle
Across
  1. - Computers
  2. - Remodeling
  3. - Vendor
  4. - Technology
  5. - Telecommunication
  6. - Security
Down
  1. - Processor
  2. - Robotization
  3. - Machinery
  4. - Vendor

10 Clues: - Vendor- Vendor- Security- Processor- Computers- Machinery- Remodeling- Technology- Robotization- Telecommunication

Cybersecurity Crossword 2021-08-05

Cybersecurity Crossword crossword puzzle
Across
  1. is a malware aimed to corrupt or modify data on one computer before spreading to others.
  2. a sequence of letters, characters, and numbers used for authentication
  3. is a technique used in order to manipulate and deceive people into handing over sensitive information.
  4. is a network device that determines what information is able to enter a system based on the rules in place.
  5. a technique to obtain sensitive information typically through text messaging
  6. is the process of encoding data so that it can only be accessed by its intended recipient.
  7. the state of being exposed to the possibility of being attacked
  8. is a method of attacking a computer by alternating a program while making it appear to function normally
Down
  1. are the measures taken in order to protect systems and their data.
  2. is a network that uses encryption in order to in order to maintain privacy.
  3. a technique to obtain sensitive information typically through email.
  4. a form of malware that takes control of data and holds it hostage until a ransom is paid.
  5. is short for malicious software, and is any intrusive software developed to wreak havoc on systems.
  6. a sequence of words used for authentication.
  7. is the act of confirmation through evidence of somethings validity.

15 Clues: a sequence of words used for authentication.the state of being exposed to the possibility of being attackedare the measures taken in order to protect systems and their data.is the act of confirmation through evidence of somethings validity.a technique to obtain sensitive information typically through email....

Cybersecurity awareness 2023-06-13

Cybersecurity awareness crossword puzzle
Across
  1. 9
  2. E
  3. A
  4. 2
  5. C
  6. 1 across
  7. 8
Down
  1. B
  2. 4
  3. D
  4. 5
  5. 7
  6. 6
  7. 3
  8. 1 down

15 Clues: 9B4ED576A32C81 down1 across

Cybersecurity 2021-08-03

Cybersecurity crossword puzzle
Across
  1. provides the validation of a message's origin.
  2. Ensures that data is not modified or tampered with.
  3. The degree of protection against danger, damage, loss, and criminal activity.
  4. Ensures that a system is up so that data is available when needed.
  5. Anything that has the potential to cause the loss of an asset.
Down
  1. An act, procedure, or piece of software that takes advantage of a vulnerability to carry out an attack.
  2. Ensures that data is not disclosed to unintended persons.
  3. An opening or weakness in the system.
  4. agent The person or entity that attempt or carries out a threat.
  5. Something that has value to an individual or an organization.

10 Clues: An opening or weakness in the system.provides the validation of a message's origin.Ensures that data is not modified or tampered with.Ensures that data is not disclosed to unintended persons.Something that has value to an individual or an organization.Anything that has the potential to cause the loss of an asset....

Cybersecurity 2024-04-22

Cybersecurity crossword puzzle
Across
  1. A good practice for authorised users is to use unique ________ passwords
  2. ____________ type of cyber attack aims to steal data from the computers
  3. cybersecurity aims to secure _______ components from attackers
  4. __________ is a person who attempts to get unauthorised access to the computer system
  5. __________ is a virtual wall between the protected computer and the internet
Down
  1. __________ are dummy computers that attract hackers to keep the remaining computers safe
  2. _________ softwares must be used to protect computers against cyberattacks
  3. Man in the __________ is a type of cyberattack where the communication line is intercepted
  4. common type of attack which includes trojans and adwares

9 Clues: common type of attack which includes trojans and adwarescybersecurity aims to secure _______ components from attackers____________ type of cyber attack aims to steal data from the computersA good practice for authorised users is to use unique ________ passwords_________ softwares must be used to protect computers against cyberattacks...

Cybersecurity Risk 2021-08-04

Cybersecurity Risk crossword puzzle
Across
  1. Malware aimed to corrupt or modify data on one computer before spreading to others.
  2. a sequence of letters, characters, and numbers used for authentication
  3. a technique used in order to manipulate and deceive people into handing over sensitive information.
  4. A network device that determines what information is able to enter a system based on the rules in place.
  5. a technique to obtain sensitive information typically through text messaging
  6. the process of encoding data so that it can only be accessed by its intended recipient.
  7. the state of being exposed to the possibility of being attacked
  8. the act of appearing to be someone or thing that you are not
Down
  1. measures taken in order to protect systems and their data.
  2. A network that uses encryption in order to in order to maintain privacy.
  3. a technique to obtain sensitive information typically through email.
  4. Software that locks your device and hold the data hostage and demands a price.
  5. intrusive software developed to wreak havoc on systems; also known as malicious software
  6. a sequence of words used for authentication.
  7. is the act of confirmation through evidence of somethings validity.

15 Clues: a sequence of words used for authentication.measures taken in order to protect systems and their data.the act of appearing to be someone or thing that you are notthe state of being exposed to the possibility of being attackedis the act of confirmation through evidence of somethings validity....

Cybersecurity fun 2022-04-28

Cybersecurity fun crossword puzzle
Across
  1. legal constraints that govern how data can be used or stored. Permission is often required from individual as to these elements
  2. possibility of undesired outcome occurring
  3. information classification
  4. Electronic or digital method to control how devices operate or control how they can or can not be used
  5. any security incident where sensitive, protected, or confidential data is accessed or stolen by an unauthorized party
  6. the original form of a message
  7. protect before an event happens
Down
  1. all the information on a website
  2. a conventional type of encryption
  3. the process of adding our signature to the document to show integrity
  4. someone who is responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
  5. a process of encoding a message so that its meaning is not obvious
  6. the a in CIA triad
  7. ways to protect vulnerabilities
  8. copies of data

15 Clues: copies of datathe a in CIA triadinformation classificationthe original form of a messageways to protect vulnerabilitiesprotect before an event happensall the information on a websitea conventional type of encryptionpossibility of undesired outcome occurringa process of encoding a message so that its meaning is not obvious...

Cybersecurity 2023-05-30

Cybersecurity crossword puzzle
Across
  1. kübervahendite turvalisus ja turvalisus kübervahendite talitluse kaudu tekkivate/tekitatavate ohtude suhtes
  2. teadmised küberturvalisuse kohta ning kuidas ennast kaitsta
  3. on riiklikult oluliste kübervahendite julgeolek ja julgeolek kübervahendite talitluse kaudu tekkivate/tekitatavate ohtude suhtes
  4. isiku v. mingi toimingu identsuse automaatne kontroll
Down
  1. tarkvara ja andmeid hävitav v. andmetöötlust häiriv väike programm, mis end arvutisüsteemides ise paljundab
  2. kui ohver tegutseb petturliku e-kirja alusel, mis nõuab kiiret tegutsemist.
  3. on kübervahendite turve ja on turve kübervahendite talitluse kaudu tekkivate/tekitatavate ohtude suhtes
  4. usalduslik, salajane
  5. pahatahtlik inimene või grupp kes murravafd sisse inimeste või ettevõtete privatsetesse keskkondadesse

9 Clues: usalduslik, salajaneisiku v. mingi toimingu identsuse automaatne kontrollteadmised küberturvalisuse kohta ning kuidas ennast kaitstakui ohver tegutseb petturliku e-kirja alusel, mis nõuab kiiret tegutsemist.pahatahtlik inimene või grupp kes murravafd sisse inimeste või ettevõtete privatsetesse keskkondadesse...

