cybersecurity Crossword Puzzles
dasd 2021-04-30
25 Clues: If • Tap • Else • List • Loop • Cyber • Float • Array • Print • Sprite • Commit • Uptime • Python • Integer • If else • Settings • Function • For loop • Variable • Autonomous • While loop • cybersecurity • Binary numbers • nueral networks • Machine learning
Cybersecurity 2021-02-12
Across
- refers to the permission to use
- a type of malicious code that looks legitimate
- a way of preventing errors
- information about yourself such as name
- the protection of computer systems and networks
- type of malware that spreads copies of itself from computer to computer
- unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
Down
- malicious software designed to block access to a computer system
- be aware of people trying to steal your information
- a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.
- software that automatically displays or downloads advertising material
11 Clues: a way of preventing errors • refers to the permission to use • information about yourself such as name • a type of malicious code that looks legitimate • the protection of computer systems and networks • be aware of people trying to steal your information • malicious software designed to block access to a computer system • ...
Cybersecurity 2024-09-09
Across
- A deliberate attempt by hackers or malicious entities to infiltrate systems, networks, or devices to steal, alter, or destroy data, disrupt operations, or cause damage.
- A weakness in a system that could be exploited.
- Breaches Confidential, sensitive, or protected information is accessed, disclosed, or stolen by unauthorized individuals.
Down
- A piece of software or technique used to take advantage of a vulnerability.
- A measure of the extent to which an entity is threatened by a potential circumstance or event.
- Theft Someone illegally obtains and uses another person’s personal information to impersonate them for financial gain or fraud.
- The part of malware that performs malicious actions once a system is compromised.
- Previously unknown vulnerabilities that can be exploited before a patch is available.
- A potential danger to a system or organization.
- Measures taken to protect against attacks and mitigate risks.
- An attempt to exploit a vulnerability to compromise a system.
11 Clues: A potential danger to a system or organization. • A weakness in a system that could be exploited. • Measures taken to protect against attacks and mitigate risks. • An attempt to exploit a vulnerability to compromise a system. • A piece of software or technique used to take advantage of a vulnerability. • ...
Cybersecurity Crossword 2023-05-10
la tecnología #2 2022-04-01
Cybersecurity 2023-10-31
Across
- when you personal data is available (another word for available)
- a hacker that is doing good
- a hacker that works without permission
- when your personal data is kept secret, another word for secret
Down
- Multi-Factor________ something you have, know, and are
- a kind of human engineering with no coding
- the art of protecting devices and data from unauthorized access
- malicious coding that can be a virus, worm, trojan etc
- Internet of __________ (network of connected devices)
- an unusual way to solve a problem
- a hacker that is malicious
11 Clues: a hacker that is malicious • a hacker that is doing good • an unusual way to solve a problem • a hacker that works without permission • a kind of human engineering with no coding • Internet of __________ (network of connected devices) • Multi-Factor________ something you have, know, and are • malicious coding that can be a virus, worm, trojan etc • ...
Cybersecurity Crossword 2023-09-15
Across
- Input device that imports digital images and video
- drive Located inside the tower or case and used to store programs and most data
- Used to get spoken input
- Input device used to import images and doucments into the computer
- Deletes text to the left of insertion point (the cursor)
- The case that the parts of the computer reside
- Drive Reads CD disks
- Bar Inserts space between words and sentences
- Lock Capitilizes all letters when locked down
- Computer A computer that has several parts attached to it, is heavy and not usually moved
Down
- The screen on your computer or laptop
- Produces printed copies of the computer output
- The rows of letters and numbers that you press to type
- Used to produce audio output (sound)
- A pointing device used to make on screen selections
- Makes captial letters and symbols at the top of the keys
- A small and portable computer
- Central Processing Unit, the computer brain
- Moves to the next line or is used to execute a command (make it work)
19 Clues: Drive Reads CD disks • Used to get spoken input • A small and portable computer • Used to produce audio output (sound) • The screen on your computer or laptop • Central Processing Unit, the computer brain • Bar Inserts space between words and sentences • Lock Capitilizes all letters when locked down • Produces printed copies of the computer output • ...
Loopbane in die moderne wêreld 2024-11-14
16 Clues: Surgeon • Director • Attorney • Marketing • Accountant • Data Engineer • Digital Designer • Financial Manager • Financial Analyst • Operations Manager • Computer Programmer • Mechanical Engineer • Cybersecurity Expert • Information Security • Human Resources Manager • Chief Executive Officer
cybersecurity crossword 2022-12-02
Across
- software that that enters a computer system without the users knowledge or consent and makes the comuter go bad
- software that prevents you from getting unwanted viruses on your device
- software that runs as a program on the local computer
- an attacker who controls a botnet
- a logical computer network of zombies under the control of an attacker
- software made to stop the spread of malware
- a malicious program designed to enter a computer via a network to take advantage of a vulnerability in a application or an operating system
- a new software made that was better the old one and fixes things that were bad or old in the old software
- software that prevents you from getting infected from differents spyware
- a set of software tools used by an attacker to hide the actions or presence of other types of malware
- software code that gives access to a program or service
Down
- a software program that gives advertising content that is unwanted by the user
- a microsoft windows function that provides info to users and obtains their approval before a program can make a change to the computers settings
- a undate that makes the software better or more efficient
- an infected computer that is under the remote control of an attacker
- getting information from a device without the owner knowing
- a backup of your data saved on a hard
- software that keeps data on where you hit the keyboard
- data that is compromised and wont be given back unless a fee is paid
19 Clues: an attacker who controls a botnet • a backup of your data saved on a hard • software made to stop the spread of malware • software that runs as a program on the local computer • software that keeps data on where you hit the keyboard • software code that gives access to a program or service • a undate that makes the software better or more efficient • ...
Cybersecurity Awareness 2022-10-21
Across
- ___ is a type of software designed to help the user's computer detect viruses and avoid them.
- ___ is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- The terms "bug" and "debugging" are popularly attributed to ___.
- Malicious actors can also use ____ to capture your personal and financial information such as credit card number, CVV, PIN, password and other sensitive information.
- Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.
- ___ is when attackers send malicious emails designed to trick people into falling for a scam.
- ___is a type of software designed to gain unauthorized access or to cause damage to a computer.
Down
- ___ National nodal agency for all measures to protect nation's critical information infrastructure.
- ___ Advertising software can be used to spread malware.
- ___ is actually considered the first computer virus?
- ___ is an authorization protocol being a standard designed to allow a website or application to access resources hosted by other web apps on behalf of a user.
- ___ is a program that secretly records what a user does so that cybercriminals can make use of this information.
- ___ is a cryptographic protocol for encrypting data to be transferred over a network which uses protocol to sets up implicit connection.
- ___ is a type of malware that is disguised as legitimate software.
- ___ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- ___ locks and encrypts the victim's data, important files and then demands a payment to unlock and decrypt the data.
- In-order to ensure the security of the data/information, we need to ___ the data.
- ___ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
- ___ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
- Which Wi-Fi communication protocol is more Secure?
20 Clues: Which Wi-Fi communication protocol is more Secure? • ___ is actually considered the first computer virus? • ___ Advertising software can be used to spread malware. • The terms "bug" and "debugging" are popularly attributed to ___. • ___ is a type of malware that is disguised as legitimate software. • ...
Cybersecurity 2023-04-28
11 Clues: malware • authorisation • making a purchase • standalone malware • facts and statistics • facts about something • obtaining private info • a network security device • something only you can see • steals other peoples information • error an action which isn't intended
CSAM 2020 2020-09-03
Across
- Someone with elevated access
- Authentication that requires more than just a passcode; usually in the form of a token or generated access code
- Software with malicious characteristics; often used to compromise a system
- A type of phishing that is more personalized to the end user
- Last name of TIAA's CISO
- An attempt at getting gaining vital information from an individual utilizing a variety of social engineering tactics; notoriously in emails
- The protection of internet connected systems and devices
- Label often assigned to devices that are on a network; can be static or dynamic
- An algorithmic method which hides characteristics of communication by converting it into various codes
- TIAA's one stop shop for computer and technical issues
Down
- Ethical hacking; hacking for the greater good
- A tactic often used by cyber criminals to lure in susceptible individuals in the form of urgency or consequence
- In December 2017, one of the most popular credit bureaus in the world that was exposed to a data breach that resulted in over 147 million Americans' information
- Unique hardware identifier; physical layer in the OSI model
- TIAA's cybersecurity mascot
- _ Routing: type of protocol that allows people to communicate anonymously; also a vegetable
- Malicious software which often requires payment in the form of cryptocurrency in order to decrypt data/files
- A concept where all devices are connected to the internet, such as household items
- What does VPN stand for
- A month dedicated to all things cybersecurity (acronym)
20 Clues: What does VPN stand for • Last name of TIAA's CISO • TIAA's cybersecurity mascot • Someone with elevated access • Ethical hacking; hacking for the greater good • TIAA's one stop shop for computer and technical issues • A month dedicated to all things cybersecurity (acronym) • The protection of internet connected systems and devices • ...
ACTIVITY 1: Crossword Puzzle 2A 2024-04-30
Across
- Relating to digital technology.
- Bullying online.
- Protection from harm.
- Protecting digital systems.
- Control over personal information.
- Malicious software.
- Connected to the internet.
- Fraudulent information request.
- Having knowledge and using technology safely and effective
- Malicious self-replicating code.
- Software to access websites.
- Unique characteristics of an individual.
- Interconnected computers.
- Intentional attack on systems.
- Global computer network.
- Secret access code.
- Traces of online activity.
- Unsolicited messages.
- Criminal activities online.
- Hardware with a function.
- Deceptive scheme.
- Information in digital form.
- Computer programs.
Down
- Relating to society.
- the ability to analyze and evaluate infomation.
- A cyber attack that redirects website traffic to a fraudulent site
- Organized and meaningful data.
- Unauthorized system access.
- Moral principles online.
- Traces of online activity.
- Verifying user identity.
- Making a copy of data to protect against loss or damage
- Practices for cybersecurity.
- Communication channels.
- Protecting systems from attacks.
- Converting data into code.
- Ability to use digital tools.
- Understanding cybersecurity threats.
- Laws governing cyberspace.
- Membership in a country.
- Unauthorized use of personal information.
- Network security system.
- A secret codr used to access a computer system or online account
- Data stored by websites.
- Knowledge or perception of a situation.
- Dual authentication.
- Software to detect and remove viruses.
- Device forwarding data.
- Physical computer components.
- Measures for protection.
- Unauthorized data access.
