cybersecurity Crossword Puzzles

Cybersecurity Crossword 2024-09-03

Cybersecurity Crossword crossword puzzle
Across
  1. the practice of securing information and communication through writing and solving codes
  2. a code that gives you access to a site
  3. a group of connected computers
  4. cyberattack that fools people into revealing personal info
  5. a type of cryptocurrency that is well-known
  6. malware that tricks users by thinking they are clicking safe links
  7. software that holds your data hostage in return for something they want
  8. network of compromised computers used in a cyberattack
  9. manipulated media images usually used to scam people
  10. a program that encrypts your internet traffic by scrambling your IP address
  11. method of scrambling data, only an authorized user can use
  12. a string of numbers used to identify a computer
  13. a person who infiltrates a computer
  14. a place where data can be stored but it is not on an internal hard drive
Down
  1. software that infects and destroys computers' data
  2. software used to detect, prevent, and remove malware
  3. computerized intelligence that forms to make and execute life-like decisions
  4. an unintended hardware or software problem
  5. an attack on somebody in a digital way of force
  6. the act of data being leaked from a source
  7. a set of software tools that gives user access without being detected
  8. malware that collects and transmits your private data

22 Clues: a group of connected computersa person who infiltrates a computera code that gives you access to a sitean unintended hardware or software problemthe act of data being leaked from a sourcea type of cryptocurrency that is well-knownan attack on somebody in a digital way of forcea string of numbers used to identify a computer...

Cybersecurity Awareness 2024-10-25

Cybersecurity Awareness crossword puzzle
Across
  1. Secure connection that hides your online activities
  2. Scrambling data to protect it from prying eyes
  3. Software that helps detect and remove malicious programs
  4. Malware disguised as legitimate software
  5. The ability to use or interact with data or systems
  6. Protects your network by blocking certain traffic
  7. A weakness in a system that can be exploited
  8. An extra layer of security requiring two forms of identification
  9. Manipulating people to gain confidential information
  10. A saved copy of data, used in case of data loss
  11. A risk from someone within the organization
  12. A security event that could harm a system or data
Down
  1. Converting scrambled data back into readable form
  2. Pretending to be someone else to deceive or scam
  3. A secret word or phrase used to access your account
  4. Malicious software that demands payment to release data
  5. Fraudulent emails trying to trick you into revealing information
  6. Criminal activities carried out using computers
  7. Username and password combination used to log in
  8. Software that secretly monitors your online activities
  9. Verifying who you are before gaining access
  10. When sensitive data is accessed without authorization
  11. Information collected and stored digitally
  12. A software update that fixes security vulnerabilities
  13. Someone who tries to gain unauthorized access to systems
  14. A type of malware that spreads by copying itself
  15. Following legal and regulatory cybersecurity standards
  16. Harmful software that damages or infiltrates devices

28 Clues: Malware disguised as legitimate softwareInformation collected and stored digitallyVerifying who you are before gaining accessA risk from someone within the organizationA weakness in a system that can be exploitedScrambling data to protect it from prying eyesCriminal activities carried out using computers...

Cybersecurity Awareness 2024-12-13

Cybersecurity Awareness crossword puzzle
Across
  1. A network of infected computers or devices that are controlled by attackers to perform malicious tasks.
  2. Unauthorized access to or manipulation of computer systems or networks, often for malicious purposes.
  3. A type of malware that locks a user’s files or system, demanding payment to restore access.
  4. A fix or update to software that addresses security vulnerabilities or bugs.
  5. Manager A tool that stores and manages your passwords securely, making it easier to use complex, unique passwords for different sites.
  6. A type of software or hardware that secretly records keystrokes, often used to steal passwords and sensitive information.
  7. Horse Malicious software disguised as a legitimate program to deceive users and gain access to their systems.
  8. Response The process of detecting, responding to, and recovering from a cybersecurity breach or attack.
  9. Engineering Manipulating people into giving up confidential information or performing actions that compromise security.
  10. Software that secretly gathers information about you or your device without your consent.
  11. (Distributed Denial of Service) An attack where multiple systems flood a server or network with traffic, overwhelming it and causing disruption.
  12. A weakness or flaw in a system that can be exploited by attackers to gain unauthorized access.
  13. The process of converting data into a secret code to prevent unauthorized access.
  14. Security system that monitors and controls incoming and outgoing traffic to protect systems from unauthorized access.
Down
  1. Software designed to detect, prevent, and remove malicious programs from your computer or network.
  2. Authentication (2FA) A security method that requires two forms of identification to verify your identity, like a password and a text message code.
  3. Any potential danger or risk that could exploit vulnerabilities in a system or network.
  4. Malicious software designed to harm or exploit devices, systems, or networks.
  5. Breach An incident where confidential data is accessed or disclosed without authorization.
  6. Escalation A method used by attackers to gain higher levels of access or control within a system than originally allowed.
  7. A security vulnerability that is unknown to the software maker and has no fix or patch available.
  8. Detection System (IDS) A system that monitors network or system activity for signs of malicious activity or policy violations.
  9. Scam where attackers try to trick individuals into revealing personal information by pretending to be trustworthy sources.
  10. A copy of important data or files that can be restored in case of loss, damage, or attack.
  11. (Virtual Private Network) A secure connection method that protects your internet activity by encrypting it and masking your location.

25 Clues: A fix or update to software that addresses security vulnerabilities or bugs.Malicious software designed to harm or exploit devices, systems, or networks.The process of converting data into a secret code to prevent unauthorized access.Any potential danger or risk that could exploit vulnerabilities in a system or network....

Cybersecurity Crossword 2025-09-25

Cybersecurity Crossword crossword puzzle
Across
  1. Requiring more than one form of verification. ____________ authentication
  2. A network security system that monitors and controls traffic.
  3. The process of verifying identity before granting access.
  4. The process of converting data into a secure code.
  5. A secret string of characters used for authentication.
  6. The practice of protecting systems, networks, and programs from attacks.
Down
  1. Technology simulating human intelligence, used in modern cybersecurity.
  2. Malicious software disguised as legitimate software.
  3. Malware that locks files and demands payment.
  4. A scam using fake emails or messages to trick people into revealing information.
  5. A clickable reference to another webpage or document.
  6. Phishing conducted through SMS text messages
  7. Software designed to harm or exploit systems.
  8. A type of malware that replicates itself by infecting other programs.
  9. Software that detects and removes malicious programs.
  10. A well-known security awareness training platform.
  11. A secure tunnel for internet traffic, stands for Virtual Private Network.
  12. An attempt to damage, steal, or disrupt digital systems.
  13. Manipulating people into revealing confidential information. ________ engineering
  14. A hidden method of bypassing normal authentication.

20 Clues: Phishing conducted through SMS text messagesMalware that locks files and demands payment.Software designed to harm or exploit systems.The process of converting data into a secure code.A well-known security awareness training platform.A hidden method of bypassing normal authentication.Malicious software disguised as legitimate software....

CyberSecurity Crossword 2026-01-30

CyberSecurity Crossword crossword puzzle
Across
  1. a program used to go on the internet
  2. information stored on a device
  3. a computer phone or tablet
  4. wireless internet connection
  5. a secret word you use to log in
  6. new software that fixes problems
  7. a page on the internet
  8. signing into an account
  9. messages sent online
  10. someone who tries to break into computers
Down
  1. a copy of important files
  2. safe from hackers
  3. your online profile
  4. keeping personal information safe
  5. something that blocks bad internet traffic
  6. bad software that spreads
  7. where websites and online games are
  8. tricking people into giving information
  9. a trick to steal information or money
  10. something you click on a website

20 Clues: safe from hackersyour online profilemessages sent onlinea page on the internetsigning into an accounta copy of important filesbad software that spreadsa computer phone or tabletwireless internet connectioninformation stored on a devicea secret word you use to log innew software that fixes problemssomething you click on a website...

cybersecurity dylan 2025-11-03

cybersecurity dylan crossword puzzle
Across
  1. Encrypts files and demands payment
  2. User education against threats
  3. Set of security rules
  4. Creates a digital fingerprint of data
  5. Detects and removes malware
  6. Steps to handle a cyberattack
  7. Replaces sensitive data with tokens
  8. Security barrier between internal and external networks
  9. Code that takes advantage of a vulnerability
  10. Attack that makes a service unavailable
Down
  1. Unauthorized data exposure
  2. Social engineering attack via fake messages
  3. Multi-Factor Authentication
  4. Compromise of system or information
  5. Install latest security patches
  6. Data copy for recovery
  7. The process of transforming data into ciphertext
  8. Malicious software such as viruses or trojans
  9. Everyday security best practices
  10. Restricts user permissions
  11. Secret key to access accounts
  12. Verifies the identity of a user or system

22 Clues: Set of security rulesData copy for recoveryUnauthorized data exposureRestricts user permissionsMulti-Factor AuthenticationDetects and removes malwareSecret key to access accountsSteps to handle a cyberattackUser education against threatsInstall latest security patchesEveryday security best practicesEncrypts files and demands payment...

Cybersecurity Terminology 2024-03-14

Cybersecurity Terminology crossword puzzle
Across
  1. Software that prevents malicious software
  2. Programs that simulates human activity.
  3. Masks malicious software.
  4. Distinguishes between humans and bots.
  5. A false warning.
  6. Being free from public attention.
  7. A type of cryptocurrency.
  8. An error in a program.
  9. Unwanted email messages.
  10. Unlocking encrypted data.
  11. Software for blackmailing.
  12. Website file that stores information.
  13. Software that corrupts files.
Down
  1. Confirms a user's identity.
  2. A way to access software.
  3. A fake online identity
  4. Techniques for safeguarding computers.
  5. Devices that mines cryptocurrency.
  6. Software that automatically displays advertisements.
  7. Entering an account requires a.
  8. Harmful computer codes that spread.

21 Clues: A false warning.A fake online identityAn error in a program.Unwanted email messages.Masks malicious software.A way to access software.A type of cryptocurrency.Unlocking encrypted data.Software for blackmailing.Confirms a user's identity.Software that corrupts files.Entering an account requires a.Being free from public attention....

Cybersecurity Vocabulary 2024-06-25

Cybersecurity Vocabulary crossword puzzle
Across
  1. Related to government revenue, especially taxes.
  2. Armed conflict or fighting between groups.
  3. Regularly checking or observing something to keep track of its progress or condition.
  4. Committed to a particular purpose or task.
  5. Arranged or organized to work together effectively.
  6. Managed or dealt with poorly.
  7. Dealing with or handling a problem or issue.
  8. Ordered lists based on certain criteria or performance.
  9. Actions or steps taken to achieve a particular goal.
  10. To make a process easier or more convenient.
  11. Making something stronger or more effective.
  12. New plans or actions intended to solve a problem or improve a situation.
Down
  1. The highest level ever reached.
  2. Managing or dealing with something.
  3. Improving the quality, value, or extent of something.
  4. Established procedures or rules for doing something.
  5. Acknowledgment or identification of someone or something.
  6. Promises or commitments to do something.
  7. An event or instance of something happening.
  8. The process of converting information into a secure code to prevent unauthorized access.
  9. Violations or breaks in a rule, law, or agreement.
  10. People who receive something.
  11. Required by law or rules.

23 Clues: Required by law or rules.Managed or dealt with poorly.People who receive something.The highest level ever reached.Managing or dealing with something.Promises or commitments to do something.Armed conflict or fighting between groups.Committed to a particular purpose or task.An event or instance of something happening....

Cybersecurity crossword 2023-04-22

Cybersecurity crossword crossword puzzle
Across
  1. unaware software vulnerability attacked
  2. computer damaging, harmful software
  3. website shutdown using multiple devices
  4. security during initial production stages
  5. seemingly harmless but malicious malware
  6. locks computer until random paid
  7. scrambling data method
  8. slows computer with unwanted ads
  9. required identification changing system settings
  10. Online repeated harassment
Down
  1. implements security for computer system
  2. access blocked for unauthorized users
  3. click hidden element, opening malware
  4. work policy for personal device
  5. misleading edited picture or video
  6. program designed to remove malware
  7. compromised system infecting other systems
  8. service for remotely connected wifi
  9. the guarding against unauthorized access
  10. personal information stealing tactic

20 Clues: scrambling data methodOnline repeated harassmentwork policy for personal devicelocks computer until random paidslows computer with unwanted adsmisleading edited picture or videoprogram designed to remove malwarecomputer damaging, harmful softwareservice for remotely connected wifipersonal information stealing tactic...

Cybersecurity Terms 2023-07-24

Cybersecurity Terms crossword puzzle
Across
  1. trustable storage of sensitive information
  2. prevents attacks to computer
  3. debris from electronic devices
  4. voice, face, retina, fingerprint
  5. acronym for uninterruptible power supply
  6. providing validation for access
  7. changes device's address
  8. cyber attackers with no knowledge
Down
  1. emails designed for advertisement
  2. dangerous software that will duplicate
  3. believe they're doing right
  4. dangerous software that causes corruption
  5. theft "is not a joke Jim"
  6. threats to security
  7. result in loss or injury
  8. makes authentication more powerful
  9. another term: black hat hackers
  10. looks harmless, infects device
  11. searching data to uncover information
  12. how much cybersecurity costs annually

20 Clues: threats to securityresult in loss or injurychanges device's addresstheft "is not a joke Jim"believe they're doing rightprevents attacks to computerdebris from electronic deviceslooks harmless, infects deviceanother term: black hat hackersproviding validation for accessvoice, face, retina, fingerprintemails designed for advertisement...

Cybersecurity vocabulary 2023-07-30

Cybersecurity vocabulary crossword puzzle
Across
  1. The potential for an unwanted or adverse outcome resulting from an incident, event, or occurrence, as determined by the likelihood that a particular threat will exploit a particular vulnerability, with the associated consequences.
  2. The process of transforming plaintext into ciphertext.
  3. The application of one or more measures to reduce the likelihood of an unwanted occurrence and/or lessen its consequences.
  4. malicious code
  5. A person, structure, facility, information, and records, information technology systems and resources, material, process, relationships, or reputation that has value.
  6. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
  7. A set of software tools with administrator-level access privileges installed on an information system and designed to hide the presence of the tools, maintain the access privileges, and conceal the activities conducted by the tools.
  8. A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
  9. A digital form of social engineering to deceive individuals into providing sensitive information.
  10. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
  11. A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.
  12. An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
  13. Qualify a cryptographic key that may be widely published and is used to enable the operation of an asymmetric cryptographic algorithm.
Down
  1. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
  2. A capability to limit network traffic between networks and/or information systems.
  3. The property whereby information, an information system, or a component of a system has not been modified or destroyed in an unauthorized manner.
  4. The property of being accessible and usable upon demand.
  5. Qualify public key cryptography
  6. Determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.
  7. Verifying the identity or other attributes of an entity (user, process, or device).
  8. A collection of computers compromised by malicious code and controlled across a network.
  9. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  10. The assurance that the confidentiality of, and access to, certain information about an entity is protected.
  11. Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
  12. An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.

25 Clues: malicious codeQualify public key cryptographyThe process of transforming plaintext into ciphertext.The property of being accessible and usable upon demand.A capability to limit network traffic between networks and/or information systems.Verifying the identity or other attributes of an entity (user, process, or device)....

Cybersecurity Terms 2023-01-28

Cybersecurity Terms crossword puzzle
Across
  1. One's own device for work
  2. Cybersecurity career peak
  3. Security for malware
  4. Mastery of Network defense
  5. Protection for user account
  6. Destructive single malware
  7. Online harassment
  8. Disguised cyber attack
  9. Malicious hackers
  10. Network device identity
  11. Plans security measures
Down
  1. Entry level certification
  2. Pay to release lockout
  3. Secure remote private network
  4. Network traffic control
  5. cloud security certification
  6. Malicious altered media
  7. Secure scrambled data
  8. Intermediate hacker mastery
  9. Surveillance malware

20 Clues: Online harassmentMalicious hackersSecurity for malwareSurveillance malwareSecure scrambled dataPay to release lockoutDisguised cyber attackNetwork traffic controlMalicious altered mediaNetwork device identityPlans security measuresEntry level certificationOne's own device for workCybersecurity career peakMastery of Network defense...

CyberSecurity Crossword 2023-09-07

CyberSecurity Crossword crossword puzzle
Across
  1. An attack that floods a server with useless messages until it crashes
  2. A scheme to steal information or money
  3. Finding information about hardware or software that could be evidence of an attack
  4. A request for data or code
  5. Software that allows programmers to connect to third party applications
  6. A cable that connects devices to networks and the internet
  7. The computer that accesses information from a server
  8. The collection and analysis of publicly available data
  9. A method of authentication that requires multiple steps, usually using something that the person knows and something that the person has
  10. A string of characters that someone knows in order to authenticate themselves.
  11. A trick using a company or person that a victim is familiar with to steal information or scam the victim
Down
  1. The name of a website
  2. A window that automatically opens, often for advertising
  3. An operating system kernel used on many servers, embedded systems, and even desktop computers.
  4. A computer that hosts files, software, or websites
  5. A local device that creates a personal area network for devices to connect to the internet
  6. Checking that the user is who they say they are
  7. Scrambling characters or code up so that it can’t be read
  8. A copy of files or software that is kept in case of an error with the device.
  9. The current wireless encryption standard

20 Clues: The name of a websiteA request for data or codeA scheme to steal information or moneyThe current wireless encryption standardChecking that the user is who they say they areA computer that hosts files, software, or websitesThe computer that accesses information from a serverThe collection and analysis of publicly available data...

