cybersecurity Crossword Puzzles

Cybersecurity Crossword 2025-09-02

Cybersecurity Crossword crossword puzzle
Across
  1. – A type of malware that replicates itself by infecting other programs.
  2. – A secure tunnel for internet traffic, stands for Virtual Private Network.
  3. – A network security system that monitors and controls traffic.
  4. – A scam using fake emails or messages to trick people into revealing information.
  5. Factor – Authentication requiring more than one form of verification.
  6. – A hidden method of bypassing normal authentication.
  7. – Malware that locks files and demands payment.
  8. – Software that detects and removes malicious programs.
  9. Attack – An attempt to damage, steal, or disrupt digital systems.
  10. – The practice of protecting systems, networks, and programs from attacks.
  11. – The process of converting data into a secure code.
  12. – A clickable reference to another webpage or document.
Down
  1. – Manipulating people into revealing confidential information. _____ engineering.
  2. – A secret string of characters used for authentication.
  3. – Software designed to harm or exploit systems.
  4. – A well-known security awareness training platform.
  5. Horse – Malicious software disguised as legitimate software.
  6. – Phishing conducted through SMS text messages.
  7. – Technology simulating human intelligence, used in modern cybersecurity.
  8. – The process of verifying identity before granting access.

20 Clues: – Software designed to harm or exploit systems.– Phishing conducted through SMS text messages.– Malware that locks files and demands payment.– A well-known security awareness training platform.– The process of converting data into a secure code.– A hidden method of bypassing normal authentication....

Cybersecurity Crossword 2025-09-30

Cybersecurity Crossword crossword puzzle
Across
  1. a type of social engineering that uses messaging technologies (such as texts)
  2. when you obtain a new device, you should always change the ________ password
  3. social engineers evoke this emotion by making threats
  4. infects your computer and does bad things
  5. social engineers try to pique your _________
  6. a type of social engineering using a voice channel
  7. be careful what you share on ___________ media; it can be used against you
  8. locks you out of your computer unless you pay a ransom
  9. the third word in 'IoT'
  10. a type of password that is long and hard to guess but memorable
  11. you can ________ your data if you want to protect it from prying eyes
Down
  1. one indicator of a phish is a sense of __________ from artificial deadlines
  2. enable automatic software ___________ to install the latest security patches
  3. you should always enable this type of authentication to secure your account
  4. if you don't know the sender, never download one of these
  5. a password's strength is determined by its __________
  6. passwords should be ________ (only used for a single account are)
  7. a password __________ will remember your passwords for you
  8. think twice before you click on ___________ in e-mails
  9. a network of infected devices used together to launch cyberattacks
  10. this is what you should do if you receive a suspicious message
  11. creating an extra copy of important files and documents

22 Clues: the third word in 'IoT'infects your computer and does bad thingssocial engineers try to pique your _________a type of social engineering using a voice channelsocial engineers evoke this emotion by making threatsa password's strength is determined by its __________think twice before you click on ___________ in e-mails...

CyberSecurity Crossword 2022-09-22

CyberSecurity Crossword crossword puzzle
Across
  1. method through which information is converted into secret code through a special algorithm that hides information's true meaning
  2. program or hardware device that filters information coming through an internet connection to a network or computer system.
  3. This attack is carried out by repeatedly trying password combinations till the password match is found.
  4. URLs that lead user to visit an harmful website or to download a virus
  5. This is a worm which came in mid-2010 and was responsible for huge damage to Iran's Nuclear Program.
  6. programs that are used to track or record users keystroke
  7. Centralized Monitoring, analysis, detection/prevention & response to cybersecurity incidents.
  8. The malicious program malware that downloads onto a computer disguised as a legitimate program. Named after an ancient greek story.
  9. I am not a robot
  10. Weaknesses that can be exploited
  11. Packets of data sent from server to browser used to identify the browser
  12. Framework that is a set of guidelines for mitigating organizational cybersecurity risks, published by the US National Institute of Standards and Technology
  13. Malicious software that is installed on the device without the end user's knowledge and is used to monitor activity without the user's permission.
  14. information about a file
  15. The process of transforming the data from unreadable format to the original message.
  16. You are sending one confidential document to your colleague. In transmission, data gets tampered & content was changed. Which part of security was lost here
  17. Used to commit financial crimes. The attack in which a small amount is taken out every day so that attack goes unnoticed. The name of the attack resembles closely to a chicken dish.
  18. Special viruses that replicate from computer to computer in a network without human interaction
Down
  1. Group of malware-infected computers that form a network to attack
  2. The device or application that monitors a network for malicious activities and has the ability to protect from or stop the incidents from taking place.
  3. this is a vital information resource under siege
  4. the system that shows the location of the person or places through satellites.
  5. The authentication method in which requires two or more verification methods to gain access to the system.
  6. This is the world's first virus(Boot-Sector Virus)
  7. This method is used to hide information inside the picture.
  8. network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts to gain unauthorized access.
  9. The attack that is done to bring down the system or to hinder the normal function of the website or other network resources.
  10. process of giving permission to someone of doing something
  11. science of collecting and analyzing information from information and communication technologies as evidence in a legal case.
  12. Process of being friends builds trust and emotional connection with a young person with future intentions of sexual abuse, exploitation or traficking.

30 Clues: I am not a robotinformation about a fileWeaknesses that can be exploitedthis is a vital information resource under siegeThis is the world's first virus(Boot-Sector Virus)programs that are used to track or record users keystrokeprocess of giving permission to someone of doing somethingThis method is used to hide information inside the picture....

Cybersecurity Words 2020-11-18

Cybersecurity Words crossword puzzle
Across
  1. a common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct malicious or unauthorized activity.
  2. An observable occurrence or sign that an attacker may be preparing to cause an incident.
  3. uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
  4. set of instructions to help IT staff detect, respond to, and recover from network security incidents.
  5. a type of cyber attack that disrupts its normal functions and prevents other users from accessing it.
  6. a situation in which a person or program successfully identifies as another by falsifying data, to gain and illegitimate advantage.
  7. ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization’s information systems.
  8. strategy used to make sure users do not send critical information outside of a corporate network.
  9. an automated program that runs over the Internet. Some bots run automatically, while others only execute commands when they receive specific input.
  10. integrated collection of security measures to prevent unauthorized access to a networked computer system
  11. a cyberattack on a server, service, website, or network floods it with Internet traffic.
  12. identifying your risks and vulnerabilities and applying administrative actions and comprehensive solutions to make sure your organization is adequately protected.
  13. the unauthorized movement of information being spread throughout the internet.
  14. Authentication via group
  15. a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.
  16. used to detect malware.
  17. a system that allows web hosts to distinguish between human and automated access to websites.
  18. Someone or Something that authenticates
  19. a standalone malware computer program that replicates itself in order to spread to other computers.
  20. science concerned with data communication and storage in secure and usually secret form.
  21. related to cloud computing, in which it can hold information and photos.
  22. to successfully escape from an area under enemy control.
  23. Source code that is free to copy and modify.
  24. an emerging online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies.
  25. Hacker who violates computer security for personal gain or malice.
  26. is the method where knowledge of internal and external information weakness of a particular organization are tested against real-world cyberattacks.
  27. The attack of a Software environment where an unauthorized user can try to enter data to or extract data from said environment.
  28. a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
Down
  1. an evaluation of events that can adversely affect operations and/or specific assets
  2. a type of monitoring software designed to record keystrokes made by a user.
  3. Source code that is not available
  4. the psychological manipulation of people into performing actions or divulging confidential information.
  5. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  6. software that displays unwanted advertisements on your computer.
  7. the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
  8. code that takes advantage of a vulnerability of flaw.
  9. a set of changes to a computer program or its supporting data designed to update, fix, or improve it
  10. an advanced attack method, where attackers intrude their target organization through small companies that work with the target company.
  11. List of people under suspicion, disfavor, etc.
  12. internet protocol address, which identifies the number associated with a specific computer or network.
  13. an individual or group that acts, or has the power, to exploit a vulnerability or conduct other damaging activities.
  14. are hackers who use automated techniques to scan specific network ranges and find vulnerable systems, such as machines without current security patches, on which to install their bot program.
  15. any malware which misleads users of its true intent.
  16. A thing that supports another thing
  17. Someone who breaks into someone else’s computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
  18. an attack on the internet that is used to steal usernames and passwords from the network.
  19. a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.
  20. a deceptive activity where a person creates a sockpuppet presence or fake identity on a social networking service, usually targeting a specific victim for abuse or fraud.
  21. keeping data safe
  22. process of collecting and searching through a database to discover information.
  23. a computer network that provides online privacy by creating an encrypted connection on the Internet.
  24. it ensures a person’s identity matches with who they are.
  25. a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one of more of them with malware.
  26. a person who operates the command and control of botnets for remote process execution.
  27. when data is coded a certain way to disallow others from seeing that information.
  28. a collection of internet-connected devices infected by malware that allow hackers to control them.
  29. offensive security professionals who are experts in attacking systems and breaking into defenses.
  30. a type of malware that is often disguised as legitimate software.
  31. unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
  32. identifies the information assets that could be affected by a cyber attack, such as hardware, systems, laptops, customer data and intellectual property.
  33. the methods that adversaries use to breach or infiltrate your network.
  34. Number generated from a string of text
  35. malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
  36. to convert information into cipher
  37. short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information.

65 Clues: keeping data safeused to detect malware.Authentication via groupSource code that is not availableto convert information into cipherA thing that supports another thingNumber generated from a string of textSomeone or Something that authenticatesSource code that is free to copy and modify.List of people under suspicion, disfavor, etc....

Cybersecurity Risk 2021-08-30

Cybersecurity Risk crossword puzzle
Across
  1. Short for malicious software
  2. A conversion of something (such as data) into a code or cipher.
  3. measures taken to protect computer systems.
  4. Text files with small pieces of data used to identify a computer.
  5. Similar to a password but much longer.
  6. The fraudulent practice of sending text messages pretending to be from reputable companies
  7. Legitimate or innocent-looking emails asking you to respond with personal data or to click on a link.
  8. False or inaccurate information,
  9. An acronym for Pause, Ask, Think.
  10. Type of data that should be protected from public view.
Down
  1. Convert data from one system of communication into another.
  2. The enciphering and deciphering of messages in secret code or cipher.
  3. Refers to the range of activities that determine how we manage digital data.
  4. Type of data that is recorded publicly and can be found as part of public record.
  5. Software that encrypts data on someone's device until that person agrees to pay to regain access.
  6. Open to attack or damage.
  7. Software written to damage a computer’s performance, steal or alter data.
  8. Pieces of data left behind when a person moves around on the internet.
  9. A social identity established by an internet user.
  10. Someone disguises an email address, sender name, phone number, or website URL to convince you that you are interacting with a trusted source.
  11. abbreviation for personal identifiable information
  12. To engage in activity online that could result in something bad or unpleasant.
  13. Large data sets analyzed to reveal patterns

23 Clues: Open to attack or damage.Short for malicious softwareFalse or inaccurate information,An acronym for Pause, Ask, Think.Similar to a password but much longer.measures taken to protect computer systems.Large data sets analyzed to reveal patternsA social identity established by an internet user.abbreviation for personal identifiable information...

Cybersecurity Crossword 2023-07-24

Cybersecurity Crossword crossword puzzle
Across
  1. A process or measure used to verify a users identity.
  2. A type of malware that denies a user's access to a system or data until a sum of money is paid.
  3. An unauthorized user who attempts to or gains access to an information system.
  4. A computer program that can spread by making copies of itself.
  5. Software that compromises the operation of a system by performing an unauthorized function or process
  6. A flaw or weakness in the design or implementation of an information system or its environment that could be exploited to adversely affect an organization's assets or operations.
  7. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  8. A collection of computers compromised by malicious code and controlled across a network
  9. The ability of individuals to understand and exercise control over how information about themselves may be used by others.
  10. Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
  11. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
  12. The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
  13. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
Down
  1. A software program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents
  2. A security barrier placed between two networks that controls the amount and kinds of traffic that may pass between the two.
  3. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
  4. The activities that address the short-term, direct effects of an incident and may also support short-term recovery
  5. Converting data into a form that cannot be easily understood by unauthorized people.
  6. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information
  7. An attempt by a third party to solicit confidential information from an individual, group, or organization by mimicking or spoofing a specific, usually well-known brand, usually for financial gain.

20 Clues: A process or measure used to verify a users identity.A computer program that can spread by making copies of itself.An unauthorized user who attempts to or gains access to an information system.Converting data into a form that cannot be easily understood by unauthorized people....

Cybersecurity Crossword 2023-07-25

Cybersecurity Crossword crossword puzzle
Across
  1. Extra copies of computer files that can be used to restore files that are lost or damaged.
  2. Computer programs that can block, detect, and remove viruses and other malware.
  3. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
  4. Part of the internet that isn't indexed by search engines.
  5. Unsolicited emails sent to many addresses.
  6. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization.
  7. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  8. Converting data into a form that cannot be easily understood by unauthorized people.
Down
  1. A mechanism for creating a secure connection between a computing device and a computer network
  2. A collection of computers compromised by malicious code and controlled across a network.
  3. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
  4. Faking the sending address of a transmission to gain illegal entry into a secure system.
  5. A cybersecurity risk that originates from within an organization.
  6. A process or measure used to verify a user’s identity.
  7. A string of characters used to authenticate an identity.
  8. A flaw or weakness in an information system that could be exploited.
  9. A type of malware that denies a user's access to a system or data until a sum of money is paid.
  10. Software that compromises the operation of a system by performing an unauthorized function or process.
  11. Software designed to block malware from entering protected networks.
  12. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  13. A replacement for passwords that provide more secure sign-ins to websites and apps across a user’s devices.
  14. An unauthorized user who attempts to or gains access to an information system.
  15. Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
  16. The ability of individuals to understand and exercise control over how information about themselves may be used by others.

24 Clues: Unsolicited emails sent to many addresses.A process or measure used to verify a user’s identity.A string of characters used to authenticate an identity.Part of the internet that isn't indexed by search engines.A cybersecurity risk that originates from within an organization.A flaw or weakness in an information system that could be exploited....

Equity: Cybersecurity 2023-10-10

Equity: Cybersecurity crossword puzzle
Across
  1. A sequence of words or text used to control access to a computer; similar to a password
  2. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  3. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  4. Hardware or software designed to prevent unauthorized access to or from a private network.
  5. The address of a webpage. Check the validity of it before clicking on it.
  6. The process of taking plain text and scrambling it into an unreadable format.
  7. The “A” in the C-I-A Triad. It ensures authorized users have access.
  8. A fraudulent email purportedly from a reputable company attempting to get personal information.
  9. Verifying identity.
  10. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  11. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
Down
  1. Facebook, Twitter, Instagram, etc. (Two words)
  2. Threatening behavior facilitated through electronic means such as texting.
  3. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  4. The “I” in the C-I-A Triad; protection from unauthorized changes.
  5. Unauthorized access to a network, information systems, or application.
  6. Should be constructed of upper and lower case letters, numbers, and special characters.
  7. A wireless technology standard used over short distances using short-wavelength UHF radio waves.
  8. Security tool that creates a secure, encrypted connection between you and the Internet (acronym)
  9. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.

20 Clues: Verifying identity.Facebook, Twitter, Instagram, etc. (Two words)The “I” in the C-I-A Triad; protection from unauthorized changes.The “A” in the C-I-A Triad. It ensures authorized users have access.Unauthorized access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it....

Cybersecurity Awareness 2023-09-22

Cybersecurity Awareness crossword puzzle
Across
  1. Cybersecurity awareness month
  2. Bring Your Own Device
  3. Software demanding money to unlock personal information
  4. An individual that is authorized to access a system
  5. Coding used to protect sensitive data
  6. A sequence of words used for authentication
  7. An employee is automatically enrolled in ______ training, if our simulated phishing campaign determines employee requires further training
  8. Weakness in a system
  9. Unauthorized intrusion
  10. A security process that uses an additional factor for verification is called "______-Factor Authentication"
Down
  1. Online harrassment
  2. Malicious "horse" software
  3. Email protection company that notifies Buckley users when questionable emails are quarantined
  4. Email that falsely claims to be from a legitimate source, usually with a threat or request for information
  5. Storage for infected files
  6. Junk email
  7. Your digital ______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  8. Altered audio/video to trick users into gaining access to a system
  9. Tech used to keep intruders out
  10. The fraudulent practice of sending a text message impersonating the head of school in order to induce individuals to reveal personal information or purchase a gift card
  11. A piece of software that allows a user to remain anonymous while using the internet by masking the location and encrypting traffic (infamously used to circumvent a web filter)
  12. Outlook button used to report suspicious emails to your IT department "Phish ______ button"

22 Clues: Junk emailOnline harrassmentWeakness in a systemBring Your Own DeviceUnauthorized intrusionMalicious "horse" softwareStorage for infected filesCybersecurity awareness monthTech used to keep intruders outCoding used to protect sensitive dataA sequence of words used for authenticationAn individual that is authorized to access a system...