51 Clues: Bullying online. • Deceptive scheme. • Computer programs. • Malicious software. • Secret access code. • Relating to society. • Dual authentication. • Protection from harm. • Unsolicited messages. • Communication channels. • Device forwarding data. • Moral principles online. • Verifying user identity. • Membership in a country. • Network security system. • Data stored by websites. • ...
025-1 2024-07-12
Across
- Process of restoring systems or data after an incident
- Unauthorized access to sensitive information
- Related to laws or regulations governing cybersecurity incidents
- Systematic examination to uncover facts about an incident
- Unauthorized transfer of data from a computer or network
- Malicious software demanding payment for data release
- Method used to secure data from unauthorized access
- Scientific analysis used to investigate and solve crimes
- Interruption to normal operations
Down
- Rules and guidelines governing cybersecurity practices
- Weakness in software or hardware that could be exploited
- State of exposing assets to danger or risk
- Process of discovering unauthorized access or activity
- Event that causes disruption or harm
- Identity concealed or not identified
- Digital currency used in ransom demands
- Measures taken to protect against unauthorized access
- Taking advantage of vulnerabilities in software or hardware
- A malicious assault on computer systems
- Effect or influence of the cyberattack
20 Clues: Interruption to normal operations • Event that causes disruption or harm • Identity concealed or not identified • Effect or influence of the cyberattack • Digital currency used in ransom demands • A malicious assault on computer systems • State of exposing assets to danger or risk • Unauthorized access to sensitive information • ...
Cybersecurity 2021-03-01
Across
- Click every traffic light in this image.
- Encrypt files to extort money.
- Fake email link bait.
- Proving your identity.
- Sneaky peek a password.
Down
- Brute force uses many attempts to guess it.
- Denial of Service attacks this.
- Blocks incoming and outgoing connections.
- Automated internet task software.
- Unauthorised access to computer systems.
- Horse with a hidden suprise.
11 Clues: Fake email link bait. • Proving your identity. • Sneaky peek a password. • Horse with a hidden suprise. • Encrypt files to extort money. • Denial of Service attacks this. • Automated internet task software. • Click every traffic light in this image. • Unauthorised access to computer systems. • Blocks incoming and outgoing connections. • ...
CyberSecurity 2024-03-09
Across
- pairs a public key for encryption and a private key for decryption
- software intended to damage a computing system or to take partial control over its operation
- a malicious program that can copy itself and gain access to a computer in an unauthorized way
- encryption involves one key for both encryption and decryption
- a technique that attempts to trick a user into providing personal information
- infomration about an individual that identifies, links, relates or describes them
Down
- a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentification mechanism
- the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- the process of decoding data
- the process of encoding data to prevent unauthorized access
- a wireless access point that give unauthorized access to to secure networks
11 Clues: the process of decoding data • the process of encoding data to prevent unauthorized access • encryption involves one key for both encryption and decryption • pairs a public key for encryption and a private key for decryption • a wireless access point that give unauthorized access to to secure networks • ...
Cybersecurity Crossword 2023-01-26
Across
- altered video to spread disinformation
- unique string that identifies device
- helps protect system
- malware that transmits private data
- helps prevent unauthorized network access
- flood website/server until crash
- codes that protect data
- cybersecurity professionals
- designs data communications network
Down
- unauthorized access to sensitive info
- software designed to disrupt system
- plans and implements security
- remote encrypted network access
- helps prevent unauthorized access
- criminal hackers
- requests payment to unlock
- malware hidden inside legitimate file
- mimics legitimate websites/emails
- network of computers used for cyber attacks
19 Clues: criminal hackers • helps protect system • codes that protect data • requests payment to unlock • cybersecurity professionals • plans and implements security • remote encrypted network access • flood website/server until crash • helps prevent unauthorized access • mimics legitimate websites/emails • software designed to disrupt system • malware that transmits private data • ...
Cybersecurity Compliance 2024-05-24
Across
- Scammers use ______ tactics to try to get a fast response.
- If you suspect a link or attachment may be suspicious, _______ download it.
- A good password is __________ for you, but difficult for others to guess.
- If you believe you've clicked a bad link, notify _____ immediately.
- Malware is most likely to enter an organization through __________.
- Never ____________ old passwords.
- Malicious links disguised as legitimate messages.
- Be wary of ______________ attachments.
Down
- Each should be unique and complicated.
- Our e-mail security system is called __________.
- Scams can come through e-mail,_______, phone call, or even in person.
- No platform is ________ to breaches.
- Using a work device for _________ use increases the risk of a cyber threat.
- Two-factor __________ protects your account by requiring a second identity verification.
- Don't use obvious __________ changes like substituting a number for a letter.
- Passwords should never be __________ with anyone.
- If you feel you have fallen prey to a scammer, notify CHN or ___________.
- 65% of people _________ passwords.
- 80% of breaches are related to stolen or ________ passwords.
19 Clues: Never ____________ old passwords. • 65% of people _________ passwords. • No platform is ________ to breaches. • Each should be unique and complicated. • Be wary of ______________ attachments. • Our e-mail security system is called __________. • Passwords should never be __________ with anyone. • Malicious links disguised as legitimate messages. • ...
CSAM 2020 2020-09-03
Across
- A month dedicated to all things cybersecurity (acronym)
- TIAA's cybersecurity mascot
- Label often assigned to devices that are on a network; can be static or dynamic
- The protection of internet connected systems and devices
- A tactic often used by cyber criminals to lure in susceptible individuals in the form of urgency or consequence
- TIAA's one stop shop for computer and technical issues
- Malicious software which often requires payment in the form of cryptocurrency in order to decrypt data/files
- Ethical hacking; hacking for the greater good
- A type of phishing that is more personalized to the end user
- A concept where all devices are connected to the internet, such as household items
- Authentication that requires more than just a passcode; usually in the form of a token or generated access code
Down
- Unique hardware identifier; physical layer in the OSI model
- _ Routing: type of protocol that allows people to communicate anonymously; also a vegetable
- An attempt at getting gaining vital information from an individual utilizing a variety of social engineering tactics; notoriously in emails
- What does VPN stand for
- Someone with elevated access
- Last name of TIAA's CISO
- Software with malicious characteristics; often used to compromise a system
- In December 2017, one of the most popular credit bureaus in the world that was exposed to a data breach that resulted in over 147 million Americans' information
- An algorithmic method which hides characteristics of communication by converting it into various codes
20 Clues: What does VPN stand for • Last name of TIAA's CISO • TIAA's cybersecurity mascot • Someone with elevated access • Ethical hacking; hacking for the greater good • TIAA's one stop shop for computer and technical issues • A month dedicated to all things cybersecurity (acronym) • The protection of internet connected systems and devices • ...
CyF Chapter 1 2023-10-08
Across
- What is the acronym for the intermediate level certification offered by EC-Council that the cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.
- Attacks that originate from within an organization are known as ___________ security threats.
- Which type of cyber attack can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
- Script _____ are teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill.
- DDoS in cyber security means "Distributed ______-of-Service.
- The acronym of this technology which enable people to connect billions of devices to the Internet.
- Criminals can also use rogue devices, such as _____ Wi-Fi access points.
- Information _______ Management Standards provide a framework for implementing cybersecurity measures within an organization.
- Cybersecurity ______ possess the insight to recognize the influence of data and harness that power to build great organizations, provide services and protect people from cyberattacks.
Down
- Criminals use this tool to capture data streams over a network.
- Federated identity management refers to ______ enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
- What is another word used to describe the speed of data.
- A group of grey hat hackers who rally and protest against different political and social ideas.
- At which level are the employees responsible to protect the organization’s reputation, data, and customers.
- Cyber ______ is a weakness that makes a target susceptible to an attack
- The acronym of the practice where people used their own devices to access enterprise information.
- This group of criminals breaks into computers or networks to gain access for various reasons.
- A cybersecurity ______ is the possibility that a harmful event, such as an attack, will occur.
- State _____ Hackers are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- _____ hat attackers are unethical criminals who violate computer and network security for personal gain.
20 Clues: What is another word used to describe the speed of data. • DDoS in cyber security means "Distributed ______-of-Service. • Criminals use this tool to capture data streams over a network. • Cyber ______ is a weakness that makes a target susceptible to an attack • Criminals can also use rogue devices, such as _____ Wi-Fi access points. • ...
Hack Your Brain 2024-09-18
Across
- A specific type of phishing that targets high-profile individuals, such as executives.
- A technology used to create a secure, encrypted tunnel between two networks.
- A malicious attempt to disrupt a network by overwhelming it with traffic.
- A simulation-based cybersecurity exercise to assess an organization's defensive capabilities.
- A technique where attackers attempt to guess passwords by trying all possible combinations.
- The unauthorized exploitation of a network to access confidential data or systems.
Down
- An individual who uses hacking skills for ethical purposes.
- An offensive security activity where ethical hackers simulate real-world attacks to test defenses (Two words, hyphenated).
- A cybersecurity practice where teams work against each other, with attackers and defenders.
- ... Shields - The world's largest multinational cybersecurity exercise, organized annually by NATO.
- A widely used asymmetric encryption algorithm named after its inventors.
- ... Management - The process of identifying and analyzing issues that could have an unwanted effect on company assets.
12 Clues: An individual who uses hacking skills for ethical purposes. • A widely used asymmetric encryption algorithm named after its inventors. • A malicious attempt to disrupt a network by overwhelming it with traffic. • A technology used to create a secure, encrypted tunnel between two networks. • ...
Introduction to Cybersecurity 2024-02-22
Across
- is the act of skirting or breaking through security boundaries.
- a type of hacker that is generally ethical and law-abiding.
- focuses on keeping applications or programs secure throughout their lifecycle.
- certification validates the holders have met the baseline of understanding required by all cybersecurity job positions.
Down
- is based on the key concepts of information assurance.
- an attack in which the attacker is connectedto a network and monitors an authenticated session.
- a set of policies and procedures meant to improve and guide anorganization’s cybersecurity practices.
- Is the protection of digital devices and their connected networks from danger and threats.
- a process in which organizations determine the information about themselves which should be kept private versus what can be shared with the public.
- prevents and protects unauthorized intrusions into the network.
- which is a set of security controls designed to protect payment account security.
- includes threats such as viruses, worms, Trojan horses.
12 Clues: is based on the key concepts of information assurance. • includes threats such as viruses, worms, Trojan horses. • a type of hacker that is generally ethical and law-abiding. • is the act of skirting or breaking through security boundaries. • prevents and protects unauthorized intrusions into the network. • ...