Cybersecurity 2022-04-26

Cybersecurity crossword puzzle
Across
  1. chief officer
  2. potential issue in security
  3. program that causes problems
Down
  1. email that mimics other people
  2. program that hides inside another
  3. an actual attack
  4. self replicating infection
  5. program that infects other programs
  6. program that uses vulnerability

9 Clues: chief officeran actual attackself replicating infectionpotential issue in securityprogram that causes problemsemail that mimics other peopleprogram that uses vulnerabilityprogram that hides inside anotherprogram that infects other programs

CyberSecurity 2022-08-25

CyberSecurity crossword puzzle
Across
  1. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs; freedom to be let alone
  2. Detailed report, usually about a person
  3. rules for interacting politely online
  4. files stored on your computer (cell phone) that tell browsers how to remember your favorites and your previous searches
  5. the practice of protecting systems, networks, and programs from digital attacks
  6. Someone who intentionally targets people for harm using online chat rooms or social media.
Down
  1. The ability to act in a safe and responsible way on the Internet and other connected environments.
  2. A site or online community where people with like experiences or interests communicate with each other and share information, resources, etc.
  3. Information about you and what you do online

9 Clues: rules for interacting politely onlineDetailed report, usually about a personInformation about you and what you do onlinethe practice of protecting systems, networks, and programs from digital attacksSomeone who intentionally targets people for harm using online chat rooms or social media....

Cybersecurity 2022-09-08

Cybersecurity crossword puzzle
Across
  1. Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems
  2. A popular programming language used in security scripts
  3. A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system
  4. A type of malicious software designed to block access to a computer system until a sum of money is paid
Down
  1. Software that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
  2. A barrier between a trusted network and untrusted network that controls/monitors incoming and outgoing network traffic
  3. A type of social engineering, online scam where criminals send alluring emails to the organization, user, and more to collect sensitive information
  4. Computer programming that is used to track internet activity and gather sensitive information
  5. A that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information

9 Clues: A popular programming language used in security scriptsComputer programming that is used to track internet activity and gather sensitive informationA type of malicious software designed to block access to a computer system until a sum of money is paid...

Cybersecurity 2023-09-04

Cybersecurity crossword puzzle
Across
  1. Make sure you set a strong one by using upper, lowercase, numbers and characters
  2. Organized and unauthorized use of an app to send thousands of messages to its users, either by fake or hacked profiles
  3. Common messaging platform for attackers to use for cyberattacks
  4. An attempt to obtain sensitive information such as usernames, passwords etc. often for malicious reasons by disguising as a trustworthy entity in an electronic communication
  5. Type of cyberattack that uses malware disguised as a legitimate file to infect a system or device. Named by a famous wooden horse
Down
  1. Malicious software that encrypts files or locks your computer, and retains control until you pay a certain amount of money
  2. Cyber-attackers use creative ways to trick you to enable them to steal it
  3. Type of cyber-attack that uses multiple computers or devices to send overwhelming traffic to a targeted website or network. The attack aims to cause the target to slow down or completely stop functioning
  4. Form of malware that poses a security program. If clicked, it pretends to scan for threats and malware on your PC and then lures you into paying real money in exchange for resolving the imaginary threat

9 Clues: Common messaging platform for attackers to use for cyberattacksCyber-attackers use creative ways to trick you to enable them to steal itMake sure you set a strong one by using upper, lowercase, numbers and charactersOrganized and unauthorized use of an app to send thousands of messages to its users, either by fake or hacked profiles...

Cybersecurity 2022-05-11

Cybersecurity crossword puzzle
Across
  1. computer program that hides and replicates
  2. most common type of social engineering
  3. inspects network traffic
  4. octets network address
Down
  1. appears to be a legitimate file or program
  2. user of programs to overcome technical obstacles
  3. database that contains the login account information
  4. hexadecimal address
  5. system that detects incoming threats

9 Clues: hexadecimal addressoctets network addressinspects network trafficsystem that detects incoming threatsmost common type of social engineeringappears to be a legitimate file or programcomputer program that hides and replicatesuser of programs to overcome technical obstaclesdatabase that contains the login account information

Cybersecurity 2022-05-11

Cybersecurity crossword puzzle
Across
  1. computer program that hides and replicates
  2. most common type of social engineering
  3. inspects network traffic
  4. octets network address
Down
  1. appears to be a legitimate file or program
  2. user of programs to overcome technical obstacles
  3. database that contains the login account information
  4. hexadecimal address
  5. system that detects incoming threats

9 Clues: hexadecimal addressoctets network addressinspects network trafficsystem that detects incoming threatsmost common type of social engineeringappears to be a legitimate file or programcomputer program that hides and replicatesuser of programs to overcome technical obstaclesdatabase that contains the login account information

cybersecurity 2023-05-25

cybersecurity crossword puzzle
Across
  1. A software designed to detect and remove viruses, malware, spyware, and other malicious programs from a computer system or network.
  2. The process of converting information into a code or cipher to prevent unauthorized access. Encryption is commonly used to secure sensitive information such as passwords, financial data, and personal information.
  3. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized intrusions and cyber attacks.
  4. Unsolicited and unwanted emails or messages sent out in bulk. Spam can be used to deliver malware, phishing attempts, or other types of unwanted content.
  5. A weakness or security flaw in a computer system or network that can be exploited by attackers. Vulnerabilities can be caused by outdated software, misconfigured systems, or human error.
Down
  1. A type of cyber attack where attackers create fake websites or emails to trick individuals into revealing personal or sensitive information. Phishing attacks often attempt to mimic legitimate websites or companies.
  2. A secret code or word that allows you to access certain devices or services. It is important to create a strong password to protect yourself from cyber threats.
  3. The process of verifying the identity of a user or device trying to access a system or network. Authentication is often done through the use of usernames and passwords, biometrics, or security tokens.
  4. A software that is designed to harm or damage computer systems and networks. Malware can include viruses, trojans, ransomware, and other malicious programs.

9 Clues: A software designed to detect and remove viruses, malware, spyware, and other malicious programs from a computer system or network.Unsolicited and unwanted emails or messages sent out in bulk. Spam can be used to deliver malware, phishing attempts, or other types of unwanted content....