Cybersecurity Kreuzworträtsel 2024-07-18

Cybersecurity Kreuzworträtsel crossword puzzle
Across
  1. Der Vorgang des illegalen Zugriffs auf Computersysteme und Netzwerke.
  2. Engineering Manipulation von Menschen, um vertrauliche Informationen zu erhalten.
  3. Schadsoftware, die Daten verschlüsselt und Lösegeld fordert.
  4. Schädliche Software, die darauf abzielt, Computer oder Netzwerke zu schädigen.
  5. Software, die Ihren Computer vor Schadprogrammen schützt.
  6. Software, die heimlich Informationen über das Nutzerverhalten sammelt.
  7. Day Eine Sicherheitslücke, die von Hackern ausgenutzt wird, bevor der Hersteller davon Kenntnis hat.
  8. Ein Netzwerk von infizierten Computern, die von einem Angreifer ferngesteuert werden.
  9. Ein Schadprogramm, das sich als nützliche Software tarnt.
Down
  1. Ein Angriff, bei dem ein Angreifer versucht, sich durch Täuschung vertrauliche Informationen zu beschaffen.
  2. Eine versteckte Methode, um Zugriff auf ein Computersystem zu erhalten.
  3. Ein System, das den Datenverkehr überwacht und kontrolliert, basierend auf vordefinierten Sicherheitsregeln.
  4. Ein unerwünschtes Programm, das sich selbst vervielfältigt und verbreitet.
  5. Eine Methode zur Sicherung einer Internetverbindung durch Verschlüsselung.
  6. Software, die unerwünschte Werbung auf Ihrem Computer anzeigt.
  7. Eine lange, komplexe Zeichenfolge, die zur Authentifizierung eines Benutzers verwendet wird.
  8. Die zweite Schicht der Authentifizierung, oft durch einen Code auf einem Mobilgerät.
  9. Der Prozess der Umwandlung von Daten in einen Code, um sie vor unbefugtem Zugriff zu schützen.
  10. Software, die tief in einem System verankert ist und es Hackern ermöglicht, das System zu kontrollieren.
  11. Ein Angriff, bei dem eine große Menge an Datenverkehr ein System überlastet.

20 Clues: Software, die Ihren Computer vor Schadprogrammen schützt.Ein Schadprogramm, das sich als nützliche Software tarnt.Schadsoftware, die Daten verschlüsselt und Lösegeld fordert.Software, die unerwünschte Werbung auf Ihrem Computer anzeigt.Der Vorgang des illegalen Zugriffs auf Computersysteme und Netzwerke....

Cybersecurity Vocab 2024-04-08

Cybersecurity Vocab crossword puzzle
Across
  1. A self-replicating type of malware that spreads across networks without human intervention, often causing damage or disruption.
  2. the fraudulent practice of sending emails or text messages purpretending porting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  3. Good practices and habits for maintaining cybersecurity, such as keeping software up to date, using strong passwords, and being cautious of suspicious emails or links.
  4. A type of malware disguised as legitimate software, which appears harmless but actually performs malicious actions when executed.
  5. The process of converting encrypted data back into its original form using a decryption key or algorithm.
  6. A strong, complex password that is difficult for attackers to guess or crack, typically consisting of a combination of letters, numbers, and special characters.
  7. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  8. The ethical principles and guidelines governing acceptable behavior and conduct in cyberspace, including respect for privacy, intellectual property rights, and online safety.
  9. Short for malicious software, malware is any software intentionally designed to cause damage to computer systems, steal data, or disrupt operations.
  10. The practice of protecting computer systems, networks, and data from digital attacks, theft, and damage.
  11. The process of reacting to and managing cybersecurity incidents, such as data breaches or cyberattacks, to minimize damage and restore normal operations.
  12. A security process that requires users to provide two different forms of identification before accessing an account or system, typically a password and a unique code sent to a mobile device.
Down
  1. A type of malware that infects computer systems by attaching itself to files or programs and replicating when executed.
  2. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  3. Measures and practices implemented to protect computer networks from unauthorized access, misuse, or disruption.
  4. The process of verifying the identity of users or devices attempting to access a system or network.
  5. the process of converting information or data into secret code, especially to prevent unauthorized access
  6. A person who uses technical skills to gain unauthorized access to computer systems or networks, often for malicious purposes.
  7. Software designed to detect, prevent, and remove malicious software (malware) from computer systems.
  8. A weakness or flaw in computer systems, networks, or software that could be exploited by attackers to gain unauthorized access or cause harm.
  9. The trail of digital information or data left behind by an individual's online activities, including social media posts, website visits, and online purchases.
  10. The use of digital communication technologies to harass, intimidate, or bully individuals or groups, often through social media, messaging apps, or online forums.
  11. The process of granting or denying access to specific resources or services based on user credentials and permissions.
  12. attack an attempt by a hacker or hackers to infiltrate or damage a computer network or system
  13. Awareness Knowledge and understanding of cybersecurity risks, best practices, and strategies for protecting against digital threats.
  14. the gaining of unauthorized access to data in a system or computer
  15. A software update intended to fix vulnerabilities or bugs in computer programs, often issued by software vendors to improve security.

27 Clues: the gaining of unauthorized access to data in a system or computerattack an attempt by a hacker or hackers to infiltrate or damage a computer network or systemThe process of verifying the identity of users or devices attempting to access a system or network....

Cybersecurity Crossword 2024-09-03

Cybersecurity Crossword crossword puzzle
Across
  1. the practice of securing information and communication through writing and solving codes
  2. a code that gives you access to a site
  3. a group of connected computers
  4. cyberattack that fools people into revealing personal info
  5. a type of cryptocurrency that is well-known
  6. malware that tricks users by thinking they are clicking safe links
  7. software that holds your data hostage in return for something they want
  8. network of compromised computers used in a cyberattack
  9. manipulated media images usually used to scam people
  10. a program that encrypts your internet traffic by scrambling your IP address
  11. method of scrambling data, only an authorized user can use
  12. a string of numbers used to identify a computer
  13. a person who infiltrates a computer
  14. a place where data can be stored but it is not on an internal hard drive
Down
  1. software that infects and destroys computers' data
  2. software used to detect, prevent, and remove malware
  3. computerized intelligence that forms to make and execute life-like decisions
  4. an unintended hardware or software problem
  5. an attack on somebody in a digital way of force
  6. the act of data being leaked from a source
  7. a set of software tools that gives user access without being detected
  8. malware that collects and transmits your private data

22 Clues: a group of connected computersa person who infiltrates a computera code that gives you access to a sitean unintended hardware or software problemthe act of data being leaked from a sourcea type of cryptocurrency that is well-knownan attack on somebody in a digital way of forcea string of numbers used to identify a computer...

Cybersecurity Awareness 2024-10-25

Cybersecurity Awareness crossword puzzle
Across
  1. Secure connection that hides your online activities
  2. Scrambling data to protect it from prying eyes
  3. Software that helps detect and remove malicious programs
  4. Malware disguised as legitimate software
  5. The ability to use or interact with data or systems
  6. Protects your network by blocking certain traffic
  7. A weakness in a system that can be exploited
  8. An extra layer of security requiring two forms of identification
  9. Manipulating people to gain confidential information
  10. A saved copy of data, used in case of data loss
  11. A risk from someone within the organization
  12. A security event that could harm a system or data
Down
  1. Converting scrambled data back into readable form
  2. Pretending to be someone else to deceive or scam
  3. A secret word or phrase used to access your account
  4. Malicious software that demands payment to release data
  5. Fraudulent emails trying to trick you into revealing information
  6. Criminal activities carried out using computers
  7. Username and password combination used to log in
  8. Software that secretly monitors your online activities
  9. Verifying who you are before gaining access
  10. When sensitive data is accessed without authorization
  11. Information collected and stored digitally
  12. A software update that fixes security vulnerabilities
  13. Someone who tries to gain unauthorized access to systems
  14. A type of malware that spreads by copying itself
  15. Following legal and regulatory cybersecurity standards
  16. Harmful software that damages or infiltrates devices

28 Clues: Malware disguised as legitimate softwareInformation collected and stored digitallyVerifying who you are before gaining accessA risk from someone within the organizationA weakness in a system that can be exploitedScrambling data to protect it from prying eyesCriminal activities carried out using computers...

Cybersecurity Awareness 2024-12-13

Cybersecurity Awareness crossword puzzle
Across
  1. A network of infected computers or devices that are controlled by attackers to perform malicious tasks.
  2. Unauthorized access to or manipulation of computer systems or networks, often for malicious purposes.
  3. A type of malware that locks a user’s files or system, demanding payment to restore access.
  4. A fix or update to software that addresses security vulnerabilities or bugs.
  5. Manager A tool that stores and manages your passwords securely, making it easier to use complex, unique passwords for different sites.
  6. A type of software or hardware that secretly records keystrokes, often used to steal passwords and sensitive information.
  7. Horse Malicious software disguised as a legitimate program to deceive users and gain access to their systems.
  8. Response The process of detecting, responding to, and recovering from a cybersecurity breach or attack.
  9. Engineering Manipulating people into giving up confidential information or performing actions that compromise security.
  10. Software that secretly gathers information about you or your device without your consent.
  11. (Distributed Denial of Service) An attack where multiple systems flood a server or network with traffic, overwhelming it and causing disruption.
  12. A weakness or flaw in a system that can be exploited by attackers to gain unauthorized access.
  13. The process of converting data into a secret code to prevent unauthorized access.
  14. Security system that monitors and controls incoming and outgoing traffic to protect systems from unauthorized access.
Down
  1. Software designed to detect, prevent, and remove malicious programs from your computer or network.
  2. Authentication (2FA) A security method that requires two forms of identification to verify your identity, like a password and a text message code.
  3. Any potential danger or risk that could exploit vulnerabilities in a system or network.
  4. Malicious software designed to harm or exploit devices, systems, or networks.
  5. Breach An incident where confidential data is accessed or disclosed without authorization.
  6. Escalation A method used by attackers to gain higher levels of access or control within a system than originally allowed.
  7. A security vulnerability that is unknown to the software maker and has no fix or patch available.
  8. Detection System (IDS) A system that monitors network or system activity for signs of malicious activity or policy violations.
  9. Scam where attackers try to trick individuals into revealing personal information by pretending to be trustworthy sources.
  10. A copy of important data or files that can be restored in case of loss, damage, or attack.
  11. (Virtual Private Network) A secure connection method that protects your internet activity by encrypting it and masking your location.

25 Clues: A fix or update to software that addresses security vulnerabilities or bugs.Malicious software designed to harm or exploit devices, systems, or networks.The process of converting data into a secret code to prevent unauthorized access.Any potential danger or risk that could exploit vulnerabilities in a system or network....

Cybersecurity Crossword 2025-09-25

Cybersecurity Crossword crossword puzzle
Across
  1. Requiring more than one form of verification. ____________ authentication
  2. A network security system that monitors and controls traffic.
  3. The process of verifying identity before granting access.
  4. The process of converting data into a secure code.
  5. A secret string of characters used for authentication.
  6. The practice of protecting systems, networks, and programs from attacks.
Down
  1. Technology simulating human intelligence, used in modern cybersecurity.
  2. Malicious software disguised as legitimate software.
  3. Malware that locks files and demands payment.
  4. A scam using fake emails or messages to trick people into revealing information.
  5. A clickable reference to another webpage or document.
  6. Phishing conducted through SMS text messages
  7. Software designed to harm or exploit systems.
  8. A type of malware that replicates itself by infecting other programs.
  9. Software that detects and removes malicious programs.
  10. A well-known security awareness training platform.
  11. A secure tunnel for internet traffic, stands for Virtual Private Network.
  12. An attempt to damage, steal, or disrupt digital systems.
  13. Manipulating people into revealing confidential information. ________ engineering
  14. A hidden method of bypassing normal authentication.

20 Clues: Phishing conducted through SMS text messagesMalware that locks files and demands payment.Software designed to harm or exploit systems.The process of converting data into a secure code.A well-known security awareness training platform.A hidden method of bypassing normal authentication.Malicious software disguised as legitimate software....

cybersecurity dylan 2025-11-03

cybersecurity dylan crossword puzzle
Across
  1. Encrypts files and demands payment
  2. User education against threats
  3. Set of security rules
  4. Creates a digital fingerprint of data
  5. Detects and removes malware
  6. Steps to handle a cyberattack
  7. Replaces sensitive data with tokens
  8. Security barrier between internal and external networks
  9. Code that takes advantage of a vulnerability
  10. Attack that makes a service unavailable
Down
  1. Unauthorized data exposure
  2. Social engineering attack via fake messages
  3. Multi-Factor Authentication
  4. Compromise of system or information
  5. Install latest security patches
  6. Data copy for recovery
  7. The process of transforming data into ciphertext
  8. Malicious software such as viruses or trojans
  9. Everyday security best practices
  10. Restricts user permissions
  11. Secret key to access accounts
  12. Verifies the identity of a user or system

22 Clues: Set of security rulesData copy for recoveryUnauthorized data exposureRestricts user permissionsMulti-Factor AuthenticationDetects and removes malwareSecret key to access accountsSteps to handle a cyberattackUser education against threatsInstall latest security patchesEveryday security best practicesEncrypts files and demands payment...

Cybersecurity Crossword 2025-09-04

Cybersecurity Crossword crossword puzzle
Across
  1. Malware that demands money
  2. Sending emails or other messages purporting to be from a reputable source
  3. Cybersecurity Awareness Month
  4. Secret string of characters needed to access secure sites, devices, and systems
  5. Unauthorized data access or exfiltration
  6. Process of confirming your identity
  7. Blocks network intruders
Down
  1. Person who breaks into software/systems
  2. Cybersecurity mascot for The Plans
  3. Button for suspicious emails (two words)
  4. Creates a secure connection to another online network (we use this when working remotely)
  5. Process of securing data by scrambling it
  6. Software that protects against malicious code
  7. Harmful software
  8. Update that fixes a vulnerability
  9. Training and phishing simulation partner (two words)

16 Clues: Harmful softwareBlocks network intrudersMalware that demands moneyCybersecurity Awareness MonthUpdate that fixes a vulnerabilityCybersecurity mascot for The PlansProcess of confirming your identityPerson who breaks into software/systemsButton for suspicious emails (two words)Unauthorized data access or exfiltration...

Cybersecurity Terminology 2024-03-14

Cybersecurity Terminology crossword puzzle
Across
  1. Software that prevents malicious software
  2. Programs that simulates human activity.
  3. Masks malicious software.
  4. Distinguishes between humans and bots.
  5. A false warning.
  6. Being free from public attention.
  7. A type of cryptocurrency.
  8. An error in a program.
  9. Unwanted email messages.
  10. Unlocking encrypted data.
  11. Software for blackmailing.
  12. Website file that stores information.
  13. Software that corrupts files.
Down
  1. Confirms a user's identity.
  2. A way to access software.
  3. A fake online identity
  4. Techniques for safeguarding computers.
  5. Devices that mines cryptocurrency.
  6. Software that automatically displays advertisements.
  7. Entering an account requires a.
  8. Harmful computer codes that spread.

21 Clues: A false warning.A fake online identityAn error in a program.Unwanted email messages.Masks malicious software.A way to access software.A type of cryptocurrency.Unlocking encrypted data.Software for blackmailing.Confirms a user's identity.Software that corrupts files.Entering an account requires a.Being free from public attention....

Cybersecurity Vocabulary 2024-06-25

Cybersecurity Vocabulary crossword puzzle
Across
  1. Related to government revenue, especially taxes.
  2. Armed conflict or fighting between groups.
  3. Regularly checking or observing something to keep track of its progress or condition.
  4. Committed to a particular purpose or task.
  5. Arranged or organized to work together effectively.
  6. Managed or dealt with poorly.
  7. Dealing with or handling a problem or issue.
  8. Ordered lists based on certain criteria or performance.
  9. Actions or steps taken to achieve a particular goal.
  10. To make a process easier or more convenient.
  11. Making something stronger or more effective.
  12. New plans or actions intended to solve a problem or improve a situation.
Down
  1. The highest level ever reached.
  2. Managing or dealing with something.
  3. Improving the quality, value, or extent of something.
  4. Established procedures or rules for doing something.
  5. Acknowledgment or identification of someone or something.
  6. Promises or commitments to do something.
  7. An event or instance of something happening.
  8. The process of converting information into a secure code to prevent unauthorized access.
  9. Violations or breaks in a rule, law, or agreement.
  10. People who receive something.
  11. Required by law or rules.

23 Clues: Required by law or rules.Managed or dealt with poorly.People who receive something.The highest level ever reached.Managing or dealing with something.Promises or commitments to do something.Armed conflict or fighting between groups.Committed to a particular purpose or task.An event or instance of something happening....

