cybersecurity Crossword Puzzles

dasd 2021-04-30

dasd crossword puzzle
Across
  1. Settings
  2. Cyber
  3. Commit
  4. Else
  5. Machine learning
  6. Integer
  7. If
  8. Function
  9. If else
  10. For loop
  11. Variable
  12. Print
  13. Loop
Down
  1. Sprite
  2. cybersecurity
  3. Autonomous
  4. nueral networks
  5. Uptime
  6. Tap
  7. Binary numbers
  8. Float
  9. Python
  10. While loop
  11. List
  12. Array

25 Clues: IfTapElseListLoopCyberFloatArrayPrintSpriteCommitUptimePythonIntegerIf elseSettingsFunctionFor loopVariableAutonomousWhile loopcybersecurityBinary numbersnueral networksMachine learning

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. refers to the permission to use
  2. a type of malicious code that looks legitimate
  3. a way of preventing errors
  4. information about yourself such as name
  5. the protection of computer systems and networks
  6. type of malware that spreads copies of itself from computer to computer
  7. unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
Down
  1. malicious software designed to block access to a computer system
  2. be aware of people trying to steal your information
  3. a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.
  4. software that automatically displays or downloads advertising material

11 Clues: a way of preventing errorsrefers to the permission to useinformation about yourself such as namea type of malicious code that looks legitimatethe protection of computer systems and networksbe aware of people trying to steal your informationmalicious software designed to block access to a computer system...

Cybersecurity 2024-09-09

Cybersecurity crossword puzzle
Across
  1. A deliberate attempt by hackers or malicious entities to infiltrate systems, networks, or devices to steal, alter, or destroy data, disrupt operations, or cause damage.
  2. A weakness in a system that could be exploited.
  3. Breaches Confidential, sensitive, or protected information is accessed, disclosed, or stolen by unauthorized individuals.
Down
  1. A piece of software or technique used to take advantage of a vulnerability.
  2. A measure of the extent to which an entity is threatened by a potential circumstance or event.
  3. Theft Someone illegally obtains and uses another person’s personal information to impersonate them for financial gain or fraud.
  4. The part of malware that performs malicious actions once a system is compromised.
  5. Previously unknown vulnerabilities that can be exploited before a patch is available.
  6. A potential danger to a system or organization.
  7. Measures taken to protect against attacks and mitigate risks.
  8. An attempt to exploit a vulnerability to compromise a system.

11 Clues: A potential danger to a system or organization.A weakness in a system that could be exploited.Measures taken to protect against attacks and mitigate risks.An attempt to exploit a vulnerability to compromise a system.A piece of software or technique used to take advantage of a vulnerability....

Cybersecurity Crossword 2023-05-10

Cybersecurity Crossword crossword puzzle
Across
  1. BOTNET
  2. MALWARE
  3. IP ADDRESS
  4. DATA BREACH
  5. VPN
Down
  1. HACKER
  2. PENTESTING
  3. SPOOFING
  4. PHISHING
  5. DEFENSE
  6. CLOUD
  7. TROJAN HORSE
  8. VULNERABILITY

13 Clues: VPNCLOUDHACKERBOTNETDEFENSEMALWARESPOOFINGPHISHINGPENTESTINGIP ADDRESSDATA BREACHTROJAN HORSEVULNERABILITY

la tecnología #2 2022-04-01

la tecnología #2 crossword puzzle
Across
  1. knowledge
  2. worsen
  3. screen
  4. delete
  5. cybersecurity
Down
  1. storage
  2. Web
  3. improve
  4. profile
  5. privacy
  6. apps
  7. printer

12 Clues: Webappsworsenscreendeletestorageimproveprofileprivacyprinterknowledgecybersecurity

Cybersecurity 2023-10-31

Cybersecurity crossword puzzle
Across
  1. when you personal data is available (another word for available)
  2. a hacker that is doing good
  3. a hacker that works without permission
  4. when your personal data is kept secret, another word for secret
Down
  1. Multi-Factor________ something you have, know, and are
  2. a kind of human engineering with no coding
  3. the art of protecting devices and data from unauthorized access
  4. malicious coding that can be a virus, worm, trojan etc
  5. Internet of __________ (network of connected devices)
  6. an unusual way to solve a problem
  7. a hacker that is malicious

11 Clues: a hacker that is maliciousa hacker that is doing goodan unusual way to solve a problema hacker that works without permissiona kind of human engineering with no codingInternet of __________ (network of connected devices)Multi-Factor________ something you have, know, and aremalicious coding that can be a virus, worm, trojan etc...

Cybersecurity Crossword 2023-09-15

Cybersecurity Crossword crossword puzzle
Across
  1. Input device that imports digital images and video
  2. drive Located inside the tower or case and used to store programs and most data
  3. Used to get spoken input
  4. Input device used to import images and doucments into the computer
  5. Deletes text to the left of insertion point (the cursor)
  6. The case that the parts of the computer reside
  7. Drive Reads CD disks
  8. Bar Inserts space between words and sentences
  9. Lock Capitilizes all letters when locked down
  10. Computer A computer that has several parts attached to it, is heavy and not usually moved
Down
  1. The screen on your computer or laptop
  2. Produces printed copies of the computer output
  3. The rows of letters and numbers that you press to type
  4. Used to produce audio output (sound)
  5. A pointing device used to make on screen selections
  6. Makes captial letters and symbols at the top of the keys
  7. A small and portable computer
  8. Central Processing Unit, the computer brain
  9. Moves to the next line or is used to execute a command (make it work)

19 Clues: Drive Reads CD disksUsed to get spoken inputA small and portable computerUsed to produce audio output (sound)The screen on your computer or laptopCentral Processing Unit, the computer brainBar Inserts space between words and sentencesLock Capitilizes all letters when locked downProduces printed copies of the computer output...

Loopbane in die moderne wêreld 2024-11-14

Loopbane in die moderne wêreld crossword puzzle
Across
  1. Data Engineer
  2. Computer Programmer
  3. Mechanical Engineer
  4. Information Security
  5. Accountant
  6. Attorney
  7. Marketing
Down
  1. Financial Manager
  2. Financial Analyst
  3. Human Resources Manager
  4. Cybersecurity Expert
  5. Digital Designer
  6. Operations Manager
  7. Chief Executive Officer
  8. Director
  9. Surgeon

16 Clues: SurgeonDirectorAttorneyMarketingAccountantData EngineerDigital DesignerFinancial ManagerFinancial AnalystOperations ManagerComputer ProgrammerMechanical EngineerCybersecurity ExpertInformation SecurityHuman Resources ManagerChief Executive Officer

cybersecurity crossword 2022-12-02

cybersecurity crossword crossword puzzle
Across
  1. software that that enters a computer system without the users knowledge or consent and makes the comuter go bad
  2. software that prevents you from getting unwanted viruses on your device
  3. software that runs as a program on the local computer
  4. an attacker who controls a botnet
  5. a logical computer network of zombies under the control of an attacker
  6. software made to stop the spread of malware
  7. a malicious program designed to enter a computer via a network to take advantage of a vulnerability in a application or an operating system
  8. a new software made that was better the old one and fixes things that were bad or old in the old software
  9. software that prevents you from getting infected from differents spyware
  10. a set of software tools used by an attacker to hide the actions or presence of other types of malware
  11. software code that gives access to a program or service
Down
  1. a software program that gives advertising content that is unwanted by the user
  2. a microsoft windows function that provides info to users and obtains their approval before a program can make a change to the computers settings
  3. a undate that makes the software better or more efficient
  4. an infected computer that is under the remote control of an attacker
  5. getting information from a device without the owner knowing
  6. a backup of your data saved on a hard
  7. software that keeps data on where you hit the keyboard
  8. data that is compromised and wont be given back unless a fee is paid

19 Clues: an attacker who controls a botneta backup of your data saved on a hardsoftware made to stop the spread of malwaresoftware that runs as a program on the local computersoftware that keeps data on where you hit the keyboardsoftware code that gives access to a program or servicea undate that makes the software better or more efficient...

Cybersecurity Awareness 2022-10-21

Cybersecurity Awareness crossword puzzle
Across
  1. ___ is a type of software designed to help the user's computer detect viruses and avoid them.
  2. ___ is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  3. The terms "bug" and "debugging" are popularly attributed to ___.
  4. Malicious actors can also use ____ to capture your personal and financial information such as credit card number, CVV, PIN, password and other sensitive information.
  5. Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.
  6. ___ is when attackers send malicious emails designed to trick people into falling for a scam.
  7. ___is a type of software designed to gain unauthorized access or to cause damage to a computer.
Down
  1. ___ National nodal agency for all measures to protect nation's critical information infrastructure.
  2. ___ Advertising software can be used to spread malware.
  3. ___ is actually considered the first computer virus?
  4. ___ is an authorization protocol being a standard designed to allow a website or application to access resources hosted by other web apps on behalf of a user.
  5. ___ is a program that secretly records what a user does so that cybercriminals can make use of this information.
  6. ___ is a cryptographic protocol for encrypting data to be transferred over a network which uses protocol to sets up implicit connection.
  7. ___ is a type of malware that is disguised as legitimate software.
  8. ___ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  9. ___ locks and encrypts the victim's data, important files and then demands a payment to unlock and decrypt the data.
  10. In-order to ensure the security of the data/information, we need to ___ the data.
  11. ___ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
  12. ___ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
  13. Which Wi-Fi communication protocol is more Secure?

20 Clues: Which Wi-Fi communication protocol is more Secure?___ is actually considered the first computer virus?___ Advertising software can be used to spread malware.The terms "bug" and "debugging" are popularly attributed to ___.___ is a type of malware that is disguised as legitimate software....

Cybersecurity 2023-04-28

Cybersecurity crossword puzzle
Across
  1. facts about something
  2. steals other peoples information
  3. malware
  4. obtaining private info
  5. making a purchase
  6. error an action which isn't intended
Down
  1. authorisation
  2. facts and statistics
  3. a network security device
  4. something only you can see
  5. standalone malware

11 Clues: malwareauthorisationmaking a purchasestandalone malwarefacts and statisticsfacts about somethingobtaining private infoa network security devicesomething only you can seesteals other peoples informationerror an action which isn't intended

CSAM 2020 2020-09-03

CSAM 2020 crossword puzzle
Across
  1. Someone with elevated access
  2. Authentication that requires more than just a passcode; usually in the form of a token or generated access code
  3. Software with malicious characteristics; often used to compromise a system
  4. A type of phishing that is more personalized to the end user
  5. Last name of TIAA's CISO
  6. An attempt at getting gaining vital information from an individual utilizing a variety of social engineering tactics; notoriously in emails
  7. The protection of internet connected systems and devices
  8. Label often assigned to devices that are on a network; can be static or dynamic
  9. An algorithmic method which hides characteristics of communication by converting it into various codes
  10. TIAA's one stop shop for computer and technical issues
Down
  1. Ethical hacking; hacking for the greater good
  2. A tactic often used by cyber criminals to lure in susceptible individuals in the form of urgency or consequence
  3. In December 2017, one of the most popular credit bureaus in the world that was exposed to a data breach that resulted in over 147 million Americans' information
  4. Unique hardware identifier; physical layer in the OSI model
  5. TIAA's cybersecurity mascot
  6. _ Routing: type of protocol that allows people to communicate anonymously; also a vegetable
  7. Malicious software which often requires payment in the form of cryptocurrency in order to decrypt data/files
  8. A concept where all devices are connected to the internet, such as household items
  9. What does VPN stand for
  10. A month dedicated to all things cybersecurity (acronym)

20 Clues: What does VPN stand forLast name of TIAA's CISOTIAA's cybersecurity mascotSomeone with elevated accessEthical hacking; hacking for the greater goodTIAA's one stop shop for computer and technical issuesA month dedicated to all things cybersecurity (acronym)The protection of internet connected systems and devices...