Cybersecurity 2022-04-05

Cybersecurity crossword puzzle
Across
  1. A type of malware disguised as bona fide software, applications, or files to deceive users into downloading it and, unknowingly, granting control of their devices.
  2. A type of malware that infiltrates devices without the owner’s knowledge. This is often for the purpose of spying on internet activity, tracking log in and password information, or collecting sensitive information that can be used for fraudulent purposes.
  3. A type of malware that comes from ads on legitimate websites. You can fall victim to malvertising by clicking on an infected ad — cybercriminals may even pay to place these on websites — or by visiting a website that is home to a corrupted ad.
Down
  1. are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks a program that crawls the internet looking for holes in security infrastructures to exploit, and the hacking is done automatically — or robotically if you will.
  2. A standalone malware computer program that replicates itself in order to spread to other computers.
  3. A type of malware that comes with a ransom. It locks and encrypts a victim’s device or data and demands a ransom to restore access.
  4. A type of malware that grants cybercriminals remote control of victims’ devices, oftentimes without the victims’ knowledge.
  5. Malware that involves advertising.
  6. A type of malware that uses software, applications, and protocols already built-in or native to device operating systems to install and execute malicious activities. In other words, no files are needed to download this type of malware.

9 Clues: Malware that involves advertising.A standalone malware computer program that replicates itself in order to spread to other computers.A type of malware that grants cybercriminals remote control of victims’ devices, oftentimes without the victims’ knowledge....

cybersecurity 2021-02-12

cybersecurity crossword puzzle
Across
  1. your computer will have many pop ups
  2. a piece of coding copying itself
  3. send ransom money
  4. used by the romans
Down
  1. what makes your computer harder to hack
  2. a person who takes or uses your computer information
  3. the other use for the word of a animal
  4. allows the hacker to spy on you
  5. scam emails or calls

9 Clues: send ransom moneyused by the romansscam emails or callsallows the hacker to spy on youa piece of coding copying itselfyour computer will have many pop upsthe other use for the word of a animalwhat makes your computer harder to hacka person who takes or uses your computer information

Cybersecurity 2020-04-07

Cybersecurity crossword puzzle
Across
  1. elettrodomestici evoluti
  2. inserirlo nella barra degli indirizzi
  3. dimostra chi è veramente il mittente
  4. ipermediale
  5. linguaggio delle pagine web
Down
  1. gestire il proprio conto corrente
  2. dominio
  3. regole comuni
  4. ragnatela grande

9 Clues: dominioipermedialeregole comuniragnatela grandeelettrodomestici evolutilinguaggio delle pagine webgestire il proprio conto correntedimostra chi è veramente il mittenteinserirlo nella barra degli indirizzi

EZOREF Weekly Bulletin Crossword 2021-07-05

EZOREF Weekly Bulletin Crossword crossword puzzle
Across
  1. much like standard AV, having an effective ------ solution is vital
  2. While Secpod provides an array of solutions to your corporate pain points, it was primarily introduced as a ----- management tool
  3. Quick Heal's Enterprise Grade cybersecurity brand
  4. Konnect Insights is identified as a next-gen social -------
  5. Global leader, ethos being 'The truth in information'
Down
  1. Forescout is positioned as a Modern ---
  2. founded in 1987, providing unparalleled cybersecurity solution now known as the device to cloud cybersecurity company
  3. IOB is an acronym for the Internet of ---------
  4. A ------- consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.
  5. This technology works by securing data flowing to and from in-house IT architectures and cloud vendor environments using an organization's security policies.

10 Clues: Forescout is positioned as a Modern ---IOB is an acronym for the Internet of ---------Quick Heal's Enterprise Grade cybersecurity brandGlobal leader, ethos being 'The truth in information'Konnect Insights is identified as a next-gen social -------much like standard AV, having an effective ------ solution is vital...

Cybersecurity 2024-02-06

Cybersecurity crossword puzzle
Across
  1. A piece of software designed to fix security vulnerabilities or improve functionality.
  2. The process of converting information into a code to prevent unauthorized access.
  3. Software designed to harm or exploit computer systems and data.
  4. Authentication based on physical or behavioral characteristics, such as fingerprints or voice patterns.
Down
  1. Network security device that monitors and controls incoming and outgoing network traffic.
  2. Process of verifying the identity of a user, system, or application.
  3. The practice of protecting systems, networks, and programs from digital attacks.
  4. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
  5. Malicious software that can replicate itself and spread to other computers.

9 Clues: Software designed to harm or exploit computer systems and data.Process of verifying the identity of a user, system, or application.Malicious software that can replicate itself and spread to other computers.The practice of protecting systems, networks, and programs from digital attacks....

Cybersecurity 2022-03-29

Cybersecurity crossword puzzle
Across
  1. DNS ____ is when a hacker pretends to be a DNS server and feeds your computer the wrong IP Address for a given website, sending you to a false website.
  2. Multi-factor _____ is an authentication method that requires the user to provide two or more verification factors to gain access.
  3. A ____ attack is spamming a web server with so many requests so close together that it crashes.
  4. A type of spyware that records every keystroke (and sometimes also mouse movements) made by a computer user in order to gain access to passwords and other confidential info
  5. ____ is any program code that explicitly attempts to bypass appropriate authorization safeguards and/or perform unauthorized functions.
Down
  1. A ___ is information stored on your computer by a website you visit. They often store your settings for a website, such as your login status and preferred language or location.
  2. ____ is an attempt by cybercriminals posing as legitimate institutions, usually via email, to obtain sensitive information from targeted individuals.
  3. ____ guessing is an attempt to gain access to a computer system by methodically trying to determine a user’s password
  4. The digital ____is a gap between those who have access to new technology and those who do not.

9 Clues: The digital ____is a gap between those who have access to new technology and those who do not.A ____ attack is spamming a web server with so many requests so close together that it crashes.____ guessing is an attempt to gain access to a computer system by methodically trying to determine a user’s password...

Cybersecurity Crossword 2021-02-03

Cybersecurity Crossword crossword puzzle
Across
  1. A technology that allows us to access our files through the internet from anywhere in the world
  2. A piece of malware that can replicate itself in order to spread the infection to other connected computers
  3. An internet version of a home address for your computer, which identifies it when it’s connected to the internet
  4. An umbrella term that describes all forms of malicious software designed to cause havoc on a computer
  5. A technique hackers use to hide their identity to pretend to be someone else or simply try to fool you over the internet
  6. A person who uses programming skills to cause damage to a computer system, steal data and in general conduct illegal cyber activities
  7. A weakness in computer software
Down
  1. A computer system that has been infected by malware and is now part of a hacker’s botnet
  2. A group of computers, printers and devices that are interconnected and governed as a whole
  3. A defensive technology focused on keeping the bad guys out
  4. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
  5. A malicious application or script that can be used to take advantage of a computer’s vulnerability
  6. An acronym that stands for Distributed Denial of Service
  7. An extra copy of data from a computer
  8. A piece of malware that often allows a hacker to gain remote access to a computer

15 Clues: A weakness in computer softwareAn extra copy of data from a computerAn acronym that stands for Distributed Denial of ServiceA defensive technology focused on keeping the bad guys outA piece of malware that often allows a hacker to gain remote access to a computer...