Cybersecurity Crossword 2023-10-06

Cybersecurity Crossword crossword puzzle
Across
  1. A process or measure used to verify a user's identity.
  2. A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
  3. Software that compromises the operation of a system by performing an unauthorized function or process.
  4. Converting data into a form that cannot be easily understood by unauthorized people.
  5. A flaw or weakness in an information system that could be exploited.
  6. A string of characters used to authenticate an identity.
  7. Extra copies of computer files that can be used to restore files that are lost or damaged.
  8. A mechanism for creating a secure connection between a computing device and a computer network
  9. A type of malware that denies a user's access to a system or data until a sum of money is paid.
  10. A collection of computers compromised by malicious code and controlled across a network.
  11. Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
Down
  1. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization.
  2. The ability of individuals to understand and exercise control over how information about themselves may be used by others.
  3. Software designed to block malware from entering protected networks.
  4. Faking the sending address of a transmission to gain illegal entry into a secure system.
  5. Part of the internet that isn't indexed by search engines.
  6. An unauthorized user who attempts to or gains access to an information system.
  7. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
  8. Computer programs that can block, detect, and remove viruses and other malware.
  9. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  10. A cybersecurity risk that originates from within an organization.
  11. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
  12. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  13. Unsolicited emails sent to many addresses.

24 Clues: Unsolicited emails sent to many addresses.A process or measure used to verify a user's identity.A string of characters used to authenticate an identity.Part of the internet that isn't indexed by search engines.A cybersecurity risk that originates from within an organization.Software designed to block malware from entering protected networks....

Cybersecurity 2 2024-11-26

Cybersecurity 2 crossword puzzle
Across
  1. Business Email Compromise, a type of fraud targeting organizations for financial gain.
  2. IT Unauthorized use of IT systems or software within an organization.
  3. National Institute of Standards and Technology, a U.S. organization providing cybersecurity frameworks.
  4. Modeling A process to identify, understand, and mitigate potential threats to systems.
  5. Dashboard A visual interface displaying security events and analytics.
  6. Software or hardware that records keystrokes to steal information.
  7. Hijacking Taking control of an active session between a user and a system.
  8. Self-replicating malware that spreads without user intervention.
  9. Kit A toolkit used to automate exploitation of vulnerabilities in systems.
  10. Threat A malicious threat originating from within the organization.
  11. Engineering Psychological manipulation of individuals to divulge confidential information.
  12. Actor An individual or group engaged in malicious cyber activities.
  13. A layered approach to cybersecurity with multiple defensive mechanisms.
Down
  1. ATT&CK A framework describing adversary tactics and techniques used in cyberattacks.
  2. Force Attack A trial-and-error method used to gain access to accounts or systems.
  3. Common Vulnerabilities and Exposures, a database of publicly disclosed vulnerabilities.
  4. Protocols that encrypt data in transit to secure communications.
  5. The process of moving laterally within a network to access other systems.
  6. Trust Architecture A security model where no entity is trusted by default, even within the network.
  7. Positive A benign event flagged as malicious by a detection tool.
  8. A network of compromised devices controlled by an attacker.
  9. Malicious software designed to gain unauthorized root-level access to a system.
  10. Injection An attack method to exploit vulnerabilities in databases through SQL queries.
  11. Address A unique identifier assigned to a network interface for communication.
  12. Escalation Exploiting a vulnerability to gain higher access permissions.
  13. Privilege A principle ensuring users have only the permissions necessary to perform their roles.
  14. Proof of Concept, a demonstration of a security vulnerability.
  15. Table A precomputed table used to crack password hashes.
  16. Positive A legitimate security event correctly identified by a detection tool.
  17. Spoofing A cyberattack that redirects a domain to a malicious IP address.

30 Clues: Table A precomputed table used to crack password hashes.A network of compromised devices controlled by an attacker.Proof of Concept, a demonstration of a security vulnerability.Protocols that encrypt data in transit to secure communications.Self-replicating malware that spreads without user intervention....

Cybersecurity Awareness 2024-11-06

Cybersecurity Awareness crossword puzzle
Across
  1. ERROR Unintentional actions by people that can compromise security systems.
  2. ___ your device before leaving your workplace is a good practice.
  3. Connecting your device to a free access public wi-fi can lead to ___ attack.
  4. A feature to switch off connections in mobile devices.
  5. One of the factors to check whether the website is official and safe.
  6. Always verify whether the website is ___ or not before entering any credentials.
  7. Passwords like “123456” and “password” is in this category.
  8. Best practice before downloading a software online. / Always ___ when you are calling someone.
  9. Download mobile applications from an ___ app store.
  10. What user lacks when they are easily fall into scam and poor understanding in security practices?
Down
  1. Never click on an ___ if you received an email from an unknown sender.
  2. Using an ___ version of software is like giving chances for hackers to hack.
  3. This tool can track your typing habits and log your passwords without your knowledge.
  4. ___ engineering is the art of manipulating humans in giving away all of your information.
  5. Best practice if an unknown device wants to connect to your device.
  6. Never share your sensitive information on ___.
  7. Using a ___ password for all accounts is not a good practice.
  8. An unauthorized individual who gains access to systems, often to modify or destroy data.
  9. This method enhances security by requiring two or more forms of verification during authentication.
  10. In an organization, who plays a role in ensuring data security?
  11. What security method uses two forms of verification, like a password and a code?
  12. Excessive background mobile ___ usage could indicate a potential hacking or malware activity on your device.
  13. __ key + L is the shortcut to lock your screen.

23 Clues: Never share your sensitive information on ___.__ key + L is the shortcut to lock your screen.Download mobile applications from an ___ app store.A feature to switch off connections in mobile devices.Passwords like “123456” and “password” is in this category.Using a ___ password for all accounts is not a good practice....

Cybersecurity Crossword 2025-05-14

Cybersecurity Crossword crossword puzzle
Across
  1. A strong and unique combination to protect online accounts.
  2. Software designed to detect and destroy computer viruses.
  3. Bullying that occurs over digital devices like phones and computers.
  4. authentication A security process using two different verification factors.
  5. A network security system controlling traffic based on rules.
  6. Data that can be used to identify an individual.
  7. Encoding info so only authorized parties can understand it.
  8. Potential dangers or malicious activities found on the internet.
  9. Protecting computer systems/networks from theft, damage, or disruption.
Down
  1. Manipulating people to divulge info or perform actions.
  2. Synthetic media replacing a person's likeness using AI.
  3. Individuals who exploit weaknesses in computer systems or networks.
  4. Connected to the internet.
  5. Extends a private network across public ones for secure data transfer.
  6. Footprint The trail of data you create while using the Internet.
  7. Attempts to gain unauthorized access to damage or disrupt systems.
  8. Software intended to damage or disable computers and systems.
  9. Trustworthy and accurate sources of information.
  10. Potential dangers or hazards.
  11. Online fraud where attackers impersonate to trick you into revealing info.

20 Clues: Connected to the internet.Potential dangers or hazards.Trustworthy and accurate sources of information.Data that can be used to identify an individual.Manipulating people to divulge info or perform actions.Synthetic media replacing a person's likeness using AI.Software designed to detect and destroy computer viruses....

CyberSecurity Law 2025-11-20

CyberSecurity Law crossword puzzle
Across
  1. This is information that can be used to identify an individual and it is related to their health
  2. This is Japan's 2003 data privacy and protection law, protecting use, consent, and security
  3. This is Mexico's federal law regulating the data held by private entities
  4. This is a common principle amongst the laws that requires the companies to gain _____ before collecting and using the data
  5. This is a data protection law/rule that originates from Canada and has 10 main principles
  6. This is a commission that oversees the nations overall power system and regulates the transmission companies that connect to the power grid
  7. This rule requires banking and other regulators to develop reasonable policies and procedures, to prevent identity theft
  8. This security rule specifically applies to covered entities who can include health plans and providers who transmit health information electronically
  9. This is a rule that 3 nations have that is all about ensuring they follow the rules and if not there needs to be someone who can be held responsible for the actions
Down
  1. This is the most common requirement across all the laws, requiring companies employ this to help protect the data
  2. The rule that financial institutes must follow in terms of cybersecurity
  3. Companies that accept or use debit or credit cards are required to comply with this ruleset
  4. This is a template to help provide a framework for states to develop data security and breach laws
  5. This rule applies to nuclear power plant operators, to protect their computer systems from cyber attacks
  6. This is a regulation of data protection and breach policy rules in Europe
  7. This state has a specific IoT law that requires manufactures to make reasonable security features on their connected devices
  8. The rule from the FTC regulating places like mortgage brokers, retailers that offer credit, and consumer reporting agencies
  9. This is another common principle amongst the laws that requires companies to ensure the data they store is up to date
  10. This is a common rule amongst the data protection laws/rules that state the companies must be _____ with what they need the data for, why they need it, and how they will use the data
  11. This is another data protection law however originating from China that has been modified recently with 5 new additions

20 Clues: The rule that financial institutes must follow in terms of cybersecurityThis is Mexico's federal law regulating the data held by private entitiesThis is a regulation of data protection and breach policy rules in EuropeThis is a data protection law/rule that originates from Canada and has 10 main principles...

CyberSecurity crossword 2026-01-30

CyberSecurity crossword crossword puzzle
Across
  1. protected from threats or attacks
  2. not protected from online dangers
  3. a type of malware that spreads between computers
  4. new software changes that fix problems
  5. a secret word used to log into accounts
  6. a fix for a security weakness
  7. wireless internet connection
  8. harmful software designed to damage or steal data
  9. extra security step after entering a password
  10. shared internet that can be unsafe
  11. entering details to access an account
  12. scrambling data so others cannot read it
  13. software that secretly watches user activity
  14. a weakness hackers use to attack systems
  15. a trick to steal money or information
  16. information stored on a computer
Down
  1. malware that locks files and demands payment
  2. a system that blocks unwanted network traffic
  3. a name used to identify a user online
  4. proving who you are online
  5. tricking people into giving away personal information
  6. an online profile or access point
  7. connected computers and devices
  8. when data is stolen or accessed without permission
  9. a global network connecting computers
  10. software that detects and removes malware
  11. permission to access something
  12. keeping personal information safe
  13. a person who tries to break into computer systems

29 Clues: proving who you are onlinewireless internet connectiona fix for a security weaknesspermission to access somethingconnected computers and devicesinformation stored on a computerprotected from threats or attacksnot protected from online dangersan online profile or access pointkeeping personal information safeshared internet that can be unsafe...

Cybersecurity Terms 2017-05-29

Cybersecurity Terms crossword puzzle
Across
  1. Warfare with a physical element such as shooting people, dropping bombs, and other physical attacks.
  2. "Good” hackers who use their tools for the public good – this can include identifying security holes.
  3. Executable programs, or programs that cause a computer to perform a task, that is bad. What it does can vary, but usually it will try to remain hidden and perform a malicious action. It will also usually attempt to replicate itself and infect other systems.
  4. The most common type of Industrial Control System.
  5. Tiny computers that allow us to digitize processes
  6. A person or company selling something
  7. A person who uses computers to gain unauthorized access to data.
  8. A network of private computers infected with malware and controlled as a group without the owners' knowledge. The word comes from the combination of “robot” and “network.”
  9. Usually means the use of ICT to aid in development projects.
  10. The process that decides whether a vulnerability will be stockpiled or given to the vendor responsible for the product.
  11. A security hole in software that the vendor does not know about.
  12. Can do all kinds of things. For example, give someone the ability to spy on you, steal your data, gain a backdoor into your system. Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves
  13. Code attackers use to exploit a software problem.
  14. Something that uses a combo of tactics (also can include social engineering).
  15. Getting someone to give up confidential or personal information by tricking them into telling you freely.
  16. Software that can do a number of things, such as disrupt the normal operations of computers, steal information, gain access to a system, sabotage the system.
  17. A security hole in software
  18. Malware that installs covertly on a victim's device usually encrypting everything and refusing to decrypt it unless a ransom is paid.
  19. An email that are designed to appear to be from someone the recipient knows and trusts and can include a subject line or content that is specifically tailored to the victim’s known interests or industry.
  20. Hackers who use multiple phases to break into a network, avoid detection, and harvest valuable information over the long term.
  21. A team of experts who manage computer emergencies. Usually government based initiatives. Often used as a baseline for understanding a country’s cybersecurity readiness.
Down
  1. Hackers with malicious intentions working to steal, exploit, and sell data. They are usually motivated by personal gain.
  2. A program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
  3. Electronic wallet services that allow users to store, send, and receive money using mobile phones. It is often used in places without banking infrastructure and is a common tool for remittances.
  4. Can either work for the public good or for their own gain.
  5. Used in industrial production - a way to automate the process of receiving data from remote stations and then issue supervisory commands.
  6. Generally anything that stores, retrieves, manipulates, transmits, information electronically in a digital form. Computers, smart phones, software, etc.
  7. Under DHS, created in 2015, meant to fill the gaps where ISACs don’t exist
  8. Independent actors working to accomplish political or social change through the use of hacking or other related techniques such as DDOS. Hacker + activist.
  9. 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.
  10. An attempt to make a machine or other resource unavailable to valid users. An actor will flood the targeted resource with requests to overload the system and make it crash.
  11. Sector specific organizations meant to collect, analyze, and disseminate threat information to their members.
  12. First known case of a cyberweapon impacting physical infrastructure. It was created by the US and Israeli governments to target the Iranian nuclear facility Natanz.
  13. Where the requests come from a variety of sources. Activists and cybercriminals use this technique. Activists argue it is the equivalent of an online “sit-in.”
  14. It’s phishing, but with a high level target such as an executive or, John Podesta.
  15. Separation of your network from others, particularly the public Internet.
  16. Basically something that is there logging what you are doing and sending it back to the person who initiated the attack.
  17. The practice of sending emails meant to get people to reveal personal information, such as passwords and credit card numbers.

38 Clues: A security hole in softwareA person or company selling somethingCode attackers use to exploit a software problem.The most common type of Industrial Control System.Tiny computers that allow us to digitize processesCan either work for the public good or for their own gain.Usually means the use of ICT to aid in development projects....

Cybersecurity Terms 2023-09-10

Cybersecurity Terms crossword puzzle
Across
  1. The act of being in accordance with established guidelines.
  2. When someone is using another person's information maliciously.
  3. A security method that encodes data to make it more secure.
  4. A valuable tool for developing applications.
  5. A group of connected computers that share user account information and a security policy.
  6. This must be protected from unauthorized access.
  7. A special computer designed for technical or scientific applications.
  8. Establishing something as genuine.
  9. In technology, this means maintaining hardware and software.
  10. Relating to software,a company that develops and sells products.
Down
  1. Programs on hardware.
  2. When you open a malicious email or text that is disguised as a legitimate one.
  3. A service that provides technology-related help.
  4. A type of secure connection.
  5. A type of coverage that insures in case of a cyber attack.
  6. When data is stolen from a system without the system's owner noticing.
  7. A string of letters, numbers, and/or symbols used for verifying identity.
  8. A person who commits fraud and/or is involved in fraudulent schemes.
  9. Malicious software that holds data hostage until a ransom is paid.
  10. Disguising an unknown source as a known source.

20 Clues: Programs on hardware.A type of secure connection.Establishing something as genuine.A valuable tool for developing applications.Disguising an unknown source as a known source.A service that provides technology-related help.This must be protected from unauthorized access.A type of coverage that insures in case of a cyber attack....

Cybersecurity Crossword 2023-11-17

Cybersecurity Crossword crossword puzzle
Across
  1. a collection of networks that communicate with one another
  2. A unique number that identifies a computer, and it is used to send messages and receive responses when visiting a website
  3. The first wide-area packet-switched network with distributed control and one of the first computer networks to implement the TCP/IP protocol suite
  4. A
  5. Criminal activity that involves the use of computers or networks such as the internet
  6. An unauthorized user who attempts to or gains access to an information system
  7. A well-known set of rules and standards that allow reliable communication between networks and network devices
  8. A global network of computers using internet protocol (IP) to communicate globally via switches and routers
  9. Smallest unit of data in a computer
Down
  1. Two or more computers that are linked in order to share resources
  2. Wireless networking technology that allows devices to interface with the Internet
  3. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
  4. a communications protocol primarily used for establishing low-latency and loss-tolerant connections between applications on the internet, typically used for video streaming
  5. and deliberate attempt to breach an information system
  6. An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
  7. Device or software application that requests services from a server
  8. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation
  9. A protocol that specifies how data is exchanged over the internet by providing end-to-end communications that identify how it should be broken into packets, addressed, transmitted, routed and received at the destination
  10. A networking device that forwards data packets between computer networks
  11. Resolves the common names of Web sites with their underlying IP addresses, adding efficiency and even security in the process

20 Clues: ASmallest unit of data in a computerand deliberate attempt to breach an information systema collection of networks that communicate with one anotherTwo or more computers that are linked in order to share resourcesDevice or software application that requests services from a server...