ACTIVITY 1: Crossword Puzzle 2A 2024-04-30

ACTIVITY 1: Crossword Puzzle 2A crossword puzzle
Across
  1. Relating to digital technology.
  2. Bullying online.
  3. Protection from harm.
  4. Protecting digital systems.
  5. Control over personal information.
  6. Malicious software.
  7. Connected to the internet.
  8. Fraudulent information request.
  9. Having knowledge and using technology safely and effective
  10. Malicious self-replicating code.
  11. Software to access websites.
  12. Unique characteristics of an individual.
  13. Interconnected computers.
  14. Intentional attack on systems.
  15. Global computer network.
  16. Secret access code.
  17. Traces of online activity.
  18. Unsolicited messages.
  19. Criminal activities online.
  20. Hardware with a function.
  21. Deceptive scheme.
  22. Information in digital form.
  23. Computer programs.
Down
  1. Relating to society.
  2. the ability to analyze and evaluate infomation.
  3. A cyber attack that redirects website traffic to a fraudulent site
  4. Organized and meaningful data.
  5. Unauthorized system access.
  6. Moral principles online.
  7. Traces of online activity.
  8. Verifying user identity.
  9. Making a copy of data to protect against loss or damage
  10. Practices for cybersecurity.
  11. Communication channels.
  12. Protecting systems from attacks.
  13. Converting data into code.
  14. Ability to use digital tools.
  15. Understanding cybersecurity threats.
  16. Laws governing cyberspace.
  17. Membership in a country.
  18. Unauthorized use of personal information.
  19. Network security system.
  20. A secret codr used to access a computer system or online account
  21. Data stored by websites.
  22. Knowledge or perception of a situation.
  23. Dual authentication.
  24. Software to detect and remove viruses.
  25. Device forwarding data.
  26. Physical computer components.
  27. Measures for protection.
  28. Unauthorized data access.

51 Clues: Bullying online.Deceptive scheme.Computer programs.Malicious software.Secret access code.Relating to society.Dual authentication.Protection from harm.Unsolicited messages.Communication channels.Device forwarding data.Moral principles online.Verifying user identity.Membership in a country.Network security system.Data stored by websites....

025-1 2024-07-12

025-1 crossword puzzle
Across
  1. Process of restoring systems or data after an incident
  2. Unauthorized access to sensitive information
  3. Related to laws or regulations governing cybersecurity incidents
  4. Systematic examination to uncover facts about an incident
  5. Unauthorized transfer of data from a computer or network
  6. Malicious software demanding payment for data release
  7. Method used to secure data from unauthorized access
  8. Scientific analysis used to investigate and solve crimes
  9. Interruption to normal operations
Down
  1. Rules and guidelines governing cybersecurity practices
  2. Weakness in software or hardware that could be exploited
  3. State of exposing assets to danger or risk
  4. Process of discovering unauthorized access or activity
  5. Event that causes disruption or harm
  6. Identity concealed or not identified
  7. Digital currency used in ransom demands
  8. Measures taken to protect against unauthorized access
  9. Taking advantage of vulnerabilities in software or hardware
  10. A malicious assault on computer systems
  11. Effect or influence of the cyberattack

20 Clues: Interruption to normal operationsEvent that causes disruption or harmIdentity concealed or not identifiedEffect or influence of the cyberattackDigital currency used in ransom demandsA malicious assault on computer systemsState of exposing assets to danger or riskUnauthorized access to sensitive information...

Cybersecurity 2021-03-01

Cybersecurity crossword puzzle
Across
  1. Click every traffic light in this image.
  2. Encrypt files to extort money.
  3. Fake email link bait.
  4. Proving your identity.
  5. Sneaky peek a password.
Down
  1. Brute force uses many attempts to guess it.
  2. Denial of Service attacks this.
  3. Blocks incoming and outgoing connections.
  4. Automated internet task software.
  5. Unauthorised access to computer systems.
  6. Horse with a hidden suprise.

11 Clues: Fake email link bait.Proving your identity.Sneaky peek a password.Horse with a hidden suprise.Encrypt files to extort money.Denial of Service attacks this.Automated internet task software.Click every traffic light in this image.Unauthorised access to computer systems.Blocks incoming and outgoing connections....

CyberSecurity 2024-03-09

CyberSecurity crossword puzzle
Across
  1. pairs a public key for encryption and a private key for decryption
  2. software intended to damage a computing system or to take partial control over its operation
  3. a malicious program that can copy itself and gain access to a computer in an unauthorized way
  4. encryption involves one key for both encryption and decryption
  5. a technique that attempts to trick a user into providing personal information
  6. infomration about an individual that identifies, links, relates or describes them
Down
  1. a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentification mechanism
  2. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  3. the process of decoding data
  4. the process of encoding data to prevent unauthorized access
  5. a wireless access point that give unauthorized access to to secure networks

11 Clues: the process of decoding datathe process of encoding data to prevent unauthorized accessencryption involves one key for both encryption and decryptionpairs a public key for encryption and a private key for decryptiona wireless access point that give unauthorized access to to secure networks...

Cybersecurity Crossword 2023-01-26

Cybersecurity Crossword crossword puzzle
Across
  1. altered video to spread disinformation
  2. unique string that identifies device
  3. helps protect system
  4. malware that transmits private data
  5. helps prevent unauthorized network access
  6. flood website/server until crash
  7. codes that protect data
  8. cybersecurity professionals
  9. designs data communications network
Down
  1. unauthorized access to sensitive info
  2. software designed to disrupt system
  3. plans and implements security
  4. remote encrypted network access
  5. helps prevent unauthorized access
  6. criminal hackers
  7. requests payment to unlock
  8. malware hidden inside legitimate file
  9. mimics legitimate websites/emails
  10. network of computers used for cyber attacks

19 Clues: criminal hackershelps protect systemcodes that protect datarequests payment to unlockcybersecurity professionalsplans and implements securityremote encrypted network accessflood website/server until crashhelps prevent unauthorized accessmimics legitimate websites/emailssoftware designed to disrupt systemmalware that transmits private data...

Cybersecurity Compliance 2024-05-24

Cybersecurity Compliance crossword puzzle
Across
  1. Scammers use ______ tactics to try to get a fast response.
  2. If you suspect a link or attachment may be suspicious, _______ download it.
  3. A good password is __________ for you, but difficult for others to guess.
  4. If you believe you've clicked a bad link, notify _____ immediately.
  5. Malware is most likely to enter an organization through __________.
  6. Never ____________ old passwords.
  7. Malicious links disguised as legitimate messages.
  8. Be wary of ______________ attachments.
Down
  1. Each should be unique and complicated.
  2. Our e-mail security system is called __________.
  3. Scams can come through e-mail,_______, phone call, or even in person.
  4. No platform is ________ to breaches.
  5. Using a work device for _________ use increases the risk of a cyber threat.
  6. Two-factor __________ protects your account by requiring a second identity verification.
  7. Don't use obvious __________ changes like substituting a number for a letter.
  8. Passwords should never be __________ with anyone.
  9. If you feel you have fallen prey to a scammer, notify CHN or ___________.
  10. 65% of people _________ passwords.
  11. 80% of breaches are related to stolen or ________ passwords.

19 Clues: Never ____________ old passwords.65% of people _________ passwords.No platform is ________ to breaches.Each should be unique and complicated.Be wary of ______________ attachments.Our e-mail security system is called __________.Passwords should never be __________ with anyone.Malicious links disguised as legitimate messages....

CSAM 2020 2020-09-03

CSAM 2020 crossword puzzle
Across
  1. A month dedicated to all things cybersecurity (acronym)
  2. TIAA's cybersecurity mascot
  3. Label often assigned to devices that are on a network; can be static or dynamic
  4. The protection of internet connected systems and devices
  5. A tactic often used by cyber criminals to lure in susceptible individuals in the form of urgency or consequence
  6. TIAA's one stop shop for computer and technical issues
  7. Malicious software which often requires payment in the form of cryptocurrency in order to decrypt data/files
  8. Ethical hacking; hacking for the greater good
  9. A type of phishing that is more personalized to the end user
  10. A concept where all devices are connected to the internet, such as household items
  11. Authentication that requires more than just a passcode; usually in the form of a token or generated access code
Down
  1. Unique hardware identifier; physical layer in the OSI model
  2. _ Routing: type of protocol that allows people to communicate anonymously; also a vegetable
  3. An attempt at getting gaining vital information from an individual utilizing a variety of social engineering tactics; notoriously in emails
  4. What does VPN stand for
  5. Someone with elevated access
  6. Last name of TIAA's CISO
  7. Software with malicious characteristics; often used to compromise a system
  8. In December 2017, one of the most popular credit bureaus in the world that was exposed to a data breach that resulted in over 147 million Americans' information
  9. An algorithmic method which hides characteristics of communication by converting it into various codes

20 Clues: What does VPN stand forLast name of TIAA's CISOTIAA's cybersecurity mascotSomeone with elevated accessEthical hacking; hacking for the greater goodTIAA's one stop shop for computer and technical issuesA month dedicated to all things cybersecurity (acronym)The protection of internet connected systems and devices...

CyF Chapter 1 2023-10-08

CyF Chapter 1 crossword puzzle
Across
  1. What is the acronym for the intermediate level certification offered by EC-Council that the cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.
  2. Attacks that originate from within an organization are known as ___________ security threats.
  3. Which type of cyber attack can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
  4. Script _____ are teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill.
  5. DDoS in cyber security means "Distributed ______-of-Service.
  6. The acronym of this technology which enable people to connect billions of devices to the Internet.
  7. Criminals can also use rogue devices, such as _____ Wi-Fi access points.
  8. Information _______ Management Standards provide a framework for implementing cybersecurity measures within an organization.
  9. Cybersecurity ______ possess the insight to recognize the influence of data and harness that power to build great organizations, provide services and protect people from cyberattacks.
Down
  1. Criminals use this tool to capture data streams over a network.
  2. Federated identity management refers to ______ enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
  3. What is another word used to describe the speed of data.
  4. A group of grey hat hackers who rally and protest against different political and social ideas.
  5. At which level are the employees responsible to protect the organization’s reputation, data, and customers.
  6. Cyber ______ is a weakness that makes a target susceptible to an attack
  7. The acronym of the practice where people used their own devices to access enterprise information.
  8. This group of criminals breaks into computers or networks to gain access for various reasons.
  9. A cybersecurity ______ is the possibility that a harmful event, such as an attack, will occur.
  10. State _____ Hackers are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
  11. _____ hat attackers are unethical criminals who violate computer and network security for personal gain.

20 Clues: What is another word used to describe the speed of data.DDoS in cyber security means "Distributed ______-of-Service.Criminals use this tool to capture data streams over a network.Cyber ______ is a weakness that makes a target susceptible to an attackCriminals can also use rogue devices, such as _____ Wi-Fi access points....

Hack Your Brain 2024-09-18

Hack Your Brain crossword puzzle
Across
  1. A specific type of phishing that targets high-profile individuals, such as executives.
  2. A technology used to create a secure, encrypted tunnel between two networks.
  3. A malicious attempt to disrupt a network by overwhelming it with traffic.
  4. A simulation-based cybersecurity exercise to assess an organization's defensive capabilities.
  5. A technique where attackers attempt to guess passwords by trying all possible combinations.
  6. The unauthorized exploitation of a network to access confidential data or systems.
Down
  1. An individual who uses hacking skills for ethical purposes.
  2. An offensive security activity where ethical hackers simulate real-world attacks to test defenses (Two words, hyphenated).
  3. A cybersecurity practice where teams work against each other, with attackers and defenders.
  4. ... Shields - The world's largest multinational cybersecurity exercise, organized annually by NATO.
  5. A widely used asymmetric encryption algorithm named after its inventors.
  6. ... Management - The process of identifying and analyzing issues that could have an unwanted effect on company assets.

12 Clues: An individual who uses hacking skills for ethical purposes.A widely used asymmetric encryption algorithm named after its inventors.A malicious attempt to disrupt a network by overwhelming it with traffic.A technology used to create a secure, encrypted tunnel between two networks....

Introduction to Cybersecurity 2024-02-22

Introduction to Cybersecurity crossword puzzle
Across
  1. is the act of skirting or breaking through security boundaries.
  2. a type of hacker that is generally ethical and law-abiding.
  3. focuses on keeping applications or programs secure throughout their lifecycle.
  4. certification validates the holders have met the baseline of understanding required by all cybersecurity job positions.
Down
  1. is based on the key concepts of information assurance.
  2. an attack in which the attacker is connectedto a network and monitors an authenticated session.
  3. a set of policies and procedures meant to improve and guide anorganization’s cybersecurity practices.
  4. Is the protection of digital devices and their connected networks from danger and threats.
  5. a process in which organizations determine the information about themselves which should be kept private versus what can be shared with the public.
  6. prevents and protects unauthorized intrusions into the network.
  7. which is a set of security controls designed to protect payment account security.
  8. includes threats such as viruses, worms, Trojan horses.

12 Clues: is based on the key concepts of information assurance.includes threats such as viruses, worms, Trojan horses.a type of hacker that is generally ethical and law-abiding.is the act of skirting or breaking through security boundaries.prevents and protects unauthorized intrusions into the network....