Cybersecurity crossword 2023-04-22

Cybersecurity crossword crossword puzzle
Across
  1. unaware software vulnerability attacked
  2. computer damaging, harmful software
  3. website shutdown using multiple devices
  4. security during initial production stages
  5. seemingly harmless but malicious malware
  6. locks computer until random paid
  7. scrambling data method
  8. slows computer with unwanted ads
  9. required identification changing system settings
  10. Online repeated harassment
Down
  1. implements security for computer system
  2. access blocked for unauthorized users
  3. click hidden element, opening malware
  4. work policy for personal device
  5. misleading edited picture or video
  6. program designed to remove malware
  7. compromised system infecting other systems
  8. service for remotely connected wifi
  9. the guarding against unauthorized access
  10. personal information stealing tactic

20 Clues: scrambling data methodOnline repeated harassmentwork policy for personal devicelocks computer until random paidslows computer with unwanted adsmisleading edited picture or videoprogram designed to remove malwarecomputer damaging, harmful softwareservice for remotely connected wifipersonal information stealing tactic...

Cybersecurity Terms 2023-07-24

Cybersecurity Terms crossword puzzle
Across
  1. trustable storage of sensitive information
  2. prevents attacks to computer
  3. debris from electronic devices
  4. voice, face, retina, fingerprint
  5. acronym for uninterruptible power supply
  6. providing validation for access
  7. changes device's address
  8. cyber attackers with no knowledge
Down
  1. emails designed for advertisement
  2. dangerous software that will duplicate
  3. believe they're doing right
  4. dangerous software that causes corruption
  5. theft "is not a joke Jim"
  6. threats to security
  7. result in loss or injury
  8. makes authentication more powerful
  9. another term: black hat hackers
  10. looks harmless, infects device
  11. searching data to uncover information
  12. how much cybersecurity costs annually

20 Clues: threats to securityresult in loss or injurychanges device's addresstheft "is not a joke Jim"believe they're doing rightprevents attacks to computerdebris from electronic deviceslooks harmless, infects deviceanother term: black hat hackersproviding validation for accessvoice, face, retina, fingerprintemails designed for advertisement...

Cybersecurity vocabulary 2023-07-30

Cybersecurity vocabulary crossword puzzle
Across
  1. The potential for an unwanted or adverse outcome resulting from an incident, event, or occurrence, as determined by the likelihood that a particular threat will exploit a particular vulnerability, with the associated consequences.
  2. The process of transforming plaintext into ciphertext.
  3. The application of one or more measures to reduce the likelihood of an unwanted occurrence and/or lessen its consequences.
  4. malicious code
  5. A person, structure, facility, information, and records, information technology systems and resources, material, process, relationships, or reputation that has value.
  6. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
  7. A set of software tools with administrator-level access privileges installed on an information system and designed to hide the presence of the tools, maintain the access privileges, and conceal the activities conducted by the tools.
  8. A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
  9. A digital form of social engineering to deceive individuals into providing sensitive information.
  10. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
  11. A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.
  12. An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
  13. Qualify a cryptographic key that may be widely published and is used to enable the operation of an asymmetric cryptographic algorithm.
Down
  1. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
  2. A capability to limit network traffic between networks and/or information systems.
  3. The property whereby information, an information system, or a component of a system has not been modified or destroyed in an unauthorized manner.
  4. The property of being accessible and usable upon demand.
  5. Qualify public key cryptography
  6. Determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.
  7. Verifying the identity or other attributes of an entity (user, process, or device).
  8. A collection of computers compromised by malicious code and controlled across a network.
  9. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  10. The assurance that the confidentiality of, and access to, certain information about an entity is protected.
  11. Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
  12. An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.

25 Clues: malicious codeQualify public key cryptographyThe process of transforming plaintext into ciphertext.The property of being accessible and usable upon demand.A capability to limit network traffic between networks and/or information systems.Verifying the identity or other attributes of an entity (user, process, or device)....

Cybersecurity Terms 2023-01-28

Cybersecurity Terms crossword puzzle
Across
  1. One's own device for work
  2. Cybersecurity career peak
  3. Security for malware
  4. Mastery of Network defense
  5. Protection for user account
  6. Destructive single malware
  7. Online harassment
  8. Disguised cyber attack
  9. Malicious hackers
  10. Network device identity
  11. Plans security measures
Down
  1. Entry level certification
  2. Pay to release lockout
  3. Secure remote private network
  4. Network traffic control
  5. cloud security certification
  6. Malicious altered media
  7. Secure scrambled data
  8. Intermediate hacker mastery
  9. Surveillance malware

20 Clues: Online harassmentMalicious hackersSecurity for malwareSurveillance malwareSecure scrambled dataPay to release lockoutDisguised cyber attackNetwork traffic controlMalicious altered mediaNetwork device identityPlans security measuresEntry level certificationOne's own device for workCybersecurity career peakMastery of Network defense...

CyberSecurity Crossword 2023-09-07

CyberSecurity Crossword crossword puzzle
Across
  1. An attack that floods a server with useless messages until it crashes
  2. A scheme to steal information or money
  3. Finding information about hardware or software that could be evidence of an attack
  4. A request for data or code
  5. Software that allows programmers to connect to third party applications
  6. A cable that connects devices to networks and the internet
  7. The computer that accesses information from a server
  8. The collection and analysis of publicly available data
  9. A method of authentication that requires multiple steps, usually using something that the person knows and something that the person has
  10. A string of characters that someone knows in order to authenticate themselves.
  11. A trick using a company or person that a victim is familiar with to steal information or scam the victim
Down
  1. The name of a website
  2. A window that automatically opens, often for advertising
  3. An operating system kernel used on many servers, embedded systems, and even desktop computers.
  4. A computer that hosts files, software, or websites
  5. A local device that creates a personal area network for devices to connect to the internet
  6. Checking that the user is who they say they are
  7. Scrambling characters or code up so that it can’t be read
  8. A copy of files or software that is kept in case of an error with the device.
  9. The current wireless encryption standard

20 Clues: The name of a websiteA request for data or codeA scheme to steal information or moneyThe current wireless encryption standardChecking that the user is who they say they areA computer that hosts files, software, or websitesThe computer that accesses information from a serverThe collection and analysis of publicly available data...

Cybersecurity Crossword 2023-10-06

Cybersecurity Crossword crossword puzzle
Across
  1. A process or measure used to verify a user's identity.
  2. A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
  3. Software that compromises the operation of a system by performing an unauthorized function or process.
  4. Converting data into a form that cannot be easily understood by unauthorized people.
  5. A flaw or weakness in an information system that could be exploited.
  6. A string of characters used to authenticate an identity.
  7. Extra copies of computer files that can be used to restore files that are lost or damaged.
  8. A mechanism for creating a secure connection between a computing device and a computer network
  9. A type of malware that denies a user's access to a system or data until a sum of money is paid.
  10. A collection of computers compromised by malicious code and controlled across a network.
  11. Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
Down
  1. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization.
  2. The ability of individuals to understand and exercise control over how information about themselves may be used by others.
  3. Software designed to block malware from entering protected networks.
  4. Faking the sending address of a transmission to gain illegal entry into a secure system.
  5. Part of the internet that isn't indexed by search engines.
  6. An unauthorized user who attempts to or gains access to an information system.
  7. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
  8. Computer programs that can block, detect, and remove viruses and other malware.
  9. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  10. A cybersecurity risk that originates from within an organization.
  11. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
  12. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  13. Unsolicited emails sent to many addresses.

24 Clues: Unsolicited emails sent to many addresses.A process or measure used to verify a user's identity.A string of characters used to authenticate an identity.Part of the internet that isn't indexed by search engines.A cybersecurity risk that originates from within an organization.Software designed to block malware from entering protected networks....

Cybersecurity 2 2024-11-26

Cybersecurity 2 crossword puzzle
Across
  1. Business Email Compromise, a type of fraud targeting organizations for financial gain.
  2. IT Unauthorized use of IT systems or software within an organization.
  3. National Institute of Standards and Technology, a U.S. organization providing cybersecurity frameworks.
  4. Modeling A process to identify, understand, and mitigate potential threats to systems.
  5. Dashboard A visual interface displaying security events and analytics.
  6. Software or hardware that records keystrokes to steal information.
  7. Hijacking Taking control of an active session between a user and a system.
  8. Self-replicating malware that spreads without user intervention.
  9. Kit A toolkit used to automate exploitation of vulnerabilities in systems.
  10. Threat A malicious threat originating from within the organization.
  11. Engineering Psychological manipulation of individuals to divulge confidential information.
  12. Actor An individual or group engaged in malicious cyber activities.
  13. A layered approach to cybersecurity with multiple defensive mechanisms.
Down
  1. ATT&CK A framework describing adversary tactics and techniques used in cyberattacks.
  2. Force Attack A trial-and-error method used to gain access to accounts or systems.
  3. Common Vulnerabilities and Exposures, a database of publicly disclosed vulnerabilities.
  4. Protocols that encrypt data in transit to secure communications.
  5. The process of moving laterally within a network to access other systems.
  6. Trust Architecture A security model where no entity is trusted by default, even within the network.
  7. Positive A benign event flagged as malicious by a detection tool.
  8. A network of compromised devices controlled by an attacker.
  9. Malicious software designed to gain unauthorized root-level access to a system.
  10. Injection An attack method to exploit vulnerabilities in databases through SQL queries.
  11. Address A unique identifier assigned to a network interface for communication.
  12. Escalation Exploiting a vulnerability to gain higher access permissions.
  13. Privilege A principle ensuring users have only the permissions necessary to perform their roles.
  14. Proof of Concept, a demonstration of a security vulnerability.
  15. Table A precomputed table used to crack password hashes.
  16. Positive A legitimate security event correctly identified by a detection tool.
  17. Spoofing A cyberattack that redirects a domain to a malicious IP address.

30 Clues: Table A precomputed table used to crack password hashes.A network of compromised devices controlled by an attacker.Proof of Concept, a demonstration of a security vulnerability.Protocols that encrypt data in transit to secure communications.Self-replicating malware that spreads without user intervention....

Cybersecurity Awareness 2024-11-06

Cybersecurity Awareness crossword puzzle
Across
  1. ERROR Unintentional actions by people that can compromise security systems.
  2. ___ your device before leaving your workplace is a good practice.
  3. Connecting your device to a free access public wi-fi can lead to ___ attack.
  4. A feature to switch off connections in mobile devices.
  5. One of the factors to check whether the website is official and safe.
  6. Always verify whether the website is ___ or not before entering any credentials.
  7. Passwords like “123456” and “password” is in this category.
  8. Best practice before downloading a software online. / Always ___ when you are calling someone.
  9. Download mobile applications from an ___ app store.
  10. What user lacks when they are easily fall into scam and poor understanding in security practices?
Down
  1. Never click on an ___ if you received an email from an unknown sender.
  2. Using an ___ version of software is like giving chances for hackers to hack.
  3. This tool can track your typing habits and log your passwords without your knowledge.
  4. ___ engineering is the art of manipulating humans in giving away all of your information.
  5. Best practice if an unknown device wants to connect to your device.
  6. Never share your sensitive information on ___.
  7. Using a ___ password for all accounts is not a good practice.
  8. An unauthorized individual who gains access to systems, often to modify or destroy data.
  9. This method enhances security by requiring two or more forms of verification during authentication.
  10. In an organization, who plays a role in ensuring data security?
  11. What security method uses two forms of verification, like a password and a code?
  12. Excessive background mobile ___ usage could indicate a potential hacking or malware activity on your device.
  13. __ key + L is the shortcut to lock your screen.

23 Clues: Never share your sensitive information on ___.__ key + L is the shortcut to lock your screen.Download mobile applications from an ___ app store.A feature to switch off connections in mobile devices.Passwords like “123456” and “password” is in this category.Using a ___ password for all accounts is not a good practice....

Cybersecurity Crossword 2025-05-14

Cybersecurity Crossword crossword puzzle
Across
  1. A strong and unique combination to protect online accounts.
  2. Software designed to detect and destroy computer viruses.
  3. Bullying that occurs over digital devices like phones and computers.
  4. authentication A security process using two different verification factors.
  5. A network security system controlling traffic based on rules.
  6. Data that can be used to identify an individual.
  7. Encoding info so only authorized parties can understand it.
  8. Potential dangers or malicious activities found on the internet.
  9. Protecting computer systems/networks from theft, damage, or disruption.
Down
  1. Manipulating people to divulge info or perform actions.
  2. Synthetic media replacing a person's likeness using AI.
  3. Individuals who exploit weaknesses in computer systems or networks.
  4. Connected to the internet.
  5. Extends a private network across public ones for secure data transfer.
  6. Footprint The trail of data you create while using the Internet.
  7. Attempts to gain unauthorized access to damage or disrupt systems.
  8. Software intended to damage or disable computers and systems.
  9. Trustworthy and accurate sources of information.
  10. Potential dangers or hazards.
  11. Online fraud where attackers impersonate to trick you into revealing info.

20 Clues: Connected to the internet.Potential dangers or hazards.Trustworthy and accurate sources of information.Data that can be used to identify an individual.Manipulating people to divulge info or perform actions.Synthetic media replacing a person's likeness using AI.Software designed to detect and destroy computer viruses....

CyberSecurity Law 2025-11-20

CyberSecurity Law crossword puzzle
Across
  1. This is information that can be used to identify an individual and it is related to their health
  2. This is Japan's 2003 data privacy and protection law, protecting use, consent, and security
  3. This is Mexico's federal law regulating the data held by private entities
  4. This is a common principle amongst the laws that requires the companies to gain _____ before collecting and using the data
  5. This is a data protection law/rule that originates from Canada and has 10 main principles
  6. This is a commission that oversees the nations overall power system and regulates the transmission companies that connect to the power grid
  7. This rule requires banking and other regulators to develop reasonable policies and procedures, to prevent identity theft
  8. This security rule specifically applies to covered entities who can include health plans and providers who transmit health information electronically
  9. This is a rule that 3 nations have that is all about ensuring they follow the rules and if not there needs to be someone who can be held responsible for the actions
Down
  1. This is the most common requirement across all the laws, requiring companies employ this to help protect the data
  2. The rule that financial institutes must follow in terms of cybersecurity
  3. Companies that accept or use debit or credit cards are required to comply with this ruleset
  4. This is a template to help provide a framework for states to develop data security and breach laws
  5. This rule applies to nuclear power plant operators, to protect their computer systems from cyber attacks
  6. This is a regulation of data protection and breach policy rules in Europe
  7. This state has a specific IoT law that requires manufactures to make reasonable security features on their connected devices
  8. The rule from the FTC regulating places like mortgage brokers, retailers that offer credit, and consumer reporting agencies
  9. This is another common principle amongst the laws that requires companies to ensure the data they store is up to date
  10. This is a common rule amongst the data protection laws/rules that state the companies must be _____ with what they need the data for, why they need it, and how they will use the data
  11. This is another data protection law however originating from China that has been modified recently with 5 new additions

20 Clues: The rule that financial institutes must follow in terms of cybersecurityThis is Mexico's federal law regulating the data held by private entitiesThis is a regulation of data protection and breach policy rules in EuropeThis is a data protection law/rule that originates from Canada and has 10 main principles...

fop 2023-04-03

fop crossword puzzle
Across
  1. 13
  2. 9
  3. 6
  4. 2
  5. 8
  6. 11
  7. 12
  8. 3
Down
  1. 15
  2. 5
  3. 14
  4. 1
  5. 4
  6. 10
  7. 7

15 Clues: 514962783151314101112

Cybersecurity Terms 2022-11-22

Cybersecurity Terms crossword puzzle
Across
  1. A set of software tools used by an attacker to hide the actions or presence of other types of malicious software.
  2. Software that is a cumulative package of all patches and feature updates.
  3. Malware that prevents a user's device from properly operating until a fee is paid.
  4. An attacker who controls a botnet.
  5. An infected computer that is under the remote control of an attacker.
  6. Computer code that lies dormant until it is triggered by a specific logical event.
  7. Software that helps prevent computers from becoming infected by different types of spyware.
  8. A malicious program designed to enter a computer via a network to take advantage of a vulnerability in an application or an operating system.
  9. Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action.
  10. A publicly released software security update intended to repair a vulnerability.
  11. Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.
Down
  1. A logical computer network of zombies under the control of an attacker.
  2. Enhancements to the software to provide new or expanded functionality, but do not address security vulnerability.
  3. Hardware or software designed to limit the spread of malware.
  4. A copy of files from a computer's hard drive saved on other digital media that is stored in a secure location.
  5. Software code that gives access to a program or a service that circumvents normal security protections.
  6. An executable program that is advertised as performing one activity but which actually performs a malicious activity.
  7. Software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus.
  8. A general term used to describe software that spies on users by gathering information without consent.
  9. A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

20 Clues: An attacker who controls a botnet.Hardware or software designed to limit the spread of malware.An infected computer that is under the remote control of an attacker.A logical computer network of zombies under the control of an attacker.Software that is a cumulative package of all patches and feature updates....