Cybersecurity Terms 2024-08-07

Cybersecurity Terms crossword puzzle
Across
  1. an identity and access management security method that requires two forms of identification to access resources and data
  2. an arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet
  3. a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages
  4. any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
  5. software and operating system (OS) updates that address security vulnerabilities within a program or product
  6. the act of disguising a communication from an unknown source as being from a known, trusted source
  7. the process of converting information or data into a code, especially to prevent unauthorized access
  8. a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network
  9. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive
  10. the collection of secure information and communication techniques employing mathematical concepts and algorithms used to disguise the content of messages
  11. a typically covert method of bypassing normal authentication or encryption in a computer
  12. any piece of software or application that displays advertisements, usually through pop-up or pop-under windows
  13. an ethical hacker whose job involves hacking into computer systems to detect security risks
  14. a type of malware program that enables cyber criminals to gain access to and infiltrate data from machines without being detected
Down
  1. the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information
  2. a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
  3. a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware
  4. a program designed to breach the security of a computer system while ostensibly performing some innocuous function
  5. a type of malicious software designed to block access to a computer system until a sum of money is paid
  6. a form of malware or hardware that keeps track of and records your keystrokes as you type
  7. a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys
  8. verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system
  9. a program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself
  10. an attack in which an attacker is positioned between two communicating parties in order to intercept and/or alter data traveling between them
  11. a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system

25 Clues: a typically covert method of bypassing normal authentication or encryption in a computera form of malware or hardware that keeps track of and records your keystrokes as you typean ethical hacker whose job involves hacking into computer systems to detect security risks...

Cybersecurity Crossword 2024-09-03

Cybersecurity Crossword crossword puzzle
Across
  1. the practice of securing information and communication through writing and solving codes
  2. a code that gives you access to a site
  3. a group of connected computers
  4. cyberattack that fools people into revealing personal info
  5. a type of cryptocurrency that is well-known
  6. malware that tricks users by thinking they are clicking safe links
  7. software that holds your data hostage in return for something they want
  8. network of compromised computers used in a cyberattack
  9. manipulated media images usually used to scam people
  10. a program that encrypts your internet traffic by scrambling your IP address
  11. method of scrambling data, only an authorized user can use
  12. a string of numbers used to identify a computer
  13. a person who infiltrates a computer
  14. a place where data can be stored but it is not on an internal hard drive
Down
  1. software that infects and destroys computers' data
  2. software used to detect, prevent, and remove malware
  3. computerized intelligence that forms to make and execute life-like decisions
  4. an unintended hardware or software problem
  5. an attack on somebody in a digital way of force
  6. the act of data being leaked from a source
  7. a set of software tools that gives user access without being detected
  8. malware that collects and transmits your private data

22 Clues: a group of connected computersa person who infiltrates a computera code that gives you access to a sitean unintended hardware or software problemthe act of data being leaked from a sourcea type of cryptocurrency that is well-knownan attack on somebody in a digital way of forcea string of numbers used to identify a computer...

Cybersecurity Crossword 2021-05-06

Cybersecurity Crossword crossword puzzle
Across
  1. The use of ____ off-the-shelf products have weakened security of ICS.
  2. Network device designed to control the flow of traffic between networks.
  3. Support component that contributes to ICS vulnerabilities.
  4. Total amount of loss or damage that can be expected from a successful attack
  5. Four-step process of taking action to reduce or eliminate risk.
  6. Doing ____ is not a viable option for securing ICS.
  7. has led to workforce downsizing and cost reducing measures in ICS.
  8. Intrusion, attack, and ____ are the three stages of an attack.
  9. The majority of attackers are _____.
Down
  1. Weakness in a system that can be exploited.
  2. The equation for ____ is threat x vulnerability x consequence
  3. A copy of your password should NOT be left on your ___.
  4. _____ should be at least 8 alphanumeric characters long.
  5. The most common social engineering method.
  6. The possibility for an insider with authorized access or understanding of an organization to use that access or knowledge to harm that organization.
  7. Along with intent and opportunity, ____ is needed for threats to succeed.
  8. 22% of breaches involved some form of ___ ___.
  9. ____% of attacks are financially motivated.
  10. _____ is rummaging through business or residential trash for the purpose of finding useful information.
  11. An attack that is used to make computer resources unavailable.
  12. Malicious software.

21 Clues: Malicious software.The majority of attackers are _____.The most common social engineering method.Weakness in a system that can be exploited.____% of attacks are financially motivated.22% of breaches involved some form of ___ ___.Doing ____ is not a viable option for securing ICS.A copy of your password should NOT be left on your ___....

Cybersecurity crossword 2022-05-18

Cybersecurity crossword crossword puzzle
Across
  1. company security policy that allows for employees’ personal devices to be used in business.
  2. type of malware aimed to corrupt, erase or modify information on a computer before spreading to others
  3. malware that functions by spying on user activity without their knowledge.
  4. technology that allows access to files/services through the internet from anywhere in the world.
  5. acronym that stands for distributed denial of service – a form of cyber attack.
  6. malicious application or script that can be used to take advantage of a computer’s vulnerability.
  7. A piece of malware that often allows a hacker to gain remote access to a computer through a back door
  8. software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer
  9. udio or video clip that has been edited and manipulated to seem real or believable
  10. internet version of a home address for your computer
  11. hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
  12. defensive technology designed to keep the bad guys out
  13. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and networ
  14. umbrella term that describes all forms of malicious software
  15. tool that allows the user to remain anonymous while using the internet
  16. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
Down
  1. malware that allows cybercriminals to remotely control your computer.
  2. technique used to manipulate and deceive people to gain sensitive and private information
  3. form of malware that deliberately prevents you from accessing files on your computer – holding your data hostag
  4. group of computers, printers and devices that are interconnected and governed as a whole
  5. set of programs that tell a computer to perform a task
  6. Breaches the network to gain sensitive information with the owner’s consent
  7. this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
  8. technique used by hackers to obtain sensitive information.
  9. piece of malware that can replicate itself in order to spread the infection to other connected computers

25 Clues: internet version of a home address for your computerset of programs that tell a computer to perform a taskdefensive technology designed to keep the bad guys outtechnique used by hackers to obtain sensitive information.umbrella term that describes all forms of malicious softwaremalware that allows cybercriminals to remotely control your computer....

Cybersecurity Puzzle 2025-03-11

Cybersecurity Puzzle crossword puzzle
Across
  1. Self-replicating malicious software
  2. Fixes security vulnerabilities
  3. Acts as an intermediary server
  4. Fake emails to steal info
  5. Attack using trial and error
  6. Program that spreads and harms
  7. Remote storage and computing
  8. Harmful software for attacks
  9. Access to an account or system
  10. Device used for entering codes
  11. Payment demanded for files
  12. Secretly monitors user activity
Down
  1. Superuser access level
  2. Method for encrypting information
  3. Disguised harmful software
  4. Protection against cyber threats
  5. Secret entry point for attacks
  6. Permission to use a system
  7. Unauthorized access to systems
  8. Encrypts data for protection

20 Clues: Superuser access levelFake emails to steal infoDisguised harmful softwarePermission to use a systemPayment demanded for filesAttack using trial and errorRemote storage and computingHarmful software for attacksEncrypts data for protectionFixes security vulnerabilitiesActs as an intermediary serverProgram that spreads and harms...

Cybersecurity 2023 2023-10-18

Cybersecurity 2023 crossword puzzle
Across
  1. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  2. A security process that uses an additional factor for verification is called "______-Factor Authentication"
  3. An individual that is authorized to access a system
  4. A _____ email falsely claims to be from a legitimate source, usually with a threat or request for information
  5. Designed to detect and destroy computer viruses
  6. Junk email
  7. Your digital ______ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  8. The gaining of unauthorized access to data in a system or computer
  9. Converting information and data into code to protect unauthorized access to sensitive data
  10. Tech used to keep intruders out
  11. Online harassment
  12. A set of changes that fix or improve a software or application
Down
  1. Cybersecurity awareness month
  2. Weakness in a system
  3. A sequence of words used for authentication
  4. Storage for infected files and emails
  5. The fraudulent practice of sending a text message impersonating the head of school in order to induce individuals to reveal personal information or purchase a gift card
  6. Software demanding money to unlock personal information
  7. Uses hand, voice and face recognition
  8. A piece of software that allows a user to remain anonymous while using the internet by masking the location and encrypting traffic
  9. _____ settings help control things like your profile, contact, and other information relating to your account
  10. Bring Your Own Device

22 Clues: Junk emailOnline harassmentWeakness in a systemBring Your Own DeviceCybersecurity awareness monthTech used to keep intruders outStorage for infected files and emailsUses hand, voice and face recognitionA sequence of words used for authenticationDesigned to detect and destroy computer virusesAn individual that is authorized to access a system...

Cybersecurity puzzle 2023-12-04

Cybersecurity puzzle crossword puzzle
Across
  1. A common tactic in scams, creating a sense of immediate action needed.
  2. Online harassment that can breach your mental health
  3. Malware that encrypts files, demanding payment for decryption.
  4. A scam method using emails to trick users into revealing personal information
  5. The process of confirming a user's identity in a security system.
  6. A general term for deceitful practices to gain financial or personal gain.
  7. adding a unique string to a password before hashing it for added security.
  8. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  9. A safer payment method for online purchases due to fraud protection.
  10. A type of malware that attaches itself to programs and corrupts or modifies files.
  11. Data-tracking files that should be disabled to enhance online privacy
  12. Deceptive malware appearing legitimate, often giving remote access to cybercriminals.
Down
  1. A method where hardware is used to record keystrokes and steal passwords.
  2. Malware that secretly observes the user's actions.
  3. Company that mitigated a record-breaking cyberattack, underlining the need for robust online defenses.
  4. Platform where the Python application gateway for malware was distributed, highlighting vigilance in downloading software.
  5. Everything you do on the internet that stays with you, even when you turn off your devices
  6. Harmful software that scammers might install through tech support scams.
  7. Name of the group associated with the intrusion into cryptocurrency platforms, showing the importance of caution with software downloads.
  8. Autonomous malware that replicates and spreads through network vulnerabilities.
  9. Software designed to detect and remove malicious software like viruses and malware.
  10. A popular brand of antivirus software.
  11. Using more than one method of authentication for enhanced security.
  12. When personal information is accessed and stolen by unauthorized individuals
  13. The method of converting passwords into gibberish to protect them in password files.
  14. A tool that encrypts internet traffic and masks IP addresses for enhanced online privacy.

26 Clues: A popular brand of antivirus software.Malware that secretly observes the user's actions.Online harassment that can breach your mental healthMalware that encrypts files, demanding payment for decryption.The process of confirming a user's identity in a security system.Using more than one method of authentication for enhanced security....

Cybersecurity Practices 2024-10-07

Cybersecurity Practices crossword puzzle
Across
  1. | A security measure that requires more than one form of verification.
  2. | An attempt to steal personal information by pretending to be a trustworthy entity.
  3. | A software update that fixes security vulnerabilities.
  4. | Software designed to detect and remove malware.
  5. | A vulnerability that is exploited before it is publicly known or patched.
  6. | A network of infected devices used in cyber attacks.
  7. | A type of malware that records keystrokes to steal sensitive information.
  8. Breach | The unauthorized release of confidential information.
  9. | The process of converting data into a code to prevent unauthorized access.
  10. Engineering | Manipulating people into giving up confidential information.
  11. | A type of malware that demands payment to restore data.
  12. | A security system that monitors and controls incoming and outgoing network traffic.
  13. | Software that is harmful to a computer system.
Down
  1. | An attack that overwhelms a system by sending an excessive amount of requests.
  2. | A weakness in a system that can be exploited by a cyber attacker.
  3. | An attempt to damage or disrupt a computer system or network.
  4. | The process of verifying the identity of a user or device.
  5. | A decoy system set up to attract cyber attackers and study their behavior.
  6. | Malware disguised as legitimate software.
  7. | Software that gathers user information without their knowledge.

20 Clues: | Malware disguised as legitimate software.| Software that is harmful to a computer system.| Software designed to detect and remove malware.| A network of infected devices used in cyber attacks.| A software update that fixes security vulnerabilities.| A type of malware that demands payment to restore data....

Cybersecurity Crossword 2024-03-15

Cybersecurity Crossword crossword puzzle
Across
  1. social engineering to steal data
  2. Hacker that attacks for self-interests
  3. malware designed to acquire money
  4. malicious software
  5. malware that changes and corrupts
  6. convert encrypted data to plain text
  7. monitors network traffic
  8. 2+ computers sharing resources
  9. network of computers for attacks
  10. seemingly harmless malware for infection
  11. unauthorized access to a system
  12. process of identifying a user
Down
  1. internet protocol address
  2. Hacker that defends others
  3. malware that's designed for monitoring
  4. leverage a vulnerability for cyberattack
  5. testing system without prior information
  6. gaining as much info before penetration
  7. gathering of hackers for practice
  8. flood bandwidth of targeted system

20 Clues: malicious softwaremonitors network trafficinternet protocol addressHacker that defends othersprocess of identifying a user2+ computers sharing resourcesunauthorized access to a systemsocial engineering to steal datanetwork of computers for attacksmalware designed to acquire moneymalware that changes and corruptsgathering of hackers for practice...

Cybersecurity 101 2025-08-29

Cybersecurity 101 crossword puzzle
Across
  1. Program that fight bugs
  2. files saved on computers
  3. Save copy of device data
  4. bad software affecting computers
  5. Fake email asking for info
  6. secret code to access data
  7. hackers asking for money
  8. Software that discreetly watches you
  9. New version of software
  10. clickable website address
Down
  1. wireless internet connection
  2. code + password
  3. secret word to log in
  4. online mail version
  5. signing out of an account
  6. Individual who breaks into computers
  7. Hides internet location
  8. blocks internet traffic
  9. online storage space
  10. junk email

20 Clues: junk emailcode + passwordonline mail versiononline storage spacesecret word to log inProgram that fight bugsHides internet locationblocks internet trafficNew version of softwarefiles saved on computersSave copy of device datahackers asking for moneysigning out of an accountclickable website addressFake email asking for info...

Cybersecurity Crossword 2025-09-02

Cybersecurity Crossword crossword puzzle
Across
  1. – A type of malware that replicates itself by infecting other programs.
  2. – A secure tunnel for internet traffic, stands for Virtual Private Network.
  3. – A network security system that monitors and controls traffic.
  4. – A scam using fake emails or messages to trick people into revealing information.
  5. Factor – Authentication requiring more than one form of verification.
  6. – A hidden method of bypassing normal authentication.
  7. – Malware that locks files and demands payment.
  8. – Software that detects and removes malicious programs.
  9. Attack – An attempt to damage, steal, or disrupt digital systems.
  10. – The practice of protecting systems, networks, and programs from attacks.
  11. – The process of converting data into a secure code.
  12. – A clickable reference to another webpage or document.
Down
  1. – Manipulating people into revealing confidential information. _____ engineering.
  2. – A secret string of characters used for authentication.
  3. – Software designed to harm or exploit systems.
  4. – A well-known security awareness training platform.
  5. Horse – Malicious software disguised as legitimate software.
  6. – Phishing conducted through SMS text messages.
  7. – Technology simulating human intelligence, used in modern cybersecurity.
  8. – The process of verifying identity before granting access.

20 Clues: – Software designed to harm or exploit systems.– Phishing conducted through SMS text messages.– Malware that locks files and demands payment.– A well-known security awareness training platform.– The process of converting data into a secure code.– A hidden method of bypassing normal authentication....

Cybersecurity Crossword 2025-09-30

Cybersecurity Crossword crossword puzzle
Across
  1. a type of social engineering that uses messaging technologies (such as texts)
  2. when you obtain a new device, you should always change the ________ password
  3. social engineers evoke this emotion by making threats
  4. infects your computer and does bad things
  5. social engineers try to pique your _________
  6. a type of social engineering using a voice channel
  7. be careful what you share on ___________ media; it can be used against you
  8. locks you out of your computer unless you pay a ransom
  9. the third word in 'IoT'
  10. a type of password that is long and hard to guess but memorable
  11. you can ________ your data if you want to protect it from prying eyes
Down
  1. one indicator of a phish is a sense of __________ from artificial deadlines
  2. enable automatic software ___________ to install the latest security patches
  3. you should always enable this type of authentication to secure your account
  4. if you don't know the sender, never download one of these
  5. a password's strength is determined by its __________
  6. passwords should be ________ (only used for a single account are)
  7. a password __________ will remember your passwords for you
  8. think twice before you click on ___________ in e-mails
  9. a network of infected devices used together to launch cyberattacks
  10. this is what you should do if you receive a suspicious message
  11. creating an extra copy of important files and documents

22 Clues: the third word in 'IoT'infects your computer and does bad thingssocial engineers try to pique your _________a type of social engineering using a voice channelsocial engineers evoke this emotion by making threatsa password's strength is determined by its __________think twice before you click on ___________ in e-mails...