Cybersecurity Definitions 2023-01-25

Cybersecurity Definitions crossword puzzle
Across
  1. hack into telecommunications systems, especially to obtain free calls.
  2. a type of network attack used to gain unauthorized access to systems within a security perimeter
  3. a person who uses computers to gain unauthorized access to data
  4. If users are unable to achieve the defined goal.
  5. are useful in passwordless and multi-factor authentication. Hidden form field is used to store session information of a client
  6. the condition of an electronics, software, or other system where the system's substantive behavior is dependent on the sequence or timing of oth
  7. Where the attacker intercepts and relays messages between two parties who believe they are communicating with each other
  8. someone who broke into computer systems, bypassed passwords or licenses in computer programs, or in other ways intentionally breached computer security.
  9. Is a more advanced technique to get user’s credentials by making effort to enter users into the website
Down
  1. Used by hijacking to gain access to a targets computer or online accounts
  2. The act of entering false information into a DNS cache
  3. a systematic approach to managing all changes made to a product or system
  4. Espionage or trespass occurs when an unauthorized individual attempts to gain illegal access to organizational information
  5. a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution
  6. A technique whereby packet data flowing across the network is detected and observed

15 Clues: If users are unable to achieve the defined goal.The act of entering false information into a DNS cachea person who uses computers to gain unauthorized access to datahack into telecommunications systems, especially to obtain free calls.Used by hijacking to gain access to a targets computer or online accounts...

Cybersecurity Terms 2022-04-28

Cybersecurity Terms crossword puzzle
Across
  1. "pretty good privacy"
  2. private modification
  3. corrective measures
  4. private readability
  5. pick out at risk information
  6. react
  7. awareness of intrusions
  8. data restoration
Down
  1. converting plain text for confidentiality
  2. ability to access
  3. multi-use accounts
  4. illegal activity in cyberspace
  5. verifying logins (acronym)
  6. copyright protection
  7. putting in controls

15 Clues: reactdata restorationability to accessmulti-use accountscorrective measuresprivate readabilityputting in controlsprivate modificationcopyright protection"pretty good privacy"awareness of intrusionsverifying logins (acronym)pick out at risk informationillegal activity in cyberspaceconverting plain text for confidentiality

Cybersecurity Terms 2023-10-27

Cybersecurity Terms crossword puzzle
Across
  1. Mobile Acquisition
  2. Picus Security
  3. Incident Response
  4. GRC
  5. Razeen
  6. Toddlers
  7. Data Classification
  8. Philip Cherian
Down
  1. Mobile Device Management
  2. Video Forensics
  3. Checkmarx
  4. External Threat Landscape
  5. #NotTraditionalPAM
  6. Purple
  7. Teel Tech

15 Clues: GRCPurpleRazeenToddlersCheckmarxTeel TechPicus SecurityPhilip CherianVideo ForensicsIncident ResponseMobile Acquisition#NotTraditionalPAMData ClassificationMobile Device ManagementExternal Threat Landscape

Cybersecurity Crossword 2021-02-02

Cybersecurity Crossword crossword puzzle
Across
  1. A technology that allows us to access our files through the internet from anywhere in the world
  2. A piece of malware that can replicate itself in order to spread the infection to other connected computers
  3. An internet version of a home address for your computer, which identifies it when it’s connected to the internet
  4. An umbrella term that describes all forms of malicious software designed to cause havoc on a computer
  5. A technique hackers use to hide their identity pretend to be someone else or simply try to fool you over the internet
  6. A person who uses programming skills to cause damage to a computer system, steal data and in general conduct illegal cyber activities
  7. A weakness in computer software
Down
  1. A computer system that has been infected by malware and is now part of a hacker’s botnet
  2. A group of computers, printers and devices that are interconnected and governed as a whole
  3. A defensive technology focused on keeping the bad guys out
  4. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
  5. A malicious application or script that can be used to take advantage of a computer’s vulnerability
  6. An acronym that stands for distributed denial of service
  7. An extra copy of data from a computer
  8. A piece of malware that often allows a hacker to gain remote access to a computer

15 Clues: A weakness in computer softwareAn extra copy of data from a computerAn acronym that stands for distributed denial of serviceA defensive technology focused on keeping the bad guys outA piece of malware that often allows a hacker to gain remote access to a computer...

Cybersecurity Crossword 2022-05-16

Cybersecurity Crossword crossword puzzle
Across
  1. To figure out or break a code or cipher.
  2. The science of analyzing or breaking secret codes or ciphers to reveal hidden messages.
  3. Central Intelligence Agency
  4. a message written in code or cipher; the encrypted message that must be decoded.
  5. a message written out in “plain” English that anyone can read; it has not been encoded.
  6. The science of writing hidden or concealed messages using secret codes or ciphers.
  7. To put words into code or cipher form.
Down
  1. A system where symbols, groups of letters or numbers, pictures or words, are substituted to represent other words or phrases.
  2. a person who secretly collects and reports information on the activities, movements, and plans of an enemy or competitor.
  3. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  4. Central Security Service
  5. National Security Agency
  6. A system where one letter or symbol is methodically substituted for another letter or symbol.
  7. The science of studying codes and ciphers.
  8. A systematic, minute, and thorough attempt to learn the facts about something complex or hidden

15 Clues: Central Security ServiceNational Security AgencyCentral Intelligence AgencyTo put words into code or cipher form.To figure out or break a code or cipher.The science of studying codes and ciphers.a message written in code or cipher; the encrypted message that must be decoded....

Cybersecurity Crossword 2023-05-15

Cybersecurity Crossword crossword puzzle
Across
  1. writing statements in order to create a program
  2. the programs that perform actions on a device like operating systems
  3. devices that are connected together for the purpose of sharing information
  4. accessing a device or network without permission or authorization
  5. a global open network that allows information dispersal and instantaneous communication
  6. identifies specific devices on a network
  7. an instruction set to a computer in order to perform an action
  8. a specific set of multiple instructions used to perform actions on a device
  9. information that is returned or transmitted by a device
  10. using codes to secure information
Down
  1. the physical electronic objects like a computer
  2. the unauthorized collection of secure or private information
  3. precautions taken to guard against crime that involves the internet
  4. accomplished when data is sent to a device
  5. an electronic device used to create and access information

15 Clues: using codes to secure informationidentifies specific devices on a networkaccomplished when data is sent to a devicethe physical electronic objects like a computerwriting statements in order to create a programinformation that is returned or transmitted by a devicean electronic device used to create and access information...

