cybersecurity Crossword Puzzles
Cybersecurity 2022-11-17
10 Clues: covid • irritating • chats for you • shops for you • rigs elections • forced advertising • ransoms your files • knowingly downloaded • wastes network bandwidth • attacks specific servers
CYBERSECURITY 2020-06-13
Across
- An occasion when private information can be seen by people who should not be able to see it is called data ... .
- A string of characters that allows access to a computer system or service.
- A web page or screen that updates often to show the latest information.
- The manner in which the components of a computer or computer system are organized and integrated.
Down
- A piece of code which is capable of copying itself and can corrupt the system or destroy data.
- A software designed to interfere with a computer´s normal functioning.
- The action to make something stronger or more important is called ... up.
- A type of utility used for scanning and removing viruses from a computer is called anti-virus ... .
- An attempt by hackers to damage or destroy a computer network or system.
- The practice of examining large pre-existing databases in order to generate new information is called data ...
10 Clues: A software designed to interfere with a computer´s normal functioning. • A web page or screen that updates often to show the latest information. • An attempt by hackers to damage or destroy a computer network or system. • The action to make something stronger or more important is called ... up. • ...
cybersecurity 2023-10-02
Across
- malware that is designed to steal personal information, such as passwords , CC numbers
- A process of identifying, assessing, and mitigating security risks
- A set of rules & procedures that govern the security of an organization's information systems.
- A system that prevents unauthorized access to a computer network
- Type of attack that attempts to trick users into revealing confidential information
- The process of verifying the identity of a user or device
Down
- process of granting access to resources based on a user's identity and permissions
- Encrypts a victim's files and demands payment to decrypt them
- Control to protect integrity of information
- A system that monitors a network for suspicious activity
10 Clues: Control to protect integrity of information • A system that monitors a network for suspicious activity • The process of verifying the identity of a user or device • Encrypts a victim's files and demands payment to decrypt them • A system that prevents unauthorized access to a computer network • A process of identifying, assessing, and mitigating security risks • ...
Cybersecurity 2024-02-18
Across
- Code red is a type of computer _______.
- Its Chakravyuh feature is an end-point anti- malware and antivirus software that creates a virtual layer between the user and the internet, blocking hackers from accessing sensitive data.which OS is refered here.
- In ethical hacking and cyber security, there are ______types of scanning.
- what is transformed with the help of a cipher algorithm.
- The technique used to hide information inside a picture.
Down
- It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the
- Oldest phone hacking technique used by hackers to make free calls.
- The malware which does not replicate or clone through an infection.
- The debian based OS which has 2 virtual machines and focuses on preserving user's data.
- A type of attack which uses a fraudulent server with a relay address.
10 Clues: Code red is a type of computer _______. • what is transformed with the help of a cipher algorithm. • The technique used to hide information inside a picture. • Oldest phone hacking technique used by hackers to make free calls. • The malware which does not replicate or clone through an infection. • ...
CyberSecurity 2024-02-24
10 Clues: What was he in? • who attacked him? • What first changed? • Was the car new or old? • What type of breech was it? • What did the hackers want to do? • What did the video call the car? • How to prevent this from happening • What else did the attackers turn off? • How did the attacker get into the car computer?
Cybersecurity 2024-03-19
Across
- Secret code used to access a device or network
- Process of verifying identity
- Software designed to harm a device or network
- Unauthorized access to a device or network
Down
- Criminal activity carried out using technology
- Malicious attempt to damage or disrupt a computer system
- Weakness in a system that can be exploited
- Fraudulent attempt to gain sensitive information
- System designed to prevent unauthorized access
- Method of protecting information
10 Clues: Process of verifying identity • Method of protecting information • Weakness in a system that can be exploited • Unauthorized access to a device or network • Software designed to harm a device or network • Criminal activity carried out using technology • Secret code used to access a device or network • System designed to prevent unauthorized access • ...
cybersecurity 2024-02-21
Across
- Cyber-attack
- Action that guarantee the identity of a computer
- Error checking method
- Hash function
Down
- Unpredictable number generated by an algorithm
- Systems that are connected by each others
- Technological process for telling a computer which tasks to perform in order to solve problems
- One way encryption
- Internet protocol part of the transport layer
- Reference model of system interconnection
10 Clues: Cyber-attack • Hash function • One way encryption • Error checking method • Systems that are connected by each others • Reference model of system interconnection • Internet protocol part of the transport layer • Unpredictable number generated by an algorithm • Action that guarantee the identity of a computer • ...