CyberSecurity Words 2023-09-07

CyberSecurity Words crossword puzzle
Across
  1. tells other servers which servers are allowed to send emails using your business’s domain name
  2. protection from data theft
  3. a data copy of files
  4. an text encryption used to protect data
  5. email authentication technology to help prevent phishing emails
  6. getting email that asks that they have your data
  7. a way of stealing data usually by emails or phone calls
  8. the service you choose should include TLS, which will help to protect your customers’ privacy.
  9. puts a digital signature on outgoing mail
  10. Accessing that another device safely
  11. People who help you with technological issues.
Down
  1. Something which can be exploited by hackers
  2. that automatically download malicious software onto your computer.
  3. Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy data
  4. Someone else using your identity
  5. a file or code that infects or steal data
  6. a new version of data of the system
  7. Usually comes from malware in the system
  8. the process or action of verifying the identity of a user or process.
  9. Information that was stolen

20 Clues: a data copy of filesprotection from data theftInformation that was stolenSomeone else using your identitya new version of data of the systemAccessing that another device safelyan text encryption used to protect dataUsually comes from malware in the systema file or code that infects or steal dataputs a digital signature on outgoing mail...

Cybersecurity Awareness 2023-10-11

Cybersecurity Awareness crossword puzzle
Across
  1. Term commonly used to describe junk e-mail on the Internet
  2. ________ software is designed to detect, prevent, and remove malware infections on computers and other devices
  3. Malicious or harmful software designed to damage or disrupt a computer system
  4. A security tool, which may be a hardware or software solution that is used to filter network traffic
  5. Unauthorized intrusion
  6. A type of media manipulation to trick users, where bad actors alter an image or video to create a false perception of reality
  7. The process of proving an individual is a claimed identity
  8. Small files which are stored on a user’s computer
  9. Software demanding money to unlock personal information
  10. A piece of software that allows a user to remain anonymous while using the internet by masking the location and encrypting traffic (infamously used to circumvent our web filter)
  11. Bring Your Own Device
  12. A network of compromised computers used to carry out cyberattacks on other systems
  13. Online harassment
  14. Email that falsely claims to be from a legitimate source, usually with a threat or request for information
Down
  1. Storage for infected files
  2. A _______ attack involves the use of multiple devices to flood a website or server with traffic, resulting in its temporary shutdown
  3. malicious software that is imbedded inside of a benign host file
  4. Coding used to protect sensitive data
  5. Creating a duplicate copy of data onto a separate physical storage device or online/cloud storage solution
  6. Tricking users into clicking on hidden elements in order to perform unwanted actions
  7. Weakness in a system
  8. A layered security system that requires more than one means of authentication to grant access to an account or device
  9. Encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
  10. Coding used to protect sensitive data
  11. A sequence of words used for authentication
  12. Cybersecurity awareness month

26 Clues: Online harassmentWeakness in a systemBring Your Own DeviceUnauthorized intrusionStorage for infected filesCybersecurity awareness monthCoding used to protect sensitive dataCoding used to protect sensitive dataA sequence of words used for authenticationSmall files which are stored on a user’s computer...

Cybersecurity Terms 2024-05-14

Cybersecurity Terms crossword puzzle
Across
  1. Multiple infected computers controlled remotely.
  2. Amount of data that can pass through a network per second.
  3. Disrupts services for political or social reasons.
  4. Program that can copy itself and cause harm.
  5. Consists of code instructing computers.
  6. Connection between devices for information exchange.
  7. Provides users and devices access to the Internet.
  8. Data storage device for files.
  9. Records keystrokes and sends them to an attacker.
  10. Updates computer programs to fix vulnerabilities.
  11. Software blocking malware from entering networks.
Down
  1. Computer programs that block, detect, and remove viruses and malware.
  2. Flaw in a program hackers exploit.
  3. Provides specific services on a network.
  4. Attempts to trick people into revealing sensitive information.
  5. Fictional virus damaging physical infrastructure.
  6. Harmful software including viruses and worms.
  7. Process of making information unreadable.
  8. Interconnected devices exchanging data.
  9. Attempt to overwhelm online services with traffic.
  10. Holds computer files hostage for ransom.
  11. Unsolicited emails sent to many addresses.
  12. Extra copies of files for restoring lost or damaged data.

23 Clues: Data storage device for files.Flaw in a program hackers exploit.Consists of code instructing computers.Interconnected devices exchanging data.Provides specific services on a network.Holds computer files hostage for ransom.Process of making information unreadable.Unsolicited emails sent to many addresses.Program that can copy itself and cause harm....

Cybersecurity Crossword 2024-04-23

Cybersecurity Crossword crossword puzzle
Across
  1. The practice of sending fraudulent emails resembling emails from reputable sources to steal sensitive information.
  2. Persistent Threats A set of stealthy and continuous computer hacking processes, often orchestrated by persons targeting a specific entity.
  3. A person who uses computers to gain unauthorized access to data.
  4. Any malicious computer program which misleads users of its true intent.
  5. Engineering The process of extracting knowledge or design information from anything manmade and reproducing it or reproducing anything based on the extracted information.
  6. A collection of software tools that enable unauthorized access to a computer or areas of its software.
  7. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  8. A piece of data that is used in network communications to identify a session.
  9. A set of changes to a computer program or its supporting data designed to update, fix, or improve it.
  10. A means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
  11. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  12. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  13. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
  14. A type of surveillance technology used to record keystrokes made by a user.
  15. The art of manipulating people so they give up confidential information.
  16. Trust Architecture A security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.
  17. Weaknesses or flaws in software that can be exploited by a threat actor to gain unauthorized access to a system.
  18. A criminal act of obtaining sexual acts, images, or videos from a person by coercing them through threats to release existing intimate content.
Down
  1. Information Management The practice of collecting, monitoring, and analyzing security related data from computer logs.
  2. Malicious software designed to harm or exploit any programmable device or network.
  3. The study of analyzing information systems in order to study the hidden aspects of the systems.
  4. Authentication A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.
  5. An attack that aims to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.
  6. Testing A method for gaining assurance in the security of an information system by attempting to breach some or all of that system's security, using the same tools and techniques an attacker might use.
  7. The act of disguising a communication from an unknown source as being from a known, trusted source.
  8. An algorithm for performing encryption or decryption.
  9. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  10. Exfiltration The unauthorized transfer of data from a computer or server.
  11. Forensics The practice of uncovering and interpreting electronic data for use in a court of law.
  12. Artificial intelligencegenerated videos or audio recordings that seem to show real people saying and doing things they never did.
  13. Response The methodology an organization uses to respond to and manage a cyberattack.
  14. Operations Center A centralized unit that deals with security issues on an organizational and technical level.
  15. Extends a private network across a public network, allowing users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
  16. Sockets Layer A standard security technology for establishing an encrypted link between a server and a client. Often abbreviated to a three letter acronym.
  17. The method by which information is converted into secret code that hides the information's true meaning.

35 Clues: An algorithm for performing encryption or decryption.A person who uses computers to gain unauthorized access to data.Any malicious computer program which misleads users of its true intent.The art of manipulating people so they give up confidential information.Exfiltration The unauthorized transfer of data from a computer or server....

cybersecurity crossword 2024-03-15

cybersecurity crossword crossword puzzle
Across
  1. connected together to share resources
  2. identifying a user’s identity
  3. bad software
  4. barrier between
  5. A scam
  6. numbers allocated to computers routers
  7. all connected as one entity
  8. Bring Your Own Device
  9. group of applications
  10. Coding used to protect
Down
  1. spy on you
  2. tricked into clicking
  3. attack on a computer system
  4. video that has been altered
  5. destroys information
  6. shield users against viruses
  7. security violation
  8. overwhelming the target
  9. collection of programs or software
  10. infected

20 Clues: A scaminfectedspy on youbad softwarebarrier betweensecurity violationdestroys informationtricked into clickingBring Your Own Devicegroup of applicationsCoding used to protectoverwhelming the targetattack on a computer systemvideo that has been alteredall connected as one entityshield users against virusesidentifying a user’s identity...

Cybersecurity Terms 2024-09-11

Cybersecurity Terms crossword puzzle
Across
  1. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
  2. An attack in which someone sends unsolicited messages to a Bluetooth-enabled device
  3. gap, To physically separate or isolate a system from other systems or networks (2 words)
  4. A computer connected to the Internet that has been compromised with malicious logic to perform activities under remote the command and control of a remote administrator.
  5. A technique allowing to locate a web user based on their IP address
  6. Attackers searching for wireless networks with vulnerabilities while moving around an area in a moving vehicle
  7. The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
  8. Software that compromises the operation of a system by performing an unauthorized function or process.
  9. Engineering, The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes (2 words)
  10. loss prevention, A set of procedures and mechanisms to stop sensitive data from leaving a security boundary (3 words)
  11. Refers to anything that has the potential to cause serious harm to a computer system
  12. a technique that is aimed to distract hackers with a fake target (a computer or data) and make them pursue it instead of the real one. It helps to secure a high-value target and observe hackers’ main techniques to learn from them
  13. A process of applying a mathematical algorithm against a set of data to produce a numeric value (a 'hash value') that represents the data.
  14. Refers to everything in a web application that is displayed or takes place on the client (end user device)
  15. king the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
  16. Spyware is malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
Down
  1. The process of verifying the identity or other attributes of an entity (user, process, or device).
  2. response, The activities that address the short-term, direct effects of an incident and may also support short-term recovery.
  3. A malware designed to deny a user or organization access to files on their computer, without first paying a fee.
  4. A set of software tools with administrator-level access privileges installed on an information system and designed to hide the presence of the tools, maintain the access privileges, and conceal the activities conducted by the tools.
  5. , A network security system that filters unsanctioned incoming and outgoing traffic.
  6. A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
  7. A type of malware that conceals its true content to fool a user into thinking it's a harmless file
  8. A technique for identifying and dropping packets that have a false source address.
  9. A technique to breach the security of a network or information system in violation of security policy.
  10. A notification that a specific attack has been detected or directed at an organization’s information system
  11. Refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (
  12. An unauthorized user who attempts to or gains access to an information system.
  13. the fabrication of a false online identity by a cybercriminal for the purposes of deception, fraud, or exploitation
  14. A tool that record what a person types on a device
  15. The process of transforming plaintext into ciphertext.
  16. a cybercrime in which the attacker floods a target with internet traffic to prevent users from accessing connected online services and sites (Acronym)

32 Clues: A tool that record what a person types on a deviceThe process of transforming plaintext into ciphertext.A technique allowing to locate a web user based on their IP addressAn unauthorized user who attempts to or gains access to an information system.A technique for identifying and dropping packets that have a false source address....

Cybersecurity Terms 2024-09-27

Cybersecurity Terms crossword puzzle
Across
  1. Collection of computers running malicious programs
  2. Virtual perimeter around network
  3. AI-generated video and audio used to deceive
  4. Type of data identifying an individual
  5. Common type of fraud used to social engineer
  6. Everyday objects connected to the web
  7. Malicious software used to obtain money from victims
  8. Type of spyware that records what you type
  9. Electronic money
Down
  1. The use of messaging to harass someone
  2. Weaknesses in software
  3. Used to verify if you're a human or a robot
  4. Simulated network resources designed to entice
  5. Playbook for emergencies
  6. Quick-repair job
  7. Physical devices that connect to a network
  8. Malicious program built for infection
  9. The practice of challenging security systems to discover vulnerabilities
  10. Coolest people on the planet
  11. Least cool people on the planet
  12. Process of verifying identity
  13. Sets of login data used to verify identity

22 Clues: Quick-repair jobElectronic moneyWeaknesses in softwarePlaybook for emergenciesCoolest people on the planetProcess of verifying identityLeast cool people on the planetVirtual perimeter around networkMalicious program built for infectionEveryday objects connected to the webThe use of messaging to harass someoneType of data identifying an individual...

Cybersecurity Terms 2025-03-09

Cybersecurity Terms crossword puzzle
Across
  1. Encoding data for security reasons
  2. Harmful software that damages computers
  3. Unauthorized access to data
  4. Falsifying identity or source
  5. Software that monitors for malware
  6. Algorithm for encrypting data
  7. Network entry point for traffic
  8. Access granted to perform actions
  9. Ethical hacking to find vulnerabilities
  10. Malware locks files for money
  11. Network security barrier
Down
  1. Facial recognition to grant access
  2. Hidden entry for unauthorized access
  3. List of blocked entities
  4. Network of infected computers
  5. Converting ciphertext into plaintext
  6. Machine learning and thinking
  7. Verifying user identity
  8. Scam emails that trick users
  9. Software displaying unwanted ads

20 Clues: Verifying user identityList of blocked entitiesNetwork security barrierUnauthorized access to dataScam emails that trick usersNetwork of infected computersFalsifying identity or sourceAlgorithm for encrypting dataMachine learning and thinkingMalware locks files for moneyNetwork entry point for trafficSoftware displaying unwanted ads...

Cybersecurity & Internet 2025-03-11

Cybersecurity & Internet crossword puzzle
Across
  1. A fraudulent attempt to obtain sensitive information via the internet.
  2. A structured set of data held in a computer.
  3. A form of bullying that occurs online.
  4. The act of stealing someone’s personal information for malicious purposes.
  5. A global network connecting millions of computers.
  6. Software designed to harm or exploit devices.
  7. The amount of data that can be transmitted in a fixed amount of time.
  8. The correct or acceptable way of communicating on the internet.
  9. A system designed to prevent unauthorized access to or from a network.
  10. A protocol used to transfer data over the internet.
  11. Individuals who exploit the internet to harm others.
  12. A unique identifier in a database.
Down
  1. The use of the internet to stalk or harass someone.
  2. Software used to manage and organize databases.
  3. Increased capacity for data transfer.
  4. A password that is difficult for others to guess or crack.
  5. A device that forwards data packets between computer networks.
  6. A unique string of numbers assigned to each device on a network.
  7. Reduced capacity for data transfer.
  8. The trail of data that individuals leave when using the internet.
  9. The system that translates domain names into IP addresses.
  10. Illegal activities that involve computers or networks.

22 Clues: A unique identifier in a database.Reduced capacity for data transfer.Increased capacity for data transfer.A form of bullying that occurs online.A structured set of data held in a computer.Software designed to harm or exploit devices.Software used to manage and organize databases.A global network connecting millions of computers....

CYBERSECURITY TERMS 2025-03-28

CYBERSECURITY TERMS crossword puzzle
Across
  1. high performance device that can switch traffic within the LAN
  2. An encrypted connection that works as a private network
  3. Translating IP Addresses to provide internet access
  4. network that covers a small area
  5. to provide error control
  6. A device that is used to access a network
  7. Software that is downloaded to protect against viruses
  8. the practice of protecting computer systems
  9. keeping your data safe and protected
  10. Ensuring that all data is accurate
  11. Holding hostage to data until a ransom is paid
  12. Client server model
Down
  1. a weakness within a system
  2. receives traffic in a port and repeats it
  3. Ensuring authorized users are able to easily access their data
  4. A device built with an antenna to provide a connection point
  5. A network millions of people utilize
  6. Standard character coding used for telecommunication
  7. A block of data that is transmitted on the network
  8. altering data and putting a key on it
  9. processing incoming emails
  10. a sequence of symbols used to interpret a message
  11. provides data to network users
  12. protects the network from unauthorized access
  13. a malware that disguises itself as something else

25 Clues: Client server modelto provide error controla weakness within a systemprocessing incoming emailsprovides data to network usersnetwork that covers a small areaEnsuring that all data is accurateA network millions of people utilizekeeping your data safe and protectedaltering data and putting a key on itreceives traffic in a port and repeats it...

Cybersecurity Crossword 2025-05-14

Cybersecurity Crossword crossword puzzle
Across
  1. Software designed to detect and destroy computer viruses.
  2. Potential dangers or malicious activities found on the internet.
  3. Synthetic media replacing a person's likeness using AI.
  4. A network security system controlling traffic based on rules.
  5. A security process using two different verification factors.
  6. Manipulating people to divulge info or perform actions.
  7. Extends a private network across public ones for secure data transfer.
  8. Attempts to gain unauthorized access to damage or disrupt systems.
  9. Trustworthy and accurate sources of information.
Down
  1. Protecting computer systems/networks from theft, damage, or disruption.
  2. Connected to the internet.
  3. Bullying that occurs over digital devices like phones and computers.
  4. Potential dangers or hazards.
  5. The trail of data you create while using the Internet.
  6. Individuals who exploit weaknesses in computer systems or networks.
  7. Software intended to damage or disable computers and systems.
  8. Encoding info so only authorized parties can understand it.
  9. Data that can be used to identify an individual.
  10. A strong and unique combination to protect online accounts.
  11. Online fraud where attackers impersonate to trick you into revealing info.