Cybersecurity Crossword 2023-01-17

Cybersecurity Crossword crossword puzzle
Across
  1. Software that monitors user activities and reports them to a third party
  2. A test that outlines the steps to restoring data after a severe setback
  3. A successful hack to gain control of a network and leak its data
  4. A scan hackers use to detect areas of weakness via sending messages to identify activity
  5. a type of computer network device that interconnects with other networks using the same protocol
  6. An intermediary server between a user and the internet that protects the enterprise from outside intrusion
  7. The practice of adhering to standards and regulatory requirements
Down
  1. An AI-manipulated video in someone’s likeness to spread misleading information
  2. Malicious software often in the form of spam emails
  3. A misleading computer program with a name deriving from Greek history
  4. A scam perpetrated by a hacker posing as a legitimate
  5. A small update to fix bugs in existing programs
  6. A special code to protect your digital information
  7. An internal computer network closed to outsiders
  8. A network that disguises users’ IP addresses with its own to deter hackers

15 Clues: A small update to fix bugs in existing programsAn internal computer network closed to outsidersA special code to protect your digital informationMalicious software often in the form of spam emailsA scam perpetrated by a hacker posing as a legitimateA successful hack to gain control of a network and leak its data...

CIS178 Jake Stevenson 2023-01-25

CIS178 Jake Stevenson crossword puzzle
Across
  1. virtual private network
  2. posing as authorized user
  3. type of malware
  4. protects you from virus
  5. protecting online data
  6. explicitly allowed
  7. security system
  8. malicious software
  9. explicitly not allowed
  10. not human
  11. gaining unauthorized access
Down
  1. network of networks
  2. type of scam
  3. protects you from malware
  4. harassment on the internet
  5. unsolicited advertisements
  6. two-factor authentication
  7. another word for information
  8. securing data
  9. human verification test

20 Clues: not humantype of scamsecuring datatype of malwaresecurity systemexplicitly allowedmalicious softwarenetwork of networksprotecting online dataexplicitly not allowedvirtual private networkprotects you from virushuman verification testposing as authorized userprotects you from malwaretwo-factor authenticationharassment on the internet...

Cybersecurity Challenge 2019-10-11

Cybersecurity Challenge crossword puzzle
Across
  1. Northern Bank's Core Values
  2. Location of the Bank's Disaster Recovery Site
  3. A way to access the Bank’s resources remotely
  4. Programs installed on your phone
  5. Password should always be?
  6. Key word used to send secure email
  7. Think before you -- ?
  8. Type of an Operating system
  9. A device you should not plug in
Down
  1. A type of malware that encrypts your file
  2. A type of an email scam
  3. Department to call for computer issues
  4. Most likely NFL team to win the superbowl in 2020
  5. Last name of the VP of IT
  6. Location of the Bank's Head Quarter

15 Clues: Think before you -- ?A type of an email scamLast name of the VP of ITPassword should always be?Northern Bank's Core ValuesType of an Operating systemA device you should not plug inPrograms installed on your phoneKey word used to send secure emailLocation of the Bank's Head QuarterDepartment to call for computer issues...

Cybersecurity Risk 2021-09-03

Cybersecurity Risk crossword puzzle
Across
  1. Convert an item, such as data, into a code or cipher.
  2. Short for malicious software
  3. Software that encrypts data on someone's device until that person agrees to pay to regain access.
  4. Similar to a password but uses multiple words together.
  5. Legitimate of innocent-looking emails asking you to respond with personal data or to click on a link.
  6. Disguising an email address or phone number to convince you that you are interacting with a trusted friend or source.
  7. False or inaccurate information.
  8. Acronym for Pause, Ask, Think.
  9. Range of activities that guide how we manage digital data.
Down
  1. Measures taken to protect computer systems.
  2. Type of identity that is established by an internet user.
  3. Software written to damage a computer's performance, steal, or alter data.
  4. The practice of phishing using text messages
  5. Type of data that can be found as part of public record.
  6. Type of data that should be protected from public view.

15 Clues: Short for malicious softwareAcronym for Pause, Ask, Think.False or inaccurate information.Measures taken to protect computer systems.The practice of phishing using text messagesConvert an item, such as data, into a code or cipher.Similar to a password but uses multiple words together.Type of data that should be protected from public view....

Vocabulary Test LKE Media A 2022-03-14

Vocabulary Test LKE Media A crossword puzzle
Across
  1. durchsetzen
  2. eine Webseite schließen
  3. Suchmaschine
  4. technikaffin
  5. Sicherheit im Netz
  6. die aktuellsten Nachrichten über
Down
  1. unbeschränkt
  2. offline gehen
  3. Verkaufszahlen
  4. jemanden oder etwas misstrauen
  5. Berichterstattung

11 Clues: durchsetzenunbeschränktSuchmaschinetechnikaffinoffline gehenVerkaufszahlenBerichterstattungSicherheit im Netzeine Webseite schließenjemanden oder etwas misstrauendie aktuellsten Nachrichten über

Cybersecurity & Web Exploitation Crossword 2022-11-16

Cybersecurity & Web Exploitation Crossword crossword puzzle
Across
  1. CSRF attacks use the ___ of other users without their knowledge.
  2. "Access control" is ensuring users cannot act outside of intended ___.
  3. You access web applications with this.
  4. As the ___ of web apps increase, the possibility of vulnerabilities also increase.
  5. When a malicious actor hijacks clicks meant for a visible top-level site.
  6. For security reasons, by default, web apps should not ___ data from the browser.
  7. The OSI model has ___ layers.
Down
  1. Denial-of-Service attacks ___ a target site with fake requests to disrupt service.
  2. In cybersecurity, blue teams do this.
  3. Acronym for the organization set up to improve software security in 2001.
  4. SQL injection attacks can give ___ to data users typically can't retrieve.
  5. What does the "I" in OSI stand for?
  6. In cybersecurity, red teams do this.
  7. ___ hat hackers hack unethically, for personal gain.
  8. ___ sanitization is the modification of user data so that it can't run scripts.

15 Clues: The OSI model has ___ layers.What does the "I" in OSI stand for?In cybersecurity, red teams do this.In cybersecurity, blue teams do this.You access web applications with this.___ hat hackers hack unethically, for personal gain.CSRF attacks use the ___ of other users without their knowledge....

INFORMATION TECHNOLOGY 2021-06-27

INFORMATION TECHNOLOGY crossword puzzle
Across
  1. A
  2. C
  3. F
  4. B
Down
  1. E
  2. D
  3. G
  4. H

8 Clues: EDGAHCFB

Cybersecurity and Healthcare 2021-05-31

Cybersecurity and Healthcare crossword puzzle
Across
  1. Limiting the risks or impacts of a cyber threat.
  2. Generic term for computer viruses, trojans, etc. designed for malicious purposes.
  3. A type of cyberattack that holds your systems or information hostage until a ransom is paid.
  4. You should never share this.
  5. The policies and measures taken to ensure the authenticity, availability, and integrity of electronic information.
Down
  1. When should you report an IT breach or potential breach?
  2. A cyberattack attempting to discover your personal information.
  3. Federal law protecting patient privacy.
  4. The US Food and Drug Administration.
  5. Whose responsibility is cybersecurity?