Hack Your Brain 2024-09-18

Hack Your Brain crossword puzzle
Across
  1. A small device or software used to create a secure encrypted tunnel between two networks
  2. The unauthorized exploitation of a network to access confidential data or systems
  3. A simulation-based cybersecurity exercise to assess an organization's defensive capabilities (Two words)
  4. The process of identifying and analyzing security risks
  5. A specific type of phishing that targets high-profile individuals, such as executives
  6. A malicious attempt to disrupt a network by overwhelming it with traffic
  7. An individual who uses hacking skills for ethical purposes
Down
  1. An offensive security activity where ethical hackers simulate real-world attacks to test defenses (Two words, hyphenated)
  2. Teaming A cybersecurity practice where teams work against each other, with attackers and defenders (Two words)
  3. A technique where attackers attempt to guess passwords by trying all possible combinations
  4. Shields The world's largest multinational cybersecurity exercise, organized annually by NATO (Two words)
  5. A widely-used asymmetric encryption algorithm named after its inventors

12 Clues: The process of identifying and analyzing security risksAn individual who uses hacking skills for ethical purposesA widely-used asymmetric encryption algorithm named after its inventorsA malicious attempt to disrupt a network by overwhelming it with trafficThe unauthorized exploitation of a network to access confidential data or systems...

AI TECHNOLOGY AND SOCIETY 2024-03-06

AI TECHNOLOGY AND SOCIETY crossword puzzle
Across
  1. Computing
  2. Talkbot
  3. Artificial
  4. 3Dimensional
  5. Automation
Down
  1. Instructions
  2. Information
  3. Protection
  4. Learning
  5. Network
  6. CyberSpace

11 Clues: TalkbotNetworkLearningComputingProtectionArtificialCyberSpaceAutomationInformationInstructions3Dimensional

Cybersecurity Awareness 2023-10-03

Cybersecurity Awareness crossword puzzle
Across
  1. A process by which a system verifies the identity of a user who wishes to access it.
  2. Small piece of data stored on a user's computer by the web browser while browsing a website.
  3. A set of static analysis tools for investigating and comparing phishing kit content within single or multiple kits.
  4. Manipulating individuals into divulging confidential information through psychological tactics.
  5. A type of malicious software that blocks access to a user's data until a sum of money is paid.
  6. A secure bridge between your device and the internet, often used to keep browsing activity private.
  7. AI-generated fake content, often video, that looks convincingly real.
  8. A collection of software and tools to make phishing campaigns easier for attackers.
  9. Software designed to harm or exploit any device, network, service, or program.
Down
  1. Targeted phishing attempts directed at specific individuals or companies.
  2. A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
  3. Malicious code that's activated by a specific condition or event.
  4. Information used to understand the enemy's strengths and weaknesses.
  5. Phishing attacks that are executed via SMS.
  6. Malicious software that records every keystroke to secretly gather personal information.
  7. Ensuring operations and data adhere to established rules and regulations.
  8. A network of private computers infected with malicious software and controlled as a group.
  9. A secret combination, often alphanumeric, used for authentication.

18 Clues: Phishing attacks that are executed via SMS.Malicious code that's activated by a specific condition or event.A secret combination, often alphanumeric, used for authentication.Information used to understand the enemy's strengths and weaknesses.AI-generated fake content, often video, that looks convincingly real....

cybersecurity terms 2022-12-16

cybersecurity terms crossword puzzle
Across
  1. a computer connected to a network that has been compromised by a hacker
  2. a kind of software used to prevent, scan, detect and delete viruses from a computer
  3. software that enables a user to covert information from another computer by transmitting data from their hard drive
  4. software that allows an unauthorized user to access a computer
  5. a type of malware that self replicates and infects other computers
  6. a class of cyberattacks in which attackers remotely execute commands to place malware or other malicious code on your computer or network
  7. a type of malware that disguises itself as legitimate code or software\
  8. software that displays advertising material
  9. A software-based firewall installed on a desktop or laptop computer to monitor and control its incoming and outgoing network traffic
Down
  1. a network security device that monitors and filters incoming and outgoing network traffic
  2. a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages
  3. malicious software that blocks access to a computer until a sum of money is paid
  4. an undocumented way of gaining access to a computer system
  5. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  6. a network of computers with malicious software
  7. any program that prohibits a pop-up at some point in time
  8. hackers who use automated techniques to scan specific network ranges and find vulnerable systems
  9. software updates that address security vulnerabilities

18 Clues: software that displays advertising materiala network of computers with malicious softwaresoftware updates that address security vulnerabilitiesany program that prohibits a pop-up at some point in timean undocumented way of gaining access to a computer systemsoftware that allows an unauthorized user to access a computer...

Cybersecurity Fundamental Chapter 2 2024-06-03

Cybersecurity Fundamental Chapter 2 crossword puzzle
Across
  1. Ensures that information is accessible only to those authorized to have access.
  2. The foundational principles of cybersecurity.
  3. A framework developed by John McCumber to manage and protect networks, domains, and the Internet.
  4. The three categories of measures used to protect cyberspace: Technologies (devices and products), Policies and Practices (procedures and guidelines), and People (awareness and knowledge)
Down
  1. The ISO Cybersecurity Model, including ISO 27001 and ISO 27002 standards, provides a framework for managing information security.
  2. Data that is stored on physical media (e.g., hard drives, USB drives, cloud storage). Protecting data at rest involves encryption, access controls, and physical security measures.
  3. Data that is being transmitted across networks (e.g., emails, data transfers). Securing data in transit involves using secure communication protocols such as SSL/TLS, VPNs, and encryption.
  4. Data that is being actively processed by applications. Protecting data in process requires secure coding practices, memory protection mechanisms, and ensuring that applications handle data securely.
  5. Ensures that information and resources are accessible to authorized users when needed.
  6. Ensures that information remains accurate and complete throughout its lifecycle.
  7. The three states in which data can exist and require protection.

11 Clues: The foundational principles of cybersecurity.The three states in which data can exist and require protection.Ensures that information is accessible only to those authorized to have access.Ensures that information remains accurate and complete throughout its lifecycle....

Cybersecurity terms 2024-03-12

Cybersecurity terms crossword puzzle
Across
  1. horse Malicious software disguised innocuously.
  2. Identity verification using traits.
  3. Malicious software threat
  4. Malicious code component.
  5. security Device-specific protection measures.
  6. policy Guidelines for security measures.
  7. Applying software updates regularly.
  8. Weakness in system security.
Down
  1. Deceptive email communication.
  2. testing Ethical hacking simulation.
  3. Malware with system-level access.
  4. hygiene Good digital security practices.
  5. incident Breach or violation event.
  6. Identity verification using traits.
  7. Malicious digital intrusion attempt.
  8. Network security barrier.
  9. Data protection through scrambling.
  10. Secure communication technique.
  11. Software against malicious programs.
  12. hat Ethical security expert.

20 Clues: Network security barrier.Malicious software threatMalicious code component.Weakness in system security.Deceptive email communication.Secure communication technique.Malware with system-level access.testing Ethical hacking simulation.Identity verification using traits.Identity verification using traits.Data protection through scrambling....

Cybersecurity Awareness 2023-09-06

Cybersecurity Awareness crossword puzzle
Across
  1. Method of secure communication (12 letters).
  2. Malware that demands payment to restore access (10 letters).
  3. Software that collects information without consent (7 letters).
  4. A group of interconnected devices (7 letters).
  5. A potential danger or risk (6 letters).
  6. Software that can infect your computer. (5 letters).
  7. Information stored on a computer (4 letters).
  8. Unauthorized access to a computer system (7 letters).
Down
  1. Process of converting data into a code (11 letters).
  2. A fraudulent scheme to deceive people (4 letters).
  3. The practice of using two different authentication methods (10 letters).
  4. A person who creates software.
  5. Weakness in a system that can be exploited (13 letters).
  6. Measures taken to protect against cyber threats (8 letters).
  7. A person interacting with a computer system (4 letters).
  8. A network security software. (8 letters).
  9. A common email-based attack (8 letters).
  10. Software to protect against malware (9 letters).

18 Clues: A person who creates software.A potential danger or risk (6 letters).A common email-based attack (8 letters).A network security software. (8 letters).Method of secure communication (12 letters).Information stored on a computer (4 letters).A group of interconnected devices (7 letters).Software to protect against malware (9 letters)....

Cybersecurity Scramble 2023-10-24

Cybersecurity Scramble crossword puzzle
Across
  1. Multiple sources sending an overwhelming amount of packets to crash the device.
  2. Holds computer data hostage in exchange for money.
  3. Requires end-user initiation.
  4. Sending an overwhelming amount of packets to crash the device.
  5. Phishing by impersonating businesses.
  6. A _ attack that attacks a vulnerability on a network unknown to the vendor.
  7. Triggers malicious code.
  8. Creates backdoors in the operating system.
  9. Replicates using network vulnerabilities
  10. Sending unauthorized messages to another bluetooth device.
Down
  1. Scares the victim into infecting their system.
  2. Phishing using calls.
  3. Creates ad-popups for the authors to generate revenue.
  4. Copying a victims information from bluetooth.
  5. Malware that carries out operations pretending to be something else.
  6. Phishing using texts.
  7. Lets the attacker view the actions of the user and their data.
  8. Phishing that targets high profile individuals.

18 Clues: Phishing using calls.Phishing using texts.Triggers malicious code.Requires end-user initiation.Phishing by impersonating businesses.Replicates using network vulnerabilitiesCreates backdoors in the operating system.Copying a victims information from bluetooth.Scares the victim into infecting their system....

dasd 2021-04-30

dasd crossword puzzle
Across
  1. List
  2. flotante, Float
  3. entero, Integer
  4. Sprite
  5. Loop
  6. Variable
  7. Autonomous
  8. binarios Binary numbers
  9. Else
  10. If
  11. Cyber
  12. automático, Machine learning
  13. If else
  14. neuronales, nueral networks
Down
  1. Settings
  2. cybersecurity
  3. Function
  4. Python
  5. el lazo, For loop
  6. Print
  7. Commit
  8. Array
  9. while, While loop
  10. activo, Uptime
  11. Tap

25 Clues: IfTapListLoopElsePrintArrayCyberSpritePythonCommitIf elseSettingsFunctionVariableAutonomouscybersecurityactivo, Uptimeflotante, Floatentero, Integerel lazo, For loopwhile, While loopbinarios Binary numbersneuronales, nueral networksautomático, Machine learning

dasd 2021-04-30

dasd crossword puzzle
Across
  1. List
  2. flotante, Float
  3. entero, Integer
  4. Sprite
  5. Loop
  6. Variable
  7. Autonomous
  8. binarios Binary numbers
  9. Else
  10. If
  11. Cyber
  12. automático Machine learning
  13. If else
  14. neuronales nueral networks
Down
  1. Settings
  2. cybersecurity
  3. Function
  4. Python
  5. el lazo, For loop
  6. Print
  7. Commit
  8. Array
  9. while, While loop
  10. activo, Uptime
  11. Tap

25 Clues: IfTapListLoopElsePrintArrayCyberSpritePythonCommitIf elseSettingsFunctionVariableAutonomouscybersecurityactivo, Uptimeflotante, Floatentero, Integerel lazo, For loopwhile, While loopbinarios Binary numbersneuronales nueral networksautomático Machine learning

Year 12 Cybersecurity 2023-08-16

Year 12 Cybersecurity crossword puzzle
Across
  1. A hacker who operates between ethical and unethical boundaries, often exposing vulnerabilities without permission.
  2. An individual who simulates cyberattacks to evaluate the security of a system.
  3. A hacker who uses their skills to help organizations identify and fix security vulnerabilities.
  4. Measures taken to protect physical assets and facilities from unauthorized access or harm.
  5. The accuracy and reliability of data, protected from unauthorized alteration.
  6. A hacker who engages in malicious activities for personal gain or to cause harm.
  7. Mistakes made by individuals that can lead to security breaches.
  8. Creating multiple security layers to prevent unauthorized access at different levels.
  9. Covert agents who gather information on behalf of a government or organization.
  10. An individual or group that uses cyberattacks to create fear and chaos for political or ideological reasons.
Down
  1. Ensuring that sensitive information is accessible only to authorized individuals.
  2. The ability to identify and recognize cybersecurity threats and incidents.
  3. Making sure that data is accessible when needed, without unauthorized disruptions.
  4. Individuals with advanced computer skills who manipulate software or systems for various purposes.
  5. Covert activities aimed at gathering confidential information from competitors or enemies.
  6. Individuals who engage in illegal activities on the internet for financial gain.
  7. People within an organization who have access to sensitive information and can pose security risks.
  8. Implementing measures to discourage potential attackers from targeting a system or organization.
  9. Introducing obstacles and barriers to slow down attackers' progress.
  10. The process of restoring systems and data after a cybersecurity breach or incident.
  11. Taking swift actions to address and mitigate cybersecurity incidents.