IEM's December Social Media Crossword Puzzle 2021-12-20
Across
- United States Space Force
- State Association of Counties Annual Meeting
- IEMer who moderated a discussion on wildfire resilience & prevention at #NDRC21 (last name)
- Follow Cybersecurity and Infrastructure Security Agency’s ______ best practices
- IEM’s innovative GIS ______
- IEMer who moderated the panel, Best Practice Programs at the State Level (last name)
- FEMA’s interactive Program Planning Toolkit
- FEMA’s 2022-2026 ____ ____
- Our thoughts are with the communities in Kentucky and the Midwest impacted by
Down
- AshBritt-IEM Health had the pleasure of meeting First Lady _____
- The IEM family would like to wish you and yours
- New FEMA Deputy Administrator (last name)
- Have you gotten you flu _____?
- It’s time to get into the holiday spirit by breaking out your…
- New COVID-19 variant
15 Clues: New COVID-19 variant • United States Space Force • FEMA’s 2022-2026 ____ ____ • IEM’s innovative GIS ______ • Have you gotten you flu _____? • New FEMA Deputy Administrator (last name) • FEMA’s interactive Program Planning Toolkit • State Association of Counties Annual Meeting • The IEM family would like to wish you and yours • ...
Cybersecurity Awareness 2021-10-27
Across
- records keystrokes and sends its info to a hacker
- (three words) a term used to describe everyday objects that connect to the internet (such as fridges, thermostats, and smart speakers)
- verifying your identity with a username, password, or other piece of information
- hackers demand a ransom for the return of information after deploying this
- an audio or video clip that has been edited and changed to seem believable
- malware disguised as legitimate software
- the most common form of cryptocurrency
Down
- (two words) manipulating and deceiving people to get sensitive and private info; lying
- the practice of protecting critical systems and sensitive information from digital attacks
- emails, text messages, or other communication designed to convince you to give the sender personal information
- sends information from your computer to a third party without your knowledge
- short for malicious software
- use this to protect your information
- a way of hiding information
- a network security device that filters incoming and outgoing websites
- displays unauthorized ads on a user's screen
- short for virtual private network
17 Clues: a way of hiding information • short for malicious software • short for virtual private network • use this to protect your information • the most common form of cryptocurrency • malware disguised as legitimate software • displays unauthorized ads on a user's screen • records keystrokes and sends its info to a hacker • ...
INF Crossword Puzzle 2024-01-24
Cybersecurity 2022-11-28
Across
- manipulation of people into performing actions or give up confidential information.
- causes your computer to download or display malicious adverts or pop-ups
- a group of Internet-connected devices, each of which runs one or more bots. can be used to perform Distributed Denial-of-Service (DDoS)
- Designed to gain access to your computer with malicious intent.
- a type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information to the attacker
Down
- When infected, they locks/encrypted your computer or files, and demand money or else they will delete or publish it.
- replicate itself by maliciously modifying other computer programs and inserting code.
- Any malware that misleads users of its true intent. The term is derived from the Ancient Greek story.
- replicate itself in order to create traffic and slowing down the system.
- describes a social engineering act of obtaining someone else's personal information without their consent.
10 Clues: Designed to gain access to your computer with malicious intent. • causes your computer to download or display malicious adverts or pop-ups • replicate itself in order to create traffic and slowing down the system. • manipulation of people into performing actions or give up confidential information. • ...
Cybersecurity 2022-11-18
Across
- the protection of internet-connected systems such as hardware, software and data from cyberthreats
- engineering the term used for a broad range of malicious activities accomplished through human interactions.
- testing an authorized simulated attack performed on a computer system to evaluate its security
- category of malicious cyber-attacks that hackers or cybercriminals employ
- information such as facts and numbers used to analyze something or make decisions
- network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
- the measurement and statistical analysis of people's unique physical and behavioral characteristics
- when attackers send malicious emails designed to trick people into falling for a scam
- allow users to keep their software programs updated without having to check for and install available updates manually
- software designed to interfere with a computer's normal functioning
10 Clues: software designed to interfere with a computer's normal functioning • category of malicious cyber-attacks that hackers or cybercriminals employ • information such as facts and numbers used to analyze something or make decisions • when attackers send malicious emails designed to trick people into falling for a scam • ...