10 Clues: You should never share this.The US Food and Drug Administration.Whose responsibility is cybersecurity?Federal law protecting patient privacy.Limiting the risks or impacts of a cyber threat.When should you report an IT breach or potential breach?A cyberattack attempting to discover your personal information....

book day 2023-05-17

book day crossword puzzle
Across
  1. asas pendawaian
  2. engineering ethics fourth edition
  3. networking basics 2 edition
  4. sistem bekalan elektrik dan pengagihan
  5. instrumentasi
  6. design for hackers
  7. perak good food guide
  8. key concepts in information & communication technology
  9. design for software
  10. embedded system
  11. cybersecurity
Down
  1. website optimization
  2. compliance
  3. koleksi menu orang bujang
  4. computer network security
  5. wireless communication principles & practise
  6. intelectuals creativity & intolerance
  7. teknologi biotenaga
  8. writing for impact
  9. android phones for dummies

20 Clues: complianceinstrumentasicybersecurityasas pendawaianembedded systemdesign for hackerswriting for impactteknologi biotenagadesign for softwarewebsite optimizationperak good food guidekoleksi menu orang bujangcomputer network securityandroid phones for dummiesnetworking basics 2 editionengineering ethics fourth edition...

FIND THE WORDS 2023-05-17

FIND THE WORDS crossword puzzle
Across
  1. Asas Pendawaian
  2. Engineering Ethics Fourth Edition
  3. Networking Basics 2 Edition
  4. Sistem Bekalan Elektrik&Pengagihan
  5. Instrumentasi
  6. Design for Hackers
  7. Perak Good Food Guide
  8. Key Concepts in Information&Communication Technology
  9. Design for Software
  10. Embedded System
  11. Cybersecurity
Down
  1. Website Optimization
  2. Compliance
  3. Koleksi Menu Orang Bujang
  4. Computer Network Security
  5. Wireless Communication Principles&Practise
  6. Intelectuals Creativity&Intolerance
  7. Teknologi Biotenaga
  8. Writing for Impact
  9. Android Phones for Dummies

20 Clues: ComplianceInstrumentasiCybersecurityAsas PendawaianEmbedded SystemDesign for HackersWriting for ImpactTeknologi BiotenagaDesign for SoftwareWebsite OptimizationPerak Good Food GuideKoleksi Menu Orang BujangComputer Network SecurityAndroid Phones for DummiesNetworking Basics 2 EditionEngineering Ethics Fourth Edition...

Cybersecurity Crossword 2022-04-28

Cybersecurity Crossword crossword puzzle
Across
  1. Filters traffic on a network
  2. Linux tool to encrypt and decrypt
  3. Encryption that only uses a public and private key
  4. A way of accessing a system remotely
  5. Linux command to search a file for a string
  6. I in CIA
  7. Tricks people into making themselves vulnerable
Down
  1. Stores files in itself
  2. Physical, Technical, Procedural and Legal controls that can be applied; second framework concept
  3. Ethical hacking
  4. Use of shifting characters to hide a message
  5. Keeping information offsite for easy recovery
  6. Malicious software
  7. File that contains information about previous interactions with a system or network

14 Clues: I in CIAEthical hackingMalicious softwareStores files in itselfFilters traffic on a networkLinux tool to encrypt and decryptA way of accessing a system remotelyLinux command to search a file for a stringUse of shifting characters to hide a messageKeeping information offsite for easy recoveryTricks people into making themselves vulnerable...

Hapebeast career advice gang 2021-12-28

Hapebeast career advice gang crossword puzzle
Across
  1. IT manager for an FMCG company in Singapore
  2. The Career advice channel podcast host
  3. The guy with 6,000 lines in this discord
  4. Hapelinked founder
  5. The healthcare investor
  6. Founder of a creative agency (and 15 other companies...) in Portland
  7. Our dropshipping entrepreneur
  8. Hey, can you help us pin this?
  9. Ecommerce B2B specialist
  10. IT specialist in healthcare and insurance
  11. Cybersecurity in banking
  12. Our Canadian social media influencer with 3 million followers
  13. Car mechanic in Switzerland
  14. Land investor across the US
  15. Aspiring architect from New Jersey
  16. Investor and artist in LA
Down
  1. The investor who works in Republic Realm
  2. A financial manager for the US Military
  3. The investment banker
  4. A student / sneakerhead based in Singapore
  5. A real estate agent who was also a D3 basketball player
  6. Hapelinked co-founder
  7. Social media manager who was a professional chef
  8. The one and only
  9. Corporate finance advisor in one of the "Big 4"
  10. Investment consultant in Chicago
  11. Electrical Engineer with experience in renewable sector
  12. Cybersecurity specialist in Pennsylvania
  13. Our LA law firm partner
  14. Ecommerce, international freight entrepreneur.

30 Clues: The one and onlyHapelinked founderThe investment bankerHapelinked co-founderThe healthcare investorOur LA law firm partnerEcommerce B2B specialistCybersecurity in bankingInvestor and artist in LACar mechanic in SwitzerlandLand investor across the USOur dropshipping entrepreneurHey, can you help us pin this?Investment consultant in Chicago...

Criss-Cross Compliance 2022-07-21

Criss-Cross Compliance crossword puzzle
Across
  1. web armor
  2. don't get hooked!
  3. call me anytime
  4. law abiding citizen
  5. I did that!
  6. this goes both ways
Down
  1. make yourself useful
  2. think outside the box
  3. do it right the first time
  4. harmless watchmen
  5. vocal hack
  6. peeps
  7. my lips are sealed
  8. doorway hacker
  9. obedient water elephant

15 Clues: peepsweb armorvocal hackI did that!doorway hackercall me anytimeharmless watchmendon't get hooked!my lips are sealedlaw abiding citizenthis goes both waysmake yourself usefulthink outside the boxobedient water elephantdo it right the first time

CyberSecurity Awareness 2016-09-30

CyberSecurity Awareness crossword puzzle
Across
  1. Electronic messages NOT handled by the Post Office
  2. A copy of the data to be used if needed
  3. Abbreviation for Instant Messaging
  4. A mobile phone built on a mobile computing platform that is not dumb
  5. A computer program that can retrieve and display information from the Internet
  6. Software that is loaded onto a computer to identify and remove viruses
  7. Abbreviation for Protected Health Information
Down
  1. Unauthorized person who tries to break into your system or network
  2. A shortened name for malicious software
  3. A secret series of characters used to authenticate a person's identity
  4. A computer network, that an organization uses for its own internal sites like MyNews or PurplePages.
  5. A technique made to scramble data making it unreadable and unusable
  6. Method used by criminals to HOOK you into giving up sensitive information.
  7. Unsolicited email sent to you also a canned meat

14 Clues: Abbreviation for Instant MessagingA shortened name for malicious softwareA copy of the data to be used if neededAbbreviation for Protected Health InformationUnsolicited email sent to you also a canned meatElectronic messages NOT handled by the Post OfficeUnauthorized person who tries to break into your system or network...