Hack Your Brain 2024-09-18
Across
- A small device or software used to create a secure encrypted tunnel between two networks
- The unauthorized exploitation of a network to access confidential data or systems
- A simulation-based cybersecurity exercise to assess an organization's defensive capabilities (Two words)
- The process of identifying and analyzing security risks
- A specific type of phishing that targets high-profile individuals, such as executives
- A malicious attempt to disrupt a network by overwhelming it with traffic
- An individual who uses hacking skills for ethical purposes
Down
- An offensive security activity where ethical hackers simulate real-world attacks to test defenses (Two words, hyphenated)
- Teaming A cybersecurity practice where teams work against each other, with attackers and defenders (Two words)
- A technique where attackers attempt to guess passwords by trying all possible combinations
- Shields The world's largest multinational cybersecurity exercise, organized annually by NATO (Two words)
- A widely-used asymmetric encryption algorithm named after its inventors
12 Clues: The process of identifying and analyzing security risks • An individual who uses hacking skills for ethical purposes • A widely-used asymmetric encryption algorithm named after its inventors • A malicious attempt to disrupt a network by overwhelming it with traffic • The unauthorized exploitation of a network to access confidential data or systems • ...
AI TECHNOLOGY AND SOCIETY 2024-03-06
Cybersecurity Awareness 2023-10-03
Across
- A process by which a system verifies the identity of a user who wishes to access it.
- Small piece of data stored on a user's computer by the web browser while browsing a website.
- A set of static analysis tools for investigating and comparing phishing kit content within single or multiple kits.
- Manipulating individuals into divulging confidential information through psychological tactics.
- A type of malicious software that blocks access to a user's data until a sum of money is paid.
- A secure bridge between your device and the internet, often used to keep browsing activity private.
- AI-generated fake content, often video, that looks convincingly real.
- A collection of software and tools to make phishing campaigns easier for attackers.
- Software designed to harm or exploit any device, network, service, or program.
Down
- Targeted phishing attempts directed at specific individuals or companies.
- A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- Malicious code that's activated by a specific condition or event.
- Information used to understand the enemy's strengths and weaknesses.
- Phishing attacks that are executed via SMS.
- Malicious software that records every keystroke to secretly gather personal information.
- Ensuring operations and data adhere to established rules and regulations.
- A network of private computers infected with malicious software and controlled as a group.
- A secret combination, often alphanumeric, used for authentication.
18 Clues: Phishing attacks that are executed via SMS. • Malicious code that's activated by a specific condition or event. • A secret combination, often alphanumeric, used for authentication. • Information used to understand the enemy's strengths and weaknesses. • AI-generated fake content, often video, that looks convincingly real. • ...
cybersecurity terms 2022-12-16
Across
- a computer connected to a network that has been compromised by a hacker
- a kind of software used to prevent, scan, detect and delete viruses from a computer
- software that enables a user to covert information from another computer by transmitting data from their hard drive
- software that allows an unauthorized user to access a computer
- a type of malware that self replicates and infects other computers
- a class of cyberattacks in which attackers remotely execute commands to place malware or other malicious code on your computer or network
- a type of malware that disguises itself as legitimate code or software\
- software that displays advertising material
- A software-based firewall installed on a desktop or laptop computer to monitor and control its incoming and outgoing network traffic
Down
- a network security device that monitors and filters incoming and outgoing network traffic
- a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages
- malicious software that blocks access to a computer until a sum of money is paid
- an undocumented way of gaining access to a computer system
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- a network of computers with malicious software
- any program that prohibits a pop-up at some point in time
- hackers who use automated techniques to scan specific network ranges and find vulnerable systems
- software updates that address security vulnerabilities
18 Clues: software that displays advertising material • a network of computers with malicious software • software updates that address security vulnerabilities • any program that prohibits a pop-up at some point in time • an undocumented way of gaining access to a computer system • software that allows an unauthorized user to access a computer • ...
Cybersecurity Fundamental Chapter 2 2024-06-03
Across
- Ensures that information is accessible only to those authorized to have access.
- The foundational principles of cybersecurity.
- A framework developed by John McCumber to manage and protect networks, domains, and the Internet.
- The three categories of measures used to protect cyberspace: Technologies (devices and products), Policies and Practices (procedures and guidelines), and People (awareness and knowledge)
Down
- The ISO Cybersecurity Model, including ISO 27001 and ISO 27002 standards, provides a framework for managing information security.
- Data that is stored on physical media (e.g., hard drives, USB drives, cloud storage). Protecting data at rest involves encryption, access controls, and physical security measures.
- Data that is being transmitted across networks (e.g., emails, data transfers). Securing data in transit involves using secure communication protocols such as SSL/TLS, VPNs, and encryption.
- Data that is being actively processed by applications. Protecting data in process requires secure coding practices, memory protection mechanisms, and ensuring that applications handle data securely.
- Ensures that information and resources are accessible to authorized users when needed.
- Ensures that information remains accurate and complete throughout its lifecycle.
- The three states in which data can exist and require protection.
11 Clues: The foundational principles of cybersecurity. • The three states in which data can exist and require protection. • Ensures that information is accessible only to those authorized to have access. • Ensures that information remains accurate and complete throughout its lifecycle. • ...
Cybersecurity terms 2024-03-12
Across
- horse Malicious software disguised innocuously.
- Identity verification using traits.
- Malicious software threat
- Malicious code component.
- security Device-specific protection measures.
- policy Guidelines for security measures.
- Applying software updates regularly.
- Weakness in system security.
Down
- Deceptive email communication.
- testing Ethical hacking simulation.
- Malware with system-level access.
- hygiene Good digital security practices.
- incident Breach or violation event.
- Identity verification using traits.
- Malicious digital intrusion attempt.
- Network security barrier.
- Data protection through scrambling.
- Secure communication technique.
- Software against malicious programs.
- hat Ethical security expert.
20 Clues: Network security barrier. • Malicious software threat • Malicious code component. • Weakness in system security. • Deceptive email communication. • Secure communication technique. • Malware with system-level access. • testing Ethical hacking simulation. • Identity verification using traits. • Identity verification using traits. • Data protection through scrambling. • ...
Cybersecurity Awareness 2023-09-06
Across
- Method of secure communication (12 letters).
- Malware that demands payment to restore access (10 letters).
- Software that collects information without consent (7 letters).
- A group of interconnected devices (7 letters).
- A potential danger or risk (6 letters).
- Software that can infect your computer. (5 letters).
- Information stored on a computer (4 letters).
- Unauthorized access to a computer system (7 letters).
Down
- Process of converting data into a code (11 letters).
- A fraudulent scheme to deceive people (4 letters).
- The practice of using two different authentication methods (10 letters).
- A person who creates software.
- Weakness in a system that can be exploited (13 letters).
- Measures taken to protect against cyber threats (8 letters).
- A person interacting with a computer system (4 letters).
- A network security software. (8 letters).
- A common email-based attack (8 letters).
- Software to protect against malware (9 letters).
18 Clues: A person who creates software. • A potential danger or risk (6 letters). • A common email-based attack (8 letters). • A network security software. (8 letters). • Method of secure communication (12 letters). • Information stored on a computer (4 letters). • A group of interconnected devices (7 letters). • Software to protect against malware (9 letters). • ...
Cybersecurity Scramble 2023-10-24
Across
- Multiple sources sending an overwhelming amount of packets to crash the device.
- Holds computer data hostage in exchange for money.
- Requires end-user initiation.
- Sending an overwhelming amount of packets to crash the device.
- Phishing by impersonating businesses.
- A _ attack that attacks a vulnerability on a network unknown to the vendor.
- Triggers malicious code.
- Creates backdoors in the operating system.
- Replicates using network vulnerabilities
- Sending unauthorized messages to another bluetooth device.
Down
- Scares the victim into infecting their system.
- Phishing using calls.
- Creates ad-popups for the authors to generate revenue.
- Copying a victims information from bluetooth.
- Malware that carries out operations pretending to be something else.
- Phishing using texts.
- Lets the attacker view the actions of the user and their data.
- Phishing that targets high profile individuals.
18 Clues: Phishing using calls. • Phishing using texts. • Triggers malicious code. • Requires end-user initiation. • Phishing by impersonating businesses. • Replicates using network vulnerabilities • Creates backdoors in the operating system. • Copying a victims information from bluetooth. • Scares the victim into infecting their system. • ...
dasd 2021-04-30
25 Clues: If • Tap • List • Loop • Else • Print • Array • Cyber • Sprite • Python • Commit • If else • Settings • Function • Variable • Autonomous • cybersecurity • activo, Uptime • flotante, Float • entero, Integer • el lazo, For loop • while, While loop • binarios Binary numbers • neuronales, nueral networks • automático, Machine learning
dasd 2021-04-30
25 Clues: If • Tap • List • Loop • Else • Print • Array • Cyber • Sprite • Python • Commit • If else • Settings • Function • Variable • Autonomous • cybersecurity • activo, Uptime • flotante, Float • entero, Integer • el lazo, For loop • while, While loop • binarios Binary numbers • neuronales nueral networks • automático Machine learning
Year 12 Cybersecurity 2023-08-16
Across
- A hacker who operates between ethical and unethical boundaries, often exposing vulnerabilities without permission.
- An individual who simulates cyberattacks to evaluate the security of a system.
- A hacker who uses their skills to help organizations identify and fix security vulnerabilities.
- Measures taken to protect physical assets and facilities from unauthorized access or harm.
- The accuracy and reliability of data, protected from unauthorized alteration.
- A hacker who engages in malicious activities for personal gain or to cause harm.
- Mistakes made by individuals that can lead to security breaches.
- Creating multiple security layers to prevent unauthorized access at different levels.
- Covert agents who gather information on behalf of a government or organization.
- An individual or group that uses cyberattacks to create fear and chaos for political or ideological reasons.
Down
- Ensuring that sensitive information is accessible only to authorized individuals.
- The ability to identify and recognize cybersecurity threats and incidents.
- Making sure that data is accessible when needed, without unauthorized disruptions.
- Individuals with advanced computer skills who manipulate software or systems for various purposes.
- Covert activities aimed at gathering confidential information from competitors or enemies.
- Individuals who engage in illegal activities on the internet for financial gain.
- People within an organization who have access to sensitive information and can pose security risks.
- Implementing measures to discourage potential attackers from targeting a system or organization.
- Introducing obstacles and barriers to slow down attackers' progress.
- The process of restoring systems and data after a cybersecurity breach or incident.
- Taking swift actions to address and mitigate cybersecurity incidents.