21 Clues: Mistakes made by individuals that can lead to security breaches.Introducing obstacles and barriers to slow down attackers' progress.Taking swift actions to address and mitigate cybersecurity incidents.The ability to identify and recognize cybersecurity threats and incidents....

Group Activity 2024-09-20

Group Activity crossword puzzle
Across
  1. limited access of any resources
  2. encrypted messages
  3. example of integrity
  4. example of integrity
Down
  1. It involves a range of technologies, processes and practices designed to safeguard the CIA of information
  2. data at-rest
  3. Component of cybersecurity
  4. combination of date and time
  5. reading by authorized parties
  6. authorized parties are able to modify

10 Clues: data at-restencrypted messagesexample of integrityexample of integrityComponent of cybersecuritycombination of date and timereading by authorized partieslimited access of any resourcesauthorized parties are able to modifyIt involves a range of technologies, processes and practices designed to safeguard the CIA of information

Internal Audit Holiday Fun 2023-12-14

Internal Audit Holiday Fun crossword puzzle
Across
  1. TEST
  2. UNLOCK
  3. SWEET
  4. TECH SAFETY
  5. CHEAT
  6. CHEAT
  7. WENDY'S TREAT
Down
  1. PROCESS SAFETY MEASURES
  2. MEAN ONE
  3. PROBABILITY
  4. JOLLY
  5. APPROVAL
  6. RED NOSE

13 Clues: TESTJOLLYSWEETCHEATCHEATUNLOCKMEAN ONEAPPROVALRED NOSEPROBABILITYTECH SAFETYWENDY'S TREATPROCESS SAFETY MEASURES

Cybersecurity 2022-09-16

Cybersecurity crossword puzzle
Across
  1. update to an operating system to repair an bug or vulnerability
  2. tool installed to give an attacker easier access to the compromised system
  3. Electronic junk mail or junk newsgroup postings.
  4. generic term for a number of different types of malicious code.
  5. User acting with malicious intent to compromise a system
  6. term to describe connecting multiple separate networks together.
Down
  1. use a computer to gain unauthorized access to data in a system
  2. program that can retrieve and display information from servers on the World Wide Web
  3. Malware that locks/encrypts computers
  4. e-mails that try to trick a user into entering valid credentials at a fake website

10 Clues: Malware that locks/encrypts computersElectronic junk mail or junk newsgroup postings.User acting with malicious intent to compromise a systemuse a computer to gain unauthorized access to data in a systemupdate to an operating system to repair an bug or vulnerabilitygeneric term for a number of different types of malicious code....

Cybersecurity 2023-10-31

Cybersecurity crossword puzzle
Across
  1. a hacker that is malicious
  2. the art of protecting devices and data from unauthorized access
  3. a hacker that is doing good
  4. when your personal data is kept secret, another word for secret
Down
  1. a hacker that works without permission
  2. when you personal data is available (another word for available)
  3. Multi-Factor________ something you have, know, and are
  4. Internet of __________ (network of connected devices)
  5. a kind of human engineering with no coding
  6. an unusual way to solve a problem

10 Clues: a hacker that is maliciousa hacker that is doing goodan unusual way to solve a problema hacker that works without permissiona kind of human engineering with no codingInternet of __________ (network of connected devices)Multi-Factor________ something you have, know, and arethe art of protecting devices and data from unauthorized access...

Cybersecurity 2023-11-15

Cybersecurity crossword puzzle
Across
  1. A cryptographic attack on hash collisions
  2. A sudden unplanned event.
  3. Something built in to or used in a system to address gaps or weaknesses in the controls that could otherwise lead to an exploit.
  4. An attack that seeks to obtain personal or private financial information through domain spoofing
  5. The action of multiple attackers planning a cyberattack
Down
  1. The art of exploiting bugs and weaknesses that exist in the telephone system
  2. A process of changing hardware and software configurations to make computers and devices as secure as possible.
  3. The capture and monitoring of network IP packets using a packet sniffer
  4. A type of fraud in which an attacker attempts to trick the victim into providing private information.
  5. The act of unscrambling ciphertext into plaintext

10 Clues: A sudden unplanned event.A cryptographic attack on hash collisionsThe act of unscrambling ciphertext into plaintextThe action of multiple attackers planning a cyberattackThe capture and monitoring of network IP packets using a packet snifferThe art of exploiting bugs and weaknesses that exist in the telephone system...

CYBERSECURITY 2024-01-14

CYBERSECURITY crossword puzzle
Across
  1. Online storage.
  2. Decryption necessity.
  3. Securely lock files.
  4. Harmful software.
  5. Fake software tactic.
Down
  1. Ransomware type.
  2. Encrypting malware.
  3. Ensuring privacy.
  4. Data preservation.
  5. Remote access method.

10 Clues: Online storage.Ransomware type.Harmful software.Ensuring privacy.Data preservation.Encrypting malware.Securely lock files.Decryption necessity.Fake software tactic.Remote access method.

Cybersecurity 2024-07-19

Cybersecurity crossword puzzle
Across
  1. gained technology access when not authorized
  2. protecting patient healthcare information
  3. safeguards data during transmission and storage
  4. patient data remaining accessible
Down
  1. passwords recommended for "logging in"
  2. patient information kept private
  3. patient records remaining accurate and intact
  4. healthcare leading cause of security breaches
  5. digitalized complete patient health information
  6. recommended regularly for software integrity

10 Clues: patient information kept privatepatient data remaining accessiblepasswords recommended for "logging in"protecting patient healthcare informationgained technology access when not authorizedrecommended regularly for software integritypatient records remaining accurate and intacthealthcare leading cause of security breaches...

Cybersecurity 2024-04-03

Cybersecurity crossword puzzle
Across
  1. A computer attack aimed at making a service unavailable.
  2. A program/device that protects a network.
  3. A type of malware that looks like a legimate program and is undetected by the anti-virus
  4. A network of computers infected by malware that are under the control of a single attacking party.
  5. A technique for protecting data by transforming it irreversibly.
Down
  1. A technique of symmetric encryption.
  2. A hashing algorithm which is the most used in secret-keys transfert.
  3. A known certfication authority who offers free certificates.
  4. A brand that makes cybersecurity devices especially for companies.
  5. A technique used by fraudsters to obtain personal information with the aim of committing identity theft.

10 Clues: A technique of symmetric encryption.A program/device that protects a network.A computer attack aimed at making a service unavailable.A known certfication authority who offers free certificates.A technique for protecting data by transforming it irreversibly.A brand that makes cybersecurity devices especially for companies....

Cybersecurity 2024-05-04

Cybersecurity crossword puzzle
Across
  1. Weaknesses or flaws in software, hardware, or network infrastructure that can be exploited by attackers to compromise the security of a system.
  2. The process of converting data into a form that is unreadable without the correct decryption key, thereby protecting it from unauthorized access.
  3. The process of verifying the identity of a user or device attempting to access a system, often through passwords, biometric scans, or two-factor authentication methods.
Down
  1. Deliberate actions taken by hackers or malicious entities to disrupt, damage, or gain unauthorized access to computer systems, networks, or data.
  2. A type of cyber attack in which attackers impersonate legitimate entities to deceive individuals into providing sensitive information, such as passwords or financial data.
  3. Unauthorized access or attempted access to a computer system or network by an individual or automated process.
  4. Authentication techniques that rely on unique biological characteristics, such as fingerprints, iris scans, or facial recognition, to verify the identity of individuals accessing a system or device.
  5. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  6. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data, often spread through email attachments, infected websites, or removable media.
  7. A software update designed to fix security vulnerabilities or address other issues within a program or operating system.

10 Clues: Unauthorized access or attempted access to a computer system or network by an individual or automated process.A software update designed to fix security vulnerabilities or address other issues within a program or operating system....

Cybersecurity 2024-04-29

Cybersecurity crossword puzzle
Across
  1. Unsolicited or unwanted email, often containing malicious links or attachments.
  2. Unauthorized access or exposure of sensitive information.
  3. A security mechanism that uses unique physical or behavioral characteristics to authenticate users.
  4. Manipulating individuals into divulging confidential information or performing actions that compromise security.
  5. Measures taken to protect the integrity and confidentiality of data transmitted over a network.
Down
  1. Malware that encrypts files or systems and demands payment for their release.
  2. A form of MFA that requires users to provide two different authentication factors.
  3. Knowledge and understanding of cybersecurity risks, threats, and best practices.
  4. The process of responding to and mitigating the effects of a cybersecurity incident.
  5. Software designed to detect, prevent, and remove malicious software from computer systems.

10 Clues: Unauthorized access or exposure of sensitive information.Malware that encrypts files or systems and demands payment for their release.Unsolicited or unwanted email, often containing malicious links or attachments.Knowledge and understanding of cybersecurity risks, threats, and best practices....

Cybersecurity 2024-05-07

Cybersecurity crossword puzzle
Across
  1. when you lose data this policy lets you restore it
  2. a program that allows hackers access to data without detect
  3. hacking under the onwers consent
  4. security actions like protecting the computer
  5. A self-replicating program
Down
  1. hacker that violates laws but not for malicious intent
  2. Basically rules and regulations
  3. protecting data from digital attacks
  4. Hacking with malicious intent
  5. A malicious program that is desguised

10 Clues: A self-replicating programHacking with malicious intentBasically rules and regulationshacking under the onwers consentprotecting data from digital attacksA malicious program that is desguisedsecurity actions like protecting the computerwhen you lose data this policy lets you restore ithacker that violates laws but not for malicious intent...

Cybersecurity 2024-09-22

Cybersecurity crossword puzzle
Across
  1. The highest level of access in a computer system
  2. Security technology that uses physical characteristics like fingerprints or facial recognition
  3. A security principle that ensures data has not been altered or tampered with
  4. A security threat that originates from within an organization
  5. The process of confirming the identity of a user or device
Down
  1. A hidden method of bypassing normal authentication to gain access to a system
  2. the science of encrypting and decrypting data
  3. is a key goal of cyber security
  4. The use of investigative techniques to examine digital crimes or security breaches
  5. one of the world's largest ransomware attacks in history

10 Clues: is a key goal of cyber securitythe science of encrypting and decrypting dataThe highest level of access in a computer systemone of the world's largest ransomware attacks in historyThe process of confirming the identity of a user or deviceA security threat that originates from within an organization...

Cybersecurity 2021-06-02

Cybersecurity crossword puzzle
Across
  1. Intention to damage a person
  2. The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  3. Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
  4. It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
  5. Ability of a user to access information or resources in a specified location and in the correct format.
  6. Illegal access to a computer system for the purpose od causing damage.
Down
  1. Malicious software designed to damage.
  2. Without permission or authorization
  3. Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
  4. It's the protection of personal information.

10 Clues: Intention to damage a personWithout permission or authorizationMalicious software designed to damage.It's the protection of personal information.Illegal access to a computer system for the purpose od causing damage.It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses....

cybersecurity 2022-05-06

cybersecurity crossword puzzle
Across
  1. eg.: 192.160.81.1
  2. A network security system
  3. background process of stealing data
  4. Virtual Private Network
  5. A man who hacks
Down
  1. sharing negative content about someone else
  2. denial of internet service attack
  3. baiting to reveal personal information
  4. A type of malware that steals data
  5. privileged acces managemen (or a brawl stars character)

10 Clues: A man who hackseg.: 192.160.81.1Virtual Private NetworkA network security systemdenial of internet service attackA type of malware that steals databackground process of stealing databaiting to reveal personal informationsharing negative content about someone elseprivileged acces managemen (or a brawl stars character)

Cybersecurity 2022-11-17

Cybersecurity crossword puzzle
Across
  1. chats for you
  2. irritating
  3. attacks specific servers
  4. covid
  5. rigs elections
Down
  1. forced advertising
  2. knowingly downloaded
  3. ransoms your files
  4. wastes network bandwidth
  5. shops for you

10 Clues: covidirritatingchats for youshops for yourigs electionsforced advertisingransoms your filesknowingly downloadedwastes network bandwidthattacks specific servers

CYBERSECURITY 2020-06-13

CYBERSECURITY crossword puzzle
Across
  1. An occasion when private information can be seen by people who should not be able to see it is called data ... .
  2. A string of characters that allows access to a computer system or service.
  3. A web page or screen that updates often to show the latest information.
  4. The manner in which the components of a computer or computer system are organized and integrated.
Down
  1. A piece of code which is capable of copying itself and can corrupt the system or destroy data.
  2. A software designed to interfere with a computer´s normal functioning.
  3. The action to make something stronger or more important is called ... up.
  4. A type of utility used for scanning and removing viruses from a computer is called anti-virus ... .
  5. An attempt by hackers to damage or destroy a computer network or system.
  6. The practice of examining large pre-existing databases in order to generate new information is called data ...