Cybersecurity Crossword 2026-02-02

Cybersecurity Crossword crossword puzzle
Across
  1. This malware name is brutally honest.
  2. “When an attacker pretends to be you… which is rude, because you barely want to be you on Mondays.”
  3. When sensitive information goes on an unsanctioned field trip.
  4. Group that treats mass extortion like a quarterly business plan.
  5. Paranoia with governance—and for once that’s a compliment.
  6. Attack when session tokens went sightseeing.
  7. The file transfer brand that learned what “blast radius” means.
  8. The business model that turns backups from “nice to have” into “board‑level KPI.”
  9. When bash said: ‘I’ll run whatever you put in here, no questions asked.’
  10. A deliciously fake host that flatters attackers into oversharing their techniques.
  11. Thousands of machines working together to ruin someone’s day. Teamwork!
  12. Why adversaries hack who you trust instead of hacking you—because efficiency matters, even in crime.
Down
  1. The internet’s basement—less spiders than expected, more stolen credentials than desired.
  2. The franchised ransomware brand with more press releases than your product launch.
  3. Your network’s bouncer; denies service to anyone not on the list (and some who are).
  4. The bug that made everyone learn what memory feels like when it overshares
  5. The door that was “definitely locked” until someone checked the logs.
  6. Not a horse, but still extremely good at hosting guests you didn’t invite.
  7. One zeroday log message to rule them all—and to invite remote code execution in for tea.
  8. words -
  9. That “urgent password reset” that somehow always lands 5 minutes before lunch.
  10. “Did someone say free database access?”
  11. Your keyboard’s diary—written without consent.

23 Clues: words -This malware name is brutally honest.“Did someone say free database access?”Attack when session tokens went sightseeing.Your keyboard’s diary—written without consent.Paranoia with governance—and for once that’s a compliment.When sensitive information goes on an unsanctioned field trip....

CYBERSECURITY CROSSWORD 2026-02-02

CYBERSECURITY CROSSWORD crossword puzzle
Across
  1. Paranoia with governance—and for once that’s a compliment.
  2. Cybercriminal Group that treats mass extortion like a quarterly business plan.
  3. One zeroday log message to rule them all—and to invite remote code execution in for tea.
  4. “When an attacker pretends to be you… which is rude, because you barely want to be you on Mondays.”
  5. The door that was “definitely locked” until someone checked the logs.
  6. Thousands of machines working together to ruin someone’s day. Teamwork!
  7. The bug that made everyone learn what memory feels like when it overshares
  8. The business model that turns backups from “nice to have” into “board‑level KPI.”
  9. “Did someone say free database access?”
  10. Not a horse, but still extremely good at hosting guests you didn’t invite.
  11. The file transfer brand that learned what “blast radius” means.
Down
  1. Your network’s bouncer; denies service to anyone not on the list (and some who are).
  2. Why adversaries hack who you trust instead of hacking you—because efficiency matters, even in crime.
  3. A deliciously fake host that flatters attackers into oversharing their techniques.
  4. That “urgent password reset” that somehow always lands 5 minutes before lunch.
  5. words -
  6. Your keyboard’s diary—written without consent.
  7. The franchised ransomware brand with more press releases than your product launch.
  8. This malware name is brutally honest.
  9. When bash said: ‘I’ll run whatever you put in here, no questions asked.’
  10. When sensitive information goes on an unsanctioned field trip.
  11. The internet’s basement—less spiders than expected, more stolen credentials than desired.

22 Clues: words -This malware name is brutally honest.“Did someone say free database access?”Your keyboard’s diary—written without consent.Paranoia with governance—and for once that’s a compliment.When sensitive information goes on an unsanctioned field trip.The file transfer brand that learned what “blast radius” means....

Cybersecurity Terms 2022-11-22

Cybersecurity Terms crossword puzzle
Across
  1. A set of software tools used by an attacker to hide the actions or presence of other types of malicious software.
  2. Software that is a cumulative package of all patches and feature updates.
  3. Malware that prevents a user's device from properly operating until a fee is paid.
  4. An attacker who controls a botnet.
  5. An infected computer that is under the remote control of an attacker.
  6. Computer code that lies dormant until it is triggered by a specific logical event.
  7. Software that helps prevent computers from becoming infected by different types of spyware.
  8. A malicious program designed to enter a computer via a network to take advantage of a vulnerability in an application or an operating system.
  9. Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action.
  10. A publicly released software security update intended to repair a vulnerability.
  11. Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.
Down
  1. A logical computer network of zombies under the control of an attacker.
  2. Enhancements to the software to provide new or expanded functionality, but do not address security vulnerability.
  3. Hardware or software designed to limit the spread of malware.
  4. A copy of files from a computer's hard drive saved on other digital media that is stored in a secure location.
  5. Software code that gives access to a program or a service that circumvents normal security protections.
  6. An executable program that is advertised as performing one activity but which actually performs a malicious activity.
  7. Software that examines a computer for any infections as well as monitors computer activity and scans new documents that might contain a virus.
  8. A general term used to describe software that spies on users by gathering information without consent.
  9. A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

20 Clues: An attacker who controls a botnet.Hardware or software designed to limit the spread of malware.An infected computer that is under the remote control of an attacker.A logical computer network of zombies under the control of an attacker.Software that is a cumulative package of all patches and feature updates....

CyberSecurity Words 2023-09-07

CyberSecurity Words crossword puzzle
Across
  1. tells other servers which servers are allowed to send emails using your business’s domain name
  2. protection from data theft
  3. a data copy of files
  4. an text encryption used to protect data
  5. email authentication technology to help prevent phishing emails
  6. getting email that asks that they have your data
  7. a way of stealing data usually by emails or phone calls
  8. the service you choose should include TLS, which will help to protect your customers’ privacy.
  9. puts a digital signature on outgoing mail
  10. Accessing that another device safely
  11. People who help you with technological issues.
Down
  1. Something which can be exploited by hackers
  2. that automatically download malicious software onto your computer.
  3. Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy data
  4. Someone else using your identity
  5. a file or code that infects or steal data
  6. a new version of data of the system
  7. Usually comes from malware in the system
  8. the process or action of verifying the identity of a user or process.
  9. Information that was stolen

20 Clues: a data copy of filesprotection from data theftInformation that was stolenSomeone else using your identitya new version of data of the systemAccessing that another device safelyan text encryption used to protect dataUsually comes from malware in the systema file or code that infects or steal dataputs a digital signature on outgoing mail...

Cybersecurity Awareness 2023-10-11

Cybersecurity Awareness crossword puzzle
Across
  1. Term commonly used to describe junk e-mail on the Internet
  2. ________ software is designed to detect, prevent, and remove malware infections on computers and other devices
  3. Malicious or harmful software designed to damage or disrupt a computer system
  4. A security tool, which may be a hardware or software solution that is used to filter network traffic
  5. Unauthorized intrusion
  6. A type of media manipulation to trick users, where bad actors alter an image or video to create a false perception of reality
  7. The process of proving an individual is a claimed identity
  8. Small files which are stored on a user’s computer
  9. Software demanding money to unlock personal information
  10. A piece of software that allows a user to remain anonymous while using the internet by masking the location and encrypting traffic (infamously used to circumvent our web filter)
  11. Bring Your Own Device
  12. A network of compromised computers used to carry out cyberattacks on other systems
  13. Online harassment
  14. Email that falsely claims to be from a legitimate source, usually with a threat or request for information
Down
  1. Storage for infected files
  2. A _______ attack involves the use of multiple devices to flood a website or server with traffic, resulting in its temporary shutdown
  3. malicious software that is imbedded inside of a benign host file
  4. Coding used to protect sensitive data
  5. Creating a duplicate copy of data onto a separate physical storage device or online/cloud storage solution
  6. Tricking users into clicking on hidden elements in order to perform unwanted actions
  7. Weakness in a system
  8. A layered security system that requires more than one means of authentication to grant access to an account or device
  9. Encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
  10. Coding used to protect sensitive data
  11. A sequence of words used for authentication
  12. Cybersecurity awareness month

26 Clues: Online harassmentWeakness in a systemBring Your Own DeviceUnauthorized intrusionStorage for infected filesCybersecurity awareness monthCoding used to protect sensitive dataCoding used to protect sensitive dataA sequence of words used for authenticationSmall files which are stored on a user’s computer...

Cybersecurity Terms 2024-05-14

Cybersecurity Terms crossword puzzle
Across
  1. Multiple infected computers controlled remotely.
  2. Amount of data that can pass through a network per second.
  3. Disrupts services for political or social reasons.
  4. Program that can copy itself and cause harm.
  5. Consists of code instructing computers.
  6. Connection between devices for information exchange.
  7. Provides users and devices access to the Internet.
  8. Data storage device for files.
  9. Records keystrokes and sends them to an attacker.
  10. Updates computer programs to fix vulnerabilities.
  11. Software blocking malware from entering networks.
Down
  1. Computer programs that block, detect, and remove viruses and malware.
  2. Flaw in a program hackers exploit.
  3. Provides specific services on a network.
  4. Attempts to trick people into revealing sensitive information.
  5. Fictional virus damaging physical infrastructure.
  6. Harmful software including viruses and worms.
  7. Process of making information unreadable.
  8. Interconnected devices exchanging data.
  9. Attempt to overwhelm online services with traffic.
  10. Holds computer files hostage for ransom.
  11. Unsolicited emails sent to many addresses.
  12. Extra copies of files for restoring lost or damaged data.

23 Clues: Data storage device for files.Flaw in a program hackers exploit.Consists of code instructing computers.Interconnected devices exchanging data.Provides specific services on a network.Holds computer files hostage for ransom.Process of making information unreadable.Unsolicited emails sent to many addresses.Program that can copy itself and cause harm....

Cybersecurity Crossword 2024-04-23

Cybersecurity Crossword crossword puzzle
Across
  1. The practice of sending fraudulent emails resembling emails from reputable sources to steal sensitive information.
  2. Persistent Threats A set of stealthy and continuous computer hacking processes, often orchestrated by persons targeting a specific entity.
  3. A person who uses computers to gain unauthorized access to data.
  4. Any malicious computer program which misleads users of its true intent.
  5. Engineering The process of extracting knowledge or design information from anything manmade and reproducing it or reproducing anything based on the extracted information.
  6. A collection of software tools that enable unauthorized access to a computer or areas of its software.
  7. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  8. A piece of data that is used in network communications to identify a session.
  9. A set of changes to a computer program or its supporting data designed to update, fix, or improve it.
  10. A means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.
  11. Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
  12. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  13. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
  14. A type of surveillance technology used to record keystrokes made by a user.
  15. The art of manipulating people so they give up confidential information.
  16. Trust Architecture A security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.
  17. Weaknesses or flaws in software that can be exploited by a threat actor to gain unauthorized access to a system.
  18. A criminal act of obtaining sexual acts, images, or videos from a person by coercing them through threats to release existing intimate content.
Down
  1. Information Management The practice of collecting, monitoring, and analyzing security related data from computer logs.
  2. Malicious software designed to harm or exploit any programmable device or network.
  3. The study of analyzing information systems in order to study the hidden aspects of the systems.
  4. Authentication A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.
  5. An attack that aims to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.
  6. Testing A method for gaining assurance in the security of an information system by attempting to breach some or all of that system's security, using the same tools and techniques an attacker might use.
  7. The act of disguising a communication from an unknown source as being from a known, trusted source.
  8. An algorithm for performing encryption or decryption.
  9. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  10. Exfiltration The unauthorized transfer of data from a computer or server.
  11. Forensics The practice of uncovering and interpreting electronic data for use in a court of law.
  12. Artificial intelligencegenerated videos or audio recordings that seem to show real people saying and doing things they never did.
  13. Response The methodology an organization uses to respond to and manage a cyberattack.
  14. Operations Center A centralized unit that deals with security issues on an organizational and technical level.
  15. Extends a private network across a public network, allowing users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
  16. Sockets Layer A standard security technology for establishing an encrypted link between a server and a client. Often abbreviated to a three letter acronym.
  17. The method by which information is converted into secret code that hides the information's true meaning.

35 Clues: An algorithm for performing encryption or decryption.A person who uses computers to gain unauthorized access to data.Any malicious computer program which misleads users of its true intent.The art of manipulating people so they give up confidential information.Exfiltration The unauthorized transfer of data from a computer or server....

cybersecurity crossword 2024-03-15

cybersecurity crossword crossword puzzle
Across
  1. connected together to share resources
  2. identifying a user’s identity
  3. bad software
  4. barrier between
  5. A scam
  6. numbers allocated to computers routers
  7. all connected as one entity
  8. Bring Your Own Device
  9. group of applications
  10. Coding used to protect
Down
  1. spy on you
  2. tricked into clicking
  3. attack on a computer system
  4. video that has been altered
  5. destroys information
  6. shield users against viruses
  7. security violation
  8. overwhelming the target
  9. collection of programs or software
  10. infected

20 Clues: A scaminfectedspy on youbad softwarebarrier betweensecurity violationdestroys informationtricked into clickingBring Your Own Devicegroup of applicationsCoding used to protectoverwhelming the targetattack on a computer systemvideo that has been alteredall connected as one entityshield users against virusesidentifying a user’s identity...

Cybersecurity Terms 2024-09-11

Cybersecurity Terms crossword puzzle
Across
  1. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
  2. An attack in which someone sends unsolicited messages to a Bluetooth-enabled device
  3. gap, To physically separate or isolate a system from other systems or networks (2 words)
  4. A computer connected to the Internet that has been compromised with malicious logic to perform activities under remote the command and control of a remote administrator.
  5. A technique allowing to locate a web user based on their IP address
  6. Attackers searching for wireless networks with vulnerabilities while moving around an area in a moving vehicle
  7. The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
  8. Software that compromises the operation of a system by performing an unauthorized function or process.
  9. Engineering, The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes (2 words)
  10. loss prevention, A set of procedures and mechanisms to stop sensitive data from leaving a security boundary (3 words)
  11. Refers to anything that has the potential to cause serious harm to a computer system
  12. a technique that is aimed to distract hackers with a fake target (a computer or data) and make them pursue it instead of the real one. It helps to secure a high-value target and observe hackers’ main techniques to learn from them
  13. A process of applying a mathematical algorithm against a set of data to produce a numeric value (a 'hash value') that represents the data.
  14. Refers to everything in a web application that is displayed or takes place on the client (end user device)
  15. king the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
  16. Spyware is malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
Down
  1. The process of verifying the identity or other attributes of an entity (user, process, or device).
  2. response, The activities that address the short-term, direct effects of an incident and may also support short-term recovery.
  3. A malware designed to deny a user or organization access to files on their computer, without first paying a fee.
  4. A set of software tools with administrator-level access privileges installed on an information system and designed to hide the presence of the tools, maintain the access privileges, and conceal the activities conducted by the tools.
  5. , A network security system that filters unsanctioned incoming and outgoing traffic.
  6. A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
  7. A type of malware that conceals its true content to fool a user into thinking it's a harmless file
  8. A technique for identifying and dropping packets that have a false source address.
  9. A technique to breach the security of a network or information system in violation of security policy.
  10. A notification that a specific attack has been detected or directed at an organization’s information system
  11. Refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (
  12. An unauthorized user who attempts to or gains access to an information system.
  13. the fabrication of a false online identity by a cybercriminal for the purposes of deception, fraud, or exploitation
  14. A tool that record what a person types on a device
  15. The process of transforming plaintext into ciphertext.
  16. a cybercrime in which the attacker floods a target with internet traffic to prevent users from accessing connected online services and sites (Acronym)

32 Clues: A tool that record what a person types on a deviceThe process of transforming plaintext into ciphertext.A technique allowing to locate a web user based on their IP addressAn unauthorized user who attempts to or gains access to an information system.A technique for identifying and dropping packets that have a false source address....