20 Clues: Connected to the internet.Potential dangers or hazards.Data that can be used to identify an individual.Trustworthy and accurate sources of information.The trail of data you create while using the Internet.Synthetic media replacing a person's likeness using AI.Manipulating people to divulge info or perform actions....

Cybersecurity Crossword 2023-03-14

Cybersecurity Crossword crossword puzzle
Across
  1. using multiple bots to overload a program
  2. Hijacks your device until they get paid
  3. A file that stores your online preferences
  4. A AI generated photo or video
  5. A means of attack on computer
  6. The process of identifing youself
  7. Hides personal information from hackers
  8. A device for spreading wireless signal
Down
  1. Technology that watches your online actions
  2. Technology used to keep hackers out
  3. Someone who gains unauthorized access to a website
  4. total loss of power
  5. Malware that can reproduce itself
  6. A software that can delete or corrupt files
  7. The URL is changed to show something trustable
  8. A system of commputers connected as one
  9. A loss in power for minutes or hours
  10. A fake person asks for information
  11. Malware that changes and corrupts devices
  12. A digital storage place

20 Clues: total loss of powerA digital storage placeA AI generated photo or videoA means of attack on computerMalware that can reproduce itselfThe process of identifing youselfA fake person asks for informationTechnology used to keep hackers outA loss in power for minutes or hoursA device for spreading wireless signalHijacks your device until they get paid...

Government Crisis 2025-01-21

Government Crisis crossword puzzle
Across
  1. Change
  2. Security Challenges
  3. Health Crisis
  4. Polarization
  5. Populations
  6. Justice Movements
  7. Inequality
  8. Economic Instability
  9. Threats
  10. Security
  11. Deficiencies
  12. Scarcity
Down
  1. Health Emergencies
  2. Workforce Crisis
  3. Disruption
  4. Media and Misinformation
  5. Security
  6. Crisis
  7. Crisis
  8. and Lack of Transparency

20 Clues: ChangeCrisisCrisisThreatsSecuritySecurityScarcityDisruptionInequalityPopulationsPolarizationDeficienciesHealth CrisisWorkforce CrisisJustice MovementsHealth EmergenciesSecurity ChallengesEconomic InstabilityMedia and Misinformationand Lack of Transparency

Internet safety 2025-02-26

Internet safety crossword puzzle
Across
  1. harass
  2. offensive
  3. platform
  4. copyright
  5. rules
Down
  1. illegal
  2. tactics
  3. stranger
  4. yelling
  5. Conversation
  6. Edited
  7. integrity
  8. money

13 Clues: moneyrulesharassEditedillegaltacticsyellingstrangerplatformintegrityoffensivecopyrightConversation

Disruptive Technology 2025-07-24

Disruptive Technology crossword puzzle
Across
  1. A modern approach to cybersecurity that moves away from traditional security
  2. A shared virtual world where users can interact with each other
  3. AI (Acronym)
  4. BI (Acronym)
  5. MFA (Acronym)
  6. DIS (Acronym)
Down
  1. To help protect claims made against users
  2. Cloud computing model
  3. XR (Acronym)
  4. Technologies that minimise environmental impact
  5. A cybersecurity technology that monitors, detects and responds to threats on endpoints
  6. A business-driven and disciplined approach
  7. XaaS (Acronym)
  8. The process of identifying risks and vulnerabilities
  9. A user's whole experience with one application across a variety of digital touchpoints
  10. A revolutionary approach to computing that influences the principles of quantum mechanics to solve complex problems
  11. EDR (Acronym)

17 Clues: XR (Acronym)AI (Acronym)BI (Acronym)EDR (Acronym)MFA (Acronym)DIS (Acronym)XaaS (Acronym)Cloud computing modelTo help protect claims made against usersA business-driven and disciplined approachTechnologies that minimise environmental impactThe process of identifying risks and vulnerabilities...

CEC 2023 #1 2023-06-09

CEC 2023 #1 crossword puzzle
Across
  1. Maxava
  2. Fresche
  3. XoruX
  4. Rocket Software
  5. Profound Logic
  6. Service Express
  7. Infor
  8. OmniScience
  9. Dynamic Solutions
  10. Fortra
  11. Arcad Software
  12. LANSA
  13. Infoview
  14. Falconstor
  15. TSP
Down
  1. Axians
  2. Connectria
  3. CNX
  4. M81
  5. IBM
  6. iVolution
  7. Metrixware
  8. Raz-Lee
  9. Taskforce
  10. Remain Software

25 Clues: CNXM81IBMTSPXoruXInforLANSAAxiansMaxavaFortraFrescheRaz-LeeInfoviewiVolutionTaskforceConnectriaMetrixwareFalconstorOmniScienceProfound LogicArcad SoftwareRocket SoftwareService ExpressRemain SoftwareDynamic Solutions

Cybersecurity Crossword 2022-12-06

Cybersecurity Crossword crossword puzzle
Across
  1. any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission
  2. establishes a barrier between a trusted network and an untrusted network
  3. An undocumented way of gaining access to computer system
  4. an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy
  5. a system where hackers can see your keystrokes
  6. a set of changes to a computer program designed to update, fix, or improve it
  7. a computer program used to prevent, detect, and remove malware
  8. software that is designed to damage a PC
  9. a mandatory access control enforcement feature
  10. a collection of computer software, typically malicious, designed to enable access to a computer
Down
  1. is software that generates revenue for its developer
  2. contain not only security and quality revisions, but also significant feature additions and changes
  3. blocker and system to block unwanted screen popups
  4. a type of program designed to prevent and detect unwanted spyware program installations
  5. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
  6. a type of malware from cryptovirology that threatens to publish the victim's personal data
  7. a copy of computer data taken and stored elsewhere
  8. a piece of code intentionally inserted into a software system that will set off a malicious function
  9. a malicious program that is installed on a device that transforms it
  10. a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system

20 Clues: software that is designed to damage a PCa system where hackers can see your keystrokesa mandatory access control enforcement featureblocker and system to block unwanted screen popupsa copy of computer data taken and stored elsewhereis software that generates revenue for its developerAn undocumented way of gaining access to computer system...

Cybersecurity Crossword 2020-09-13

Cybersecurity Crossword crossword puzzle
Across
  1. Pretending to be somebody else online.
  2. A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program
  3. A type of attack that uses trial and error over and over to guess a password until it is correct.
  4. Small files that are saved on your computer that store information that help websites track your visits
  5. A virus that can replicate without the user doing anything such as opening a program.
  6. Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
  7. Stealing another person's information to use for criminal activity.
  8. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  9. A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands money if the victim wants his or her files back.
  10. The amount of data that can pass through a network or part of a network per second.
  11. Computer programs that can block, detect, and remove viruses and other malware.
  12. Creating a web address that purposely fools people into thinking it is another person or company's website.
  13. The process of making extra copies of computer files that can be used to restore files that are lost or damaged.
  14. Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
Down
  1. The process of using codes to make readable information unreadable. Encrypted information cannot be read until it is decrypted using a secret key.
  2. Two or more interconnected devices that can exchange data.
  3. A "good guy" hacker; one who hacks to help find vulnerabilities to make a system more secure.
  4. Software designed to block malware from entering protected networks.
  5. The use of something in a way different from what it was intended for in order to solve a problem.
  6. A general name for software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs.
  7. A computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
  8. Malware that records every key struck on a keyboard and sends that information to an attacker.
  9. A way of shutting down or slowing down a website by overwhelming it with a flood of traffic from a team of computers.
  10. Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
  11. A flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.

25 Clues: Pretending to be somebody else online.Two or more interconnected devices that can exchange data.Stealing another person's information to use for criminal activity.Software designed to block malware from entering protected networks.Computer programs that can block, detect, and remove viruses and other malware....

Cybersecurity Terms 2023-03-17

Cybersecurity Terms crossword puzzle
Across
  1. While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking.
  2. Attack Any attempt to breach a logical environment's security boundary. An attack may concentrate on intelligence gathering, disrupting company operations, exploiting weaknesses, keeping track of targets, stopping work, obtaining value, harming logical or physical assets, or leveraging system resources to enable assaults against other targets.
  3. The newest virus detection technology is integrated into anti-virus systems to shield users against viruses, spyware, trojans, and worms that can damage computer hardware through email or web browsing.
  4. A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data
  5. You already utilize cloud computing if you use Gmail for email, Google Drive for document storage, or Netflix to stream your favorite movies.
  6. A combination of the words “robot” and “network”, a botnet is a network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.
  7. A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity.
  8. is a method of connecting a series of computers and devices in a private encrypted network
  9. Engineering Instead of breaking in or utilizing technical hacking techniques, social engineering is a growingly popular way to access restricted resources
  10. Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications make up a network.
  11. Horse Yet another form of malware, this one a misleading computer program that looks innocent, but in fact allows the hacker into your system via a back door, allowing them to control your computer.
Down
  1. it’s when a hacker changes the IP address of an email so that it seems to come from a trusted source.
  2. A portmanteau of “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system.
  3. The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
  4. is used to protect your information from hackers.
  5. is a series of numbers allocated to computers routers servers, and pretty much anything connected to the Internet
  6. A form of malware used by hackers to spy on you and your computer activities
  7. also referred to as two-factor authentication, makes it more difficult for hackers to access your account by requiring you to provide at least two different credentials
  8. Any technology, be it software or hardware, used to keep intruders out.
  9. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network

20 Clues: is used to protect your information from hackers.Any technology, be it software or hardware, used to keep intruders out.A form of malware used by hackers to spy on you and your computer activitiesis a method of connecting a series of computers and devices in a private encrypted network...

Cybersecurity Month 2023-05-19

Cybersecurity Month crossword puzzle
Across
  1. creating a fake identity on a social network account or dating website
  2. an error, flaw, failure, or fault in a computer or system
  3. programs that automatically execute tasks as ordered by the creator of the program that has infected them
  4. after these are downloaded, opened, or executed, your data becomes corrupt
  5. programs and other operating systems used by a computer
  6. a type of malicious software that disguises itself as a harmless program
  7. a cyber attacker
  8. private network VPN
  9. an attack when a person or program disguises themselves as another
  10. malware used to gain access to a user's system or data
  11. authentication attaching a phone number or email to an account for extra security
  12. short for malicious software
  13. breach when sensitive, protected, or confidential information is intentionally released to an untrusted environment
  14. engineering taking advantage of human trust to gain access to private information
Down
  1. customizable additions to software for extra functionality
  2. secret word or phrase used to gain access
  3. method of obtaining user info through fraudulent communications targeted directly at people
  4. a technique for protecting computers, networks, programs, and data from unauthorized access or hackers
  5. the way in which the identity of a user is confirmed
  6. cryptocurrency
  7. software that automatically displays or downloads material when a user if offline
  8. a form of malware used to threaten victims by blocking, publishing, or corrupting their data unless a ransom is paid
  9. technology IT
  10. an internet traffic filter meant to stop unauthorized traffic
  11. the physical and tangible parts of a computer

25 Clues: technology ITcryptocurrencya cyber attackerprivate network VPNshort for malicious softwaresecret word or phrase used to gain accessthe physical and tangible parts of a computerthe way in which the identity of a user is confirmedmalware used to gain access to a user's system or dataprograms and other operating systems used by a computer...

Cybersecurity Crossword 2023-06-29

Cybersecurity Crossword crossword puzzle
Across
  1. Security tool that creates a secure, encrypted connection between you and the Internet (acronym)
  2. Hardware or software designed to prevent unauthorized access to or from a private network.
  3. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  4. Should be constructed of upper and lower case letters, numbers, and special characters.
  5. The address of a webpage. Check the validity of it before clicking on it.
  6. Unauthorized access to a network, information systems, or application.
  7. A sequence of words or text used to control access to a computer; similar to a password.
  8. The process of taking plain text and scrambling it into an unreadable format.
  9. Threatening behavior facilitated through electronic means such as texting.
  10. MEDIA Facebook, Twitter, Instagram, etc. (Two words)
  11. Verifying identity.
  12. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
  13. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
Down
  1. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  2. A fraudulent email purportedly from a reputable company attempting to get personal information.
  3. 1. A wireless technology standard used over short distances using short-wavelength UHF radio waves.
  4. The “A” in the C-I-A Triad. It ensures authorized users have access.
  5. The “I” in the C-I-A Triad; protection from unauthorized changes.
  6. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  7. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.

20 Clues: Verifying identity.MEDIA Facebook, Twitter, Instagram, etc. (Two words)The “I” in the C-I-A Triad; protection from unauthorized changes.The “A” in the C-I-A Triad. It ensures authorized users have access.Unauthorized access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it....

Cybersecurity Crossword 2023-09-01

Cybersecurity Crossword crossword puzzle
Across
  1. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  2. The “A” in the C-I-A Triad. It ensures authorized users have access.
  3. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
  4. Verifying identity.
  5. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  6. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  7. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  8. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
Down
  1. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  2. Facebook, Twitter, Instagram, etc. (Two words)
  3. Hardware or software designed to prevent unauthorized access to or from a private network.
  4. The address of a webpage. Check the validity of it before clicking on it.
  5. A sequence of words and text used to access to computer; similar to a password
  6. A wireless technology standard used over short distances using short-wavelength UHF radio waves.
  7. Threatening behavior facilitated through electronic means such as texting.
  8. The process of taking plain text and scrambling it into an unreadable format.
  9. Unauthorized access to a network, information systems, or application.
  10. The “I” in the C-I-A Triad; protection from unauthorized changes.
  11. Should be constructed of upper and lower case letters, numbers, and special characters.
  12. A fraudulent email purportedly from a reputable company attempting to get personal information.

20 Clues: Verifying identity.Facebook, Twitter, Instagram, etc. (Two words)The “I” in the C-I-A Triad; protection from unauthorized changes.The “A” in the C-I-A Triad. It ensures authorized users have access.Unauthorized access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it....

Cybersecurity Terms 2024-03-07

Cybersecurity Terms crossword puzzle
Across
  1. Secure network connection
  2. Harmful software
  3. Unique human identifiers
  4. Wireless network connection
  5. Secure Socket Layer
  6. Software update fix
  7. Keystroke monitoring software
  8. Data recovery copy
Down
  1. Malicious data encryption
  2. Network of compromised devices
  3. Malicious software
  4. Denial of Service attack
  5. Engineering Manipulating users for access
  6. Malicious software disguised
  7. Intrusion Detection System
  8. Secure data encoding
  9. Deceptive email attacks
  10. Unsolicited email messages
  11. Unauthorized access seeker
  12. Network security barrier

20 Clues: Harmful softwareMalicious softwareData recovery copySecure Socket LayerSoftware update fixSecure data encodingDeceptive email attacksDenial of Service attackUnique human identifiersNetwork security barrierMalicious data encryptionSecure network connectionIntrusion Detection SystemUnsolicited email messagesUnauthorized access seeker...

Cybersecurity Crossword 2024-06-03

Cybersecurity Crossword crossword puzzle
Across
  1. Blocks online threats
  2. Uses body parts for login
  3. Stores data online
  4. Scrambles data
  5. Extra login security step
  6. Makes software current
  7. Deceptive website link
  8. Hidden part of the internet
  9. Breaks into systems
  10. Creates digital internet signals
Down
  1. Tracks keystrokes
  2. Unwanted emails
  3. Spreads and infects
  4. Copies data for safety
  5. Certification for cisco network
  6. Hides online location
  7. Enters an account
  8. Tests for real users
  9. Used to access the internet
  10. Secret word for access

20 Clues: Scrambles dataUnwanted emailsTracks keystrokesEnters an accountStores data onlineSpreads and infectsBreaks into systemsTests for real usersBlocks online threatsHides online locationCopies data for safetyMakes software currentDeceptive website linkSecret word for accessUses body parts for loginExtra login security stepHidden part of the internet...

Cybersecurity Terms 2024-05-08

Cybersecurity Terms crossword puzzle
Across
  1. Impersonation of another device or user on a network.
  2. A secret key that protects your digital accounts.
  3. Secret agents in software form, spying on your computer activities.
  4. A process to confirm someone is who they claim to be.
  5. A weakness in a system that can be exploited.
  6. A secure tunnel for data on the internet.
  7. A coding error that might cause programs to behave unexpectedly.
  8. A person who breaks into computers, often for malicious reasons.
  9. Malicious software disguised as legitimate.
  10. A digital kidnapper of data, demanding payment for release.
  11. Scrambling data to protect it from prying eyes.
Down
  1. Ensuring that authorized parties can access information when needed.
  2. A digital barrier protecting a network from unauthorized access.
  3. A deceptive attempt to steal sensitive information via email.
  4. Manipulation techniques to trick people into breaking security procedures.
  5. Unwanted software that displays ads on your screen.
  6. Protection against unauthorized data alteration.
  7. This program defends your computer against malicious agents.
  8. Malicious software designed to harm or exploit any programmable device.
  9. Network of computers infected with malicious software intented to cause harm.
  10. A self-replicating program that spreads through networks.