CyberSecurity 2023-01-05
Across
- Should be constructed of upper and lower case letters, numbers, and special characters
- A flawed or weakness in computer system that could be exploited to violate the system's security.
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- Hardware or software designed to prevent unauthorized access to or from a private network.
- Unauthorized access to a network, information systems, or application.
Down
- Verifying identity
- Fraudulent email purportedly from a reputable company attempting to get a personal information.
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- The address of a webpage. Check the validity of it before clicking on it.
- A sequence of words or text used to control access to a computer; similar to a password.
10 Clues: Verifying identity • Unauthorized access to a network, information systems, or application. • The address of a webpage. Check the validity of it before clicking on it. • Should be constructed of upper and lower case letters, numbers, and special characters • A sequence of words or text used to control access to a computer; similar to a password. • ...
Cybersecurity 2021-03-08
Across
- making a copy of original data
- software that causes harm to a computer
- a malicious computer program that is hidden in an application
- software that tracks the key strokes on the keyboard
- defrauding an online account holder of financial information by posing as a legitimate company
Down
- software that lets a user obtain covert information on your computer activities
- someone who exploits weaknesses in a computer system
- Software designed to detect and destroy a virus
- a standalone malicious computer program that replicates and spreads on a computer system
- software that encodes data and requires a key to decode
10 Clues: making a copy of original data • software that causes harm to a computer • Software designed to detect and destroy a virus • someone who exploits weaknesses in a computer system • software that tracks the key strokes on the keyboard • software that encodes data and requires a key to decode • a malicious computer program that is hidden in an application • ...
Cybersecurity 2021-02-12
Across
- data dater that has personal information such as your maiden name or your date of birth
- a person who uses computers to gain unauthorized access to data.
- you use it to login to websites and files
- Need to be attached to a file
- not known or seen or not meant to be known or seen by others.
Down
- what you do without getting permission to do it first
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- Opens a back door which allows more malware to be loaded
- Uses vulnerabilities to move into your machine.
- when somebody sends an email giving you false information to make you give them something
10 Clues: Need to be attached to a file • you use it to login to websites and files • Uses vulnerabilities to move into your machine. • what you do without getting permission to do it first • Opens a back door which allows more malware to be loaded • not known or seen or not meant to be known or seen by others. • ...
Cybersecurity 2021-02-12
Across
- data dater that has personal information such as your maiden name or your date of birth
- a person who uses computers to gain unauthorized access to data.
- you use it to login to websites and files
- Need to be attached to a file
- not known or seen or not meant to be known or seen by others.
Down
- what you do without getting permission to do it first
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- Opens a back door which allows more malware to be loaded
- Uses vulnerabilities to move into your machine.
- when somebody sends an email giving you false information to make you give them something
10 Clues: Need to be attached to a file • you use it to login to websites and files • Uses vulnerabilities to move into your machine. • what you do without getting permission to do it first • Opens a back door which allows more malware to be loaded • not known or seen or not meant to be known or seen by others. • ...
CYBERSECURITY 2021-10-18
Across
- The short form of malicious software - Malware
- A software that covertly monitors your online behavior
- A software or hardware device designed to protect your private data
- A tool that helps mask to location of the user to guarantee anonymity
- The practice of sending fraudulent communications that appear to come from a reputable source
Down
- HORSE A piece of malware that often allows a hacker to gain remote access to a computer through a back door
- A piece of malicious code that can replicate itself in order to spread the infection to other connected computers
- A technology that enables us to access our files through the internet remotely
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
- An incident where a hacker gains unauthorized access to a computer or device
10 Clues: The short form of malicious software - Malware • A software that covertly monitors your online behavior • A software or hardware device designed to protect your private data • A tool that helps mask to location of the user to guarantee anonymity • An incident where a hacker gains unauthorized access to a computer or device • ...