Cybersecurity Terms 2024-09-27

Cybersecurity Terms crossword puzzle
Across
  1. Collection of computers running malicious programs
  2. Virtual perimeter around network
  3. AI-generated video and audio used to deceive
  4. Type of data identifying an individual
  5. Common type of fraud used to social engineer
  6. Everyday objects connected to the web
  7. Malicious software used to obtain money from victims
  8. Type of spyware that records what you type
  9. Electronic money
Down
  1. The use of messaging to harass someone
  2. Weaknesses in software
  3. Used to verify if you're a human or a robot
  4. Simulated network resources designed to entice
  5. Playbook for emergencies
  6. Quick-repair job
  7. Physical devices that connect to a network
  8. Malicious program built for infection
  9. The practice of challenging security systems to discover vulnerabilities
  10. Coolest people on the planet
  11. Least cool people on the planet
  12. Process of verifying identity
  13. Sets of login data used to verify identity

22 Clues: Quick-repair jobElectronic moneyWeaknesses in softwarePlaybook for emergenciesCoolest people on the planetProcess of verifying identityLeast cool people on the planetVirtual perimeter around networkMalicious program built for infectionEveryday objects connected to the webThe use of messaging to harass someoneType of data identifying an individual...

Cybersecurity Terms 2025-03-09

Cybersecurity Terms crossword puzzle
Across
  1. Encoding data for security reasons
  2. Harmful software that damages computers
  3. Unauthorized access to data
  4. Falsifying identity or source
  5. Software that monitors for malware
  6. Algorithm for encrypting data
  7. Network entry point for traffic
  8. Access granted to perform actions
  9. Ethical hacking to find vulnerabilities
  10. Malware locks files for money
  11. Network security barrier
Down
  1. Facial recognition to grant access
  2. Hidden entry for unauthorized access
  3. List of blocked entities
  4. Network of infected computers
  5. Converting ciphertext into plaintext
  6. Machine learning and thinking
  7. Verifying user identity
  8. Scam emails that trick users
  9. Software displaying unwanted ads

20 Clues: Verifying user identityList of blocked entitiesNetwork security barrierUnauthorized access to dataScam emails that trick usersNetwork of infected computersFalsifying identity or sourceAlgorithm for encrypting dataMachine learning and thinkingMalware locks files for moneyNetwork entry point for trafficSoftware displaying unwanted ads...

Cybersecurity & Internet 2025-03-11

Cybersecurity & Internet crossword puzzle
Across
  1. A fraudulent attempt to obtain sensitive information via the internet.
  2. A structured set of data held in a computer.
  3. A form of bullying that occurs online.
  4. The act of stealing someone’s personal information for malicious purposes.
  5. A global network connecting millions of computers.
  6. Software designed to harm or exploit devices.
  7. The amount of data that can be transmitted in a fixed amount of time.
  8. The correct or acceptable way of communicating on the internet.
  9. A system designed to prevent unauthorized access to or from a network.
  10. A protocol used to transfer data over the internet.
  11. Individuals who exploit the internet to harm others.
  12. A unique identifier in a database.
Down
  1. The use of the internet to stalk or harass someone.
  2. Software used to manage and organize databases.
  3. Increased capacity for data transfer.
  4. A password that is difficult for others to guess or crack.
  5. A device that forwards data packets between computer networks.
  6. A unique string of numbers assigned to each device on a network.
  7. Reduced capacity for data transfer.
  8. The trail of data that individuals leave when using the internet.
  9. The system that translates domain names into IP addresses.
  10. Illegal activities that involve computers or networks.

22 Clues: A unique identifier in a database.Reduced capacity for data transfer.Increased capacity for data transfer.A form of bullying that occurs online.A structured set of data held in a computer.Software designed to harm or exploit devices.Software used to manage and organize databases.A global network connecting millions of computers....

CYBERSECURITY TERMS 2025-03-28

CYBERSECURITY TERMS crossword puzzle
Across
  1. high performance device that can switch traffic within the LAN
  2. An encrypted connection that works as a private network
  3. Translating IP Addresses to provide internet access
  4. network that covers a small area
  5. to provide error control
  6. A device that is used to access a network
  7. Software that is downloaded to protect against viruses
  8. the practice of protecting computer systems
  9. keeping your data safe and protected
  10. Ensuring that all data is accurate
  11. Holding hostage to data until a ransom is paid
  12. Client server model
Down
  1. a weakness within a system
  2. receives traffic in a port and repeats it
  3. Ensuring authorized users are able to easily access their data
  4. A device built with an antenna to provide a connection point
  5. A network millions of people utilize
  6. Standard character coding used for telecommunication
  7. A block of data that is transmitted on the network
  8. altering data and putting a key on it
  9. processing incoming emails
  10. a sequence of symbols used to interpret a message
  11. provides data to network users
  12. protects the network from unauthorized access
  13. a malware that disguises itself as something else

25 Clues: Client server modelto provide error controla weakness within a systemprocessing incoming emailsprovides data to network usersnetwork that covers a small areaEnsuring that all data is accurateA network millions of people utilizekeeping your data safe and protectedaltering data and putting a key on itreceives traffic in a port and repeats it...

Cybersecurity Crossword 2025-05-14

Cybersecurity Crossword crossword puzzle
Across
  1. Software designed to detect and destroy computer viruses.
  2. Potential dangers or malicious activities found on the internet.
  3. Synthetic media replacing a person's likeness using AI.
  4. A network security system controlling traffic based on rules.
  5. A security process using two different verification factors.
  6. Manipulating people to divulge info or perform actions.
  7. Extends a private network across public ones for secure data transfer.
  8. Attempts to gain unauthorized access to damage or disrupt systems.
  9. Trustworthy and accurate sources of information.
Down
  1. Protecting computer systems/networks from theft, damage, or disruption.
  2. Connected to the internet.
  3. Bullying that occurs over digital devices like phones and computers.
  4. Potential dangers or hazards.
  5. The trail of data you create while using the Internet.
  6. Individuals who exploit weaknesses in computer systems or networks.
  7. Software intended to damage or disable computers and systems.
  8. Encoding info so only authorized parties can understand it.
  9. Data that can be used to identify an individual.
  10. A strong and unique combination to protect online accounts.
  11. Online fraud where attackers impersonate to trick you into revealing info.

20 Clues: Connected to the internet.Potential dangers or hazards.Data that can be used to identify an individual.Trustworthy and accurate sources of information.The trail of data you create while using the Internet.Synthetic media replacing a person's likeness using AI.Manipulating people to divulge info or perform actions....

Cybersecurity Crossword 2023-03-14

Cybersecurity Crossword crossword puzzle
Across
  1. using multiple bots to overload a program
  2. Hijacks your device until they get paid
  3. A file that stores your online preferences
  4. A AI generated photo or video
  5. A means of attack on computer
  6. The process of identifing youself
  7. Hides personal information from hackers
  8. A device for spreading wireless signal
Down
  1. Technology that watches your online actions
  2. Technology used to keep hackers out
  3. Someone who gains unauthorized access to a website
  4. total loss of power
  5. Malware that can reproduce itself
  6. A software that can delete or corrupt files
  7. The URL is changed to show something trustable
  8. A system of commputers connected as one
  9. A loss in power for minutes or hours
  10. A fake person asks for information
  11. Malware that changes and corrupts devices
  12. A digital storage place

20 Clues: total loss of powerA digital storage placeA AI generated photo or videoA means of attack on computerMalware that can reproduce itselfThe process of identifing youselfA fake person asks for informationTechnology used to keep hackers outA loss in power for minutes or hoursA device for spreading wireless signalHijacks your device until they get paid...

Cybersecurity Vocabulary 2026-01-27

Cybersecurity Vocabulary crossword puzzle
Across
  1. Internet-based platforms/applications that enable users to create, share, & interact with content in real time.
  2. Try to discover weaknesses in programs so they can be fixed. They work directly with a company.
  3. Also called Terms of Use – says what rights you have & what rights you give up when you use an app.
  4. The practice of protecting systems from digital attacks, unauthorized access, damage, or disruption.
  5. Can piece together data from computers and networks to find criminals.
  6. Personally Identifiable Information (Name, Birth Date, Address, Social Security Number, Email Address or Password.)
  7. A system of interconnected computing devices (computers, servers, printers, and mobile devices)
  8. The process cell phone companies use to know the location of your devices.
  9. Computer skills whiz who uses their expertise to gain unauthorized access to systems, networks, or data.
  10. Everything you do online creates a trail of info. (Internet Searches, Online Shopping, Social Media Posts)
  11. Artificial Intelligence
  12. Images, videos, or audio created using AI
  13. Malicious software (malware) that, when executed, replicates itself by modifying code in other programs. Can spy.
Down
  1. Uses a combination of Law Enforcement and Tech Knowledge to solve crimes.
  2. Refers to any illegal activity that involves computers, networks, or digital devices.
  3. Same as Penetration Testers, but they typically work within a consulting company for many businesses.
  4. Hardware, software, networks, and digital data
  5. Contain info of all the tasks a digital device does – like which device, when, and who was logged in.
  6. Acronym for World Wide Web
  7. Writes encryption programs companies use to protect their data.
  8. Digital devices you use collect data about what you’ve done (send an email/text, create a doc, take a pic)
  9. Same as Penetration Testers and Ethical Hackers, but they watch for hacking being done in real time.
  10. Designers of Cybersecurity Systems.
  11. Deliberate/malicious attempt to breach, damage, disrupt, or gain access to networks or digital devices.
  12. A cyberattack using deceptive methods (via email, text, calls, or fake websites) to trick people into revealing PII.
  13. Synthetic media mimicking real people, making it appear as if someone said/did something they never did.

26 Clues: Artificial IntelligenceAcronym for World Wide WebDesigners of Cybersecurity Systems.Images, videos, or audio created using AIHardware, software, networks, and digital dataWrites encryption programs companies use to protect their data.Can piece together data from computers and networks to find criminals....

Cybersecurity Crossword 2025-09-04

Cybersecurity Crossword crossword puzzle
Across
  1. Malware that demands money
  2. Sending emails or other messages purporting to be from a reputable source
  3. Cybersecurity Awareness Month
  4. Secret string of characters needed to access secure sites, devices, and systems
  5. Unauthorized data access or exfiltration
  6. Process of confirming your identity
  7. Blocks network intruders
Down
  1. Person who breaks into software/systems
  2. Cybersecurity mascot for The Plans
  3. Button for suspicious emails (two words)
  4. Creates a secure connection to another online network (we use this when working remotely)
  5. Process of securing data by scrambling it
  6. Software that protects against malicious code
  7. Harmful software
  8. Update that fixes a vulnerability
  9. Training and phishing simulation partner (two words)

16 Clues: Harmful softwareBlocks network intrudersMalware that demands moneyCybersecurity Awareness MonthUpdate that fixes a vulnerabilityCybersecurity mascot for The PlansProcess of confirming your identityPerson who breaks into software/systemsButton for suspicious emails (two words)Unauthorized data access or exfiltration...

fop 2023-04-03

fop crossword puzzle
Across
  1. 13
  2. 9
  3. 6
  4. 2
  5. 8
  6. 11
  7. 12
  8. 3
Down
  1. 15
  2. 5
  3. 14
  4. 1
  5. 4
  6. 10
  7. 7

15 Clues: 514962783151314101112

Government Crisis 2025-01-21

Government Crisis crossword puzzle
Across
  1. Change
  2. Security Challenges
  3. Health Crisis
  4. Polarization
  5. Populations
  6. Justice Movements
  7. Inequality
  8. Economic Instability
  9. Threats
  10. Security
  11. Deficiencies
  12. Scarcity
Down
  1. Health Emergencies
  2. Workforce Crisis
  3. Disruption
  4. Media and Misinformation
  5. Security
  6. Crisis
  7. Crisis
  8. and Lack of Transparency

20 Clues: ChangeCrisisCrisisThreatsSecuritySecurityScarcityDisruptionInequalityPopulationsPolarizationDeficienciesHealth CrisisWorkforce CrisisJustice MovementsHealth EmergenciesSecurity ChallengesEconomic InstabilityMedia and Misinformationand Lack of Transparency

Cybersecurity Crossword 2022-12-06

Cybersecurity Crossword crossword puzzle
Across
  1. any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission
  2. establishes a barrier between a trusted network and an untrusted network
  3. An undocumented way of gaining access to computer system
  4. an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy
  5. a system where hackers can see your keystrokes
  6. a set of changes to a computer program designed to update, fix, or improve it
  7. a computer program used to prevent, detect, and remove malware
  8. software that is designed to damage a PC
  9. a mandatory access control enforcement feature
  10. a collection of computer software, typically malicious, designed to enable access to a computer
Down
  1. is software that generates revenue for its developer
  2. contain not only security and quality revisions, but also significant feature additions and changes
  3. blocker and system to block unwanted screen popups
  4. a type of program designed to prevent and detect unwanted spyware program installations
  5. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
  6. a type of malware from cryptovirology that threatens to publish the victim's personal data
  7. a copy of computer data taken and stored elsewhere
  8. a piece of code intentionally inserted into a software system that will set off a malicious function
  9. a malicious program that is installed on a device that transforms it
  10. a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system

20 Clues: software that is designed to damage a PCa system where hackers can see your keystrokesa mandatory access control enforcement featureblocker and system to block unwanted screen popupsa copy of computer data taken and stored elsewhereis software that generates revenue for its developerAn undocumented way of gaining access to computer system...

Cybersecurity Crossword 2020-09-13

Cybersecurity Crossword crossword puzzle
Across
  1. Pretending to be somebody else online.
  2. A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program
  3. A type of attack that uses trial and error over and over to guess a password until it is correct.
  4. Small files that are saved on your computer that store information that help websites track your visits
  5. A virus that can replicate without the user doing anything such as opening a program.
  6. Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
  7. Stealing another person's information to use for criminal activity.
  8. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  9. A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands money if the victim wants his or her files back.
  10. The amount of data that can pass through a network or part of a network per second.
  11. Computer programs that can block, detect, and remove viruses and other malware.
  12. Creating a web address that purposely fools people into thinking it is another person or company's website.
  13. The process of making extra copies of computer files that can be used to restore files that are lost or damaged.
  14. Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
Down
  1. The process of using codes to make readable information unreadable. Encrypted information cannot be read until it is decrypted using a secret key.
  2. Two or more interconnected devices that can exchange data.
  3. A "good guy" hacker; one who hacks to help find vulnerabilities to make a system more secure.
  4. Software designed to block malware from entering protected networks.
  5. The use of something in a way different from what it was intended for in order to solve a problem.
  6. A general name for software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs.
  7. A computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
  8. Malware that records every key struck on a keyboard and sends that information to an attacker.
  9. A way of shutting down or slowing down a website by overwhelming it with a flood of traffic from a team of computers.
  10. Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
  11. A flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.

25 Clues: Pretending to be somebody else online.Two or more interconnected devices that can exchange data.Stealing another person's information to use for criminal activity.Software designed to block malware from entering protected networks.Computer programs that can block, detect, and remove viruses and other malware....

Cybersecurity Terms 2023-03-17

Cybersecurity Terms crossword puzzle
Across
  1. While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking.
  2. Attack Any attempt to breach a logical environment's security boundary. An attack may concentrate on intelligence gathering, disrupting company operations, exploiting weaknesses, keeping track of targets, stopping work, obtaining value, harming logical or physical assets, or leveraging system resources to enable assaults against other targets.
  3. The newest virus detection technology is integrated into anti-virus systems to shield users against viruses, spyware, trojans, and worms that can damage computer hardware through email or web browsing.
  4. A means of attack on a computer system, either a series of commands, malicious software, or piece of infected data
  5. You already utilize cloud computing if you use Gmail for email, Google Drive for document storage, or Netflix to stream your favorite movies.
  6. A combination of the words “robot” and “network”, a botnet is a network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.
  7. A series of computers and associated peripherals (routers, printers, scanners), that are all connected as one entity.
  8. is a method of connecting a series of computers and devices in a private encrypted network
  9. Engineering Instead of breaking in or utilizing technical hacking techniques, social engineering is a growingly popular way to access restricted resources
  10. Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications make up a network.
  11. Horse Yet another form of malware, this one a misleading computer program that looks innocent, but in fact allows the hacker into your system via a back door, allowing them to control your computer.
Down
  1. it’s when a hacker changes the IP address of an email so that it seems to come from a trusted source.
  2. A portmanteau of “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system.
  3. The process of identifying a user’s identity, making sure that they can have access to the system and/or files.
  4. is used to protect your information from hackers.
  5. is a series of numbers allocated to computers routers servers, and pretty much anything connected to the Internet
  6. A form of malware used by hackers to spy on you and your computer activities
  7. also referred to as two-factor authentication, makes it more difficult for hackers to access your account by requiring you to provide at least two different credentials
  8. Any technology, be it software or hardware, used to keep intruders out.
  9. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network

20 Clues: is used to protect your information from hackers.Any technology, be it software or hardware, used to keep intruders out.A form of malware used by hackers to spy on you and your computer activitiesis a method of connecting a series of computers and devices in a private encrypted network...