Cybersecurity trainning 2018-03-12

Cybersecurity trainning crossword puzzle
Across
  1. a hostile message that may contain obscene language.
  2. techniques used by people who want to sexually harm children and young people get close to them and gain their trust.
  3. willful, repeated harm through electronic text.
  4. a trail of the user’s activity in cyberspace.
  5. information about your visit recorded automatically on your computer
  6. sending, receiving, or forwarding sexually explicit messages, photographs or images
  7. malicious software or code designed to damage computer or collect information.
Down
  1. unsolicited e-mail, or junk mail.
  2. engine an Internet service that helps you search for information on the web.
  3. Internet gamers who intentionally cause problems and/or cyberbully other gamers.
  4. Rules for interacting courteously with others online
  5. allows you to block certain types of content from being displayed.
  6. type of online fraud, where someone tries to trick the victim into revealing sensitive details.
  7. a program that lets you find, see, and hear material on web pages

14 Clues: unsolicited e-mail, or junk mail.a trail of the user’s activity in cyberspace.willful, repeated harm through electronic text.a hostile message that may contain obscene language.Rules for interacting courteously with others onlinea program that lets you find, see, and hear material on web pages...

Cybersecurity terms 2023-09-29

Cybersecurity terms crossword puzzle
Across
  1. Barrier between a trusted network and an untrustworthy network.
  2. A collection of programs or software tools that allow hackers to remotely access and control a computer or network.
  3. A form of fraud that involves contacting victims through email, telephone, or text to trick them into sharing personal information.
  4. It refers to protecting information from unauthorized user
  5. A form of malware used by hackers to spy on you and your computer activities.
Down
  1. Visit the global policy database and find the title of MFC-STA-023
  2. Also referred to as two-factor authentication
  3. Short for malicious software
  4. The process of converting information into a code to prevent unauthorized access.
  5. It means data are trustworthy and have not been accidentally altered or modified by an unauthorized access
  6. It is the process of converting coded or encrypted data to its original form.
  7. It means data are accessible when you need them
  8. It relates to rights to control the sharing and use of one’s personal information
  9. A network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.

14 Clues: Short for malicious softwareAlso referred to as two-factor authenticationIt means data are accessible when you need themIt refers to protecting information from unauthorized userBarrier between a trusted network and an untrustworthy network.Visit the global policy database and find the title of MFC-STA-023...

Cybersecurity Crossword Puzzle 2021-08-14

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Fake organisations will send SMSes that usually contain spelling or --- errors
  2. Although strictly not under cybersecurity, --- activities via digital devices are becoming common.
  3. Scams involve emotions such as fear and ---
  4. A good way is to use password --- apps
  5. Seniors should use uppercase and --- letters, numbers or symbols to make passwords harder to crack
  6. The third topic that we discussed is Handling ---
  7. Fear messages are meant to force the seniors into --- action without stopping to think
  8. DAs are encouraged to use real-life --- in sharing cybersecurity information with seniors
Down
  1. Share with seniors how to --- between legitimate and fake organisations
  2. Legitimate organisations will never ask for personal --- information such as passwords, bank account and OTPs
  3. A common scam these days : –-- jobs with high salaries
  4. Seniors can use 2 notebooks as a way to remember passwords and personal information but they must keep the 2 notebooks ---
  5. Seniors are encouraged to use a strong ---
  6. Use --- bells as imagery
  7. Seniors should be wary of providing --- information
  8. Not sure, --- back
  9. Online --- apps will most likely make seniors lose money
  10. Seniors should never click on unknown links or ---

18 Clues: Not sure, --- backUse --- bells as imageryA good way is to use password --- appsSeniors are encouraged to use a strong ---Scams involve emotions such as fear and ---The third topic that we discussed is Handling ---Seniors should never click on unknown links or ---Seniors should be wary of providing --- information...

Farah thee Sattar 2023-11-20

Farah thee Sattar crossword puzzle
Across
  1. farah's first friend
  2. he will be found
  3. be careful online
  4. thing 2
  5. 40th birthday gift
  6. the spice of life
  7. the other f word
  8. one r
Down
  1. signature look
  2. where was farah born
  3. flip the pan
  4. da who?
  5. the best yogurt variety
  6. thing 1

14 Clues: one rthing 2da who?thing 1flip the pansignature lookhe will be foundthe other f wordbe careful onlinethe spice of life40th birthday giftfarah's first friendwhere was farah bornthe best yogurt variety

Information Security 2023-12-12

Information Security crossword puzzle
Across
  1. 57% of organizations see at least weekly phishing attempts
  2. The most common target of phishing attacks are ____
  3. The US holds ____ place in the tanks of countries targeted for cybersecurity tasks
  4. 94% of malware is delivered by ____
  5. You should ____ over a link in an email to preview the actual address before clicking
Down
  1. Lock your ____ when you step away
  2. German American's Information Security Officer is
  3. ____ is one of the most common and dangerous forms of cyber crime
  4. Phishing is an attempt to obtain sensitive ____ with malicious intent
  5. Display names and email domains can be ____ hiding the true identity and appearing trustworthy
  6. Report spam/suspicious emails through the ____ button on the Outlook toolbar
  7. Our first line of defense against cybersecurity attacks and fraud is ___
  8. At German American, _____ is responsible for information security

13 Clues: Lock your ____ when you step away94% of malware is delivered by ____German American's Information Security Officer isThe most common target of phishing attacks are ____57% of organizations see at least weekly phishing attempts____ is one of the most common and dangerous forms of cyber crime...

Clément_34_Cyberattack,nuclear weapon, destruction 2020-02-27

Clément_34_Cyberattack,nuclear weapon, destruction crossword puzzle
Across
  1. impossible situation
  2. non civilian
  3. science of online security
  4. virtual attack
  5. oil train
  6. most powerful bomb
Down
  1. online fight
  2. injuries
  3. refineries science
  4. Gain access

10 Clues: injuriesoil trainGain accessonline fightnon civilianvirtual attackrefineries sciencemost powerful bombimpossible situationscience of online security

FSRW - MS Digital Tools 2021-10-05

FSRW - MS Digital Tools crossword puzzle
Across
  1. Lisa Golia
  2. credit protection
  3. secure document sharing
  4. Secured Approval
  5. Training
  6. client can do it instead of FA
Down
  1. Protecting digital information
  2. substitute for pen and paper
  3. Eco friendly
  4. consolidated accounts
  5. quick 1-800 tool
  6. great for happy hours
  7. Self-Service Platform
  8. generates recommendations

14 Clues: TrainingLisa GoliaEco friendlyquick 1-800 toolSecured Approvalcredit protectionconsolidated accountsgreat for happy hoursSelf-Service Platformsecure document sharinggenerates recommendationssubstitute for pen and paperProtecting digital informationclient can do it instead of FA