21 Clues: Mistakes made by individuals that can lead to security breaches. • Introducing obstacles and barriers to slow down attackers' progress. • Taking swift actions to address and mitigate cybersecurity incidents. • The ability to identify and recognize cybersecurity threats and incidents. • ...
Group Activity 2024-09-20
Across
- limited access of any resources
- encrypted messages
- example of integrity
- example of integrity
Down
- It involves a range of technologies, processes and practices designed to safeguard the CIA of information
- data at-rest
- Component of cybersecurity
- combination of date and time
- reading by authorized parties
- authorized parties are able to modify
10 Clues: data at-rest • encrypted messages • example of integrity • example of integrity • Component of cybersecurity • combination of date and time • reading by authorized parties • limited access of any resources • authorized parties are able to modify • It involves a range of technologies, processes and practices designed to safeguard the CIA of information
Internal Audit Holiday Fun 2023-12-14
Cybersecurity 2022-09-16
Across
- update to an operating system to repair an bug or vulnerability
- tool installed to give an attacker easier access to the compromised system
- Electronic junk mail or junk newsgroup postings.
- generic term for a number of different types of malicious code.
- User acting with malicious intent to compromise a system
- term to describe connecting multiple separate networks together.
Down
- use a computer to gain unauthorized access to data in a system
- program that can retrieve and display information from servers on the World Wide Web
- Malware that locks/encrypts computers
- e-mails that try to trick a user into entering valid credentials at a fake website
10 Clues: Malware that locks/encrypts computers • Electronic junk mail or junk newsgroup postings. • User acting with malicious intent to compromise a system • use a computer to gain unauthorized access to data in a system • update to an operating system to repair an bug or vulnerability • generic term for a number of different types of malicious code. • ...
Cybersecurity 2023-10-31
Across
- a hacker that is malicious
- the art of protecting devices and data from unauthorized access
- a hacker that is doing good
- when your personal data is kept secret, another word for secret
Down
- a hacker that works without permission
- when you personal data is available (another word for available)
- Multi-Factor________ something you have, know, and are
- Internet of __________ (network of connected devices)
- a kind of human engineering with no coding
- an unusual way to solve a problem
10 Clues: a hacker that is malicious • a hacker that is doing good • an unusual way to solve a problem • a hacker that works without permission • a kind of human engineering with no coding • Internet of __________ (network of connected devices) • Multi-Factor________ something you have, know, and are • the art of protecting devices and data from unauthorized access • ...
Cybersecurity 2023-11-15
Across
- A cryptographic attack on hash collisions
- A sudden unplanned event.
- Something built in to or used in a system to address gaps or weaknesses in the controls that could otherwise lead to an exploit.
- An attack that seeks to obtain personal or private financial information through domain spoofing
- The action of multiple attackers planning a cyberattack
Down
- The art of exploiting bugs and weaknesses that exist in the telephone system
- A process of changing hardware and software configurations to make computers and devices as secure as possible.
- The capture and monitoring of network IP packets using a packet sniffer
- A type of fraud in which an attacker attempts to trick the victim into providing private information.
- The act of unscrambling ciphertext into plaintext
10 Clues: A sudden unplanned event. • A cryptographic attack on hash collisions • The act of unscrambling ciphertext into plaintext • The action of multiple attackers planning a cyberattack • The capture and monitoring of network IP packets using a packet sniffer • The art of exploiting bugs and weaknesses that exist in the telephone system • ...
CYBERSECURITY 2024-01-14
10 Clues: Online storage. • Ransomware type. • Harmful software. • Ensuring privacy. • Data preservation. • Encrypting malware. • Securely lock files. • Decryption necessity. • Fake software tactic. • Remote access method.
Cybersecurity 2024-07-19
Across
- gained technology access when not authorized
- protecting patient healthcare information
- safeguards data during transmission and storage
- patient data remaining accessible
Down
- passwords recommended for "logging in"
- patient information kept private
- patient records remaining accurate and intact
- healthcare leading cause of security breaches
- digitalized complete patient health information
- recommended regularly for software integrity
10 Clues: patient information kept private • patient data remaining accessible • passwords recommended for "logging in" • protecting patient healthcare information • gained technology access when not authorized • recommended regularly for software integrity • patient records remaining accurate and intact • healthcare leading cause of security breaches • ...
Cybersecurity 2024-04-03
Across
- A computer attack aimed at making a service unavailable.
- A program/device that protects a network.
- A type of malware that looks like a legimate program and is undetected by the anti-virus
- A network of computers infected by malware that are under the control of a single attacking party.
- A technique for protecting data by transforming it irreversibly.
Down
- A technique of symmetric encryption.
- A hashing algorithm which is the most used in secret-keys transfert.
- A known certfication authority who offers free certificates.
- A brand that makes cybersecurity devices especially for companies.
- A technique used by fraudsters to obtain personal information with the aim of committing identity theft.
10 Clues: A technique of symmetric encryption. • A program/device that protects a network. • A computer attack aimed at making a service unavailable. • A known certfication authority who offers free certificates. • A technique for protecting data by transforming it irreversibly. • A brand that makes cybersecurity devices especially for companies. • ...
Cybersecurity 2024-05-04
Across
- Weaknesses or flaws in software, hardware, or network infrastructure that can be exploited by attackers to compromise the security of a system.
- The process of converting data into a form that is unreadable without the correct decryption key, thereby protecting it from unauthorized access.
- The process of verifying the identity of a user or device attempting to access a system, often through passwords, biometric scans, or two-factor authentication methods.
Down
- Deliberate actions taken by hackers or malicious entities to disrupt, damage, or gain unauthorized access to computer systems, networks, or data.
- A type of cyber attack in which attackers impersonate legitimate entities to deceive individuals into providing sensitive information, such as passwords or financial data.
- Unauthorized access or attempted access to a computer system or network by an individual or automated process.
- Authentication techniques that rely on unique biological characteristics, such as fingerprints, iris scans, or facial recognition, to verify the identity of individuals accessing a system or device.
- A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data, often spread through email attachments, infected websites, or removable media.
- A software update designed to fix security vulnerabilities or address other issues within a program or operating system.
10 Clues: Unauthorized access or attempted access to a computer system or network by an individual or automated process. • A software update designed to fix security vulnerabilities or address other issues within a program or operating system. • ...
Cybersecurity 2024-04-29
Across
- Unsolicited or unwanted email, often containing malicious links or attachments.
- Unauthorized access or exposure of sensitive information.
- A security mechanism that uses unique physical or behavioral characteristics to authenticate users.
- Manipulating individuals into divulging confidential information or performing actions that compromise security.
- Measures taken to protect the integrity and confidentiality of data transmitted over a network.
Down
- Malware that encrypts files or systems and demands payment for their release.
- A form of MFA that requires users to provide two different authentication factors.
- Knowledge and understanding of cybersecurity risks, threats, and best practices.
- The process of responding to and mitigating the effects of a cybersecurity incident.
- Software designed to detect, prevent, and remove malicious software from computer systems.
10 Clues: Unauthorized access or exposure of sensitive information. • Malware that encrypts files or systems and demands payment for their release. • Unsolicited or unwanted email, often containing malicious links or attachments. • Knowledge and understanding of cybersecurity risks, threats, and best practices. • ...
Cybersecurity 2024-05-07
Across
- when you lose data this policy lets you restore it
- a program that allows hackers access to data without detect
- hacking under the onwers consent
- security actions like protecting the computer
- A self-replicating program
Down
- hacker that violates laws but not for malicious intent
- Basically rules and regulations
- protecting data from digital attacks
- Hacking with malicious intent
- A malicious program that is desguised
10 Clues: A self-replicating program • Hacking with malicious intent • Basically rules and regulations • hacking under the onwers consent • protecting data from digital attacks • A malicious program that is desguised • security actions like protecting the computer • when you lose data this policy lets you restore it • hacker that violates laws but not for malicious intent • ...
Cybersecurity 2024-09-22
Across
- The highest level of access in a computer system
- Security technology that uses physical characteristics like fingerprints or facial recognition
- A security principle that ensures data has not been altered or tampered with
- A security threat that originates from within an organization
- The process of confirming the identity of a user or device
Down
- A hidden method of bypassing normal authentication to gain access to a system
- the science of encrypting and decrypting data
- is a key goal of cyber security
- The use of investigative techniques to examine digital crimes or security breaches
- one of the world's largest ransomware attacks in history
10 Clues: is a key goal of cyber security • the science of encrypting and decrypting data • The highest level of access in a computer system • one of the world's largest ransomware attacks in history • The process of confirming the identity of a user or device • A security threat that originates from within an organization • ...
Cybersecurity 2021-06-02
Across
- Intention to damage a person
- The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
- It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
- Ability of a user to access information or resources in a specified location and in the correct format.
- Illegal access to a computer system for the purpose od causing damage.
Down
- Malicious software designed to damage.
- Without permission or authorization
- Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
- It's the protection of personal information.
10 Clues: Intention to damage a person • Without permission or authorization • Malicious software designed to damage. • It's the protection of personal information. • Illegal access to a computer system for the purpose od causing damage. • It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses. • ...
cybersecurity 2022-05-06
Across
- eg.: 192.160.81.1
- A network security system
- background process of stealing data
- Virtual Private Network
- A man who hacks
Down
- sharing negative content about someone else
- denial of internet service attack
- baiting to reveal personal information
- A type of malware that steals data
- privileged acces managemen (or a brawl stars character)
10 Clues: A man who hacks • eg.: 192.160.81.1 • Virtual Private Network • A network security system • denial of internet service attack • A type of malware that steals data • background process of stealing data • baiting to reveal personal information • sharing negative content about someone else • privileged acces managemen (or a brawl stars character)
Cybersecurity 2022-11-17
10 Clues: covid • irritating • chats for you • shops for you • rigs elections • forced advertising • ransoms your files • knowingly downloaded • wastes network bandwidth • attacks specific servers
CYBERSECURITY 2020-06-13
Across
- An occasion when private information can be seen by people who should not be able to see it is called data ... .
- A string of characters that allows access to a computer system or service.
- A web page or screen that updates often to show the latest information.
- The manner in which the components of a computer or computer system are organized and integrated.
Down
- A piece of code which is capable of copying itself and can corrupt the system or destroy data.
- A software designed to interfere with a computer´s normal functioning.
- The action to make something stronger or more important is called ... up.
- A type of utility used for scanning and removing viruses from a computer is called anti-virus ... .
- An attempt by hackers to damage or destroy a computer network or system.
- The practice of examining large pre-existing databases in order to generate new information is called data ...