Cybersecurity Month 2023-05-19

Cybersecurity Month crossword puzzle
Across
  1. creating a fake identity on a social network account or dating website
  2. an error, flaw, failure, or fault in a computer or system
  3. programs that automatically execute tasks as ordered by the creator of the program that has infected them
  4. after these are downloaded, opened, or executed, your data becomes corrupt
  5. programs and other operating systems used by a computer
  6. a type of malicious software that disguises itself as a harmless program
  7. a cyber attacker
  8. private network VPN
  9. an attack when a person or program disguises themselves as another
  10. malware used to gain access to a user's system or data
  11. authentication attaching a phone number or email to an account for extra security
  12. short for malicious software
  13. breach when sensitive, protected, or confidential information is intentionally released to an untrusted environment
  14. engineering taking advantage of human trust to gain access to private information
Down
  1. customizable additions to software for extra functionality
  2. secret word or phrase used to gain access
  3. method of obtaining user info through fraudulent communications targeted directly at people
  4. a technique for protecting computers, networks, programs, and data from unauthorized access or hackers
  5. the way in which the identity of a user is confirmed
  6. cryptocurrency
  7. software that automatically displays or downloads material when a user if offline
  8. a form of malware used to threaten victims by blocking, publishing, or corrupting their data unless a ransom is paid
  9. technology IT
  10. an internet traffic filter meant to stop unauthorized traffic
  11. the physical and tangible parts of a computer

25 Clues: technology ITcryptocurrencya cyber attackerprivate network VPNshort for malicious softwaresecret word or phrase used to gain accessthe physical and tangible parts of a computerthe way in which the identity of a user is confirmedmalware used to gain access to a user's system or dataprograms and other operating systems used by a computer...

Cybersecurity Crossword 2023-06-29

Cybersecurity Crossword crossword puzzle
Across
  1. Security tool that creates a secure, encrypted connection between you and the Internet (acronym)
  2. Hardware or software designed to prevent unauthorized access to or from a private network.
  3. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  4. Should be constructed of upper and lower case letters, numbers, and special characters.
  5. The address of a webpage. Check the validity of it before clicking on it.
  6. Unauthorized access to a network, information systems, or application.
  7. A sequence of words or text used to control access to a computer; similar to a password.
  8. The process of taking plain text and scrambling it into an unreadable format.
  9. Threatening behavior facilitated through electronic means such as texting.
  10. MEDIA Facebook, Twitter, Instagram, etc. (Two words)
  11. Verifying identity.
  12. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
  13. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
Down
  1. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  2. A fraudulent email purportedly from a reputable company attempting to get personal information.
  3. 1. A wireless technology standard used over short distances using short-wavelength UHF radio waves.
  4. The “A” in the C-I-A Triad. It ensures authorized users have access.
  5. The “I” in the C-I-A Triad; protection from unauthorized changes.
  6. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  7. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.

20 Clues: Verifying identity.MEDIA Facebook, Twitter, Instagram, etc. (Two words)The “I” in the C-I-A Triad; protection from unauthorized changes.The “A” in the C-I-A Triad. It ensures authorized users have access.Unauthorized access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it....

Cybersecurity Crossword 2023-09-01

Cybersecurity Crossword crossword puzzle
Across
  1. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  2. The “A” in the C-I-A Triad. It ensures authorized users have access.
  3. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
  4. Verifying identity.
  5. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  6. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  7. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
  8. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
Down
  1. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  2. Facebook, Twitter, Instagram, etc. (Two words)
  3. Hardware or software designed to prevent unauthorized access to or from a private network.
  4. The address of a webpage. Check the validity of it before clicking on it.
  5. A sequence of words and text used to access to computer; similar to a password
  6. A wireless technology standard used over short distances using short-wavelength UHF radio waves.
  7. Threatening behavior facilitated through electronic means such as texting.
  8. The process of taking plain text and scrambling it into an unreadable format.
  9. Unauthorized access to a network, information systems, or application.
  10. The “I” in the C-I-A Triad; protection from unauthorized changes.
  11. Should be constructed of upper and lower case letters, numbers, and special characters.
  12. A fraudulent email purportedly from a reputable company attempting to get personal information.

20 Clues: Verifying identity.Facebook, Twitter, Instagram, etc. (Two words)The “I” in the C-I-A Triad; protection from unauthorized changes.The “A” in the C-I-A Triad. It ensures authorized users have access.Unauthorized access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it....

Cybersecurity Terms 2024-03-07

Cybersecurity Terms crossword puzzle
Across
  1. Secure network connection
  2. Harmful software
  3. Unique human identifiers
  4. Wireless network connection
  5. Secure Socket Layer
  6. Software update fix
  7. Keystroke monitoring software
  8. Data recovery copy
Down
  1. Malicious data encryption
  2. Network of compromised devices
  3. Malicious software
  4. Denial of Service attack
  5. Engineering Manipulating users for access
  6. Malicious software disguised
  7. Intrusion Detection System
  8. Secure data encoding
  9. Deceptive email attacks
  10. Unsolicited email messages
  11. Unauthorized access seeker
  12. Network security barrier

20 Clues: Harmful softwareMalicious softwareData recovery copySecure Socket LayerSoftware update fixSecure data encodingDeceptive email attacksDenial of Service attackUnique human identifiersNetwork security barrierMalicious data encryptionSecure network connectionIntrusion Detection SystemUnsolicited email messagesUnauthorized access seeker...

Cybersecurity Crossword 2024-06-03

Cybersecurity Crossword crossword puzzle
Across
  1. Blocks online threats
  2. Uses body parts for login
  3. Stores data online
  4. Scrambles data
  5. Extra login security step
  6. Makes software current
  7. Deceptive website link
  8. Hidden part of the internet
  9. Breaks into systems
  10. Creates digital internet signals
Down
  1. Tracks keystrokes
  2. Unwanted emails
  3. Spreads and infects
  4. Copies data for safety
  5. Certification for cisco network
  6. Hides online location
  7. Enters an account
  8. Tests for real users
  9. Used to access the internet
  10. Secret word for access

20 Clues: Scrambles dataUnwanted emailsTracks keystrokesEnters an accountStores data onlineSpreads and infectsBreaks into systemsTests for real usersBlocks online threatsHides online locationCopies data for safetyMakes software currentDeceptive website linkSecret word for accessUses body parts for loginExtra login security stepHidden part of the internet...

Cybersecurity Terms 2024-05-08

Cybersecurity Terms crossword puzzle
Across
  1. Impersonation of another device or user on a network.
  2. A secret key that protects your digital accounts.
  3. Secret agents in software form, spying on your computer activities.
  4. A process to confirm someone is who they claim to be.
  5. A weakness in a system that can be exploited.
  6. A secure tunnel for data on the internet.
  7. A coding error that might cause programs to behave unexpectedly.
  8. A person who breaks into computers, often for malicious reasons.
  9. Malicious software disguised as legitimate.
  10. A digital kidnapper of data, demanding payment for release.
  11. Scrambling data to protect it from prying eyes.
Down
  1. Ensuring that authorized parties can access information when needed.
  2. A digital barrier protecting a network from unauthorized access.
  3. A deceptive attempt to steal sensitive information via email.
  4. Manipulation techniques to trick people into breaking security procedures.
  5. Unwanted software that displays ads on your screen.
  6. Protection against unauthorized data alteration.
  7. This program defends your computer against malicious agents.
  8. Malicious software designed to harm or exploit any programmable device.
  9. Network of computers infected with malicious software intented to cause harm.
  10. A self-replicating program that spreads through networks.

21 Clues: A secure tunnel for data on the internet.Malicious software disguised as legitimate.A weakness in a system that can be exploited.Scrambling data to protect it from prying eyes.Protection against unauthorized data alteration.A secret key that protects your digital accounts.Unwanted software that displays ads on your screen....

Cybersecurity Unit 2025-02-07

Cybersecurity Unit crossword puzzle
Across
  1. illegally copying and/or distributing software.
  2. malware designed to trick users by posing as legitimate software.
  3. an ethical hacker.
  4. spam via telephone.
  5. the ability to verify the identity of an entity or individual.
  6. someone that is new to hacking.
  7. protection of information from being shared to unauthorized systems, entities, or individuals.
  8. the ability to correlate, with high certainty, a recorded action with its originating individual or entity.
Down
  1. an authentication process that allows a user to access multiple applications with one set of login credentials.
  2. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  3. type of hacker that is malicious and often participates in criminal acts.
  4. timely, reliable access to data and information services by authorized users.
  5. malware which is capable of making multiple copies of itself on a single device.
  6. specializes in defense, such as building firewalls.
  7. unsolicited emails that are generally sent in mass.
  8. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  9. Protection of information, systems, and services from unauthorized modification/destruction.
  10. the fraudulent practice of sending emails purporting to be from reputable companies in order to get individuals to reveal personal information.
  11. between a black and white hat. They often work for the government.
  12. malware that can copy itself from one computer to another.
  13. vigilante hacker.

21 Clues: vigilante hacker.an ethical hacker.spam via telephone.someone that is new to hacking.illegally copying and/or distributing software.specializes in defense, such as building firewalls.unsolicited emails that are generally sent in mass.malware that can copy itself from one computer to another....

Cybersecurity Terminology 2024-07-11

Cybersecurity Terminology crossword puzzle
Across
  1. malicious software executed by trigger
  2. nefariously spreads via email attachments
  3. stores and manages credentials
  4. spreads computer to computer
  5. malicious encryption demanding payment
  6. designed to exploit macros
  7. disguised program intending to steal
  8. finds weaknesses to exploit systems
  9. stored small text files
Down
  1. targeting systems to overwhelm
  2. secretly recording private device activity
  3. new phone using stolen data
  4. Targeted advertisements from online activity
  5. Attack Botnet used to target website
  6. Private Network within Public Network
  7. personalized attacks luring victims
  8. mass stolen credentials gaining access
  9. layered disguise for unintended clicking
  10. remotely controlled devices launching attacks
  11. monitors and controls network traffic

20 Clues: stored small text filesdesigned to exploit macrosnew phone using stolen dataspreads computer to computertargeting systems to overwhelmstores and manages credentialspersonalized attacks luring victimsfinds weaknesses to exploit systemsAttack Botnet used to target websitedisguised program intending to stealPrivate Network within Public Network...

Cybersecurity/Safety 2024-07-11

Cybersecurity/Safety crossword puzzle
Across
  1. short for any malicious software
  2. digital brick layered wall of security
  3. vulnerability no one is aware of yet
  4. collect/transmit private user info
  5. identifies device is connected to internet
  6. appears harmless/conceals malicious intent
  7. monitors security protection measures
  8. designs, tests, implements security system
  9. media manipulation/false perception
  10. fool's user into providing private info
  11. analyst that designs data communication
Down
  1. Also known as "crackers"
  2. clicking hidden elements "UI redress attack"
  3. Germany had great message _____ until, Alan Turing
  4. "penetration testers" works with organization
  5. software to detect, prevent/remove cpu infections
  6. compromised computers to carry out attacks
  7. digital technology harassment
  8. prudent to use a ____ whenever possible
  9. locks out user for Bitcoin

20 Clues: Also known as "crackers"locks out user for Bitcoindigital technology harassmentshort for any malicious softwarecollect/transmit private user infomedia manipulation/false perceptionvulnerability no one is aware of yetmonitors security protection measuresdigital brick layered wall of securityprudent to use a ____ whenever possible...

Cybersecurity CIS178 2024-07-12

Cybersecurity CIS178 crossword puzzle
Across
  1. Portable chip storing cellular connection
  2. Network Defense against unauthorized access
  3. Deceptive scheme to trick victims
  4. Fraudulent attempts to steal your data
  5. File or document sent electronically
  6. Cybercriminal skilled in breaching security
  7. Online content displayed in a browser
  8. Bad software directed at computers
  9. Digital Crimes committed using technology
  10. Developer updates to fix vulnerabilities
  11. Essential access code for security
Down
  1. Identifies you using something you are
  2. Affects system displaying unwanted ads
  3. Virus that disguises as legitimate software
  4. Holds data hostage for money
  5. Records users keystrokes to steal information
  6. Physical object used for authentication
  7. Detects and removes viruses
  8. Unauthorized software that gathers information
  9. Way to secure data trough coded algorithms

20 Clues: Detects and removes virusesHolds data hostage for moneyDeceptive scheme to trick victimsBad software directed at computersEssential access code for securityFile or document sent electronicallyOnline content displayed in a browserIdentifies you using something you areAffects system displaying unwanted adsFraudulent attempts to steal your data...

Cybersecurity Terms 2024-07-13

Cybersecurity Terms crossword puzzle
Across
  1. Secure online service
  2. AKA UI Redress attack
  3. Have to pay
  4. Gain access to sensitive infromation
  5. Method of scrambling data
  6. Attempts to steal personal data
  7. Appears harmless
  8. Bring your device
  9. Prevent unauthorized access
Down
  1. Protect, prevent, remove
  2. Harmful software designed to damage
  3. Online harassment
  4. Protect data during encryption process
  5. Security in cloud infrastructure
  6. Interment protocol address
  7. Network of compromised computers
  8. A security feature
  9. Media manipulation
  10. Type of malware
  11. Can be particularly dangerous

20 Clues: Have to payType of malwareAppears harmlessOnline harassmentBring your deviceA security featureMedia manipulationSecure online serviceAKA UI Redress attackProtect, prevent, removeMethod of scrambling dataInterment protocol addressPrevent unauthorized accessCan be particularly dangerousAttempts to steal personal dataSecurity in cloud infrastructure...

CyberSecurity Trivia 2024-07-09

CyberSecurity Trivia crossword puzzle
Across
  1. Unsolicited emails
  2. Protection of physical assets
  3. Authentication method using two steps
  4. Copy of data for recovery
  5. Protection of personal information
  6. Harmful software
  7. Monitoring for unauthorized access
  8. Potential danger
  9. Software to detect and remove viruses
  10. Epiq's CISO
  11. Network security barrier
  12. Ethical hacking to find vulnerabilities
  13. Evaluation of potential threats
Down
  1. Data protection through coding
  2. Encrypted communication protocol
  3. Adherence to regulations
  4. Examination of security measures
  5. Network security barrier (again)
  6. Offensive action against computer systems
  7. Process of updating software vulnerabilities
  8. Permission to access resources
  9. Weakness in a system's security
  10. Software update to fix vulnerabilities
  11. Psychological manipulation for information
  12. Verification of who someone is
  13. Science of secure communication
  14. Protection against threats
  15. Breach of security
  16. Overwhelming a system to deny access
  17. Deceptive email or website to steal information

30 Clues: Epiq's CISOHarmful softwarePotential dangerUnsolicited emailsBreach of securityAdherence to regulationsNetwork security barrierCopy of data for recoveryProtection against threatsProtection of physical assetsData protection through codingPermission to access resourcesVerification of who someone isWeakness in a system's security...

Cybersecurity Crossword 2024-09-16

Cybersecurity Crossword crossword puzzle
Across
  1. The process of returning data to its original condition after loss or damage.
  2. A network of private computers infected with malicious software and controlled as a group.
  3. Malicious software that misleads users of its true intent.
  4. A secret word or phrase used to gain access to a system.
  5. Abbreviation for a service that encrypts your internet connection for privacy.
  6. The fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  7. A network security system that monitors and controls incoming and outgoing network traffic.
  8. An incident where data is accessed without authorization.
  9. Malware that threatens to publish the victim's data or block access unless a ransom is paid.
  10. Software that enables a user to obtain covert information about another's computer activities.
Down
  1. The process of verifying the identity of a user or process.
  2. A malicious program that replicates itself and spreads to other computers.
  3. The process of converting information into code to prevent unauthorized access.
  4. Software designed to detect and destroy computer viruses.
  5. Software that automatically displays or downloads advertising material.
  6. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  7. Irrelevant or unsolicited messages sent over the internet.
  8. A copy of data stored separately for recovery in case the original is lost or damaged.
  9. A program that records every keystroke made by a user.
  10. Abbreviation for a protocol for establishing authenticated and encrypted links between networked computers.

20 Clues: A program that records every keystroke made by a user.A secret word or phrase used to gain access to a system.Software designed to detect and destroy computer viruses.An incident where data is accessed without authorization.Malicious software that misleads users of its true intent.Irrelevant or unsolicited messages sent over the internet....

Cybersecurity Crossword 2025-03-02

Cybersecurity Crossword crossword puzzle
Across
  1. A distinctive attribute of something
  2. YouTube hates these because it causes them to lose profits from ads
  3. Connects devices to internet
  4. Leads to another website
  5. Unique address that identifies a device
  6. People that commit crimes online
  7. Collections of analytics and statistics
  8. Programs used by a computer
  9. This video is sponsored by Nord _ _ _
  10. A secondary copy of data
Down
  1. a person's regular occupation
  2. Coming or derived from a source outside the subject affected.
  3. Not mandatory
  4. Promoting or advertising
  5. A food that is also data
  6. Hiding information by coding it
  7. Can be a phone, laptop, etc.
  8. Poses a danger
  9. To gain unauthorised access to
  10. Wrongful deception

20 Clues: Not mandatoryPoses a dangerWrongful deceptionPromoting or advertisingA food that is also dataLeads to another websiteA secondary copy of dataPrograms used by a computerConnects devices to internetCan be a phone, laptop, etc.a person's regular occupationTo gain unauthorised access toHiding information by coding itPeople that commit crimes online...