Bridal Shower 2022-04-18

Bridal Shower crossword puzzle
Across
  1. Bride's Maiden Name
  2. City Where Wedding will be Held
  3. College Where Couple Graduated From
  4. Groom
  5. Where Bride grew up
  6. Month Bride was Born
  7. Honeymoon
  8. Site of Gift Registry
  9. Month of Wedding
Down
  1. Bride's car
  2. Instrument Groom Plays
  3. Josh's Major in College
  4. Number of Attendants
  5. Bride's High School Sport
  6. Last Name of Groom
  7. Groom's car
  8. Groom's sport
  9. Month the Groom was born

18 Clues: GroomHoneymoonBride's carGroom's carGroom's sportMonth of WeddingLast Name of GroomBride's Maiden NameWhere Bride grew upNumber of AttendantsMonth Bride was BornSite of Gift RegistryInstrument Groom PlaysJosh's Major in CollegeMonth the Groom was bornBride's High School SportCity Where Wedding will be HeldCollege Where Couple Graduated From

Cybersecurity 2023-05-10

Cybersecurity crossword puzzle
Across
  1. Defensive computer technology, software or hardware-based, created and installed to keep hackers and malware out. The firewall filters interactions with a computer, allowing or denying entry, to keep systems secure.
  2. Algorithmic technique utilized to change the contents of a file into something unreadable by anyone outside a specific chain of communication.
  3. A type of hacker. Whitehat hackers use their skills for good, helping organizations test their cybersecurity measures and find vulnerabilities.
Down
  1. A type of hacker. A blackhat hacker is an individual that uses their skills to cause damage like breaking into a computer system and stealing confidential information.
  2. Type of malware that prevents access to computer files. When a computer is infected with ransomware, the malicious software will encrypt files and request a ransom for decryption.
  3. Computer systems that have been infected by malware. The malware then allows the hacker to connect infected computers creating a network. This network, instructed by the hacker, can be used to carry out malicious attacks.
  4. Malware used to cause damage on personal computers, aimed at changing, erasing, or modifying data.
  5. To protect digital data, a consistently updated copy of files should be stored safely offline, in case a system is hacked and data is encrypted or lost.

8 Clues: Malware used to cause damage on personal computers, aimed at changing, erasing, or modifying data.Algorithmic technique utilized to change the contents of a file into something unreadable by anyone outside a specific chain of communication....

Cybersecurity 2023-09-20

Cybersecurity crossword puzzle
Across
  1. A security protocol that ensures data integrity
  2. A type of attack that floods a network with traffic
  3. Method of verifying a user's identity
  4. A system's first line of defense
Down
  1. A piece of information used to access an account
  2. A common social engineering tactic
  3. A set of rules that filters network traffic
  4. A program that appears legitimate but is malicious

8 Clues: A system's first line of defenseA common social engineering tacticMethod of verifying a user's identityA set of rules that filters network trafficA security protocol that ensures data integrityA piece of information used to access an accountA program that appears legitimate but is maliciousA type of attack that floods a network with traffic

Cybersecurity 2024-02-21

Cybersecurity crossword puzzle
Across
  1. Technique of asymmetric encryption
  2. Malicious program capable of replicating and spreading
  3. Another protocol for securing internet communications
  4. Authentication system based on something the user possesses
Down
  1. Protocol for securing internet communications
  2. Technique for protecting data by transforming it irreversibly
  3. Type of attack that involves making a service unavailable
  4. International organization establishing information security standards

8 Clues: Technique of asymmetric encryptionProtocol for securing internet communicationsAnother protocol for securing internet communicationsMalicious program capable of replicating and spreadingType of attack that involves making a service unavailableAuthentication system based on something the user possesses...

Technologies 2024-01-30

Technologies crossword puzzle
Across
  1. interconnected
  2. Customer
  3. Talk online
  4. Programme
  5. device used to select items
  6. enter data into a computer for processing
  7. secret word
  8. set of keys
  9. state of being safe from electronic crime
  10. Unit of data
Down
  1. Problem-solving steps
  2. computer part
  3. Computer memory
  4. organised data retrieved by a computer
  5. collection of related data
  6. primary display screen
  7. transfer
  8. single worldwide computer network
  9. the capacity of a computer
  10. to remove defects

20 Clues: CustomertransferProgrammeTalk onlinesecret wordset of keysUnit of datacomputer partinterconnectedComputer memoryto remove defectsProblem-solving stepsprimary display screencollection of related datathe capacity of a computerdevice used to select itemssingle worldwide computer networkorganised data retrieved by a computer...

cybersecurity 2024-02-27

cybersecurity crossword puzzle
Across
  1. (Firewall)
  2. (Password)
  3. ( cybersecurity)
Down
  1. (Malware)
  2. (Phishing )

5 Clues: (Malware)(Firewall)(Password)(Phishing )( cybersecurity)

Basic of Cyber Sercurity 2019-07-10

Basic of Cyber Sercurity crossword puzzle
Across
  1. items or people of value online
  2. making sure every individual working with an information system has specific responsibilities for information assurance
  3. preventing unauthorized access to information and actively detecting, documenting, and counteracting such threats
  4. the virtual, online world
  5. provides a way for denial to be impossible
  6. a weakness or gap in our effort to protect ourselves
  7. assures online information is trustworthy and accurate
Down
  1. infrastructure government term describing assets that keep society and the economy functioning (including national and economic security, public health and safety, communication, transportation, and electricity generation)
  2. guarantee of reliable access to information
  3. three-pronged system of cybersecurity
  4. the practice of protecting digital and non-digital information
  5. a set of rules limiting access to certain information, much like privacy
  6. the state of being protected against criminal or unauthorized online activity
  7. guarantee that the message, transaction, or other exchange of information has shown its proof of identity

14 Clues: the virtual, online worlditems or people of value onlinethree-pronged system of cybersecurityprovides a way for denial to be impossibleguarantee of reliable access to informationa weakness or gap in our effort to protect ourselvesassures online information is trustworthy and accuratethe practice of protecting digital and non-digital information...

CyberAware&Prep 2023-04-14

CyberAware&Prep crossword puzzle
Across
  1. You should always ____ your screen when stepping away from the computer
  2. a _____ should be difficult for attackers to guess, but easy for you to remember
  3. The people responsible for cybersecurity
Down
  1. if you receive a strange email, never open any ___
  2. You can flag suspicious emails asking for information using the 'report ____' option
  3. the abbreviation for multiple layers of access control/login protections
  4. Frequent software ___ can help keep systems secure
  5. ____ are the weakest link in cybersecurity
  6. always ___ out when you are done using a website
  7. Shoulder ____ is when someone tries to gain information from a device by peeking over your shoulder

10 Clues: The people responsible for cybersecurity____ are the weakest link in cybersecurityalways ___ out when you are done using a websiteif you receive a strange email, never open any ___Frequent software ___ can help keep systems secureYou should always ____ your screen when stepping away from the computer...