10 Clues: A software designed to interfere with a computer´s normal functioning. • A web page or screen that updates often to show the latest information. • An attempt by hackers to damage or destroy a computer network or system. • The action to make something stronger or more important is called ... up. • ...
cybersecurity 2023-10-02
Across
- malware that is designed to steal personal information, such as passwords , CC numbers
- A process of identifying, assessing, and mitigating security risks
- A set of rules & procedures that govern the security of an organization's information systems.
- A system that prevents unauthorized access to a computer network
- Type of attack that attempts to trick users into revealing confidential information
- The process of verifying the identity of a user or device
Down
- process of granting access to resources based on a user's identity and permissions
- Encrypts a victim's files and demands payment to decrypt them
- Control to protect integrity of information
- A system that monitors a network for suspicious activity
10 Clues: Control to protect integrity of information • A system that monitors a network for suspicious activity • The process of verifying the identity of a user or device • Encrypts a victim's files and demands payment to decrypt them • A system that prevents unauthorized access to a computer network • A process of identifying, assessing, and mitigating security risks • ...
Cybersecurity 2024-02-18
Across
- Code red is a type of computer _______.
- Its Chakravyuh feature is an end-point anti- malware and antivirus software that creates a virtual layer between the user and the internet, blocking hackers from accessing sensitive data.which OS is refered here.
- In ethical hacking and cyber security, there are ______types of scanning.
- what is transformed with the help of a cipher algorithm.
- The technique used to hide information inside a picture.
Down
- It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the
- Oldest phone hacking technique used by hackers to make free calls.
- The malware which does not replicate or clone through an infection.
- The debian based OS which has 2 virtual machines and focuses on preserving user's data.
- A type of attack which uses a fraudulent server with a relay address.
10 Clues: Code red is a type of computer _______. • what is transformed with the help of a cipher algorithm. • The technique used to hide information inside a picture. • Oldest phone hacking technique used by hackers to make free calls. • The malware which does not replicate or clone through an infection. • ...
CyberSecurity 2024-02-24
10 Clues: What was he in? • who attacked him? • What first changed? • Was the car new or old? • What type of breech was it? • What did the hackers want to do? • What did the video call the car? • How to prevent this from happening • What else did the attackers turn off? • How did the attacker get into the car computer?
Cybersecurity 2024-03-19
Across
- Secret code used to access a device or network
- Process of verifying identity
- Software designed to harm a device or network
- Unauthorized access to a device or network
Down
- Criminal activity carried out using technology
- Malicious attempt to damage or disrupt a computer system
- Weakness in a system that can be exploited
- Fraudulent attempt to gain sensitive information
- System designed to prevent unauthorized access
- Method of protecting information
10 Clues: Process of verifying identity • Method of protecting information • Weakness in a system that can be exploited • Unauthorized access to a device or network • Software designed to harm a device or network • Criminal activity carried out using technology • Secret code used to access a device or network • System designed to prevent unauthorized access • ...
cybersecurity 2024-02-21
Across
- Cyber-attack
- Action that guarantee the identity of a computer
- Error checking method
- Hash function
Down
- Unpredictable number generated by an algorithm
- Systems that are connected by each others
- Technological process for telling a computer which tasks to perform in order to solve problems
- One way encryption
- Internet protocol part of the transport layer
- Reference model of system interconnection
10 Clues: Cyber-attack • Hash function • One way encryption • Error checking method • Systems that are connected by each others • Reference model of system interconnection • Internet protocol part of the transport layer • Unpredictable number generated by an algorithm • Action that guarantee the identity of a computer • ...
cybersecurity 2024-11-12
Across
- What do you call the set of secret characters used to access accounts and secure information?
- What is malicious software that disguises itself as legitimate software?
- What is the term for a digital attack in which hackers demand payment to unlock encrypted files?
- What is a deceptive email that tricks users into giving sensitive information?
- What is the practice of protecting systems, networks, and programs from digital attacks?
Down
- What is the process of verifying the identity of a user before granting access to a system?
- What type of attack overwhelms a system with traffic, causing it to crash?
- What do you call a software program that replicates itself and spreads to other computers?
- What is the act of attempting to gain unauthorized access to a computer or network?
- What is a tool that filters incoming and outgoing network traffic to secure a network?
10 Clues: What is malicious software that disguises itself as legitimate software? • What type of attack overwhelms a system with traffic, causing it to crash? • What is a deceptive email that tricks users into giving sensitive information? • What is the act of attempting to gain unauthorized access to a computer or network? • ...
IEM July SM Crossword 2022-07-26
Across
- Each year, over 500,000 ____ are affected by house fires.
- ________ is creating a common baseline for cybersecurity performance goals in critical infrastructure.
- National Oceanic & Atmospheric Administration released a _______ Community Guide Tool for community planners and decision makers.
- On July 17th is also known as what?
Down
- People who regularly have ____ interactions with others tend to live longer, boost their mood, and have a sense of purpose.
- The US Postal Service processes and delivers 425.3 ______ pieces of mail each day.
- NIST is updating its _____ Framework (CSF) to keep pace with the evolving cybersecurity landscape.
- The ___ app provides access to weather alerts, disaster resources and preparedness tips.
- ______ bring the risk of fires, injuries, and death.
- July 25th is National Hire a _____ day.
10 Clues: On July 17th is also known as what? • July 25th is National Hire a _____ day. • ______ bring the risk of fires, injuries, and death. • Each year, over 500,000 ____ are affected by house fires. • The US Postal Service processes and delivers 425.3 ______ pieces of mail each day. • ...
Risk Awareness Month 2024 2024-05-14
Across
- _________ can make a difference [Word found in EDM on CRO's message]
- _________ effort of every level [Word found in EDM on risk governance framework]
- Stay alert on possible _________ attempts [Word found in EDM on cybersecurity risks]
- We are not immune to _________ risks [Word found in EDM on cybersecurity risks]
- _________ form the 1st line of defence in our risk governance framework [Word found in EDM on risk governance framework]
- _________ into Critical Installations [Word found in EDM on operational risks]
Down
- Risk_________ Month [Word found in EDM on CRO's message]
- Flooding at expressways and major _________ [Word found in EDM on operational risks]
- Good _________ marksmanship [Word found in EDM on financial and strategic risk]
- Use water _________ appliances and fittings [Word found in EDM on financial and strategic risk]
10 Clues: Risk_________ Month [Word found in EDM on CRO's message] • _________ can make a difference [Word found in EDM on CRO's message] • _________ into Critical Installations [Word found in EDM on operational risks] • Good _________ marksmanship [Word found in EDM on financial and strategic risk] • ...
Cybersecurity 2021-02-12
Across
- An unwanted software that monitors and gathers information on a person and how they use their computer, for example monitoring your internet usage to send you harmless but annoying adverts.
- A series of letters, numbers or symbols that protect data in your computer.
- A type of malware that exploits vulnerabilities in the a computer’s operating system and once in uses the system’s resources.
- A person that tries to access your data by getting into your computer, for example by figuring our your passwords.
- Locks a computer, encrypts files, and prevents the user from being able to access the data.
Down
- A more sinister spyware that records every keystroke made by a user.
- It infects a computer and causes it to download or display adverts or pop-ups when the victim is online.
- Being able to edit and view personal files like photos or videos.
- A self-replicating software, to get into the computer it has to be downloaded as part of another file which is then executed on the computer.
- A specific type of computer virus that tricks you into downloading it onto your computer. Once in your computer it might open a ‘back door’ to give an attacker remote access to your computer.
10 Clues: Being able to edit and view personal files like photos or videos. • A more sinister spyware that records every keystroke made by a user. • A series of letters, numbers or symbols that protect data in your computer. • Locks a computer, encrypts files, and prevents the user from being able to access the data. • ...
Cybersecurity 2021-06-02
Across
- Intention to damage a person.
- The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
- It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
- Ability of a user to access information or resources in a specified location and in the correct format.
- Illegal access to a computer system for the purpose od causing damage.
Down
- Malicious software designed to damage.
- Without permission or authorization
- Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
- It's the protection of personal information.
10 Clues: Intention to damage a person. • Without permission or authorization • Malicious software designed to damage. • It's the protection of personal information. • Illegal access to a computer system for the purpose od causing damage. • It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses. • ...
Cybersecurity 2022-06-29
11 Clues: physical asset • Tangible asset • tangible asset • Intangible asset • Purchasing of asset • hardware and software • plumbing installation • Wear and tear situation • Digital media and content • Costlier than traditional • Longeststage of asset lifecycle
Cybersecurity 2023-10-31
Across
- a hacker that is malicious
- the art of protecting devices and data from unauthorized access
- a hacker that is doing good
- when your personal data is kept secret
Down
- a hacker that works without permission
- when you personal data is available
- Multi-Factor________ something you have, know, and are
- Internet of __________
- a kind of human engineering
- an unusual way to solve a problem
10 Clues: Internet of __________ • a hacker that is malicious • a hacker that is doing good • a kind of human engineering • an unusual way to solve a problem • when you personal data is available • a hacker that works without permission • when your personal data is kept secret • Multi-Factor________ something you have, know, and are • ...
CyberSecurity 2024-09-05
Across
- Software designed to disrupt, damage, or gain unauthorized access to a computer system
- Where the recruitment, retention and advancement of women in cybersecurity happens.
- Taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
- A term used to describe a person who tries to gain unauthorized access to a network or computer system
- A service that encrypts users' data and masks their IP addresses
- Contains items that are temporarily blocked until an additional step is performed
- The practice of sending fraudulent communications that appear to come from a legitimate source
Down
- A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- The process of converting information into ciphertext
- The process of decoding cipher text to plain text
10 Clues: The process of decoding cipher text to plain text • The process of converting information into ciphertext • A service that encrypts users' data and masks their IP addresses • Contains items that are temporarily blocked until an additional step is performed • Where the recruitment, retention and advancement of women in cybersecurity happens. • ...
INF Crossword Puzzle 2024-01-24
IEM's December Social Media Crossword Puzzle 2021-12-20
Across
- United States Space Force
- State Association of Counties Annual Meeting
- IEMer who moderated a discussion on wildfire resilience & prevention at #NDRC21 (last name)
- Follow Cybersecurity and Infrastructure Security Agency’s ______ best practices
- IEM’s innovative GIS ______
- IEMer who moderated the panel, Best Practice Programs at the State Level (last name)
- FEMA’s interactive Program Planning Toolkit
- FEMA’s 2022-2026 ____ ____
- Our thoughts are with the communities in Kentucky and the Midwest impacted by
Down
- AshBritt-IEM Health had the pleasure of meeting First Lady _____
- The IEM family would like to wish you and yours
- New FEMA Deputy Administrator (last name)
- Have you gotten you flu _____?