Commerce Cybersecurity 2025-03-02

Commerce Cybersecurity crossword puzzle
Across
  1. Wrongful or criminal deception intended to result in financial or personal gain.
  2. Malicious intruders could take advantage of a zero-day exploit to gain unauthorized access to data.
  3. A method to hide the actual web address (URL) of a webpage and replace it with another,
  4. the action or activity of buying goods from shops.
  5. Importance requiring swift action.
  6. Relating to or characteristic of the culture of computers, information technology, and virtual reality.
  7. Getting your money back after a purchase.
  8. A voluntary promise offered by the person or business who sold the product or service to you.
Down
  1. Made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
  2. Acronym for Two factor Authentication
  3. An arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet.
  4. Make an online service unavailable by overwhelming it with excessive traffic from many locations and sources.
  5. A legally binding agreement between two or more people
  6. Commonly known as the Scamming Captial of the world.
  7. The power or right to give orders, make decisions, and enforce obedience.
  8. The state of being free from danger or threat.
  9. When cybercriminals target victims with emails that appear to be from a legitimate company asking for sensitive information.
  10. A program inserted into a system to compromise the confidentiality, integrity, or availability of data.
  11. pay someone for the use of (something, typically property, land, or a car).
  12. designed to trick you into giving away your money or your personal details.

20 Clues: Importance requiring swift action.Acronym for Two factor AuthenticationGetting your money back after a purchase.The state of being free from danger or threat.the action or activity of buying goods from shops.Commonly known as the Scamming Captial of the world.A legally binding agreement between two or more people...

Cybersecurity Crossword 2025-03-02

Cybersecurity Crossword crossword puzzle
Across
  1. A distinctive attribute of something
  2. YouTube hates these because it causes them to lose profits from ads
  3. Connects devices to internet
  4. Leads to another website
  5. Unique address that identifies a device
  6. People that commit crimes online
  7. Collections of analytics and statistics
  8. Programs used by a computer
  9. This video is sponsored by Nord _ _ _
  10. A secondary copy of data
Down
  1. a person's regular occupation
  2. Coming or derived from a source outside the subject affected.
  3. Not mandatory
  4. Promoting or advertising
  5. A food that is also data
  6. Hiding information by coding it
  7. Can be a phone, laptop, etc.
  8. Poses a danger
  9. To gain unauthorised access to
  10. Wrongful deception

20 Clues: Not mandatoryPoses a dangerWrongful deceptionPromoting or advertisingA food that is also dataLeads to another websiteA secondary copy of dataPrograms used by a computerConnects devices to internetCan be a phone, laptop, etc.a person's regular occupationTo gain unauthorised access toHiding information by coding itPeople that commit crimes online...

Cybersecurity Terms 2025-03-15

Cybersecurity Terms crossword puzzle
Across
  1. Covert method of bypassing normal authentication.
  2. Denial of service attack affecting one system.
  3. Unsolicited Emails.
  4. Response test to verify human v. bot.
  5. Secretly installed data gathering software.
  6. Group of Compromised Internet-connected devices.
  7. Network protection preventing virus from penetrating.
  8. Digital form of social engineering using deceit.
  9. A fundamental unit of computer storage
  10. Software that monitors for Malware.
Down
  1. Software designed to harm or exploit.
  2. Malware preventing file access via Encryption.
  3. Encrypted sites not indexed by search engines.
  4. Spyware that records keystrokes.
  5. Successful hack allows access to files.
  6. Capturing of Data Packets over network.
  7. Vulnerability or flaw in a system.
  8. Denial of service attack affecting multiple systems.
  9. Attackers posing as a known trusted source.
  10. Software that earns revenue off advertisements

20 Clues: Unsolicited Emails.Spyware that records keystrokes.Vulnerability or flaw in a system.Software that monitors for Malware.Software designed to harm or exploit.Response test to verify human v. bot.A fundamental unit of computer storageSuccessful hack allows access to files.Capturing of Data Packets over network....

Cybersecurity Terminology 2025-06-05

Cybersecurity Terminology crossword puzzle
Across
  1. Fishing for the highest target
  2. Network security that filters access
  3. Your personal cybersecurity methods
  4. Computer program to fight attacks
  5. Your personal key
  6. Is it really you?
  7. Flooding your servers
  8. A virus is watching you
  9. Make sure you block these
  10. Who and what is allowed
Down
  1. Malicious program
  2. Gaining access without approval
  3. Information accessed through a key
  4. I'm not where I say I am
  5. A computer infection
  6. I don't want these emails
  7. Holding your information captive
  8. Your internet address
  9. Casting a line for personal information
  10. Software update to fix holes

20 Clues: Malicious programYour personal keyIs it really you?A computer infectionFlooding your serversYour internet addressA virus is watching youWho and what is allowedI'm not where I say I amI don't want these emailsMake sure you block theseSoftware update to fix holesFishing for the highest targetGaining access without approval...

Cybersecurity Acronym 2025-06-13

Cybersecurity Acronym crossword puzzle
Across
  1. Issues tickets and Kerberos authentication
  2. methods exposed by a script or program that allow other scripts or programs to use it.
  3. Standards, best practices, and guidelines
  4. XML-based data format used to exchange authentication information
  5. access control model where resources are protected by ACLs & managed by admins
  6. access control model where each resource is protected by an access control list
  7. An XML-based web services protocol used to exchange messages
  8. token issued to an authenticated account
  9. A number used with authentication devices such as smartcards
Down
  1. Three principles of security control and management
  2. A collection of access control entries
  3. authentication scheme that requires at least two different factors as credentials
  4. value assigned to an account by windows
  5. access control model where resources are protected by system-defined rules
  6. A standard for federated identity management
  7. stateless style used by web applications
  8. access control technique that evaluates a set of attributes that each subject possesses
  9. file format that uses attribute-value pairs
  10. A password that is generated for use in one specific session
  11. provides identification, authentication, and authorization mechanisms for users

20 Clues: A collection of access control entriesvalue assigned to an account by windowsstateless style used by web applicationstoken issued to an authenticated accountStandards, best practices, and guidelinesIssues tickets and Kerberos authenticationfile format that uses attribute-value pairsA standard for federated identity management...

Disruptive Technology 2025-07-24

Disruptive Technology crossword puzzle
Across
  1. A modern approach to cybersecurity that moves away from traditional security
  2. A shared virtual world where users can interact with each other
  3. AI (Acronym)
  4. BI (Acronym)
  5. MFA (Acronym)
  6. DIS (Acronym)
Down
  1. To help protect claims made against users
  2. Cloud computing model
  3. XR (Acronym)
  4. Technologies that minimise environmental impact
  5. A cybersecurity technology that monitors, detects and responds to threats on endpoints
  6. A business-driven and disciplined approach
  7. XaaS (Acronym)
  8. The process of identifying risks and vulnerabilities
  9. A user's whole experience with one application across a variety of digital touchpoints
  10. A revolutionary approach to computing that influences the principles of quantum mechanics to solve complex problems
  11. EDR (Acronym)

17 Clues: XR (Acronym)AI (Acronym)BI (Acronym)EDR (Acronym)MFA (Acronym)DIS (Acronym)XaaS (Acronym)Cloud computing modelTo help protect claims made against usersA business-driven and disciplined approachTechnologies that minimise environmental impactThe process of identifying risks and vulnerabilities...

CEC 2023 #1 2023-06-09

CEC 2023 #1 crossword puzzle
Across
  1. Maxava
  2. Fresche
  3. XoruX
  4. Rocket Software
  5. Profound Logic
  6. Service Express
  7. Infor
  8. OmniScience
  9. Dynamic Solutions
  10. Fortra
  11. Arcad Software
  12. LANSA
  13. Infoview
  14. Falconstor
  15. TSP
Down
  1. Axians
  2. Connectria
  3. CNX
  4. M81
  5. IBM
  6. iVolution
  7. Metrixware
  8. Raz-Lee
  9. Taskforce
  10. Remain Software

25 Clues: CNXM81IBMTSPXoruXInforLANSAAxiansMaxavaFortraFrescheRaz-LeeInfoviewiVolutionTaskforceConnectriaMetrixwareFalconstorOmniScienceProfound LogicArcad SoftwareRocket SoftwareService ExpressRemain SoftwareDynamic Solutions

Internet safety 2025-02-26

Internet safety crossword puzzle
Across
  1. harass
  2. offensive
  3. platform
  4. copyright
  5. rules
Down
  1. illegal
  2. tactics
  3. stranger
  4. yelling
  5. Conversation
  6. Edited
  7. integrity
  8. money

13 Clues: moneyrulesharassEditedillegaltacticsyellingstrangerplatformintegrityoffensivecopyrightConversation

December 2020 Crossword Puzzle Answer Key 2020-12-01

December 2020 Crossword Puzzle Answer Key crossword puzzle
Across
  1. An unsecure network where you can connect to the internet such as from a café
  2. a popular tool for hosting video calls
  3. All commercial transactions conducted electronically on the internet
  4. The Cybersecurity project that pulled Forest Service out of a material weakness
  5. The top method of cyberattack that most attacks begin with usually via email
  6. Educating management on the potential threats of unsecure systems
  7. The 3 core tenants of cybersecurity include confidentiality, integrity, and…
Down
  1. Who can be a target of a cyberattack?
  2. A site that cybercriminals create to steal your information
  3. Any software, hardware, or systems that cybersecurity is not aware of
  4. The country where most of the fake and fraudulent ecommerce sites are coming from

11 Clues: Who can be a target of a cyberattack?a popular tool for hosting video callsA site that cybercriminals create to steal your informationEducating management on the potential threats of unsecure systemsAll commercial transactions conducted electronically on the internetAny software, hardware, or systems that cybersecurity is not aware of...

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. refers to the permission to use
  2. a type of malicious code that looks legitimate
  3. a way of preventing errors
  4. information about yourself such as name
  5. the protection of computer systems and networks
  6. type of malware that spreads copies of itself from computer to computer
  7. unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
Down
  1. malicious software designed to block access to a computer system
  2. be aware of people trying to steal your information
  3. a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.
  4. software that automatically displays or downloads advertising material

11 Clues: a way of preventing errorsrefers to the permission to useinformation about yourself such as namea type of malicious code that looks legitimatethe protection of computer systems and networksbe aware of people trying to steal your informationmalicious software designed to block access to a computer system...

Cybersecurity 2024-09-09

Cybersecurity crossword puzzle
Across
  1. A deliberate attempt by hackers or malicious entities to infiltrate systems, networks, or devices to steal, alter, or destroy data, disrupt operations, or cause damage.
  2. A weakness in a system that could be exploited.
  3. Breaches Confidential, sensitive, or protected information is accessed, disclosed, or stolen by unauthorized individuals.
Down
  1. A piece of software or technique used to take advantage of a vulnerability.
  2. A measure of the extent to which an entity is threatened by a potential circumstance or event.
  3. Theft Someone illegally obtains and uses another person’s personal information to impersonate them for financial gain or fraud.
  4. The part of malware that performs malicious actions once a system is compromised.
  5. Previously unknown vulnerabilities that can be exploited before a patch is available.
  6. A potential danger to a system or organization.
  7. Measures taken to protect against attacks and mitigate risks.
  8. An attempt to exploit a vulnerability to compromise a system.

11 Clues: A potential danger to a system or organization.A weakness in a system that could be exploited.Measures taken to protect against attacks and mitigate risks.An attempt to exploit a vulnerability to compromise a system.A piece of software or technique used to take advantage of a vulnerability....

Cybersecurity Crossword 2023-09-15

Cybersecurity Crossword crossword puzzle
Across
  1. Input device that imports digital images and video
  2. drive Located inside the tower or case and used to store programs and most data
  3. Used to get spoken input
  4. Input device used to import images and doucments into the computer
  5. Deletes text to the left of insertion point (the cursor)
  6. The case that the parts of the computer reside
  7. Drive Reads CD disks
  8. Bar Inserts space between words and sentences
  9. Lock Capitilizes all letters when locked down
  10. Computer A computer that has several parts attached to it, is heavy and not usually moved
Down
  1. The screen on your computer or laptop
  2. Produces printed copies of the computer output
  3. The rows of letters and numbers that you press to type
  4. Used to produce audio output (sound)
  5. A pointing device used to make on screen selections
  6. Makes captial letters and symbols at the top of the keys
  7. A small and portable computer
  8. Central Processing Unit, the computer brain
  9. Moves to the next line or is used to execute a command (make it work)

19 Clues: Drive Reads CD disksUsed to get spoken inputA small and portable computerUsed to produce audio output (sound)The screen on your computer or laptopCentral Processing Unit, the computer brainBar Inserts space between words and sentencesLock Capitilizes all letters when locked downProduces printed copies of the computer output...

Healthcare Cybersecurity 2024-04-22

Healthcare Cybersecurity crossword puzzle
Across
  1. What you wear — not where you should keep a password
  2. A common system used to manage patient records
  3. When a patient leaves — data must still be secured
  4. Where patient info is written and stored
  5. The ID you scan to enter secure hospital areas
  6. A place where data might still be written — handle with care
  7. A person who needs to protect patient charts from snooping
  8. A patient’s OK to share info — must be protected
  9. What patients wear with ID info — keep private!
  10. The first step in patient care — and in data entry!
  11. What nurses may carry — should never be left unattended
Down
  1. Electronic place where patient records live
  2. What goes on a sample — double check and protect
  3. What you do to open a secure door — don’t tailgate!
  4. A sample like blood or urine — never to be mislabeled or emailed unprotected
  5. Where you relax — but still don’t talk patient info!
  6. A hospital emergency that should never be shared online
  7. A device some doctors still use — don’t text PHI on it!
  8. Where you access records — lock it when you leave!
  9. A doctor’s daily visits — not a time to leave screens unlocked

20 Clues: Where patient info is written and storedElectronic place where patient records liveA common system used to manage patient recordsThe ID you scan to enter secure hospital areasWhat patients wear with ID info — keep private!What goes on a sample — double check and protectA patient’s OK to share info — must be protected...

Cybersecurity crossword 2025-06-07

Cybersecurity crossword crossword puzzle
Across
  1. Overwhelms servers with traffic
  2. Scrambling data for security
  3. Fraudulent attempt to steal data
  4. Stealthy malware with deep access
  5. Secures internet connections
  6. Popular cryptocurrency
  7. Malware that demands payment
  8. Malware disguised as legitimate
  9. Breaches systems illegally
Down
  1. Remote data storage
  2. Tracks keystrokes secretly
  3. Network of infected devices
  4. Uses fingerprints or face ID
  5. Artificial intelligence
  6. Software update fixing flaws
  7. Software that spies on users
  8. Harmful software like viruses
  9. Network security barrier
  10. Secret code for access

19 Clues: Remote data storageSecret code for accessPopular cryptocurrencyArtificial intelligenceNetwork security barrierTracks keystrokes secretlyBreaches systems illegallyNetwork of infected devicesUses fingerprints or face IDScrambling data for securitySoftware update fixing flawsSoftware that spies on usersSecures internet connections...

Cybersecurity 2021-03-01

Cybersecurity crossword puzzle
Across
  1. Click every traffic light in this image.
  2. Encrypt files to extort money.
  3. Fake email link bait.
  4. Proving your identity.
  5. Sneaky peek a password.
Down
  1. Brute force uses many attempts to guess it.
  2. Denial of Service attacks this.
  3. Blocks incoming and outgoing connections.
  4. Automated internet task software.
  5. Unauthorised access to computer systems.
  6. Horse with a hidden suprise.

11 Clues: Fake email link bait.Proving your identity.Sneaky peek a password.Horse with a hidden suprise.Encrypt files to extort money.Denial of Service attacks this.Automated internet task software.Click every traffic light in this image.Unauthorised access to computer systems.Blocks incoming and outgoing connections....

CyberSecurity 2024-03-09

CyberSecurity crossword puzzle
Across
  1. pairs a public key for encryption and a private key for decryption
  2. software intended to damage a computing system or to take partial control over its operation
  3. a malicious program that can copy itself and gain access to a computer in an unauthorized way
  4. encryption involves one key for both encryption and decryption
  5. a technique that attempts to trick a user into providing personal information
  6. infomration about an individual that identifies, links, relates or describes them
Down
  1. a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentification mechanism
  2. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  3. the process of decoding data
  4. the process of encoding data to prevent unauthorized access
  5. a wireless access point that give unauthorized access to to secure networks

11 Clues: the process of decoding datathe process of encoding data to prevent unauthorized accessencryption involves one key for both encryption and decryptionpairs a public key for encryption and a private key for decryptiona wireless access point that give unauthorized access to to secure networks...