21 Clues: A secure tunnel for data on the internet.Malicious software disguised as legitimate.A weakness in a system that can be exploited.Scrambling data to protect it from prying eyes.Protection against unauthorized data alteration.A secret key that protects your digital accounts.Unwanted software that displays ads on your screen....

Cybersecurity Unit 2025-02-07

Cybersecurity Unit crossword puzzle
Across
  1. illegally copying and/or distributing software.
  2. malware designed to trick users by posing as legitimate software.
  3. an ethical hacker.
  4. spam via telephone.
  5. the ability to verify the identity of an entity or individual.
  6. someone that is new to hacking.
  7. protection of information from being shared to unauthorized systems, entities, or individuals.
  8. the ability to correlate, with high certainty, a recorded action with its originating individual or entity.
Down
  1. an authentication process that allows a user to access multiple applications with one set of login credentials.
  2. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  3. type of hacker that is malicious and often participates in criminal acts.
  4. timely, reliable access to data and information services by authorized users.
  5. malware which is capable of making multiple copies of itself on a single device.
  6. specializes in defense, such as building firewalls.
  7. unsolicited emails that are generally sent in mass.
  8. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  9. Protection of information, systems, and services from unauthorized modification/destruction.
  10. the fraudulent practice of sending emails purporting to be from reputable companies in order to get individuals to reveal personal information.
  11. between a black and white hat. They often work for the government.
  12. malware that can copy itself from one computer to another.
  13. vigilante hacker.

21 Clues: vigilante hacker.an ethical hacker.spam via telephone.someone that is new to hacking.illegally copying and/or distributing software.specializes in defense, such as building firewalls.unsolicited emails that are generally sent in mass.malware that can copy itself from one computer to another....

Cybersecurity Terminology 2024-07-11

Cybersecurity Terminology crossword puzzle
Across
  1. malicious software executed by trigger
  2. nefariously spreads via email attachments
  3. stores and manages credentials
  4. spreads computer to computer
  5. malicious encryption demanding payment
  6. designed to exploit macros
  7. disguised program intending to steal
  8. finds weaknesses to exploit systems
  9. stored small text files
Down
  1. targeting systems to overwhelm
  2. secretly recording private device activity
  3. new phone using stolen data
  4. Targeted advertisements from online activity
  5. Attack Botnet used to target website
  6. Private Network within Public Network
  7. personalized attacks luring victims
  8. mass stolen credentials gaining access
  9. layered disguise for unintended clicking
  10. remotely controlled devices launching attacks
  11. monitors and controls network traffic

20 Clues: stored small text filesdesigned to exploit macrosnew phone using stolen dataspreads computer to computertargeting systems to overwhelmstores and manages credentialspersonalized attacks luring victimsfinds weaknesses to exploit systemsAttack Botnet used to target websitedisguised program intending to stealPrivate Network within Public Network...

Cybersecurity/Safety 2024-07-11

Cybersecurity/Safety crossword puzzle
Across
  1. short for any malicious software
  2. digital brick layered wall of security
  3. vulnerability no one is aware of yet
  4. collect/transmit private user info
  5. identifies device is connected to internet
  6. appears harmless/conceals malicious intent
  7. monitors security protection measures
  8. designs, tests, implements security system
  9. media manipulation/false perception
  10. fool's user into providing private info
  11. analyst that designs data communication
Down
  1. Also known as "crackers"
  2. clicking hidden elements "UI redress attack"
  3. Germany had great message _____ until, Alan Turing
  4. "penetration testers" works with organization
  5. software to detect, prevent/remove cpu infections
  6. compromised computers to carry out attacks
  7. digital technology harassment
  8. prudent to use a ____ whenever possible
  9. locks out user for Bitcoin

20 Clues: Also known as "crackers"locks out user for Bitcoindigital technology harassmentshort for any malicious softwarecollect/transmit private user infomedia manipulation/false perceptionvulnerability no one is aware of yetmonitors security protection measuresdigital brick layered wall of securityprudent to use a ____ whenever possible...

Cybersecurity CIS178 2024-07-12

Cybersecurity CIS178 crossword puzzle
Across
  1. Portable chip storing cellular connection
  2. Network Defense against unauthorized access
  3. Deceptive scheme to trick victims
  4. Fraudulent attempts to steal your data
  5. File or document sent electronically
  6. Cybercriminal skilled in breaching security
  7. Online content displayed in a browser
  8. Bad software directed at computers
  9. Digital Crimes committed using technology
  10. Developer updates to fix vulnerabilities
  11. Essential access code for security
Down
  1. Identifies you using something you are
  2. Affects system displaying unwanted ads
  3. Virus that disguises as legitimate software
  4. Holds data hostage for money
  5. Records users keystrokes to steal information
  6. Physical object used for authentication
  7. Detects and removes viruses
  8. Unauthorized software that gathers information
  9. Way to secure data trough coded algorithms

20 Clues: Detects and removes virusesHolds data hostage for moneyDeceptive scheme to trick victimsBad software directed at computersEssential access code for securityFile or document sent electronicallyOnline content displayed in a browserIdentifies you using something you areAffects system displaying unwanted adsFraudulent attempts to steal your data...

Cybersecurity Terms 2024-07-13

Cybersecurity Terms crossword puzzle
Across
  1. Secure online service
  2. AKA UI Redress attack
  3. Have to pay
  4. Gain access to sensitive infromation
  5. Method of scrambling data
  6. Attempts to steal personal data
  7. Appears harmless
  8. Bring your device
  9. Prevent unauthorized access
Down
  1. Protect, prevent, remove
  2. Harmful software designed to damage
  3. Online harassment
  4. Protect data during encryption process
  5. Security in cloud infrastructure
  6. Interment protocol address
  7. Network of compromised computers
  8. A security feature
  9. Media manipulation
  10. Type of malware
  11. Can be particularly dangerous

20 Clues: Have to payType of malwareAppears harmlessOnline harassmentBring your deviceA security featureMedia manipulationSecure online serviceAKA UI Redress attackProtect, prevent, removeMethod of scrambling dataInterment protocol addressPrevent unauthorized accessCan be particularly dangerousAttempts to steal personal dataSecurity in cloud infrastructure...

CyberSecurity Trivia 2024-07-09

CyberSecurity Trivia crossword puzzle
Across
  1. Unsolicited emails
  2. Protection of physical assets
  3. Authentication method using two steps
  4. Copy of data for recovery
  5. Protection of personal information
  6. Harmful software
  7. Monitoring for unauthorized access
  8. Potential danger
  9. Software to detect and remove viruses
  10. Epiq's CISO
  11. Network security barrier
  12. Ethical hacking to find vulnerabilities
  13. Evaluation of potential threats
Down
  1. Data protection through coding
  2. Encrypted communication protocol
  3. Adherence to regulations
  4. Examination of security measures
  5. Network security barrier (again)
  6. Offensive action against computer systems
  7. Process of updating software vulnerabilities
  8. Permission to access resources
  9. Weakness in a system's security
  10. Software update to fix vulnerabilities
  11. Psychological manipulation for information
  12. Verification of who someone is
  13. Science of secure communication
  14. Protection against threats
  15. Breach of security
  16. Overwhelming a system to deny access
  17. Deceptive email or website to steal information

30 Clues: Epiq's CISOHarmful softwarePotential dangerUnsolicited emailsBreach of securityAdherence to regulationsNetwork security barrierCopy of data for recoveryProtection against threatsProtection of physical assetsData protection through codingPermission to access resourcesVerification of who someone isWeakness in a system's security...

Cybersecurity Crossword 2024-09-16

Cybersecurity Crossword crossword puzzle
Across
  1. The process of returning data to its original condition after loss or damage.
  2. A network of private computers infected with malicious software and controlled as a group.
  3. Malicious software that misleads users of its true intent.
  4. A secret word or phrase used to gain access to a system.
  5. Abbreviation for a service that encrypts your internet connection for privacy.
  6. The fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  7. A network security system that monitors and controls incoming and outgoing network traffic.
  8. An incident where data is accessed without authorization.
  9. Malware that threatens to publish the victim's data or block access unless a ransom is paid.
  10. Software that enables a user to obtain covert information about another's computer activities.
Down
  1. The process of verifying the identity of a user or process.
  2. A malicious program that replicates itself and spreads to other computers.
  3. The process of converting information into code to prevent unauthorized access.
  4. Software designed to detect and destroy computer viruses.
  5. Software that automatically displays or downloads advertising material.
  6. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  7. Irrelevant or unsolicited messages sent over the internet.
  8. A copy of data stored separately for recovery in case the original is lost or damaged.
  9. A program that records every keystroke made by a user.
  10. Abbreviation for a protocol for establishing authenticated and encrypted links between networked computers.

20 Clues: A program that records every keystroke made by a user.A secret word or phrase used to gain access to a system.Software designed to detect and destroy computer viruses.An incident where data is accessed without authorization.Malicious software that misleads users of its true intent.Irrelevant or unsolicited messages sent over the internet....

Cybersecurity Crossword 2025-03-02

Cybersecurity Crossword crossword puzzle
Across
  1. A distinctive attribute of something
  2. YouTube hates these because it causes them to lose profits from ads
  3. Connects devices to internet
  4. Leads to another website
  5. Unique address that identifies a device
  6. People that commit crimes online
  7. Collections of analytics and statistics
  8. Programs used by a computer
  9. This video is sponsored by Nord _ _ _
  10. A secondary copy of data
Down
  1. a person's regular occupation
  2. Coming or derived from a source outside the subject affected.
  3. Not mandatory
  4. Promoting or advertising
  5. A food that is also data
  6. Hiding information by coding it
  7. Can be a phone, laptop, etc.
  8. Poses a danger
  9. To gain unauthorised access to
  10. Wrongful deception

20 Clues: Not mandatoryPoses a dangerWrongful deceptionPromoting or advertisingA food that is also dataLeads to another websiteA secondary copy of dataPrograms used by a computerConnects devices to internetCan be a phone, laptop, etc.a person's regular occupationTo gain unauthorised access toHiding information by coding itPeople that commit crimes online...

Commerce Cybersecurity 2025-03-02

Commerce Cybersecurity crossword puzzle
Across
  1. Wrongful or criminal deception intended to result in financial or personal gain.
  2. Malicious intruders could take advantage of a zero-day exploit to gain unauthorized access to data.
  3. A method to hide the actual web address (URL) of a webpage and replace it with another,
  4. the action or activity of buying goods from shops.
  5. Importance requiring swift action.
  6. Relating to or characteristic of the culture of computers, information technology, and virtual reality.
  7. Getting your money back after a purchase.
  8. A voluntary promise offered by the person or business who sold the product or service to you.
Down
  1. Made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
  2. Acronym for Two factor Authentication
  3. An arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet.
  4. Make an online service unavailable by overwhelming it with excessive traffic from many locations and sources.
  5. A legally binding agreement between two or more people
  6. Commonly known as the Scamming Captial of the world.
  7. The power or right to give orders, make decisions, and enforce obedience.
  8. The state of being free from danger or threat.
  9. When cybercriminals target victims with emails that appear to be from a legitimate company asking for sensitive information.
  10. A program inserted into a system to compromise the confidentiality, integrity, or availability of data.
  11. pay someone for the use of (something, typically property, land, or a car).
  12. designed to trick you into giving away your money or your personal details.

20 Clues: Importance requiring swift action.Acronym for Two factor AuthenticationGetting your money back after a purchase.The state of being free from danger or threat.the action or activity of buying goods from shops.Commonly known as the Scamming Captial of the world.A legally binding agreement between two or more people...

Cybersecurity Crossword 2025-03-02

Cybersecurity Crossword crossword puzzle
Across
  1. A distinctive attribute of something
  2. YouTube hates these because it causes them to lose profits from ads
  3. Connects devices to internet
  4. Leads to another website
  5. Unique address that identifies a device
  6. People that commit crimes online
  7. Collections of analytics and statistics
  8. Programs used by a computer
  9. This video is sponsored by Nord _ _ _
  10. A secondary copy of data
Down
  1. a person's regular occupation
  2. Coming or derived from a source outside the subject affected.
  3. Not mandatory
  4. Promoting or advertising
  5. A food that is also data
  6. Hiding information by coding it
  7. Can be a phone, laptop, etc.
  8. Poses a danger
  9. To gain unauthorised access to
  10. Wrongful deception

20 Clues: Not mandatoryPoses a dangerWrongful deceptionPromoting or advertisingA food that is also dataLeads to another websiteA secondary copy of dataPrograms used by a computerConnects devices to internetCan be a phone, laptop, etc.a person's regular occupationTo gain unauthorised access toHiding information by coding itPeople that commit crimes online...

Cybersecurity Terms 2025-03-15

Cybersecurity Terms crossword puzzle
Across
  1. Covert method of bypassing normal authentication.
  2. Denial of service attack affecting one system.
  3. Unsolicited Emails.
  4. Response test to verify human v. bot.
  5. Secretly installed data gathering software.
  6. Group of Compromised Internet-connected devices.
  7. Network protection preventing virus from penetrating.
  8. Digital form of social engineering using deceit.
  9. A fundamental unit of computer storage
  10. Software that monitors for Malware.
Down
  1. Software designed to harm or exploit.
  2. Malware preventing file access via Encryption.
  3. Encrypted sites not indexed by search engines.
  4. Spyware that records keystrokes.
  5. Successful hack allows access to files.
  6. Capturing of Data Packets over network.
  7. Vulnerability or flaw in a system.
  8. Denial of service attack affecting multiple systems.
  9. Attackers posing as a known trusted source.
  10. Software that earns revenue off advertisements

20 Clues: Unsolicited Emails.Spyware that records keystrokes.Vulnerability or flaw in a system.Software that monitors for Malware.Software designed to harm or exploit.Response test to verify human v. bot.A fundamental unit of computer storageSuccessful hack allows access to files.Capturing of Data Packets over network....

Cybersecurity Terminology 2025-06-05

Cybersecurity Terminology crossword puzzle
Across
  1. Fishing for the highest target
  2. Network security that filters access
  3. Your personal cybersecurity methods
  4. Computer program to fight attacks
  5. Your personal key
  6. Is it really you?
  7. Flooding your servers
  8. A virus is watching you
  9. Make sure you block these
  10. Who and what is allowed
Down
  1. Malicious program
  2. Gaining access without approval
  3. Information accessed through a key
  4. I'm not where I say I am
  5. A computer infection
  6. I don't want these emails
  7. Holding your information captive
  8. Your internet address
  9. Casting a line for personal information
  10. Software update to fix holes

20 Clues: Malicious programYour personal keyIs it really you?A computer infectionFlooding your serversYour internet addressA virus is watching youWho and what is allowedI'm not where I say I amI don't want these emailsMake sure you block theseSoftware update to fix holesFishing for the highest targetGaining access without approval...

Cybersecurity Acronym 2025-06-13

Cybersecurity Acronym crossword puzzle
Across
  1. Issues tickets and Kerberos authentication
  2. methods exposed by a script or program that allow other scripts or programs to use it.
  3. Standards, best practices, and guidelines
  4. XML-based data format used to exchange authentication information
  5. access control model where resources are protected by ACLs & managed by admins
  6. access control model where each resource is protected by an access control list
  7. An XML-based web services protocol used to exchange messages
  8. token issued to an authenticated account
  9. A number used with authentication devices such as smartcards
Down
  1. Three principles of security control and management
  2. A collection of access control entries
  3. authentication scheme that requires at least two different factors as credentials
  4. value assigned to an account by windows
  5. access control model where resources are protected by system-defined rules
  6. A standard for federated identity management
  7. stateless style used by web applications
  8. access control technique that evaluates a set of attributes that each subject possesses
  9. file format that uses attribute-value pairs
  10. A password that is generated for use in one specific session
  11. provides identification, authentication, and authorization mechanisms for users

20 Clues: A collection of access control entriesvalue assigned to an account by windowsstateless style used by web applicationstoken issued to an authenticated accountStandards, best practices, and guidelinesIssues tickets and Kerberos authenticationfile format that uses attribute-value pairsA standard for federated identity management...

December 2020 Crossword Puzzle Answer Key 2020-12-01

December 2020 Crossword Puzzle Answer Key crossword puzzle
Across
  1. An unsecure network where you can connect to the internet such as from a café
  2. a popular tool for hosting video calls
  3. All commercial transactions conducted electronically on the internet
  4. The Cybersecurity project that pulled Forest Service out of a material weakness
  5. The top method of cyberattack that most attacks begin with usually via email
  6. Educating management on the potential threats of unsecure systems
  7. The 3 core tenants of cybersecurity include confidentiality, integrity, and…
Down
  1. Who can be a target of a cyberattack?
  2. A site that cybercriminals create to steal your information
  3. Any software, hardware, or systems that cybersecurity is not aware of
  4. The country where most of the fake and fraudulent ecommerce sites are coming from

11 Clues: Who can be a target of a cyberattack?a popular tool for hosting video callsA site that cybercriminals create to steal your informationEducating management on the potential threats of unsecure systemsAll commercial transactions conducted electronically on the internetAny software, hardware, or systems that cybersecurity is not aware of...