10 Clues: A software designed to interfere with a computer´s normal functioning.A web page or screen that updates often to show the latest information.An attempt by hackers to damage or destroy a computer network or system.The action to make something stronger or more important is called ... up....

cybersecurity 2023-10-02

cybersecurity crossword puzzle
Across
  1. malware that is designed to steal personal information, such as passwords , CC numbers
  2. A process of identifying, assessing, and mitigating security risks
  3. A set of rules & procedures that govern the security of an organization's information systems.
  4. A system that prevents unauthorized access to a computer network
  5. Type of attack that attempts to trick users into revealing confidential information
  6. The process of verifying the identity of a user or device
Down
  1. process of granting access to resources based on a user's identity and permissions
  2. Encrypts a victim's files and demands payment to decrypt them
  3. Control to protect integrity of information
  4. A system that monitors a network for suspicious activity

10 Clues: Control to protect integrity of informationA system that monitors a network for suspicious activityThe process of verifying the identity of a user or deviceEncrypts a victim's files and demands payment to decrypt themA system that prevents unauthorized access to a computer networkA process of identifying, assessing, and mitigating security risks...

Cybersecurity 2024-02-18

Cybersecurity crossword puzzle
Across
  1. Code red is a type of computer _______.
  2. Its Chakravyuh feature is an end-point anti- malware and antivirus software that creates a virtual layer between the user and the internet, blocking hackers from accessing sensitive data.which OS is refered here.
  3. In ethical hacking and cyber security, there are ______types of scanning.
  4. what is transformed with the help of a cipher algorithm.
  5. The technique used to hide information inside a picture.
Down
  1. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the
  2. Oldest phone hacking technique used by hackers to make free calls.
  3. The malware which does not replicate or clone through an infection.
  4. The debian based OS which has 2 virtual machines and focuses on preserving user's data.
  5. A type of attack which uses a fraudulent server with a relay address.

10 Clues: Code red is a type of computer _______.what is transformed with the help of a cipher algorithm.The technique used to hide information inside a picture.Oldest phone hacking technique used by hackers to make free calls.The malware which does not replicate or clone through an infection....

CyberSecurity 2024-02-24

CyberSecurity crossword puzzle
Across
  1. What first changed?
  2. What else did the attackers turn off?
  3. How did the attacker get into the car computer?
  4. How to prevent this from happening
  5. What type of breech was it?
Down
  1. What did the hackers want to do?
  2. What did the video call the car?
  3. Was the car new or old?
  4. who attacked him?
  5. What was he in?

10 Clues: What was he in?who attacked him?What first changed?Was the car new or old?What type of breech was it?What did the hackers want to do?What did the video call the car?How to prevent this from happeningWhat else did the attackers turn off?How did the attacker get into the car computer?

Cybersecurity 2024-03-19

Cybersecurity crossword puzzle
Across
  1. Secret code used to access a device or network
  2. Process of verifying identity
  3. Software designed to harm a device or network
  4. Unauthorized access to a device or network
Down
  1. Criminal activity carried out using technology
  2. Malicious attempt to damage or disrupt a computer system
  3. Weakness in a system that can be exploited
  4. Fraudulent attempt to gain sensitive information
  5. System designed to prevent unauthorized access
  6. Method of protecting information

10 Clues: Process of verifying identityMethod of protecting informationWeakness in a system that can be exploitedUnauthorized access to a device or networkSoftware designed to harm a device or networkCriminal activity carried out using technologySecret code used to access a device or networkSystem designed to prevent unauthorized access...

cybersecurity 2024-02-21

cybersecurity crossword puzzle
Across
  1. Cyber-attack
  2. Action that guarantee the identity of a computer
  3. Error checking method
  4. Hash function
Down
  1. Unpredictable number generated by an algorithm
  2. Systems that are connected by each others
  3. Technological process for telling a computer which tasks to perform in order to solve problems
  4. One way encryption
  5. Internet protocol part of the transport layer
  6. Reference model of system interconnection

10 Clues: Cyber-attackHash functionOne way encryptionError checking methodSystems that are connected by each othersReference model of system interconnectionInternet protocol part of the transport layerUnpredictable number generated by an algorithmAction that guarantee the identity of a computer...

cybersecurity 2024-11-12

cybersecurity crossword puzzle
Across
  1. What do you call the set of secret characters used to access accounts and secure information?
  2. What is malicious software that disguises itself as legitimate software?
  3. What is the term for a digital attack in which hackers demand payment to unlock encrypted files?
  4. What is a deceptive email that tricks users into giving sensitive information?
  5. What is the practice of protecting systems, networks, and programs from digital attacks?
Down
  1. What is the process of verifying the identity of a user before granting access to a system?
  2. What type of attack overwhelms a system with traffic, causing it to crash?
  3. What do you call a software program that replicates itself and spreads to other computers?
  4. What is the act of attempting to gain unauthorized access to a computer or network?
  5. What is a tool that filters incoming and outgoing network traffic to secure a network?

10 Clues: What is malicious software that disguises itself as legitimate software?What type of attack overwhelms a system with traffic, causing it to crash?What is a deceptive email that tricks users into giving sensitive information?What is the act of attempting to gain unauthorized access to a computer or network?...

IEM July SM Crossword 2022-07-26

IEM July SM Crossword crossword puzzle
Across
  1. Each year, over 500,000 ____ are affected by house fires.
  2. ________ is creating a common baseline for cybersecurity performance goals in critical infrastructure.
  3. National Oceanic & Atmospheric Administration released a _______ Community Guide Tool for community planners and decision makers.
  4. On July 17th is also known as what?
Down
  1. People who regularly have ____ interactions with others tend to live longer, boost their mood, and have a sense of purpose.
  2. The US Postal Service processes and delivers 425.3 ______ pieces of mail each day.
  3. NIST is updating its _____ Framework (CSF) to keep pace with the evolving cybersecurity landscape.
  4. The ___ app provides access to weather alerts, disaster resources and preparedness tips.
  5. ______ bring the risk of fires, injuries, and death.
  6. July 25th is National Hire a _____ day.

10 Clues: On July 17th is also known as what?July 25th is National Hire a _____ day.______ bring the risk of fires, injuries, and death.Each year, over 500,000 ____ are affected by house fires.The US Postal Service processes and delivers 425.3 ______ pieces of mail each day....

Risk Awareness Month 2024 2024-05-14

Risk Awareness Month 2024 crossword puzzle
Across
  1. _________ can make a difference [Word found in EDM on CRO's message]
  2. _________ effort of every level [Word found in EDM on risk governance framework]
  3. Stay alert on possible _________ attempts [Word found in EDM on cybersecurity risks]
  4. We are not immune to _________ risks [Word found in EDM on cybersecurity risks]
  5. _________ form the 1st line of defence in our risk governance framework [Word found in EDM on risk governance framework]
  6. _________ into Critical Installations [Word found in EDM on operational risks]
Down
  1. Risk_________ Month [Word found in EDM on CRO's message]
  2. Flooding at expressways and major _________ [Word found in EDM on operational risks]
  3. Good _________ marksmanship [Word found in EDM on financial and strategic risk]
  4. Use water _________ appliances and fittings [Word found in EDM on financial and strategic risk]

10 Clues: Risk_________ Month [Word found in EDM on CRO's message]_________ can make a difference [Word found in EDM on CRO's message]_________ into Critical Installations [Word found in EDM on operational risks]Good _________ marksmanship [Word found in EDM on financial and strategic risk]...

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. An unwanted software that monitors and gathers information on a person and how they use their computer, for example monitoring your internet usage to send you harmless but annoying adverts.
  2. A series of letters, numbers or symbols that protect data in your computer.
  3. A type of malware that exploits vulnerabilities in the a computer’s operating system and once in uses the system’s resources.
  4. A person that tries to access your data by getting into your computer, for example by figuring our your passwords.
  5. Locks a computer, encrypts files, and prevents the user from being able to access the data.
Down
  1. A more sinister spyware that records every keystroke made by a user.
  2. It infects a computer and causes it to download or display adverts or pop-ups when the victim is online.
  3. Being able to edit and view personal files like photos or videos.
  4. A self-replicating software, to get into the computer it has to be downloaded as part of another file which is then executed on the computer.
  5. A specific type of computer virus that tricks you into downloading it onto your computer. Once in your computer it might open a ‘back door’ to give an attacker remote access to your computer.

10 Clues: Being able to edit and view personal files like photos or videos.A more sinister spyware that records every keystroke made by a user.A series of letters, numbers or symbols that protect data in your computer.Locks a computer, encrypts files, and prevents the user from being able to access the data....

Cybersecurity 2021-06-02

Cybersecurity crossword puzzle
Across
  1. Intention to damage a person.
  2. The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  3. Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
  4. It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
  5. Ability of a user to access information or resources in a specified location and in the correct format.
  6. Illegal access to a computer system for the purpose od causing damage.
Down
  1. Malicious software designed to damage.
  2. Without permission or authorization
  3. Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
  4. It's the protection of personal information.

10 Clues: Intention to damage a person.Without permission or authorizationMalicious software designed to damage.It's the protection of personal information.Illegal access to a computer system for the purpose od causing damage.It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses....

Cybersecurity 2022-06-29

Cybersecurity crossword puzzle
Across
  1. Purchasing of asset
  2. hardware and software
  3. Longeststage of asset lifecycle
  4. Tangible asset
  5. Intangible asset
  6. tangible asset
Down
  1. physical asset
  2. Digital media and content
  3. Wear and tear situation
  4. Costlier than traditional
  5. plumbing installation

11 Clues: physical assetTangible assettangible assetIntangible assetPurchasing of assethardware and softwareplumbing installationWear and tear situationDigital media and contentCostlier than traditionalLongeststage of asset lifecycle

Cybersecurity 2023-10-31

Cybersecurity crossword puzzle
Across
  1. a hacker that is malicious
  2. the art of protecting devices and data from unauthorized access
  3. a hacker that is doing good
  4. when your personal data is kept secret
Down
  1. a hacker that works without permission
  2. when you personal data is available
  3. Multi-Factor________ something you have, know, and are
  4. Internet of __________
  5. a kind of human engineering
  6. an unusual way to solve a problem

10 Clues: Internet of __________a hacker that is maliciousa hacker that is doing gooda kind of human engineeringan unusual way to solve a problemwhen you personal data is availablea hacker that works without permissionwhen your personal data is kept secretMulti-Factor________ something you have, know, and are...

CyberSecurity 2024-09-05

CyberSecurity crossword puzzle
Across
  1. Software designed to disrupt, damage, or gain unauthorized access to a computer system
  2. Where the recruitment, retention and advancement of women in cybersecurity happens.
  3. Taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
  4. A term used to describe a person who tries to gain unauthorized access to a network or computer system
  5. A service that encrypts users' data and masks their IP addresses
  6. Contains items that are temporarily blocked until an additional step is performed
  7. The practice of sending fraudulent communications that appear to come from a legitimate source
Down
  1. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
  2. The process of converting information into ciphertext
  3. The process of decoding cipher text to plain text

10 Clues: The process of decoding cipher text to plain textThe process of converting information into ciphertextA service that encrypts users' data and masks their IP addressesContains items that are temporarily blocked until an additional step is performedWhere the recruitment, retention and advancement of women in cybersecurity happens....