Cybersecurity 2025-10-10

Cybersecurity crossword puzzle
Across
  1. Strukturierte Darstellung möglicher Angriffswege auf ein System.
  2. Simulierter Angriff zur Identifikation von Schwachstellen.
  3. Regelwerk zur Festlegung von Sicherheitszielen und Maßnahmen. (englisches Wort)
  4. Nachweis, dass ein Benutzer oder System tatsächlich derjenige ist, der er vorgibt zu sein.
  5. Physisches oder digitales Authentifizierung. (englisches Wort)
Down
  1. Maßnahme zur Schließung bekannter Schwachstellen in Software.
  2. Verwaltung und Kontrolle sicherheitsrelevanter Software- oder Hardwarebestandteile.
  3. Sicherheitsmodell: Kein Standardvertrauen in Geräte oder Nutzer. (englisches Wort)
  4. Strukturierter Aufbau von IT-Systemen mit Fokus auf Sicherheitsmaßnahmen.
  5. Schutz von Daten vor unbefugtem Zugriff.
  6. Systematische Bewertung potenzieller Bedrohungen und Schwachstellen.

11 Clues: Schutz von Daten vor unbefugtem Zugriff.Simulierter Angriff zur Identifikation von Schwachstellen.Maßnahme zur Schließung bekannter Schwachstellen in Software.Physisches oder digitales Authentifizierung. (englisches Wort)Strukturierte Darstellung möglicher Angriffswege auf ein System....

Cybersecurity 2023-04-28

Cybersecurity crossword puzzle
Across
  1. facts about something
  2. steals other peoples information
  3. malware
  4. obtaining private info
  5. making a purchase
  6. error an action which isn't intended
Down
  1. authorisation
  2. facts and statistics
  3. a network security device
  4. something only you can see
  5. standalone malware

11 Clues: malwareauthorisationmaking a purchasestandalone malwarefacts and statisticsfacts about somethingobtaining private infoa network security devicesomething only you can seesteals other peoples informationerror an action which isn't intended

Cybersecurity 2025-05-22

Cybersecurity crossword puzzle
Across
  1. Strukturierte Darstellung möglicher Angriffswege auf ein System.
  2. Simulierter Angriff zur Identifikation von Schwachstellen.
  3. Regelwerk zur Festlegung von Sicherheitszielen und Maßnahmen. (englisches Wort)
  4. Nachweis, dass ein Benutzer oder System tatsächlich derjenige ist, der er vorgibt zu sein.
  5. Physisches oder digitales Authentifizierung. (englisches Wort)
Down
  1. Maßnahme zur Schließung bekannter Schwachstellen in Software.
  2. Verwaltung und Kontrolle sicherheitsrelevanter Software- oder Hardwarebestandteile.
  3. Sicherheitsmodell: Kein Standardvertrauen in Geräte oder Nutzer. (englisches Wort)
  4. Strukturierter Aufbau von IT-Systemen mit Fokus auf Sicherheitsmaßnahmen.
  5. Schutz von Daten vor unbefugtem Zugriff.
  6. Systematische Bewertung potenzieller Bedrohungen und Schwachstellen.

11 Clues: Schutz von Daten vor unbefugtem Zugriff.Simulierter Angriff zur Identifikation von Schwachstellen.Maßnahme zur Schließung bekannter Schwachstellen in Software.Physisches oder digitales Authentifizierung. (englisches Wort)Strukturierte Darstellung möglicher Angriffswege auf ein System....

Cybersecurity 2025-09-10

Cybersecurity crossword puzzle
Across
  1. What Greenwald says his work is mainly focused on: the condition of keeping one's actions, information, and choices safe from outside scrutiny.
  2. An expressive action people do freely when they believe they are alone and unobserved.
  3. The deep discomfort and embarrassment shown on someone's face when they are caught in a private act.
  4. The role the internet was once praised for: allowing people new freedoms and opportunities.
  5. A state of being alone, unobserved, where actions are performed without others watching.
  6. The way in which someone acts or conducts oneself, especially towards others.
Down
  1. A process or state where the internet enabled broader participation and equality, now contrasted with its new surveillance role.
  2. A global network that was once seen as a tool of openness and freedom but is now described as a zone of surveillance.
  3. Describes surveillance that is not targeted but affects everyone, as Greenwald says the internet has become.
  4. The powerful emotion, described by Glenn Greenwald, that someone feels when caught doing something privately and unexpectedly seen by others.
  5. To secretly watch or observe someone without their knowing, as in the person unexpectedly seeing another in the passage's anecdote.

11 Clues: The way in which someone acts or conducts oneself, especially towards others.An expressive action people do freely when they believe they are alone and unobserved.A state of being alone, unobserved, where actions are performed without others watching.The role the internet was once praised for: allowing people new freedoms and opportunities....

Cybersecurity - JMcBride 2025-08-28

Cybersecurity - JMcBride crossword puzzle
Across
  1. general term for malicious software
  2. person who breaks into computer systems
  3. malware that locks files and demands payment
  4. software that hides malware from detection
  5. network security system that monitors and controls traffic
  6. secret string used for user authentication
  7. vulnerability unknown to the software maker
  8. authentication method using two forms of verification
  9. secure tunnel for internet traffic (abbreviation)
  10. code that takes advantage of a software vulnerability
  11. deceptive attempt to steal sensitive information via email or messages
Down
  1. process of converting data into a secure code
  2. barrier that blocks unauthorized network access
  3. software that detects and removes malicious programs
  4. tool that records everything typed on a keyboard
  5. hidden way to bypass normal authentication
  6. software that secretly gathers user data
  7. malware disguised as legitimate software
  8. network of infected devices under hacker control
  9. software update that fixes security vulnerabilities

20 Clues: general term for malicious softwareperson who breaks into computer systemssoftware that secretly gathers user datamalware disguised as legitimate softwaresoftware that hides malware from detectionhidden way to bypass normal authenticationsecret string used for user authenticationvulnerability unknown to the software maker...

Cybersecurity 2023-10-31

Cybersecurity crossword puzzle
Across
  1. when you personal data is available (another word for available)
  2. a hacker that is doing good
  3. a hacker that works without permission
  4. when your personal data is kept secret, another word for secret
Down
  1. Multi-Factor________ something you have, know, and are
  2. a kind of human engineering with no coding
  3. the art of protecting devices and data from unauthorized access
  4. malicious coding that can be a virus, worm, trojan etc
  5. Internet of __________ (network of connected devices)
  6. an unusual way to solve a problem
  7. a hacker that is malicious

11 Clues: a hacker that is maliciousa hacker that is doing goodan unusual way to solve a problema hacker that works without permissiona kind of human engineering with no codingInternet of __________ (network of connected devices)Multi-Factor________ something you have, know, and aremalicious coding that can be a virus, worm, trojan etc...

Cybersecurity 2025-11-03

Cybersecurity crossword puzzle
Across
  1. A security system that blocks unwanted network traffic.
  2. A trick that sends users to fake websites to steal personal data.
  3. A program that finds and removes viruses or malware.
  4. A person who breaks into computer systems.
  5. Malware that lets a hacker control your computer remotely.
Down
  1. The time when a user is actively connected to a system or website.
  2. Bad software that can harm a computer or steal information.
  3. Tool that hides your IP address and secures your internet connection.
  4. Tools used by hackers to create fake websites and steal login details.
  5. A small software update that fixes bugs or security issues.
  6. Someone or something that secretly collects information.

11 Clues: A person who breaks into computer systems.A program that finds and removes viruses or malware.A security system that blocks unwanted network traffic.Someone or something that secretly collects information.Malware that lets a hacker control your computer remotely.Bad software that can harm a computer or steal information....

cybersecurity crossword 2022-12-02

cybersecurity crossword crossword puzzle
Across
  1. software that that enters a computer system without the users knowledge or consent and makes the comuter go bad
  2. software that prevents you from getting unwanted viruses on your device
  3. software that runs as a program on the local computer
  4. an attacker who controls a botnet
  5. a logical computer network of zombies under the control of an attacker
  6. software made to stop the spread of malware
  7. a malicious program designed to enter a computer via a network to take advantage of a vulnerability in a application or an operating system
  8. a new software made that was better the old one and fixes things that were bad or old in the old software
  9. software that prevents you from getting infected from differents spyware
  10. a set of software tools used by an attacker to hide the actions or presence of other types of malware
  11. software code that gives access to a program or service
Down
  1. a software program that gives advertising content that is unwanted by the user
  2. a microsoft windows function that provides info to users and obtains their approval before a program can make a change to the computers settings
  3. a undate that makes the software better or more efficient
  4. an infected computer that is under the remote control of an attacker
  5. getting information from a device without the owner knowing
  6. a backup of your data saved on a hard
  7. software that keeps data on where you hit the keyboard
  8. data that is compromised and wont be given back unless a fee is paid

19 Clues: an attacker who controls a botneta backup of your data saved on a hardsoftware made to stop the spread of malwaresoftware that runs as a program on the local computersoftware that keeps data on where you hit the keyboardsoftware code that gives access to a program or servicea undate that makes the software better or more efficient...

Cybersecurity Awareness 2022-10-21

Cybersecurity Awareness crossword puzzle
Across
  1. ___ is a type of software designed to help the user's computer detect viruses and avoid them.
  2. ___ is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  3. The terms "bug" and "debugging" are popularly attributed to ___.
  4. Malicious actors can also use ____ to capture your personal and financial information such as credit card number, CVV, PIN, password and other sensitive information.
  5. Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.
  6. ___ is when attackers send malicious emails designed to trick people into falling for a scam.
  7. ___is a type of software designed to gain unauthorized access or to cause damage to a computer.
Down
  1. ___ National nodal agency for all measures to protect nation's critical information infrastructure.
  2. ___ Advertising software can be used to spread malware.
  3. ___ is actually considered the first computer virus?
  4. ___ is an authorization protocol being a standard designed to allow a website or application to access resources hosted by other web apps on behalf of a user.
  5. ___ is a program that secretly records what a user does so that cybercriminals can make use of this information.
  6. ___ is a cryptographic protocol for encrypting data to be transferred over a network which uses protocol to sets up implicit connection.
  7. ___ is a type of malware that is disguised as legitimate software.
  8. ___ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  9. ___ locks and encrypts the victim's data, important files and then demands a payment to unlock and decrypt the data.
  10. In-order to ensure the security of the data/information, we need to ___ the data.
  11. ___ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
  12. ___ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
  13. Which Wi-Fi communication protocol is more Secure?

20 Clues: Which Wi-Fi communication protocol is more Secure?___ is actually considered the first computer virus?___ Advertising software can be used to spread malware.The terms "bug" and "debugging" are popularly attributed to ___.___ is a type of malware that is disguised as legitimate software....

December 2020 Crossword Puzzle 2020-12-01

December 2020 Crossword Puzzle crossword puzzle
Across
  1. An unsecure network where you can connect to the internet such as from a café
  2. a popular tool for hosting video calls
  3. All commercial transactions conducted electronically on the internet
  4. The Cybersecurity project that pulled Forest Service out of a material weakness
  5. The top method of cyberattack that most attacks begin with usually via email
  6. Educating management on the potential threats of unsecure systems
  7. The 3 core tenants of cybersecurity include confidentiality, integrity, and…
Down
  1. Who can be a target of a cyberattack?
  2. A site that cybercriminals create to steal your information
  3. Any software, hardware, or systems that cybersecurity is not aware of
  4. The country where most of the fake and fraudulent ecommerce sites are coming from

11 Clues: Who can be a target of a cyberattack?a popular tool for hosting video callsA site that cybercriminals create to steal your informationEducating management on the potential threats of unsecure systemsAll commercial transactions conducted electronically on the internetAny software, hardware, or systems that cybersecurity is not aware of...

Spanish 25 words 2021-04-30

Spanish 25 words crossword puzzle
Across
  1. Settings
  2. Cyber
  3. Commit
  4. Else
  5. Machine learning
  6. Integer
  7. If
  8. Function
  9. If else
  10. For loop
  11. Variable
  12. Print
  13. Loop
Down
  1. Sprite
  2. cybersecurity
  3. Autonomous
  4. nueral networks
  5. Uptime
  6. Tap
  7. Binary numbers
  8. Float
  9. Python
  10. While loop
  11. List
  12. Array

25 Clues: IfTapElseListLoopCyberFloatArrayPrintSpriteCommitUptimePythonIntegerIf elseSettingsFunctionFor loopVariableAutonomousWhile loopcybersecurityBinary numbersnueral networksMachine learning

CSAM 2020 2020-09-03

CSAM 2020 crossword puzzle
Across
  1. Someone with elevated access
  2. Authentication that requires more than just a passcode; usually in the form of a token or generated access code
  3. Software with malicious characteristics; often used to compromise a system
  4. A type of phishing that is more personalized to the end user
  5. Last name of TIAA's CISO
  6. An attempt at getting gaining vital information from an individual utilizing a variety of social engineering tactics; notoriously in emails
  7. The protection of internet connected systems and devices
  8. Label often assigned to devices that are on a network; can be static or dynamic
  9. An algorithmic method which hides characteristics of communication by converting it into various codes
  10. TIAA's one stop shop for computer and technical issues
Down
  1. Ethical hacking; hacking for the greater good
  2. A tactic often used by cyber criminals to lure in susceptible individuals in the form of urgency or consequence
  3. In December 2017, one of the most popular credit bureaus in the world that was exposed to a data breach that resulted in over 147 million Americans' information
  4. Unique hardware identifier; physical layer in the OSI model
  5. TIAA's cybersecurity mascot
  6. _ Routing: type of protocol that allows people to communicate anonymously; also a vegetable
  7. Malicious software which often requires payment in the form of cryptocurrency in order to decrypt data/files
  8. A concept where all devices are connected to the internet, such as household items
  9. What does VPN stand for
  10. A month dedicated to all things cybersecurity (acronym)

20 Clues: What does VPN stand forLast name of TIAA's CISOTIAA's cybersecurity mascotSomeone with elevated accessEthical hacking; hacking for the greater goodTIAA's one stop shop for computer and technical issuesA month dedicated to all things cybersecurity (acronym)The protection of internet connected systems and devices...

ACTIVITY 1: Crossword Puzzle 2A 2024-04-30

ACTIVITY 1: Crossword Puzzle 2A crossword puzzle
Across
  1. Relating to digital technology.
  2. Bullying online.
  3. Protection from harm.
  4. Protecting digital systems.
  5. Control over personal information.
  6. Malicious software.
  7. Connected to the internet.
  8. Fraudulent information request.
  9. Having knowledge and using technology safely and effective
  10. Malicious self-replicating code.
  11. Software to access websites.
  12. Unique characteristics of an individual.
  13. Interconnected computers.
  14. Intentional attack on systems.
  15. Global computer network.
  16. Secret access code.
  17. Traces of online activity.
  18. Unsolicited messages.
  19. Criminal activities online.
  20. Hardware with a function.
  21. Deceptive scheme.
  22. Information in digital form.
  23. Computer programs.
Down
  1. Relating to society.
  2. the ability to analyze and evaluate infomation.
  3. A cyber attack that redirects website traffic to a fraudulent site
  4. Organized and meaningful data.
  5. Unauthorized system access.
  6. Moral principles online.
  7. Traces of online activity.
  8. Verifying user identity.
  9. Making a copy of data to protect against loss or damage
  10. Practices for cybersecurity.
  11. Communication channels.
  12. Protecting systems from attacks.
  13. Converting data into code.
  14. Ability to use digital tools.
  15. Understanding cybersecurity threats.
  16. Laws governing cyberspace.
  17. Membership in a country.
  18. Unauthorized use of personal information.
  19. Network security system.
  20. A secret codr used to access a computer system or online account
  21. Data stored by websites.
  22. Knowledge or perception of a situation.
  23. Dual authentication.
  24. Software to detect and remove viruses.
  25. Device forwarding data.
  26. Physical computer components.
  27. Measures for protection.
  28. Unauthorized data access.

51 Clues: Bullying online.Deceptive scheme.Computer programs.Malicious software.Secret access code.Relating to society.Dual authentication.Protection from harm.Unsolicited messages.Communication channels.Device forwarding data.Moral principles online.Verifying user identity.Membership in a country.Network security system.Data stored by websites....

cybersecurity 2025-12-19

cybersecurity crossword puzzle
Across
  1. A fake email or message meant to trick you
  2. A program like chrome or safari used to view websites.
  3. Someone who tries to break into computer without permission
  4. The footprint or history you leave behind online
  5. A wireless way to connect your device to the internet
  6. A digital security guard that protects your network
Down
  1. The secret key you use to log into your accounts.
  2. the world wide web that connects us all
  3. Small files that websites use to track your visits.
  4. Harmful software (like a virus) that can damage your computer
  5. A websités specific address (it stars with www)

11 Clues: the world wide web that connects us allA fake email or message meant to trick youA websités specific address (it stars with www)The footprint or history you leave behind onlineThe secret key you use to log into your accounts.Small files that websites use to track your visits.A digital security guard that protects your network...