Cybersecurity 2023-04-28

Cybersecurity crossword puzzle
Across
  1. facts about something
  2. steals other peoples information
  3. malware
  4. obtaining private info
  5. making a purchase
  6. error an action which isn't intended
Down
  1. authorisation
  2. facts and statistics
  3. a network security device
  4. something only you can see
  5. standalone malware

11 Clues: malwareauthorisationmaking a purchasestandalone malwarefacts and statisticsfacts about somethingobtaining private infoa network security devicesomething only you can seesteals other peoples informationerror an action which isn't intended

Cybersecurity 2025-05-22

Cybersecurity crossword puzzle
Across
  1. Strukturierte Darstellung möglicher Angriffswege auf ein System.
  2. Simulierter Angriff zur Identifikation von Schwachstellen.
  3. Regelwerk zur Festlegung von Sicherheitszielen und Maßnahmen. (englisches Wort)
  4. Nachweis, dass ein Benutzer oder System tatsächlich derjenige ist, der er vorgibt zu sein.
  5. Physisches oder digitales Authentifizierung. (englisches Wort)
Down
  1. Maßnahme zur Schließung bekannter Schwachstellen in Software.
  2. Verwaltung und Kontrolle sicherheitsrelevanter Software- oder Hardwarebestandteile.
  3. Sicherheitsmodell: Kein Standardvertrauen in Geräte oder Nutzer. (englisches Wort)
  4. Strukturierter Aufbau von IT-Systemen mit Fokus auf Sicherheitsmaßnahmen.
  5. Schutz von Daten vor unbefugtem Zugriff.
  6. Systematische Bewertung potenzieller Bedrohungen und Schwachstellen.

11 Clues: Schutz von Daten vor unbefugtem Zugriff.Simulierter Angriff zur Identifikation von Schwachstellen.Maßnahme zur Schließung bekannter Schwachstellen in Software.Physisches oder digitales Authentifizierung. (englisches Wort)Strukturierte Darstellung möglicher Angriffswege auf ein System....

Cybersecurity 2025-09-10

Cybersecurity crossword puzzle
Across
  1. What Greenwald says his work is mainly focused on: the condition of keeping one's actions, information, and choices safe from outside scrutiny.
  2. An expressive action people do freely when they believe they are alone and unobserved.
  3. The deep discomfort and embarrassment shown on someone's face when they are caught in a private act.
  4. The role the internet was once praised for: allowing people new freedoms and opportunities.
  5. A state of being alone, unobserved, where actions are performed without others watching.
  6. The way in which someone acts or conducts oneself, especially towards others.
Down
  1. A process or state where the internet enabled broader participation and equality, now contrasted with its new surveillance role.
  2. A global network that was once seen as a tool of openness and freedom but is now described as a zone of surveillance.
  3. Describes surveillance that is not targeted but affects everyone, as Greenwald says the internet has become.
  4. The powerful emotion, described by Glenn Greenwald, that someone feels when caught doing something privately and unexpectedly seen by others.
  5. To secretly watch or observe someone without their knowing, as in the person unexpectedly seeing another in the passage's anecdote.

11 Clues: The way in which someone acts or conducts oneself, especially towards others.An expressive action people do freely when they believe they are alone and unobserved.A state of being alone, unobserved, where actions are performed without others watching.The role the internet was once praised for: allowing people new freedoms and opportunities....

Cybersecurity - JMcBride 2025-08-28

Cybersecurity - JMcBride crossword puzzle
Across
  1. general term for malicious software
  2. person who breaks into computer systems
  3. malware that locks files and demands payment
  4. software that hides malware from detection
  5. network security system that monitors and controls traffic
  6. secret string used for user authentication
  7. vulnerability unknown to the software maker
  8. authentication method using two forms of verification
  9. secure tunnel for internet traffic (abbreviation)
  10. code that takes advantage of a software vulnerability
  11. deceptive attempt to steal sensitive information via email or messages
Down
  1. process of converting data into a secure code
  2. barrier that blocks unauthorized network access
  3. software that detects and removes malicious programs
  4. tool that records everything typed on a keyboard
  5. hidden way to bypass normal authentication
  6. software that secretly gathers user data
  7. malware disguised as legitimate software
  8. network of infected devices under hacker control
  9. software update that fixes security vulnerabilities

20 Clues: general term for malicious softwareperson who breaks into computer systemssoftware that secretly gathers user datamalware disguised as legitimate softwaresoftware that hides malware from detectionhidden way to bypass normal authenticationsecret string used for user authenticationvulnerability unknown to the software maker...

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. refers to the permission to use
  2. a type of malicious code that looks legitimate
  3. a way of preventing errors
  4. information about yourself such as name
  5. the protection of computer systems and networks
  6. type of malware that spreads copies of itself from computer to computer
  7. unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
Down
  1. malicious software designed to block access to a computer system
  2. be aware of people trying to steal your information
  3. a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.
  4. software that automatically displays or downloads advertising material

11 Clues: a way of preventing errorsrefers to the permission to useinformation about yourself such as namea type of malicious code that looks legitimatethe protection of computer systems and networksbe aware of people trying to steal your informationmalicious software designed to block access to a computer system...

Cybersecurity 2024-09-09

Cybersecurity crossword puzzle
Across
  1. A deliberate attempt by hackers or malicious entities to infiltrate systems, networks, or devices to steal, alter, or destroy data, disrupt operations, or cause damage.
  2. A weakness in a system that could be exploited.
  3. Breaches Confidential, sensitive, or protected information is accessed, disclosed, or stolen by unauthorized individuals.
Down
  1. A piece of software or technique used to take advantage of a vulnerability.
  2. A measure of the extent to which an entity is threatened by a potential circumstance or event.
  3. Theft Someone illegally obtains and uses another person’s personal information to impersonate them for financial gain or fraud.
  4. The part of malware that performs malicious actions once a system is compromised.
  5. Previously unknown vulnerabilities that can be exploited before a patch is available.
  6. A potential danger to a system or organization.
  7. Measures taken to protect against attacks and mitigate risks.
  8. An attempt to exploit a vulnerability to compromise a system.

11 Clues: A potential danger to a system or organization.A weakness in a system that could be exploited.Measures taken to protect against attacks and mitigate risks.An attempt to exploit a vulnerability to compromise a system.A piece of software or technique used to take advantage of a vulnerability....

Cybersecurity Crossword 2023-09-15

Cybersecurity Crossword crossword puzzle
Across
  1. Input device that imports digital images and video
  2. drive Located inside the tower or case and used to store programs and most data
  3. Used to get spoken input
  4. Input device used to import images and doucments into the computer
  5. Deletes text to the left of insertion point (the cursor)
  6. The case that the parts of the computer reside
  7. Drive Reads CD disks
  8. Bar Inserts space between words and sentences
  9. Lock Capitilizes all letters when locked down
  10. Computer A computer that has several parts attached to it, is heavy and not usually moved
Down
  1. The screen on your computer or laptop
  2. Produces printed copies of the computer output
  3. The rows of letters and numbers that you press to type
  4. Used to produce audio output (sound)
  5. A pointing device used to make on screen selections
  6. Makes captial letters and symbols at the top of the keys
  7. A small and portable computer
  8. Central Processing Unit, the computer brain
  9. Moves to the next line or is used to execute a command (make it work)

19 Clues: Drive Reads CD disksUsed to get spoken inputA small and portable computerUsed to produce audio output (sound)The screen on your computer or laptopCentral Processing Unit, the computer brainBar Inserts space between words and sentencesLock Capitilizes all letters when locked downProduces printed copies of the computer output...

Healthcare Cybersecurity 2024-04-22

Healthcare Cybersecurity crossword puzzle
Across
  1. What you wear — not where you should keep a password
  2. A common system used to manage patient records
  3. When a patient leaves — data must still be secured
  4. Where patient info is written and stored
  5. The ID you scan to enter secure hospital areas
  6. A place where data might still be written — handle with care
  7. A person who needs to protect patient charts from snooping
  8. A patient’s OK to share info — must be protected
  9. What patients wear with ID info — keep private!
  10. The first step in patient care — and in data entry!
  11. What nurses may carry — should never be left unattended
Down
  1. Electronic place where patient records live
  2. What goes on a sample — double check and protect
  3. What you do to open a secure door — don’t tailgate!
  4. A sample like blood or urine — never to be mislabeled or emailed unprotected
  5. Where you relax — but still don’t talk patient info!
  6. A hospital emergency that should never be shared online
  7. A device some doctors still use — don’t text PHI on it!
  8. Where you access records — lock it when you leave!
  9. A doctor’s daily visits — not a time to leave screens unlocked

20 Clues: Where patient info is written and storedElectronic place where patient records liveA common system used to manage patient recordsThe ID you scan to enter secure hospital areasWhat patients wear with ID info — keep private!What goes on a sample — double check and protectA patient’s OK to share info — must be protected...

Cybersecurity crossword 2025-06-07

Cybersecurity crossword crossword puzzle
Across
  1. Overwhelms servers with traffic
  2. Scrambling data for security
  3. Fraudulent attempt to steal data
  4. Stealthy malware with deep access
  5. Secures internet connections
  6. Popular cryptocurrency
  7. Malware that demands payment
  8. Malware disguised as legitimate
  9. Breaches systems illegally
Down
  1. Remote data storage
  2. Tracks keystrokes secretly
  3. Network of infected devices
  4. Uses fingerprints or face ID
  5. Artificial intelligence
  6. Software update fixing flaws
  7. Software that spies on users
  8. Harmful software like viruses
  9. Network security barrier
  10. Secret code for access

19 Clues: Remote data storageSecret code for accessPopular cryptocurrencyArtificial intelligenceNetwork security barrierTracks keystrokes secretlyBreaches systems illegallyNetwork of infected devicesUses fingerprints or face IDScrambling data for securitySoftware update fixing flawsSoftware that spies on usersSecures internet connections...

Cybersecurity 2023-10-31

Cybersecurity crossword puzzle
Across
  1. when you personal data is available (another word for available)
  2. a hacker that is doing good
  3. a hacker that works without permission
  4. when your personal data is kept secret, another word for secret
Down
  1. Multi-Factor________ something you have, know, and are
  2. a kind of human engineering with no coding
  3. the art of protecting devices and data from unauthorized access
  4. malicious coding that can be a virus, worm, trojan etc
  5. Internet of __________ (network of connected devices)
  6. an unusual way to solve a problem
  7. a hacker that is malicious

11 Clues: a hacker that is maliciousa hacker that is doing goodan unusual way to solve a problema hacker that works without permissiona kind of human engineering with no codingInternet of __________ (network of connected devices)Multi-Factor________ something you have, know, and aremalicious coding that can be a virus, worm, trojan etc...

Cybersecurity 2025-11-03

Cybersecurity crossword puzzle
Across
  1. A security system that blocks unwanted network traffic.
  2. A trick that sends users to fake websites to steal personal data.
  3. A program that finds and removes viruses or malware.
  4. A person who breaks into computer systems.
  5. Malware that lets a hacker control your computer remotely.
Down
  1. The time when a user is actively connected to a system or website.
  2. Bad software that can harm a computer or steal information.
  3. Tool that hides your IP address and secures your internet connection.
  4. Tools used by hackers to create fake websites and steal login details.
  5. A small software update that fixes bugs or security issues.
  6. Someone or something that secretly collects information.

11 Clues: A person who breaks into computer systems.A program that finds and removes viruses or malware.A security system that blocks unwanted network traffic.Someone or something that secretly collects information.Malware that lets a hacker control your computer remotely.Bad software that can harm a computer or steal information....

Cybersecurity 2021-03-01

Cybersecurity crossword puzzle
Across
  1. Click every traffic light in this image.
  2. Encrypt files to extort money.
  3. Fake email link bait.
  4. Proving your identity.
  5. Sneaky peek a password.
Down
  1. Brute force uses many attempts to guess it.
  2. Denial of Service attacks this.
  3. Blocks incoming and outgoing connections.
  4. Automated internet task software.
  5. Unauthorised access to computer systems.
  6. Horse with a hidden suprise.

11 Clues: Fake email link bait.Proving your identity.Sneaky peek a password.Horse with a hidden suprise.Encrypt files to extort money.Denial of Service attacks this.Automated internet task software.Click every traffic light in this image.Unauthorised access to computer systems.Blocks incoming and outgoing connections....

CyberSecurity 2024-03-09

CyberSecurity crossword puzzle
Across
  1. pairs a public key for encryption and a private key for decryption
  2. software intended to damage a computing system or to take partial control over its operation
  3. a malicious program that can copy itself and gain access to a computer in an unauthorized way
  4. encryption involves one key for both encryption and decryption
  5. a technique that attempts to trick a user into providing personal information
  6. infomration about an individual that identifies, links, relates or describes them
Down
  1. a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentification mechanism
  2. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  3. the process of decoding data
  4. the process of encoding data to prevent unauthorized access
  5. a wireless access point that give unauthorized access to to secure networks

11 Clues: the process of decoding datathe process of encoding data to prevent unauthorized accessencryption involves one key for both encryption and decryptionpairs a public key for encryption and a private key for decryptiona wireless access point that give unauthorized access to to secure networks...

Cybersecurity 2025-10-10

Cybersecurity crossword puzzle
Across
  1. Strukturierte Darstellung möglicher Angriffswege auf ein System.
  2. Simulierter Angriff zur Identifikation von Schwachstellen.
  3. Regelwerk zur Festlegung von Sicherheitszielen und Maßnahmen. (englisches Wort)
  4. Nachweis, dass ein Benutzer oder System tatsächlich derjenige ist, der er vorgibt zu sein.
  5. Physisches oder digitales Authentifizierung. (englisches Wort)
Down
  1. Maßnahme zur Schließung bekannter Schwachstellen in Software.
  2. Verwaltung und Kontrolle sicherheitsrelevanter Software- oder Hardwarebestandteile.
  3. Sicherheitsmodell: Kein Standardvertrauen in Geräte oder Nutzer. (englisches Wort)
  4. Strukturierter Aufbau von IT-Systemen mit Fokus auf Sicherheitsmaßnahmen.
  5. Schutz von Daten vor unbefugtem Zugriff.
  6. Systematische Bewertung potenzieller Bedrohungen und Schwachstellen.

11 Clues: Schutz von Daten vor unbefugtem Zugriff.Simulierter Angriff zur Identifikation von Schwachstellen.Maßnahme zur Schließung bekannter Schwachstellen in Software.Physisches oder digitales Authentifizierung. (englisches Wort)Strukturierte Darstellung möglicher Angriffswege auf ein System....

December 2020 Crossword Puzzle 2020-12-01

December 2020 Crossword Puzzle crossword puzzle
Across
  1. An unsecure network where you can connect to the internet such as from a café
  2. a popular tool for hosting video calls
  3. All commercial transactions conducted electronically on the internet
  4. The Cybersecurity project that pulled Forest Service out of a material weakness
  5. The top method of cyberattack that most attacks begin with usually via email
  6. Educating management on the potential threats of unsecure systems
  7. The 3 core tenants of cybersecurity include confidentiality, integrity, and…
Down
  1. Who can be a target of a cyberattack?
  2. A site that cybercriminals create to steal your information
  3. Any software, hardware, or systems that cybersecurity is not aware of
  4. The country where most of the fake and fraudulent ecommerce sites are coming from

11 Clues: Who can be a target of a cyberattack?a popular tool for hosting video callsA site that cybercriminals create to steal your informationEducating management on the potential threats of unsecure systemsAll commercial transactions conducted electronically on the internetAny software, hardware, or systems that cybersecurity is not aware of...

cybersecurity crossword 2022-12-02

cybersecurity crossword crossword puzzle
Across
  1. software that that enters a computer system without the users knowledge or consent and makes the comuter go bad
  2. software that prevents you from getting unwanted viruses on your device
  3. software that runs as a program on the local computer
  4. an attacker who controls a botnet
  5. a logical computer network of zombies under the control of an attacker
  6. software made to stop the spread of malware
  7. a malicious program designed to enter a computer via a network to take advantage of a vulnerability in a application or an operating system
  8. a new software made that was better the old one and fixes things that were bad or old in the old software
  9. software that prevents you from getting infected from differents spyware
  10. a set of software tools used by an attacker to hide the actions or presence of other types of malware
  11. software code that gives access to a program or service
Down
  1. a software program that gives advertising content that is unwanted by the user
  2. a microsoft windows function that provides info to users and obtains their approval before a program can make a change to the computers settings
  3. a undate that makes the software better or more efficient
  4. an infected computer that is under the remote control of an attacker
  5. getting information from a device without the owner knowing
  6. a backup of your data saved on a hard
  7. software that keeps data on where you hit the keyboard
  8. data that is compromised and wont be given back unless a fee is paid

19 Clues: an attacker who controls a botneta backup of your data saved on a hardsoftware made to stop the spread of malwaresoftware that runs as a program on the local computersoftware that keeps data on where you hit the keyboardsoftware code that gives access to a program or servicea undate that makes the software better or more efficient...