INF Crossword Puzzle 2024-01-24

INF Crossword Puzzle crossword puzzle
Across
  1. Game Changers
  2. Safety Protocol
  3. Private
  4. Machinery
  5. Code
  6. Man-Made
Down
  1. Design
  2. Storage
  3. Connections
  4. Computer Procedure
  5. Login

11 Clues: CodeLoginDesignStoragePrivateMan-MadeMachineryConnectionsGame ChangersSafety ProtocolComputer Procedure

IEM's December Social Media Crossword Puzzle 2021-12-20

IEM's December Social Media Crossword Puzzle crossword puzzle
Across
  1. United States Space Force
  2. State Association of Counties Annual Meeting
  3. IEMer who moderated a discussion on wildfire resilience & prevention at #NDRC21 (last name)
  4. Follow Cybersecurity and Infrastructure Security Agency’s ______ best practices
  5. IEM’s innovative GIS ______
  6. IEMer who moderated the panel, Best Practice Programs at the State Level (last name)
  7. FEMA’s interactive Program Planning Toolkit
  8. FEMA’s 2022-2026 ____ ____
  9. Our thoughts are with the communities in Kentucky and the Midwest impacted by
Down
  1. AshBritt-IEM Health had the pleasure of meeting First Lady _____
  2. The IEM family would like to wish you and yours
  3. New FEMA Deputy Administrator (last name)
  4. Have you gotten you flu _____?
  5. It’s time to get into the holiday spirit by breaking out your…
  6. New COVID-19 variant

15 Clues: New COVID-19 variantUnited States Space ForceFEMA’s 2022-2026 ____ ____IEM’s innovative GIS ______Have you gotten you flu _____?New FEMA Deputy Administrator (last name)FEMA’s interactive Program Planning ToolkitState Association of Counties Annual MeetingThe IEM family would like to wish you and yours...

Cybersecurity 2022-11-28

Cybersecurity crossword puzzle
Across
  1. manipulation of people into performing actions or give up confidential information.
  2. causes your computer to download or display malicious adverts or pop-ups
  3. a group of Internet-connected devices, each of which runs one or more bots. can be used to perform Distributed Denial-of-Service (DDoS)
  4. Designed to gain access to your computer with malicious intent.
  5. a type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information to the attacker
Down
  1. When infected, they locks/encrypted your computer or files, and demand money or else they will delete or publish it.
  2. replicate itself by maliciously modifying other computer programs and inserting code.
  3. Any malware that misleads users of its true intent. The term is derived from the Ancient Greek story.
  4. replicate itself in order to create traffic and slowing down the system.
  5. describes a social engineering act of obtaining someone else's personal information without their consent.

10 Clues: Designed to gain access to your computer with malicious intent.causes your computer to download or display malicious adverts or pop-upsreplicate itself in order to create traffic and slowing down the system.manipulation of people into performing actions or give up confidential information....

Cybersecurity 2022-11-18

Cybersecurity crossword puzzle
Across
  1. the protection of internet-connected systems such as hardware, software and data from cyberthreats
  2. engineering the term used for a broad range of malicious activities accomplished through human interactions.
  3. testing an authorized simulated attack performed on a computer system to evaluate its security
  4. category of malicious cyber-attacks that hackers or cybercriminals employ
  5. information such as facts and numbers used to analyze something or make decisions
  6. network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
  1. the measurement and statistical analysis of people's unique physical and behavioral characteristics
  2. when attackers send malicious emails designed to trick people into falling for a scam
  3. allow users to keep their software programs updated without having to check for and install available updates manually
  4. software designed to interfere with a computer's normal functioning

10 Clues: software designed to interfere with a computer's normal functioningcategory of malicious cyber-attacks that hackers or cybercriminals employinformation such as facts and numbers used to analyze something or make decisionswhen attackers send malicious emails designed to trick people into falling for a scam...

CyberSecurity 2023-01-05

CyberSecurity crossword puzzle
Across
  1. Should be constructed of upper and lower case letters, numbers, and special characters
  2. A flawed or weakness in computer system that could be exploited to violate the system's security.
  3. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  4. Hardware or software designed to prevent unauthorized access to or from a private network.
  5. Unauthorized access to a network, information systems, or application.
Down
  1. Verifying identity
  2. Fraudulent email purportedly from a reputable company attempting to get a personal information.
  3. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  4. The address of a webpage. Check the validity of it before clicking on it.
  5. A sequence of words or text used to control access to a computer; similar to a password.

10 Clues: Verifying identityUnauthorized access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it.Should be constructed of upper and lower case letters, numbers, and special charactersA sequence of words or text used to control access to a computer; similar to a password....

Cybersecurity 2021-03-08

Cybersecurity crossword puzzle
Across
  1. making a copy of original data
  2. software that causes harm to a computer
  3. a malicious computer program that is hidden in an application
  4. software that tracks the key strokes on the keyboard
  5. defrauding an online account holder of financial information by posing as a legitimate company
Down
  1. software that lets a user obtain covert information on your computer activities
  2. someone who exploits weaknesses in a computer system
  3. Software designed to detect and destroy a virus
  4. a standalone malicious computer program that replicates and spreads on a computer system
  5. software that encodes data and requires a key to decode

10 Clues: making a copy of original datasoftware that causes harm to a computerSoftware designed to detect and destroy a virussomeone who exploits weaknesses in a computer systemsoftware that tracks the key strokes on the keyboardsoftware that encodes data and requires a key to decodea malicious computer program that is hidden in an application...

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. data dater that has personal information such as your maiden name or your date of birth
  2. a person who uses computers to gain unauthorized access to data.
  3. you use it to login to websites and files
  4. Need to be attached to a file
  5. not known or seen or not meant to be known or seen by others.
Down
  1. what you do without getting permission to do it first
  2. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. Opens a back door which allows more malware to be loaded
  4. Uses vulnerabilities to move into your machine.
  5. when somebody sends an email giving you false information to make you give them something

10 Clues: Need to be attached to a fileyou use it to login to websites and filesUses vulnerabilities to move into your machine.what you do without getting permission to do it firstOpens a back door which allows more malware to be loadednot known or seen or not meant to be known or seen by others....

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. data dater that has personal information such as your maiden name or your date of birth
  2. a person who uses computers to gain unauthorized access to data.
  3. you use it to login to websites and files
  4. Need to be attached to a file
  5. not known or seen or not meant to be known or seen by others.
Down
  1. what you do without getting permission to do it first
  2. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. Opens a back door which allows more malware to be loaded
  4. Uses vulnerabilities to move into your machine.
  5. when somebody sends an email giving you false information to make you give them something

10 Clues: Need to be attached to a fileyou use it to login to websites and filesUses vulnerabilities to move into your machine.what you do without getting permission to do it firstOpens a back door which allows more malware to be loadednot known or seen or not meant to be known or seen by others....

CYBERSECURITY 2021-10-18

CYBERSECURITY crossword puzzle
Across
  1. The short form of malicious software - Malware
  2. A software that covertly monitors your online behavior
  3. A software or hardware device designed to protect your private data
  4. A tool that helps mask to location of the user to guarantee anonymity
  5. The practice of sending fraudulent communications that appear to come from a reputable source
Down
  1. HORSE A piece of malware that often allows a hacker to gain remote access to a computer through a back door
  2. A piece of malicious code that can replicate itself in order to spread the infection to other connected computers
  3. A technology that enables us to access our files through the internet remotely
  4. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
  5. An incident where a hacker gains unauthorized access to a computer or device

10 Clues: The short form of malicious software - MalwareA software that covertly monitors your online behaviorA software or hardware device designed to protect your private dataA tool that helps mask to location of the user to guarantee anonymityAn incident where a hacker gains unauthorized access to a computer or device...

cybersecurity 2023-04-02

cybersecurity crossword puzzle
Across
  1. worm A type of malware that spreads itself by copying itself to other computers on the same network (9 letters): _________ worm
  2. Malicious software that is designed to gain access to a computer system without the user's consent (7 letters): ________
  3. A technique used to trick users into revealing sensitive information, such as passwords or credit card numbers (9 letters): _________ing
  4. A type of attack that involves intercepting and altering communication between two parties (10 letters): _________-in-the-middle attack
  5. of Service A type of attack that attempts to make a computer or network resource unavailable to its intended users (8 letters): _________ of Service
Down
  1. exploit A type of attack that targets vulnerabilities in software or hardware to gain unauthorized access (8 letters): _________ exploit
  2. force A type of attack that involves guessing a password by trying many different combinations (9 letters): _________ force attack
  3. The process of converting data into an unreadable format to prevent unauthorized access (8 letters): _________tion
  4. A security protocol used to encrypt internet traffic (4 letters): ______
  5. A type of authentication that uses physical characteristics, such as fingerprints or facial

10 Clues: A security protocol used to encrypt internet traffic (4 letters): ______A type of authentication that uses physical characteristics, such as fingerprints or facialThe process of converting data into an unreadable format to prevent unauthorized access (8 letters): _________tion...

Cybersecurity 2023-08-23

Cybersecurity crossword puzzle
Across
  1. A string of characters that allows access to a computer system or service.
  2. Before an application goes live, it needs to go through a security ___.
  3. Process of updating to address security vulnerabilities.
  4. If a cyber attack is suspected, it should be reported to the ___ response team.
  5. SIEM tool from IBM.
Down
  1. A type of social engineering attack involving communication that pretends to be legitimate.
  2. We are all cyber ___.
  3. Used in cryptography to prove authenticity of a device, server, or user.
  4. FIM checks OS, database, and application software files to uncover tampering. What is the I in FIM?
  5. Linux distro used for ethical hacking.

10 Clues: SIEM tool from IBM.We are all cyber ___.Linux distro used for ethical hacking.Process of updating to address security vulnerabilities.Before an application goes live, it needs to go through a security ___.Used in cryptography to prove authenticity of a device, server, or user....

Cybersecurity 2023-11-24

Cybersecurity crossword puzzle
Across
  1. when your data is confidential, available and keeps it's integrity
  2. a special way of decrypting a cipher such as pigpen, morse code, or caesar
  3. internet of things
  4. hacker that does bad
  5. words or text that needs a key to decode
  6. hacker that does good but without permission
Down
  1. hiding a file or text in a picture
  2. hacking people without code
  3. authentication that is something you are, know or have
  4. hacker that does good

10 Clues: internet of thingshacker that does badhacker that does goodhacking people without codehiding a file or text in a picturewords or text that needs a key to decodehacker that does good but without permissionauthentication that is something you are, know or havewhen your data is confidential, available and keeps it's integrity...

Cybersecurity 2024-03-20

Cybersecurity crossword puzzle
Across
  1. A scam where a hacker poses as a legitimate business or organization in order to fool the victim into giving them sensitive personal information
  2. shield users against viruses, spyware, trojans, and worms that can damage computer hardware through email or web browsing.
  3. a network security device that monitors traffic to or from your network.
  4. Coding used to protect your information from hackers.
Down
  1. A hacker who is invited to test out computer systems and servers, looking for vulnerabilities "hacker ____ __ "
  2. The process of identifying a user’s identity
  3. malicious attempt to disrupt normal traffic to a web property.
  4. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
  5. a method of connecting a series of computers and devices in a private encrypted network,
  6. A piece of audio or video that has been altered and changed to make it seem authentic or credible.

10 Clues: The process of identifying a user’s identityCoding used to protect your information from hackers.malicious attempt to disrupt normal traffic to a web property.a network security device that monitors traffic to or from your network.a method of connecting a series of computers and devices in a private encrypted network,...

Cybersecurity 2024-05-07

Cybersecurity crossword puzzle
Across
  1. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  2. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  4. Unauthorized access to a network, information systems, or application.
  5. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying dat
Down
  1. The process of converting information or data into a code, especially to prevent unauthorized access.
  2. The process of recognizing a user's identity to ensure that individuals are who they claim to be.
  3. A type of surveillance software that has the capability to record every keystroke made on a computer.
  4. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
  5. A service that allows you to connect to the internet via a server run by a provider, creating a secure connection.

10 Clues: Unauthorized access to a network, information systems, or application.The process of recognizing a user's identity to ensure that individuals are who they claim to be.The process of converting information or data into a code, especially to prevent unauthorized access....

Cybersecurity 2024-09-16

Cybersecurity crossword puzzle
Across
  1. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
  2. Malware that locks or encrypts data, demanding payment for its release
  3. A person who gains unauthorized access to systems or networks
  4. Process of converting data into a code to prevent unauthorized access
Down
  1. A secret word or phrase used to authenticate access to data or systems
  2. Software that secretly monitors user activity and collects information
  3. Malicious software designed to harm, exploit, or disable computers
  4. A security system that monitors and controls incoming and outgoing network traffic
  5. Software used to detect, prevent, and remove malicious software
  6. A secure network connection that allows users to send and receive data as if they were on a private network

10 Clues: A person who gains unauthorized access to systems or networksSoftware used to detect, prevent, and remove malicious softwareMalicious software designed to harm, exploit, or disable computersProcess of converting data into a code to prevent unauthorized accessA secret word or phrase used to authenticate access to data or systems...