- It’s time to get into the holiday spirit by breaking out your…
- New COVID-19 variant
15 Clues: New COVID-19 variant • United States Space Force • FEMA’s 2022-2026 ____ ____ • IEM’s innovative GIS ______ • Have you gotten you flu _____? • New FEMA Deputy Administrator (last name) • FEMA’s interactive Program Planning Toolkit • State Association of Counties Annual Meeting • The IEM family would like to wish you and yours • ...
Cybersecurity 2022-11-28
Across
- manipulation of people into performing actions or give up confidential information.
- causes your computer to download or display malicious adverts or pop-ups
- a group of Internet-connected devices, each of which runs one or more bots. can be used to perform Distributed Denial-of-Service (DDoS)
- Designed to gain access to your computer with malicious intent.
- a type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information to the attacker
Down
- When infected, they locks/encrypted your computer or files, and demand money or else they will delete or publish it.
- replicate itself by maliciously modifying other computer programs and inserting code.
- Any malware that misleads users of its true intent. The term is derived from the Ancient Greek story.
- replicate itself in order to create traffic and slowing down the system.
- describes a social engineering act of obtaining someone else's personal information without their consent.
10 Clues: Designed to gain access to your computer with malicious intent. • causes your computer to download or display malicious adverts or pop-ups • replicate itself in order to create traffic and slowing down the system. • manipulation of people into performing actions or give up confidential information. • ...
Cybersecurity 2022-11-18
Across
- the protection of internet-connected systems such as hardware, software and data from cyberthreats
- engineering the term used for a broad range of malicious activities accomplished through human interactions.
- testing an authorized simulated attack performed on a computer system to evaluate its security
- category of malicious cyber-attacks that hackers or cybercriminals employ
- information such as facts and numbers used to analyze something or make decisions
- network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
- the measurement and statistical analysis of people's unique physical and behavioral characteristics
- when attackers send malicious emails designed to trick people into falling for a scam
- allow users to keep their software programs updated without having to check for and install available updates manually
- software designed to interfere with a computer's normal functioning
10 Clues: software designed to interfere with a computer's normal functioning • category of malicious cyber-attacks that hackers or cybercriminals employ • information such as facts and numbers used to analyze something or make decisions • when attackers send malicious emails designed to trick people into falling for a scam • ...
CyberSecurity 2023-01-05
Across
- Should be constructed of upper and lower case letters, numbers, and special characters
- A flawed or weakness in computer system that could be exploited to violate the system's security.
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- Hardware or software designed to prevent unauthorized access to or from a private network.
- Unauthorized access to a network, information systems, or application.
Down
- Verifying identity
- Fraudulent email purportedly from a reputable company attempting to get a personal information.
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- The address of a webpage. Check the validity of it before clicking on it.
- A sequence of words or text used to control access to a computer; similar to a password.
10 Clues: Verifying identity • Unauthorized access to a network, information systems, or application. • The address of a webpage. Check the validity of it before clicking on it. • Should be constructed of upper and lower case letters, numbers, and special characters • A sequence of words or text used to control access to a computer; similar to a password. • ...
Cybersecurity 2021-03-08
Across
- making a copy of original data
- software that causes harm to a computer
- a malicious computer program that is hidden in an application
- software that tracks the key strokes on the keyboard
- defrauding an online account holder of financial information by posing as a legitimate company
Down
- software that lets a user obtain covert information on your computer activities
- someone who exploits weaknesses in a computer system
- Software designed to detect and destroy a virus
- a standalone malicious computer program that replicates and spreads on a computer system
- software that encodes data and requires a key to decode
10 Clues: making a copy of original data • software that causes harm to a computer • Software designed to detect and destroy a virus • someone who exploits weaknesses in a computer system • software that tracks the key strokes on the keyboard • software that encodes data and requires a key to decode • a malicious computer program that is hidden in an application • ...
Cybersecurity 2021-02-12
Across
- data dater that has personal information such as your maiden name or your date of birth
- a person who uses computers to gain unauthorized access to data.
- you use it to login to websites and files
- Need to be attached to a file
- not known or seen or not meant to be known or seen by others.
Down
- what you do without getting permission to do it first
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- Opens a back door which allows more malware to be loaded
- Uses vulnerabilities to move into your machine.
- when somebody sends an email giving you false information to make you give them something
10 Clues: Need to be attached to a file • you use it to login to websites and files • Uses vulnerabilities to move into your machine. • what you do without getting permission to do it first • Opens a back door which allows more malware to be loaded • not known or seen or not meant to be known or seen by others. • ...
Cybersecurity 2021-02-12
Across
- data dater that has personal information such as your maiden name or your date of birth
- a person who uses computers to gain unauthorized access to data.
- you use it to login to websites and files
- Need to be attached to a file
- not known or seen or not meant to be known or seen by others.
Down
- what you do without getting permission to do it first
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- Opens a back door which allows more malware to be loaded
- Uses vulnerabilities to move into your machine.
- when somebody sends an email giving you false information to make you give them something
10 Clues: Need to be attached to a file • you use it to login to websites and files • Uses vulnerabilities to move into your machine. • what you do without getting permission to do it first • Opens a back door which allows more malware to be loaded • not known or seen or not meant to be known or seen by others. • ...
CYBERSECURITY 2021-10-18
Across
- The short form of malicious software - Malware
- A software that covertly monitors your online behavior
- A software or hardware device designed to protect your private data
- A tool that helps mask to location of the user to guarantee anonymity
- The practice of sending fraudulent communications that appear to come from a reputable source
Down
- HORSE A piece of malware that often allows a hacker to gain remote access to a computer through a back door
- A piece of malicious code that can replicate itself in order to spread the infection to other connected computers
- A technology that enables us to access our files through the internet remotely
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
- An incident where a hacker gains unauthorized access to a computer or device
10 Clues: The short form of malicious software - Malware • A software that covertly monitors your online behavior • A software or hardware device designed to protect your private data • A tool that helps mask to location of the user to guarantee anonymity • An incident where a hacker gains unauthorized access to a computer or device • ...
cybersecurity 2023-04-02
Across
- worm A type of malware that spreads itself by copying itself to other computers on the same network (9 letters): _________ worm
- Malicious software that is designed to gain access to a computer system without the user's consent (7 letters): ________
- A technique used to trick users into revealing sensitive information, such as passwords or credit card numbers (9 letters): _________ing
- A type of attack that involves intercepting and altering communication between two parties (10 letters): _________-in-the-middle attack
- of Service A type of attack that attempts to make a computer or network resource unavailable to its intended users (8 letters): _________ of Service
Down
- exploit A type of attack that targets vulnerabilities in software or hardware to gain unauthorized access (8 letters): _________ exploit
- force A type of attack that involves guessing a password by trying many different combinations (9 letters): _________ force attack
- The process of converting data into an unreadable format to prevent unauthorized access (8 letters): _________tion
- A security protocol used to encrypt internet traffic (4 letters): ______
- A type of authentication that uses physical characteristics, such as fingerprints or facial
10 Clues: A security protocol used to encrypt internet traffic (4 letters): ______ • A type of authentication that uses physical characteristics, such as fingerprints or facial • The process of converting data into an unreadable format to prevent unauthorized access (8 letters): _________tion • ...
Cybersecurity 2023-08-23
Across
- A string of characters that allows access to a computer system or service.
- Before an application goes live, it needs to go through a security ___.
- Process of updating to address security vulnerabilities.
- If a cyber attack is suspected, it should be reported to the ___ response team.
- SIEM tool from IBM.
Down
- A type of social engineering attack involving communication that pretends to be legitimate.
- We are all cyber ___.
- Used in cryptography to prove authenticity of a device, server, or user.
- FIM checks OS, database, and application software files to uncover tampering. What is the I in FIM?
- Linux distro used for ethical hacking.
10 Clues: SIEM tool from IBM. • We are all cyber ___. • Linux distro used for ethical hacking. • Process of updating to address security vulnerabilities. • Before an application goes live, it needs to go through a security ___. • Used in cryptography to prove authenticity of a device, server, or user. • ...
Cybersecurity 2023-11-24
Across
- when your data is confidential, available and keeps it's integrity
- a special way of decrypting a cipher such as pigpen, morse code, or caesar
- internet of things
- hacker that does bad
- words or text that needs a key to decode
- hacker that does good but without permission
Down
- hiding a file or text in a picture
- hacking people without code
- authentication that is something you are, know or have
- hacker that does good
10 Clues: internet of things • hacker that does bad • hacker that does good • hacking people without code • hiding a file or text in a picture • words or text that needs a key to decode • hacker that does good but without permission • authentication that is something you are, know or have • when your data is confidential, available and keeps it's integrity • ...
Cybersecurity 2024-03-20
Across
- A scam where a hacker poses as a legitimate business or organization in order to fool the victim into giving them sensitive personal information
- shield users against viruses, spyware, trojans, and worms that can damage computer hardware through email or web browsing.
- a network security device that monitors traffic to or from your network.
- Coding used to protect your information from hackers.
Down
- A hacker who is invited to test out computer systems and servers, looking for vulnerabilities "hacker ____ __ "
- The process of identifying a user’s identity
- malicious attempt to disrupt normal traffic to a web property.
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
- a method of connecting a series of computers and devices in a private encrypted network,
- A piece of audio or video that has been altered and changed to make it seem authentic or credible.
10 Clues: The process of identifying a user’s identity • Coding used to protect your information from hackers. • malicious attempt to disrupt normal traffic to a web property. • a network security device that monitors traffic to or from your network. • a method of connecting a series of computers and devices in a private encrypted network, • ...
Cybersecurity 2024-05-07
Across
- A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- Unauthorized access to a network, information systems, or application.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying dat
Down
- The process of converting information or data into a code, especially to prevent unauthorized access.
- The process of recognizing a user's identity to ensure that individuals are who they claim to be.
- A type of surveillance software that has the capability to record every keystroke made on a computer.
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
- A service that allows you to connect to the internet via a server run by a provider, creating a secure connection.
10 Clues: Unauthorized access to a network, information systems, or application. • The process of recognizing a user's identity to ensure that individuals are who they claim to be. • The process of converting information or data into a code, especially to prevent unauthorized access. • ...