Cybersecurity Awareness 2022-10-21

Cybersecurity Awareness crossword puzzle
Across
  1. ___ is a type of software designed to help the user's computer detect viruses and avoid them.
  2. ___ is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  3. The terms "bug" and "debugging" are popularly attributed to ___.
  4. Malicious actors can also use ____ to capture your personal and financial information such as credit card number, CVV, PIN, password and other sensitive information.
  5. Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.
  6. ___ is when attackers send malicious emails designed to trick people into falling for a scam.
  7. ___is a type of software designed to gain unauthorized access or to cause damage to a computer.
Down
  1. ___ National nodal agency for all measures to protect nation's critical information infrastructure.
  2. ___ Advertising software can be used to spread malware.
  3. ___ is actually considered the first computer virus?
  4. ___ is an authorization protocol being a standard designed to allow a website or application to access resources hosted by other web apps on behalf of a user.
  5. ___ is a program that secretly records what a user does so that cybercriminals can make use of this information.
  6. ___ is a cryptographic protocol for encrypting data to be transferred over a network which uses protocol to sets up implicit connection.
  7. ___ is a type of malware that is disguised as legitimate software.
  8. ___ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  9. ___ locks and encrypts the victim's data, important files and then demands a payment to unlock and decrypt the data.
  10. In-order to ensure the security of the data/information, we need to ___ the data.
  11. ___ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
  12. ___ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
  13. Which Wi-Fi communication protocol is more Secure?

20 Clues: Which Wi-Fi communication protocol is more Secure?___ is actually considered the first computer virus?___ Advertising software can be used to spread malware.The terms "bug" and "debugging" are popularly attributed to ___.___ is a type of malware that is disguised as legitimate software....

Spanish 25 words 2021-04-30

Spanish 25 words crossword puzzle
Across
  1. Settings
  2. Cyber
  3. Commit
  4. Else
  5. Machine learning
  6. Integer
  7. If
  8. Function
  9. If else
  10. For loop
  11. Variable
  12. Print
  13. Loop
Down
  1. Sprite
  2. cybersecurity
  3. Autonomous
  4. nueral networks
  5. Uptime
  6. Tap
  7. Binary numbers
  8. Float
  9. Python
  10. While loop
  11. List
  12. Array

25 Clues: IfTapElseListLoopCyberFloatArrayPrintSpriteCommitUptimePythonIntegerIf elseSettingsFunctionFor loopVariableAutonomousWhile loopcybersecurityBinary numbersnueral networksMachine learning

CSAM 2020 2020-09-03

CSAM 2020 crossword puzzle
Across
  1. Someone with elevated access
  2. Authentication that requires more than just a passcode; usually in the form of a token or generated access code
  3. Software with malicious characteristics; often used to compromise a system
  4. A type of phishing that is more personalized to the end user
  5. Last name of TIAA's CISO
  6. An attempt at getting gaining vital information from an individual utilizing a variety of social engineering tactics; notoriously in emails
  7. The protection of internet connected systems and devices
  8. Label often assigned to devices that are on a network; can be static or dynamic
  9. An algorithmic method which hides characteristics of communication by converting it into various codes
  10. TIAA's one stop shop for computer and technical issues
Down
  1. Ethical hacking; hacking for the greater good
  2. A tactic often used by cyber criminals to lure in susceptible individuals in the form of urgency or consequence
  3. In December 2017, one of the most popular credit bureaus in the world that was exposed to a data breach that resulted in over 147 million Americans' information
  4. Unique hardware identifier; physical layer in the OSI model
  5. TIAA's cybersecurity mascot
  6. _ Routing: type of protocol that allows people to communicate anonymously; also a vegetable
  7. Malicious software which often requires payment in the form of cryptocurrency in order to decrypt data/files
  8. A concept where all devices are connected to the internet, such as household items
  9. What does VPN stand for
  10. A month dedicated to all things cybersecurity (acronym)

20 Clues: What does VPN stand forLast name of TIAA's CISOTIAA's cybersecurity mascotSomeone with elevated accessEthical hacking; hacking for the greater goodTIAA's one stop shop for computer and technical issuesA month dedicated to all things cybersecurity (acronym)The protection of internet connected systems and devices...

ACTIVITY 1: Crossword Puzzle 2A 2024-04-30

ACTIVITY 1: Crossword Puzzle 2A crossword puzzle
Across
  1. Relating to digital technology.
  2. Bullying online.
  3. Protection from harm.
  4. Protecting digital systems.
  5. Control over personal information.
  6. Malicious software.
  7. Connected to the internet.
  8. Fraudulent information request.
  9. Having knowledge and using technology safely and effective
  10. Malicious self-replicating code.
  11. Software to access websites.
  12. Unique characteristics of an individual.
  13. Interconnected computers.
  14. Intentional attack on systems.
  15. Global computer network.
  16. Secret access code.
  17. Traces of online activity.
  18. Unsolicited messages.
  19. Criminal activities online.
  20. Hardware with a function.
  21. Deceptive scheme.
  22. Information in digital form.
  23. Computer programs.
Down
  1. Relating to society.
  2. the ability to analyze and evaluate infomation.
  3. A cyber attack that redirects website traffic to a fraudulent site
  4. Organized and meaningful data.
  5. Unauthorized system access.
  6. Moral principles online.
  7. Traces of online activity.
  8. Verifying user identity.
  9. Making a copy of data to protect against loss or damage
  10. Practices for cybersecurity.
  11. Communication channels.
  12. Protecting systems from attacks.
  13. Converting data into code.
  14. Ability to use digital tools.
  15. Understanding cybersecurity threats.
  16. Laws governing cyberspace.
  17. Membership in a country.
  18. Unauthorized use of personal information.
  19. Network security system.
  20. A secret codr used to access a computer system or online account
  21. Data stored by websites.
  22. Knowledge or perception of a situation.
  23. Dual authentication.
  24. Software to detect and remove viruses.
  25. Device forwarding data.
  26. Physical computer components.
  27. Measures for protection.
  28. Unauthorized data access.

51 Clues: Bullying online.Deceptive scheme.Computer programs.Malicious software.Secret access code.Relating to society.Dual authentication.Protection from harm.Unsolicited messages.Communication channels.Device forwarding data.Moral principles online.Verifying user identity.Membership in a country.Network security system.Data stored by websites....

Raqamli iqtisodiyot indikatorlari va ularning xususiyatlari 2025-11-26

Raqamli iqtisodiyot indikatorlari va ularning xususiyatlari crossword puzzle
Across
  1. Onlayn tizim
  2. Internet ashyolari
  3. Onlayn savdo
  4. Ish samaradorligi
  5. Sarmoya
  6. Raqamlashtirish
  7. Avtomatlashtirish
  8. Ulanish
Down
  1. Xavfsizlik
  2. Tejamkorlik
  3. Iqtisodiy hajm
  4. Yangi texnologiya
  5. Harakatlilik
  6. Bulut
  7. Ma’lumot oqimi

15 Clues: BulutSarmoyaUlanishXavfsizlikTejamkorlikOnlayn tizimOnlayn savdoHarakatlilikIqtisodiy hajmMa’lumot oqimiRaqamlashtirishIsh samaradorligiYangi texnologiyaAvtomatlashtirishInternet ashyolari

dasd 2021-04-30

dasd crossword puzzle
Across
  1. Settings
  2. Cyber
  3. Commit
  4. Else
  5. Machine learning
  6. Integer
  7. If
  8. Function
  9. If else
  10. For loop
  11. Variable
  12. Print
  13. Loop
Down
  1. Sprite
  2. cybersecurity
  3. Autonomous
  4. nueral networks
  5. Uptime
  6. Tap
  7. Binary numbers
  8. Float
  9. Python
  10. While loop
  11. List
  12. Array

25 Clues: IfTapElseListLoopCyberFloatArrayPrintSpriteCommitUptimePythonIntegerIf elseSettingsFunctionFor loopVariableAutonomousWhile loopcybersecurityBinary numbersnueral networksMachine learning

Cybersecurity Crossword 2023-05-10

Cybersecurity Crossword crossword puzzle
Across
  1. BOTNET
  2. MALWARE
  3. IP ADDRESS
  4. DATA BREACH
  5. VPN
Down
  1. HACKER
  2. PENTESTING
  3. SPOOFING
  4. PHISHING
  5. DEFENSE
  6. CLOUD
  7. TROJAN HORSE
  8. VULNERABILITY

13 Clues: VPNCLOUDHACKERBOTNETDEFENSEMALWARESPOOFINGPHISHINGPENTESTINGIP ADDRESSDATA BREACHTROJAN HORSEVULNERABILITY

la tecnología #2 2022-04-01

la tecnología #2 crossword puzzle
Across
  1. knowledge
  2. worsen
  3. screen
  4. delete
  5. cybersecurity
Down
  1. storage
  2. Web
  3. improve
  4. profile
  5. privacy
  6. apps
  7. printer

12 Clues: Webappsworsenscreendeletestorageimproveprofileprivacyprinterknowledgecybersecurity

Cybersecurity Crossword 2023-01-26

Cybersecurity Crossword crossword puzzle
Across
  1. altered video to spread disinformation
  2. unique string that identifies device
  3. helps protect system
  4. malware that transmits private data
  5. helps prevent unauthorized network access
  6. flood website/server until crash
  7. codes that protect data
  8. cybersecurity professionals
  9. designs data communications network
Down
  1. unauthorized access to sensitive info
  2. software designed to disrupt system
  3. plans and implements security
  4. remote encrypted network access
  5. helps prevent unauthorized access
  6. criminal hackers
  7. requests payment to unlock
  8. malware hidden inside legitimate file
  9. mimics legitimate websites/emails
  10. network of computers used for cyber attacks

19 Clues: criminal hackershelps protect systemcodes that protect datarequests payment to unlockcybersecurity professionalsplans and implements securityremote encrypted network accessflood website/server until crashhelps prevent unauthorized accessmimics legitimate websites/emailssoftware designed to disrupt systemmalware that transmits private data...

Cybersecurity Compliance 2024-05-24

Cybersecurity Compliance crossword puzzle
Across
  1. Scammers use ______ tactics to try to get a fast response.
  2. If you suspect a link or attachment may be suspicious, _______ download it.
  3. A good password is __________ for you, but difficult for others to guess.
  4. If you believe you've clicked a bad link, notify _____ immediately.
  5. Malware is most likely to enter an organization through __________.
  6. Never ____________ old passwords.
  7. Malicious links disguised as legitimate messages.
  8. Be wary of ______________ attachments.
Down
  1. Each should be unique and complicated.
  2. Our e-mail security system is called __________.
  3. Scams can come through e-mail,_______, phone call, or even in person.
  4. No platform is ________ to breaches.
  5. Using a work device for _________ use increases the risk of a cyber threat.
  6. Two-factor __________ protects your account by requiring a second identity verification.
  7. Don't use obvious __________ changes like substituting a number for a letter.
  8. Passwords should never be __________ with anyone.
  9. If you feel you have fallen prey to a scammer, notify CHN or ___________.
  10. 65% of people _________ passwords.
  11. 80% of breaches are related to stolen or ________ passwords.

19 Clues: Never ____________ old passwords.65% of people _________ passwords.No platform is ________ to breaches.Each should be unique and complicated.Be wary of ______________ attachments.Our e-mail security system is called __________.Passwords should never be __________ with anyone.Malicious links disguised as legitimate messages....

Healthcare Cybersecurity 2025-04-23

Healthcare Cybersecurity crossword puzzle
Across
  1. What patients wear with ID info — keep private!
  2. What nurses may carry — should never be left unattended
  3. The ID you scan to enter secure hospital areas
  4. A place where data might still be written — handle with care
  5. What goes on a sample — double check and protect
  6. A device some doctors still use — don’t text PHI on it!
  7. What you wear — not where you should keep a password
  8. A doctor’s daily visits — not a time to leave screens unlocked
  9. A common system used to manage patient records
  10. Where you access records — lock it when you leave!
  11. Electronic place where patient records live
Down
  1. The first step in patient care — and in data entry!
  2. A sample like blood or urine — never to be mislabeled or emailed unprotected
  3. A hospital emergency that should never be shared online
  4. What you do to open a secure door — don’t tailgate!
  5. When a patient leaves — data must still be secured
  6. A patient’s OK to share info — must be protected
  7. Where you relax — but still don’t talk patient info!
  8. Where patient info is written and stored
  9. A person who needs to protect patient charts from snooping

20 Clues: Where patient info is written and storedElectronic place where patient records liveThe ID you scan to enter secure hospital areasA common system used to manage patient recordsWhat patients wear with ID info — keep private!A patient’s OK to share info — must be protectedWhat goes on a sample — double check and protect...

025-1 2024-07-12

025-1 crossword puzzle
Across
  1. Process of restoring systems or data after an incident
  2. Unauthorized access to sensitive information
  3. Related to laws or regulations governing cybersecurity incidents
  4. Systematic examination to uncover facts about an incident
  5. Unauthorized transfer of data from a computer or network
  6. Malicious software demanding payment for data release
  7. Method used to secure data from unauthorized access
  8. Scientific analysis used to investigate and solve crimes
  9. Interruption to normal operations
Down
  1. Rules and guidelines governing cybersecurity practices
  2. Weakness in software or hardware that could be exploited
  3. State of exposing assets to danger or risk
  4. Process of discovering unauthorized access or activity
  5. Event that causes disruption or harm
  6. Identity concealed or not identified
  7. Digital currency used in ransom demands
  8. Measures taken to protect against unauthorized access
  9. Taking advantage of vulnerabilities in software or hardware
  10. A malicious assault on computer systems
  11. Effect or influence of the cyberattack

20 Clues: Interruption to normal operationsEvent that causes disruption or harmIdentity concealed or not identifiedEffect or influence of the cyberattackDigital currency used in ransom demandsA malicious assault on computer systemsState of exposing assets to danger or riskUnauthorized access to sensitive information...

CSAM 2020 2020-09-03

CSAM 2020 crossword puzzle
Across
  1. A month dedicated to all things cybersecurity (acronym)
  2. TIAA's cybersecurity mascot
  3. Label often assigned to devices that are on a network; can be static or dynamic
  4. The protection of internet connected systems and devices
  5. A tactic often used by cyber criminals to lure in susceptible individuals in the form of urgency or consequence
  6. TIAA's one stop shop for computer and technical issues
  7. Malicious software which often requires payment in the form of cryptocurrency in order to decrypt data/files
  8. Ethical hacking; hacking for the greater good
  9. A type of phishing that is more personalized to the end user
  10. A concept where all devices are connected to the internet, such as household items
  11. Authentication that requires more than just a passcode; usually in the form of a token or generated access code
Down
  1. Unique hardware identifier; physical layer in the OSI model
  2. _ Routing: type of protocol that allows people to communicate anonymously; also a vegetable
  3. An attempt at getting gaining vital information from an individual utilizing a variety of social engineering tactics; notoriously in emails
  4. What does VPN stand for
  5. Someone with elevated access
  6. Last name of TIAA's CISO
  7. Software with malicious characteristics; often used to compromise a system
  8. In December 2017, one of the most popular credit bureaus in the world that was exposed to a data breach that resulted in over 147 million Americans' information
  9. An algorithmic method which hides characteristics of communication by converting it into various codes

20 Clues: What does VPN stand forLast name of TIAA's CISOTIAA's cybersecurity mascotSomeone with elevated accessEthical hacking; hacking for the greater goodTIAA's one stop shop for computer and technical issuesA month dedicated to all things cybersecurity (acronym)The protection of internet connected systems and devices...

Introduction to Cybersecurity 2024-02-22

Introduction to Cybersecurity crossword puzzle
Across
  1. is the act of skirting or breaking through security boundaries.
  2. a type of hacker that is generally ethical and law-abiding.
  3. focuses on keeping applications or programs secure throughout their lifecycle.
  4. certification validates the holders have met the baseline of understanding required by all cybersecurity job positions.
Down
  1. is based on the key concepts of information assurance.
  2. an attack in which the attacker is connectedto a network and monitors an authenticated session.
  3. a set of policies and procedures meant to improve and guide anorganization’s cybersecurity practices.
  4. Is the protection of digital devices and their connected networks from danger and threats.
  5. a process in which organizations determine the information about themselves which should be kept private versus what can be shared with the public.
  6. prevents and protects unauthorized intrusions into the network.
  7. which is a set of security controls designed to protect payment account security.
  8. includes threats such as viruses, worms, Trojan horses.

12 Clues: is based on the key concepts of information assurance.includes threats such as viruses, worms, Trojan horses.a type of hacker that is generally ethical and law-abiding.is the act of skirting or breaking through security boundaries.prevents and protects unauthorized intrusions into the network....