Cybersecurity 2021-02-28

Cybersecurity crossword puzzle
Across
  1. Your data was not corrupted even though it crashed due to which feature of your NTFS system drive?
  2. The type of operating system that is permanently programmed into a hardware device.
  3. A _____ determines how memory is used.
  4. The most common Mobile OS.
Down
  1. The type of software license that allows a predetermined number of people to use the account at the same time.
  2. What is saved even when in private browsing?
  3. Your web browser is showing an outdated picture on a website that you visit often. Which of the following would be the best choice for attempting to fix this issue? Clear _____
  4. The most popular OS for desktops and laptops.
  5. An alert pops up on your screen informing you of a possible vulnerability in your system. Which security method is most likely responsible for sending this alert? _____ software
  6. The ____ accounts are responsible for creating new user accounts and setting permissions.

10 Clues: The most common Mobile OS.A _____ determines how memory is used.What is saved even when in private browsing?The most popular OS for desktops and laptops.The type of operating system that is permanently programmed into a hardware device.The ____ accounts are responsible for creating new user accounts and setting permissions....

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. Needs to be downloaded as part of another file which is then executed on the computer.
  2. It can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts
  3. Much similar to phishing but uses an SMS message
  4. Is software that is designed to gain access to your computer with malicious intent.
  5. Locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
Down
  1. Specific type of computer virus that tricks you into downloading it onto your computer.
  2. Unwanted software that monitors and gathers information on a person and how they use their computer.
  3. Replicate themselves but do not attach themselves to files as a virus does.
  4. Is a cybercrime in which a target/s are contacted by email, text message or telephone by posing as a legitimate institution.
  5. A secret word/phrase used to protect important log-in info on different websites

10 Clues: Much similar to phishing but uses an SMS messageReplicate themselves but do not attach themselves to files as a virus does.A secret word/phrase used to protect important log-in info on different websitesIs software that is designed to gain access to your computer with malicious intent....

Cybersecurity! 2022-09-22

Cybersecurity! crossword puzzle
Across
  1. person who uses computers to gain access to computers without consent
  2. stopping something from happening
  3. a type of malicious software that is installed without the user knowing to gain sensitive information on a system.
  4. protects your computer from attacks
  5. something a user clicks on to go to another page
Down
  1. guidelines for workplace procedures
  2. an attempt to damage or destroy a network
  3. keep safe from harm
  4. knowing of a situation or fact
  5. emails or texts sent to try and get personal information

10 Clues: keep safe from harmknowing of a situation or factstopping something from happeningguidelines for workplace proceduresprotects your computer from attacksan attempt to damage or destroy a networksomething a user clicks on to go to another pageemails or texts sent to try and get personal information...

Cybersecurity 2022-12-05

Cybersecurity crossword puzzle
Across
  1. it’s when a hacker changes the IP address of an email so that it seems to come from a trusted source.
  2. A wiper is a type of malware with a single purpose: to erase user data and ensure it can’t be recovered.
  3. While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking.
  4. A rootkit is software that gives malicious actors remote control of a victim’s computer with full administrative privileges.
  5. A form of malware used by hackers to spy on you and your computer activities.
Down
  1. a wide variety of bad software used to infect and/or damage a system, most often delivered via spam emails.
  2. Worms target vulnerabilities in operating systems to install themselves into networks.
  3. A scam where a hacker poses as a legitimate business or organization (especially credit card companies, banks, charities, Internet providers, other utilities) in order to fool the victim
  4. it kidnaps your computer and holds it for ransom, hence the clever name.
  5. disguises itself as desirable code

10 Clues: disguises itself as desirable codeit kidnaps your computer and holds it for ransom, hence the clever name.A form of malware used by hackers to spy on you and your computer activities.Worms target vulnerabilities in operating systems to install themselves into networks....

cybersecurity 2024-10-10

cybersecurity crossword puzzle
Across
  1. theft: The crime of obtaining personal information and using it to assume someone else's identity.
  2. This is the overall practice of protecting systems, networks, and data from digital attacks.
  3. A piece of software designed to fix a vulnerability or bug.
  4. Malicious software designed to disrupt computer operations, steal data, or gain unauthorized access to a computer system.
  5. A weakness in a computer system that can be exploited by attackers.
  6. A type of malware that restricts access to a computer system or data until a ransom is paid.
Down
  1. A cyberattack where a hacker poses as a trusted entity to trick a user into providing sensitive information.
  2. The process of converting information into a secret code to prevent unauthorized access.
  3. authentication (2FA): A security process that requires two forms of identification, such as a password and a code sent to your phone.
  4. A network security system that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic.

10 Clues: A piece of software designed to fix a vulnerability or bug.A weakness in a computer system that can be exploited by attackers.The process of converting information into a secret code to prevent unauthorized access.This is the overall practice of protecting systems, networks, and data from digital attacks....

cybersecurity 2024-11-12

cybersecurity crossword puzzle
Across
  1. What do you call the set of secret characters used to access accounts and secure information?
  2. What is malicious software that disguises itself as legitimate software?
  3. What is the term for a digital attack in which hackers demand payment to unlock encrypted files?
  4. What is a deceptive email that tricks users into giving sensitive information?
  5. What is the practice of protecting systems, networks, and programs from digital attacks?
Down
  1. What is the process of verifying the identity of a user before granting access to a system?
  2. What type of attack overwhelms a system with traffic, causing it to crash?
  3. What do you call a software program that replicates itself and spreads to other computers?
  4. What is the act of attempting to gain unauthorized access to a computer or network?
  5. What is a tool that filters incoming and outgoing network traffic to secure a network?

10 Clues: What is malicious software that disguises itself as legitimate software?What type of attack overwhelms a system with traffic, causing it to crash?What is a deceptive email that tricks users into giving sensitive information?What is the act of attempting to gain unauthorized access to a computer or network?...

Lucas' Graduation-Day Crossword 2021-10-14

Lucas' Graduation-Day Crossword crossword puzzle
Across
  1. Grand _ University
  2. Type of Ceremony
  3. GCU Street
  4. Years in School
  5. Type of Degree
  6. Lucas's Employer
  7. Graduate
  8. GCU Color
  9. Black Beans
Down
  1. Name of GCU Mascot
  2. Go...
  3. Lucas's Major
  4. Pomp
  5. group of people
  6. Hat Decoration
  7. A builder
  8. Best type of Tree

17 Clues: PompGo...GraduateA builderGCU ColorGCU StreetBlack BeansLucas's MajorHat DecorationType of DegreeYears in Schoolgroup of peopleType of CeremonyLucas's EmployerBest type of TreeName of GCU MascotGrand _ University

Cybersecurity Awareness 2021-10-27

Cybersecurity Awareness crossword puzzle
Across
  1. records keystrokes and sends its info to a hacker
  2. (three words) a term used to describe everyday objects that connect to the internet (such as fridges, thermostats, and smart speakers)
  3. verifying your identity with a username, password, or other piece of information
  4. hackers demand a ransom for the return of information after deploying this
  5. an audio or video clip that has been edited and changed to seem believable
  6. malware disguised as legitimate software
  7. the most common form of cryptocurrency
Down
  1. (two words) manipulating and deceiving people to get sensitive and private info; lying
  2. the practice of protecting critical systems and sensitive information from digital attacks
  3. emails, text messages, or other communication designed to convince you to give the sender personal information
  4. sends information from your computer to a third party without your knowledge
  5. short for malicious software
  6. use this to protect your information
  7. a way of hiding information
  8. a network security device that filters incoming and outgoing websites
  9. displays unauthorized ads on a user's screen
  10. short for virtual private network

17 Clues: a way of hiding informationshort for malicious softwareshort for virtual private networkuse this to protect your informationthe most common form of cryptocurrencymalware disguised as legitimate softwaredisplays unauthorized ads on a user's screenrecords keystrokes and sends its info to a hacker...

IT Cybersecurity 2023-03-29

IT Cybersecurity crossword puzzle
Across
  1. Wireless network that requires no authentication.
  2. A method that allows the frequency of the wireless network to be fine-tuned. Each channel is approximately 20 MHz wide.
  3. Wireless communication technology that allows two devices to connect to each other over a short distance.
  4. Combines multiple channels—or lanes—to increase the amount of traffic that a modem's highway can comfortably support.
  5. A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
  6. Wireless authentication method that allows for automatic connection between a device and the wireless access point.
  7. The wireless access point provides access to a wireless network.
  8. An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices.
  9. A communication method that allows two-way communication between two devices within a few centimeters of each other.
  10. Wireless authentication method that uses a passphrase to authenticate users.
  11. A method that combines channels into one to increase bandwidth.
Down
  1. Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest versions in use.
  2. Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
  3. An enhancement that allows multiple antennas to use the same radio frequency.
  4. The expected number of times an event will occur in a given time frame.
  5. Conceals the data's original meaning to prevent it from being known or used.
  6. An Ethernet cable provides the connection between a device connected to the network port and the switch.
  7. The interface between a computer's hardware and software.

18 Clues: Wireless network that requires no authentication.The interface between a computer's hardware and software.A method that combines channels into one to increase bandwidth.The wireless access point provides access to a wireless network.The expected number of times an event will occur in a given time frame....

test 2022-10-25

test crossword puzzle
Across
  1. djfglijd hfgikjf
  2. fdgsdgsd
  3. gfdsgds
Down
  1. gdfgfs
  2. sgfdsgsdrg
  3. gfdsgdsg
  4. gfdsgd
  5. fdgdfsgfds
  6. gdsgsdgfd
  7. gdfsgds

10 Clues: gdfgfsgfdsgdgdfsgdsgfdsgdsgfdsgdsgfdgsdgsdgdsgsdgfdsgfdsgsdrgfdgdfsgfdsdjfglijd hfgikjf

What is Cyber Security: Vocabulary Review 2024-09-04

What is Cyber Security: Vocabulary Review crossword puzzle
Across
  1. the practice of isolating resources and controlling access to them through APIs or strict interfaces
  2. a design technique that separates the functionality of a program into independent, interchangeable components.
  3. the process of breaking down complex cybersecurity models into abstract components to simplify and clearly define their security roles.
  4. the practice of protecting data from unauthorized access, disclosure, or alteration
  5. the protection of data from unauthorized modification or deletion.
  6. a cybersecurity technique that protects processes from each other on an operating system.
  7. a design principle that emphasizes the importance of simplicity in cyber security systems and logics
  8. the practice of concealing information within other data, structures, or media to prevent unauthorized access.
  9. the principle of granting users only the minimum level of access or permissions necessary to perform their job functions
  10. the practice of collecting, processing, and storing only the minimum amount of data needed to complete a specific task.
Down
  1. creating secondary safety nets that bolster network security and mitigate single points of failure throughout the network.
  2. the ability to reliably access and use information in a timely manner.
  3. a cybersecurity strategy that uses multiple layers of security measures to protect an organization's assets.
  4. a process that separates data, processes, and administrative tasks into logical groupings, or domains.
  5. the practice of reducing unnecessary complexity and focusing on what's essential
  6. a way of looking at the world from the perspective of a hacker

16 Clues: a way of looking at the world from the perspective of a hackerthe protection of data from unauthorized modification or deletion.the ability to reliably access and use information in a timely manner.the practice of reducing unnecessary complexity and focusing on what's essential...