Cybersecurity 2024-09-16
Across
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
- Malware that locks or encrypts data, demanding payment for its release
- A person who gains unauthorized access to systems or networks
- Process of converting data into a code to prevent unauthorized access
Down
- A secret word or phrase used to authenticate access to data or systems
- Software that secretly monitors user activity and collects information
- Malicious software designed to harm, exploit, or disable computers
- A security system that monitors and controls incoming and outgoing network traffic
- Software used to detect, prevent, and remove malicious software
- A secure network connection that allows users to send and receive data as if they were on a private network
10 Clues: A person who gains unauthorized access to systems or networks • Software used to detect, prevent, and remove malicious software • Malicious software designed to harm, exploit, or disable computers • Process of converting data into a code to prevent unauthorized access • A secret word or phrase used to authenticate access to data or systems • ...
Cybersecurity 2021-02-28
Across
- Your data was not corrupted even though it crashed due to which feature of your NTFS system drive?
- The type of operating system that is permanently programmed into a hardware device.
- A _____ determines how memory is used.
- The most common Mobile OS.
Down
- The type of software license that allows a predetermined number of people to use the account at the same time.
- What is saved even when in private browsing?
- Your web browser is showing an outdated picture on a website that you visit often. Which of the following would be the best choice for attempting to fix this issue? Clear _____
- The most popular OS for desktops and laptops.
- An alert pops up on your screen informing you of a possible vulnerability in your system. Which security method is most likely responsible for sending this alert? _____ software
- The ____ accounts are responsible for creating new user accounts and setting permissions.
10 Clues: The most common Mobile OS. • A _____ determines how memory is used. • What is saved even when in private browsing? • The most popular OS for desktops and laptops. • The type of operating system that is permanently programmed into a hardware device. • The ____ accounts are responsible for creating new user accounts and setting permissions. • ...
Cybersecurity 2021-02-12
Across
- Needs to be downloaded as part of another file which is then executed on the computer.
- It can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts
- Much similar to phishing but uses an SMS message
- Is software that is designed to gain access to your computer with malicious intent.
- Locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
Down
- Specific type of computer virus that tricks you into downloading it onto your computer.
- Unwanted software that monitors and gathers information on a person and how they use their computer.
- Replicate themselves but do not attach themselves to files as a virus does.
- Is a cybercrime in which a target/s are contacted by email, text message or telephone by posing as a legitimate institution.
- A secret word/phrase used to protect important log-in info on different websites
10 Clues: Much similar to phishing but uses an SMS message • Replicate themselves but do not attach themselves to files as a virus does. • A secret word/phrase used to protect important log-in info on different websites • Is software that is designed to gain access to your computer with malicious intent. • ...
Cybersecurity! 2022-09-22
Across
- person who uses computers to gain access to computers without consent
- stopping something from happening
- a type of malicious software that is installed without the user knowing to gain sensitive information on a system.
- protects your computer from attacks
- something a user clicks on to go to another page
Down
- guidelines for workplace procedures
- an attempt to damage or destroy a network
- keep safe from harm
- knowing of a situation or fact
- emails or texts sent to try and get personal information
10 Clues: keep safe from harm • knowing of a situation or fact • stopping something from happening • guidelines for workplace procedures • protects your computer from attacks • an attempt to damage or destroy a network • something a user clicks on to go to another page • emails or texts sent to try and get personal information • ...
Cybersecurity 2022-12-05
Across
- it’s when a hacker changes the IP address of an email so that it seems to come from a trusted source.
- A wiper is a type of malware with a single purpose: to erase user data and ensure it can’t be recovered.
- While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking.
- A rootkit is software that gives malicious actors remote control of a victim’s computer with full administrative privileges.
- A form of malware used by hackers to spy on you and your computer activities.
Down
- a wide variety of bad software used to infect and/or damage a system, most often delivered via spam emails.
- Worms target vulnerabilities in operating systems to install themselves into networks.
- A scam where a hacker poses as a legitimate business or organization (especially credit card companies, banks, charities, Internet providers, other utilities) in order to fool the victim
- it kidnaps your computer and holds it for ransom, hence the clever name.
- disguises itself as desirable code
10 Clues: disguises itself as desirable code • it kidnaps your computer and holds it for ransom, hence the clever name. • A form of malware used by hackers to spy on you and your computer activities. • Worms target vulnerabilities in operating systems to install themselves into networks. • ...
cybersecurity 2024-10-10
Across
- theft: The crime of obtaining personal information and using it to assume someone else's identity.
- This is the overall practice of protecting systems, networks, and data from digital attacks.
- A piece of software designed to fix a vulnerability or bug.
- Malicious software designed to disrupt computer operations, steal data, or gain unauthorized access to a computer system.
- A weakness in a computer system that can be exploited by attackers.
- A type of malware that restricts access to a computer system or data until a ransom is paid.
Down
- A cyberattack where a hacker poses as a trusted entity to trick a user into providing sensitive information.
- The process of converting information into a secret code to prevent unauthorized access.
- authentication (2FA): A security process that requires two forms of identification, such as a password and a code sent to your phone.
- A network security system that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic.
10 Clues: A piece of software designed to fix a vulnerability or bug. • A weakness in a computer system that can be exploited by attackers. • The process of converting information into a secret code to prevent unauthorized access. • This is the overall practice of protecting systems, networks, and data from digital attacks. • ...
cybersecurity 2024-11-12
Across
- What do you call the set of secret characters used to access accounts and secure information?
- What is malicious software that disguises itself as legitimate software?
- What is the term for a digital attack in which hackers demand payment to unlock encrypted files?
- What is a deceptive email that tricks users into giving sensitive information?
- What is the practice of protecting systems, networks, and programs from digital attacks?
Down
- What is the process of verifying the identity of a user before granting access to a system?
- What type of attack overwhelms a system with traffic, causing it to crash?
- What do you call a software program that replicates itself and spreads to other computers?
- What is the act of attempting to gain unauthorized access to a computer or network?
- What is a tool that filters incoming and outgoing network traffic to secure a network?
10 Clues: What is malicious software that disguises itself as legitimate software? • What type of attack overwhelms a system with traffic, causing it to crash? • What is a deceptive email that tricks users into giving sensitive information? • What is the act of attempting to gain unauthorized access to a computer or network? • ...
Lucas' Graduation-Day Crossword 2021-10-14
17 Clues: Pomp • Go... • Graduate • A builder • GCU Color • GCU Street • Black Beans • Lucas's Major • Hat Decoration • Type of Degree • Years in School • group of people • Type of Ceremony • Lucas's Employer • Best type of Tree • Name of GCU Mascot • Grand _ University
Cybersecurity Awareness 2021-10-27
Across
- records keystrokes and sends its info to a hacker
- (three words) a term used to describe everyday objects that connect to the internet (such as fridges, thermostats, and smart speakers)
- verifying your identity with a username, password, or other piece of information
- hackers demand a ransom for the return of information after deploying this
- an audio or video clip that has been edited and changed to seem believable
- malware disguised as legitimate software
- the most common form of cryptocurrency
Down
- (two words) manipulating and deceiving people to get sensitive and private info; lying
- the practice of protecting critical systems and sensitive information from digital attacks
- emails, text messages, or other communication designed to convince you to give the sender personal information
- sends information from your computer to a third party without your knowledge
- short for malicious software
- use this to protect your information
- a way of hiding information
- a network security device that filters incoming and outgoing websites
- displays unauthorized ads on a user's screen
- short for virtual private network
17 Clues: a way of hiding information • short for malicious software • short for virtual private network • use this to protect your information • the most common form of cryptocurrency • malware disguised as legitimate software • displays unauthorized ads on a user's screen • records keystrokes and sends its info to a hacker • ...
IT Cybersecurity 2023-03-29
Across
- Wireless network that requires no authentication.
- A method that allows the frequency of the wireless network to be fine-tuned. Each channel is approximately 20 MHz wide.
- Wireless communication technology that allows two devices to connect to each other over a short distance.
- Combines multiple channels—or lanes—to increase the amount of traffic that a modem's highway can comfortably support.
- A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
- Wireless authentication method that allows for automatic connection between a device and the wireless access point.
- The wireless access point provides access to a wireless network.
- An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices.
- A communication method that allows two-way communication between two devices within a few centimeters of each other.
- Wireless authentication method that uses a passphrase to authenticate users.
- A method that combines channels into one to increase bandwidth.
Down
- Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest versions in use.
- Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
- An enhancement that allows multiple antennas to use the same radio frequency.
- The expected number of times an event will occur in a given time frame.
- Conceals the data's original meaning to prevent it from being known or used.
- An Ethernet cable provides the connection between a device connected to the network port and the switch.
- The interface between a computer's hardware and software.
18 Clues: Wireless network that requires no authentication. • The interface between a computer's hardware and software. • A method that combines channels into one to increase bandwidth. • The wireless access point provides access to a wireless network. • The expected number of times an event will occur in a given time frame. • ...
test 2022-10-25
What is Cyber Security: Vocabulary Review 2024-09-04
Across
- the practice of isolating resources and controlling access to them through APIs or strict interfaces
- a design technique that separates the functionality of a program into independent, interchangeable components.
- the process of breaking down complex cybersecurity models into abstract components to simplify and clearly define their security roles.
- the practice of protecting data from unauthorized access, disclosure, or alteration
- the protection of data from unauthorized modification or deletion.
- a cybersecurity technique that protects processes from each other on an operating system.
- a design principle that emphasizes the importance of simplicity in cyber security systems and logics
- the practice of concealing information within other data, structures, or media to prevent unauthorized access.
- the principle of granting users only the minimum level of access or permissions necessary to perform their job functions
- the practice of collecting, processing, and storing only the minimum amount of data needed to complete a specific task.
Down
- creating secondary safety nets that bolster network security and mitigate single points of failure throughout the network.
- the ability to reliably access and use information in a timely manner.
- a cybersecurity strategy that uses multiple layers of security measures to protect an organization's assets.
- a process that separates data, processes, and administrative tasks into logical groupings, or domains.
- the practice of reducing unnecessary complexity and focusing on what's essential
- a way of looking at the world from the perspective of a hacker
16 Clues: a way of looking at the world from the perspective of a hacker • the protection of data from unauthorized modification or deletion. • the ability to reliably access and use information in a timely manner. • the practice of reducing unnecessary complexity and focusing on what's essential • ...
TECHNOLOGY 2024-02-14
hahahha 2024-08-24
Panther Cross Word 2022-04-29
Across
- The largest End Point Detection vendor on the market
- The fastest growing area to store company data
- A computer or system that mimics a target that a hacker would go after. It is used as a way to collect data on different attack patterns
- The word used to describe the adding of additional contextual data to alerts in order to cut down on noise. Greynoise helped us with this.
- The acronym used to describe a fully outsourced solution for threat detection
- A 3rd party vendor who acts as a middleman to distribute software
- Refers to data exiting a network
- Refers to data entering into a network
- A receipt of any action performed within a system
- A compliance-driven evaluation that reveals where you're susceptible to an attack
- The acronym used to describe a solution type that detections user behavior for anything malicious
Down
- This compliance is imposed on companies that do business in within the EMEA
- The most utilized cybersecurity framework in the world
- A phrase coined by Panther to describe one of our biggest differentiators
- This compliance is imposed on companies that collect health care data
- The practice of protecting systems, networks, and programs from cyber attacks
- The largest SIEM vendor in the world
- This compliance is imposed on companies that collect credit card data
- A solution that aggregates logs
- Acronym that describes Endpoint detection combined with Threat Detection
- This compliance is imposed on companies that collect other companies information
- Refers to different events being interconnected that paint a conclusion
- A 3rd party vendor who you can outsource your cybersecurity to
- This is typically the gatekeeper for your network and the first line of cyber defense
24 Clues: A solution that aggregates logs • Refers to data exiting a network • The largest SIEM vendor in the world • Refers to data entering into a network • The fastest growing area to store company data • A receipt of any action performed within a system • The largest End Point Detection vendor on the market • The most utilized cybersecurity framework in the world • ...
청당 빠바 구문독해 6-22 2023-01-18
16 Clues: 절도 • 자동차 • 대리점 • 공동의 • 자동차의 • 입증하다 • 흔히, 보통 • 사이버 보안 • 취약한, 연약한 • 실직한, 실업자인 • 임차하다, 빌리다 • 혜택, 이득; 득을 보다 • (범죄, 사고 등) 사건 • 조정[조절]하다; 적응하다 • (연료, 에너지, 시간을)소모하다 • (자동차 앞창에 있는)유리 닦개(와이퍼)
Cybersecurity Vocabulary 2023-01-25
Across
- A bug where user input is passed as the format argument to printf
- This is when an application reveals sensitive data
- determines strength and validity of passwords.
- A secret entry point into a program.
- can undermine the controls that secure the data of millions
- The result of a mismatch between arithmetic and mathematical arithmetic
- The web server account is incorrectly given access to the system files
- Is the manipulation of people to divulge information or performing actions.
Down
- Somebody who gains illegal access to a phones system.
- An attempt to crack a password by using every combination of letters and digits until a password is cracked.
- bypassing standard authentication or encryption in a computer.
- Mother Nature's actions
- A trapdoor in software that allows easy maintenance
- A subset of the Trojan horse malware.
- A system used to gain authentications by cracking a password hash.
- when a hacker exploits the vulnerability before its fixed.
16 Clues: Mother Nature's actions • A secret entry point into a program. • A subset of the Trojan horse malware. • determines strength and validity of passwords. • This is when an application reveals sensitive data • A trapdoor in software that allows easy maintenance • Somebody who gains illegal access to a phones system. • ...
CyberSecurity Crossword 2023-08-07
Across
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction
- Should be constructed of upper and lower case letters, numbers, and special characters
- verifying identity
- a type of software that is designed to display advertisements on a user's computer or device.
- a type of software or hardware device that is designed to capture and record keystrokes made on a computer or other device
- The “I” in the C-I-A Triad; protection from unauthorized changes
- The “A” in the C-I-A Triad. It ensures authorized users have access
- A fraudulent email purportedly from a reputable company attempting to get personal information
Down
- Threatening behavior facilitated through electronic means such as texting
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- weakness in a computer system that could be exploited to violate the system’s security
- Software that scans a device or a network to detect security threats, alert the user, and neutralize malicious code
- Facebook, Twitter, Instagram, etc. (Two words)
- The process of taking plain text and scrambling it into an unreadable format
- the act of secretly listening to or monitoring the conversations or communications of others without their knowledge or consent
- enables a user to connect securely from outside to their business network, even though they are not located on their office premises
16 Clues: verifying identity • Facebook, Twitter, Instagram, etc. (Two words) • The “I” in the C-I-A Triad; protection from unauthorized changes • The “A” in the C-I-A Triad. It ensures authorized users have access • Threatening behavior facilitated through electronic means such as texting • The process of taking plain text and scrambling it into an unreadable format • ...
NVH September Trivia 2022-08-24
Across
- Ext. 7060
- Policy keeper
- NVH Lab blood supplier
- Personal ______ Equipment
- Cybersecurity Training
- Code Call for Combative Person
- Coffee Shop
- Extended Care "Family"
- John Caitlynn & Liz Therapy
Down
- TFMC ARNP
- Zzz Service
- payroll software
- BOC Meeting Day
- Purchaser
- Resuscitation Quality Improvement
- Drs. Dhillon & Jex Service
- The next EHR
- New mammo system
18 Clues: TFMC ARNP • Ext. 7060 • Purchaser • Zzz Service • Coffee Shop • The next EHR • Policy keeper • BOC Meeting Day • payroll software • New mammo system • NVH Lab blood supplier • Cybersecurity Training • Extended Care "Family" • Personal ______ Equipment • Drs. Dhillon & Jex Service • John Caitlynn & Liz Therapy • Code Call for Combative Person • Resuscitation Quality Improvement
Cybersecurity Month 2023-07-24
Across
- (Hint: Make a copy of your important files for safety)
- (Hint: Your data is well-protected and out of harm's way)
- (Hint: Being informed and cautious about online risks)
- (Hint: Keep your personal information confidential)
- (Hint: A secret code you create to protect your accounts)
- (Hint: Ensure your online accounts and devices are protected)
- (Hint: Converting data into secret code to keep it safe)
Down
- (Hint: Relating to computers and the internet)
- (Hint: Regularly install software improvements for better security)
- (Hint: A protective barrier that keeps hackers out)
- (Hint: Secure your device with a digital key)
- (Hint: Harmful software that can damage your computer)
- (Hint: Tricky schemes to deceive you online)
- (Hint: A harmful computer program that can spread)
- (Hint: Only rely on reputable sources and websites)
- (Hint: Deceptive emails or messages trying to steal your info)
16 Clues: (Hint: Tricky schemes to deceive you online) • (Hint: Secure your device with a digital key) • (Hint: Relating to computers and the internet) • (Hint: A harmful computer program that can spread) • (Hint: A protective barrier that keeps hackers out) • (Hint: Keep your personal information confidential) • (Hint: Only rely on reputable sources and websites) • ...
Cybersecurity Threats 2024-04-10
Across
- A type of malicious software that can replicate itself and spread to other systems.
- Unwanted or unsolicited emails, often used to deliver malware or phishing attempts.
- Malicious software that encrypts files and demands a ransom to restore access.
- Malicious software that secretly monitors and collects information about a user.
- Malicious ads that spread malware through advertising networks.
- Any potential danger to an organization's data, networks, or systems.
- Redirecting users to a fraudulent website without their knowledge.
- Tricking a user into clicking something different from what they think they’re clicking on.
Down
- A weakness in a system that can be exploited by attackers.
- A scam where attackers send fraudulent emails to trick recipients into providing sensitive information.
- Unwanted software that displays ads, often bundled with free downloads.
- Listening in on communications without permission, often used in attacks.
- Software that records the keys pressed on a keyboard to steal sensitive information, such as passwords.
- A type of malware that replicates itself to spread to other computers over a network.
- Malicious software designed to damage or gain unauthorized access to systems.
- Taking advantage of a vulnerability in a system or network to gain unauthorized access.
16 Clues: A weakness in a system that can be exploited by attackers. • Malicious ads that spread malware through advertising networks. • Redirecting users to a fraudulent website without their knowledge. • Any potential danger to an organization's data, networks, or systems. • Unwanted software that displays ads, often bundled with free downloads. • ...
Cybersecurity Vocab 2021-09-28
Across
- Secret unknown access point into a system
- Flaw or potential for harm
- Virus that infects a computer before the operating system loads
- Following the rules or standards that have been established
- Software that is embedded in hardware
- Computer code intentially written to cause some form of harm
- Using a lie or scam to obtain private information
- Physical token inserted into a computer's usb port
Down
- Measurement and analysis of a biological feature
- Condition of being pricate or secret
- Something that takes a vulnerability to a level where it can be exploited
- Encrypts data do user connot access it intil a fee is paid to hacker only
- Acions of ,alicous code
- Proccess by which something becomes harder it is made harder to hack
- State of being complete or uncorrupted
- Technology that thracks a users' keystokes on the keyboard
16 Clues: Acions of ,alicous code • Flaw or potential for harm • Condition of being pricate or secret • Software that is embedded in hardware • State of being complete or uncorrupted • Secret unknown access point into a system • Measurement and analysis of a biological feature • Using a lie or scam to obtain private information • Physical token inserted into a computer's usb port • ...
cybersecurity awareness 2017-09-28
Across
- is a string of characters used for authenticating a user on acomputer system
- A small, portable flash memory card that plugs into a computer s USB port and functions as a portable hard drive.
- is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
- A criminal act that involves malicious threats intended to cause injury to an individual to compel him or her to do an act against his or her will.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- an electronic device for storing and processing data
- is a type of malware that is often disguised as legitimate software
Down
- is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner's private information
- is a standalone malware computerprogram that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the targetcomputer to access it.
- is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.Feb
- is a form of malware in which rogue software code effectively holds a user's computer hostage until a "ransom" fee is paid.
- The translation of data into a secret code.The most effective way to achieve data security.
- The global communication network that allows almost allcomputers worldwide to connect and exchange information.
- the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.
- software that is intended to damage or disable computers and computer systems.
16 Clues: an electronic device for storing and processing data • is a type of malware that is often disguised as legitimate software • is a string of characters used for authenticating a user on acomputer system • software that is intended to damage or disable computers and computer systems. • ...
Cybersecurity Crossword 2022-09-07
Across
- umbrella term for malicious software
- a software tool used to take advantage of a software or hardware vulnerabilities
- self replicating malware that does not require human interaction
- software that lets you browse the internet
- small files that track browser usage and preferences
- email based scamming
- software that scans a device to detect threats
Down
- day of the week most vendors release patches
- malware that encrypts files and demands payment
- software that secretly captures info as it is typed
- text message based scamming
- another word for a software update
- copy of computer data for data loss prevention
- phone based scamming
- any kind of unwanted, unsolicited digital communication
- filters unwanted traffic on a network
16 Clues: phone based scamming • email based scamming • text message based scamming • another word for a software update • umbrella term for malicious software • filters unwanted traffic on a network • software that lets you browse the internet • day of the week most vendors release patches • copy of computer data for data loss prevention • ...