TECHNOLOGY 2024-02-14

TECHNOLOGY crossword puzzle
Across
  1. ACHEINM
  2. CITYSECUREBYR
  3. BISTROCOO
  4. Rivaltu LAYTIRE
  5. GUMCONPIT
  6. NONECOGYNAHTOL
  7. TINRENET
Down
  1. CIANEDSETCA
  2. RATTAILIFIC GENTLENICELIT
  3. CRYCUERAPTORNY

10 Clues: ACHEINMTINRENETBISTROCOOGUMCONPITCIANEDSETCACITYSECUREBYRCRYCUERAPTORNYNONECOGYNAHTOLRivaltu LAYTIRERATTAILIFIC GENTLENICELIT

hahahha 2024-08-24

hahahha crossword puzzle
Across
  1. TWINS
  2. SHOP
  3. network
  4. Banking
  5. 1.0
  6. MESH
Down
  1. LEARNING
  2. Betners-Lee
  3. TAIL
  4. WEB
  5. of Things
  6. 3.0

12 Clues: WEB1.03.0TAILSHOPMESHTWINSnetworkBankingLEARNINGof ThingsBetners-Lee

Panther Cross Word 2022-04-29

Panther Cross Word crossword puzzle
Across
  1. The largest End Point Detection vendor on the market
  2. The fastest growing area to store company data
  3. A computer or system that mimics a target that a hacker would go after. It is used as a way to collect data on different attack patterns
  4. The word used to describe the adding of additional contextual data to alerts in order to cut down on noise. Greynoise helped us with this.
  5. The acronym used to describe a fully outsourced solution for threat detection
  6. A 3rd party vendor who acts as a middleman to distribute software
  7. Refers to data exiting a network
  8. Refers to data entering into a network
  9. A receipt of any action performed within a system
  10. A compliance-driven evaluation that reveals where you're susceptible to an attack
  11. The acronym used to describe a solution type that detections user behavior for anything malicious
Down
  1. This compliance is imposed on companies that do business in within the EMEA
  2. The most utilized cybersecurity framework in the world
  3. A phrase coined by Panther to describe one of our biggest differentiators
  4. This compliance is imposed on companies that collect health care data
  5. The practice of protecting systems, networks, and programs from cyber attacks
  6. The largest SIEM vendor in the world
  7. This compliance is imposed on companies that collect credit card data
  8. A solution that aggregates logs
  9. Acronym that describes Endpoint detection combined with Threat Detection
  10. This compliance is imposed on companies that collect other companies information
  11. Refers to different events being interconnected that paint a conclusion
  12. A 3rd party vendor who you can outsource your cybersecurity to
  13. This is typically the gatekeeper for your network and the first line of cyber defense

24 Clues: A solution that aggregates logsRefers to data exiting a networkThe largest SIEM vendor in the worldRefers to data entering into a networkThe fastest growing area to store company dataA receipt of any action performed within a systemThe largest End Point Detection vendor on the marketThe most utilized cybersecurity framework in the world...

청당 빠바 구문독해 6-22 2023-01-18

청당 빠바 구문독해 6-22 crossword puzzle
Across
  1. 실직한, 실업자인
  2. (자동차 앞창에 있는)유리 닦개(와이퍼)
  3. 공동의
  4. 흔히, 보통
  5. (범죄, 사고 등) 사건
  6. 입증하다
  7. 사이버 보안
Down
  1. 자동차의
  2. (연료, 에너지, 시간을)소모하다
  3. 절도
  4. 자동차
  5. 대리점
  6. 혜택, 이득; 득을 보다
  7. 임차하다, 빌리다
  8. 취약한, 연약한
  9. 조정[조절]하다; 적응하다

16 Clues: 절도자동차대리점공동의자동차의입증하다흔히, 보통사이버 보안취약한, 연약한실직한, 실업자인임차하다, 빌리다혜택, 이득; 득을 보다(범죄, 사고 등) 사건조정[조절]하다; 적응하다(연료, 에너지, 시간을)소모하다(자동차 앞창에 있는)유리 닦개(와이퍼)

Cybersecurity Vocabulary 2023-01-25

Cybersecurity Vocabulary crossword puzzle
Across
  1. A bug where user input is passed as the format argument to printf
  2. This is when an application reveals sensitive data
  3. determines strength and validity of passwords.
  4. A secret entry point into a program.
  5. can undermine the controls that secure the data of millions
  6. The result of a mismatch between arithmetic and mathematical arithmetic
  7. The web server account is incorrectly given access to the system files
  8. Is the manipulation of people to divulge information or performing actions.
Down
  1. Somebody who gains illegal access to a phones system.
  2. An attempt to crack a password by using every combination of letters and digits until a password is cracked.
  3. bypassing standard authentication or encryption in a computer.
  4. Mother Nature's actions
  5. A trapdoor in software that allows easy maintenance
  6. A subset of the Trojan horse malware.
  7. A system used to gain authentications by cracking a password hash.
  8. when a hacker exploits the vulnerability before its fixed.

16 Clues: Mother Nature's actionsA secret entry point into a program.A subset of the Trojan horse malware.determines strength and validity of passwords.This is when an application reveals sensitive dataA trapdoor in software that allows easy maintenanceSomebody who gains illegal access to a phones system....

CyberSecurity Crossword 2023-08-07

CyberSecurity Crossword crossword puzzle
Across
  1. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction
  2. Should be constructed of upper and lower case letters, numbers, and special characters
  3. verifying identity
  4. a type of software that is designed to display advertisements on a user's computer or device.
  5. a type of software or hardware device that is designed to capture and record keystrokes made on a computer or other device
  6. The “I” in the C-I-A Triad; protection from unauthorized changes
  7. The “A” in the C-I-A Triad. It ensures authorized users have access
  8. A fraudulent email purportedly from a reputable company attempting to get personal information
Down
  1. Threatening behavior facilitated through electronic means such as texting
  2. A type of malicious software designed to block access to a computer system until a sum of money is paid
  3. weakness in a computer system that could be exploited to violate the system’s security
  4. Software that scans a device or a network to detect security threats, alert the user, and neutralize malicious code
  5. Facebook, Twitter, Instagram, etc. (Two words)
  6. The process of taking plain text and scrambling it into an unreadable format
  7. the act of secretly listening to or monitoring the conversations or communications of others without their knowledge or consent
  8. enables a user to connect securely from outside to their business network, even though they are not located on their office premises

16 Clues: verifying identityFacebook, Twitter, Instagram, etc. (Two words)The “I” in the C-I-A Triad; protection from unauthorized changesThe “A” in the C-I-A Triad. It ensures authorized users have accessThreatening behavior facilitated through electronic means such as textingThe process of taking plain text and scrambling it into an unreadable format...

NVH September Trivia 2022-08-24

NVH September Trivia crossword puzzle
Across
  1. Ext. 7060
  2. Policy keeper
  3. NVH Lab blood supplier
  4. Personal ______ Equipment
  5. Cybersecurity Training
  6. Code Call for Combative Person
  7. Coffee Shop
  8. Extended Care "Family"
  9. John Caitlynn & Liz Therapy
Down
  1. TFMC ARNP
  2. Zzz Service
  3. payroll software
  4. BOC Meeting Day
  5. Purchaser
  6. Resuscitation Quality Improvement
  7. Drs. Dhillon & Jex Service
  8. The next EHR
  9. New mammo system

18 Clues: TFMC ARNPExt. 7060PurchaserZzz ServiceCoffee ShopThe next EHRPolicy keeperBOC Meeting Daypayroll softwareNew mammo systemNVH Lab blood supplierCybersecurity TrainingExtended Care "Family"Personal ______ EquipmentDrs. Dhillon & Jex ServiceJohn Caitlynn & Liz TherapyCode Call for Combative PersonResuscitation Quality Improvement

Cybersecurity Month 2023-07-24

Cybersecurity Month crossword puzzle
Across
  1. (Hint: Make a copy of your important files for safety)
  2. (Hint: Your data is well-protected and out of harm's way)
  3. (Hint: Being informed and cautious about online risks)
  4. (Hint: Keep your personal information confidential)
  5. (Hint: A secret code you create to protect your accounts)
  6. (Hint: Ensure your online accounts and devices are protected)
  7. (Hint: Converting data into secret code to keep it safe)
Down
  1. (Hint: Relating to computers and the internet)
  2. (Hint: Regularly install software improvements for better security)
  3. (Hint: A protective barrier that keeps hackers out)
  4. (Hint: Secure your device with a digital key)
  5. (Hint: Harmful software that can damage your computer)
  6. (Hint: Tricky schemes to deceive you online)
  7. (Hint: A harmful computer program that can spread)
  8. (Hint: Only rely on reputable sources and websites)
  9. (Hint: Deceptive emails or messages trying to steal your info)

16 Clues: (Hint: Tricky schemes to deceive you online)(Hint: Secure your device with a digital key)(Hint: Relating to computers and the internet)(Hint: A harmful computer program that can spread)(Hint: A protective barrier that keeps hackers out)(Hint: Keep your personal information confidential)(Hint: Only rely on reputable sources and websites)...

Cybersecurity Threats 2024-04-10

Cybersecurity Threats crossword puzzle
Across
  1. A type of malicious software that can replicate itself and spread to other systems.
  2. Unwanted or unsolicited emails, often used to deliver malware or phishing attempts.
  3. Malicious software that encrypts files and demands a ransom to restore access.
  4. Malicious software that secretly monitors and collects information about a user.
  5. Malicious ads that spread malware through advertising networks.
  6. Any potential danger to an organization's data, networks, or systems.
  7. Redirecting users to a fraudulent website without their knowledge.
  8. Tricking a user into clicking something different from what they think they’re clicking on.
Down
  1. A weakness in a system that can be exploited by attackers.
  2. A scam where attackers send fraudulent emails to trick recipients into providing sensitive information.
  3. Unwanted software that displays ads, often bundled with free downloads.
  4. Listening in on communications without permission, often used in attacks.
  5. Software that records the keys pressed on a keyboard to steal sensitive information, such as passwords.
  6. A type of malware that replicates itself to spread to other computers over a network.
  7. Malicious software designed to damage or gain unauthorized access to systems.
  8. Taking advantage of a vulnerability in a system or network to gain unauthorized access.

16 Clues: A weakness in a system that can be exploited by attackers.Malicious ads that spread malware through advertising networks.Redirecting users to a fraudulent website without their knowledge.Any potential danger to an organization's data, networks, or systems.Unwanted software that displays ads, often bundled with free downloads....

Cybersecurity Vocab 2021-09-28

Cybersecurity Vocab crossword puzzle
Across
  1. Secret unknown access point into a system
  2. Flaw or potential for harm
  3. Virus that infects a computer before the operating system loads
  4. Following the rules or standards that have been established
  5. Software that is embedded in hardware
  6. Computer code intentially written to cause some form of harm
  7. Using a lie or scam to obtain private information
  8. Physical token inserted into a computer's usb port
Down
  1. Measurement and analysis of a biological feature
  2. Condition of being pricate or secret
  3. Something that takes a vulnerability to a level where it can be exploited
  4. Encrypts data do user connot access it intil a fee is paid to hacker only
  5. Acions of ,alicous code
  6. Proccess by which something becomes harder it is made harder to hack
  7. State of being complete or uncorrupted
  8. Technology that thracks a users' keystokes on the keyboard

16 Clues: Acions of ,alicous codeFlaw or potential for harmCondition of being pricate or secretSoftware that is embedded in hardwareState of being complete or uncorruptedSecret unknown access point into a systemMeasurement and analysis of a biological featureUsing a lie or scam to obtain private informationPhysical token inserted into a computer's usb port...

cybersecurity awareness 2017-09-28

cybersecurity awareness crossword puzzle
Across
  1. is a string of characters used for authenticating a user on acomputer system
  2. A small, portable flash memory card that plugs into a computer s USB port and functions as a portable hard drive.
  3. is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  4. refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
  5. A criminal act that involves malicious threats intended to cause injury to an individual to compel him or her to do an act against his or her will.
  6. a local or restricted communications network, especially a private network created using World Wide Web software.
  7. an electronic device for storing and processing data
  8. is a type of malware that is often disguised as legitimate software
Down
  1. is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner's private information
  2. is a standalone malware computerprogram that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the targetcomputer to access it.
  3. is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.Feb
  4. is a form of malware in which rogue software code effectively holds a user's computer hostage until a "ransom" fee is paid.
  5. The translation of data into a secret code.The most effective way to achieve data security.
  6. The global communication network that allows almost allcomputers worldwide to connect and exchange information.
  7. the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.
  8. software that is intended to damage or disable computers and computer systems.

16 Clues: an electronic device for storing and processing datais a type of malware that is often disguised as legitimate softwareis a string of characters used for authenticating a user on acomputer systemsoftware that is intended to damage or disable computers and computer systems....

Cybersecurity Crossword 2022-09-07

Cybersecurity Crossword crossword puzzle
Across
  1. umbrella term for malicious software
  2. a software tool used to take advantage of a software or hardware vulnerabilities
  3. self replicating malware that does not require human interaction
  4. software that lets you browse the internet
  5. small files that track browser usage and preferences
  6. email based scamming
  7. software that scans a device to detect threats
Down
  1. day of the week most vendors release patches
  2. malware that encrypts files and demands payment
  3. software that secretly captures info as it is typed
  4. text message based scamming
  5. another word for a software update
  6. copy of computer data for data loss prevention
  7. phone based scamming
  8. any kind of unwanted, unsolicited digital communication
  9. filters unwanted traffic on a network

16 Clues: phone based scammingemail based scammingtext message based scamminganother word for a software updateumbrella term for malicious softwarefilters unwanted traffic on a networksoftware that lets you browse the internetday of the week most vendors release patchescopy of computer data for data loss prevention...