cybersecurity 2023-04-02
Across
- worm A type of malware that spreads itself by copying itself to other computers on the same network (9 letters): _________ worm
- Malicious software that is designed to gain access to a computer system without the user's consent (7 letters): ________
- A technique used to trick users into revealing sensitive information, such as passwords or credit card numbers (9 letters): _________ing
- A type of attack that involves intercepting and altering communication between two parties (10 letters): _________-in-the-middle attack
- of Service A type of attack that attempts to make a computer or network resource unavailable to its intended users (8 letters): _________ of Service
Down
- exploit A type of attack that targets vulnerabilities in software or hardware to gain unauthorized access (8 letters): _________ exploit
- force A type of attack that involves guessing a password by trying many different combinations (9 letters): _________ force attack
- The process of converting data into an unreadable format to prevent unauthorized access (8 letters): _________tion
- A security protocol used to encrypt internet traffic (4 letters): ______
- A type of authentication that uses physical characteristics, such as fingerprints or facial
10 Clues: A security protocol used to encrypt internet traffic (4 letters): ______ • A type of authentication that uses physical characteristics, such as fingerprints or facial • The process of converting data into an unreadable format to prevent unauthorized access (8 letters): _________tion • ...
Cybersecurity 2023-08-23
Across
- A string of characters that allows access to a computer system or service.
- Before an application goes live, it needs to go through a security ___.
- Process of updating to address security vulnerabilities.
- If a cyber attack is suspected, it should be reported to the ___ response team.
- SIEM tool from IBM.
Down
- A type of social engineering attack involving communication that pretends to be legitimate.
- We are all cyber ___.
- Used in cryptography to prove authenticity of a device, server, or user.
- FIM checks OS, database, and application software files to uncover tampering. What is the I in FIM?
- Linux distro used for ethical hacking.
10 Clues: SIEM tool from IBM. • We are all cyber ___. • Linux distro used for ethical hacking. • Process of updating to address security vulnerabilities. • Before an application goes live, it needs to go through a security ___. • Used in cryptography to prove authenticity of a device, server, or user. • ...
Cybersecurity 2023-11-24
Across
- when your data is confidential, available and keeps it's integrity
- a special way of decrypting a cipher such as pigpen, morse code, or caesar
- internet of things
- hacker that does bad
- words or text that needs a key to decode
- hacker that does good but without permission
Down
- hiding a file or text in a picture
- hacking people without code
- authentication that is something you are, know or have
- hacker that does good
10 Clues: internet of things • hacker that does bad • hacker that does good • hacking people without code • hiding a file or text in a picture • words or text that needs a key to decode • hacker that does good but without permission • authentication that is something you are, know or have • when your data is confidential, available and keeps it's integrity • ...
Cybersecurity 2024-03-20
Across
- A scam where a hacker poses as a legitimate business or organization in order to fool the victim into giving them sensitive personal information
- shield users against viruses, spyware, trojans, and worms that can damage computer hardware through email or web browsing.
- a network security device that monitors traffic to or from your network.
- Coding used to protect your information from hackers.
Down
- A hacker who is invited to test out computer systems and servers, looking for vulnerabilities "hacker ____ __ "
- The process of identifying a user’s identity
- malicious attempt to disrupt normal traffic to a web property.
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
- a method of connecting a series of computers and devices in a private encrypted network,
- A piece of audio or video that has been altered and changed to make it seem authentic or credible.
10 Clues: The process of identifying a user’s identity • Coding used to protect your information from hackers. • malicious attempt to disrupt normal traffic to a web property. • a network security device that monitors traffic to or from your network. • a method of connecting a series of computers and devices in a private encrypted network, • ...
IT Cybersecurity 2023-03-29
Across
- Wireless network that requires no authentication.
- A method that allows the frequency of the wireless network to be fine-tuned. Each channel is approximately 20 MHz wide.
- Wireless communication technology that allows two devices to connect to each other over a short distance.
- Combines multiple channels—or lanes—to increase the amount of traffic that a modem's highway can comfortably support.
- A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
- Wireless authentication method that allows for automatic connection between a device and the wireless access point.
- The wireless access point provides access to a wireless network.
- An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices.
- A communication method that allows two-way communication between two devices within a few centimeters of each other.
- Wireless authentication method that uses a passphrase to authenticate users.
- A method that combines channels into one to increase bandwidth.
Down
- Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest versions in use.
- Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
- An enhancement that allows multiple antennas to use the same radio frequency.
- The expected number of times an event will occur in a given time frame.
- Conceals the data's original meaning to prevent it from being known or used.
- An Ethernet cable provides the connection between a device connected to the network port and the switch.
- The interface between a computer's hardware and software.
18 Clues: Wireless network that requires no authentication. • The interface between a computer's hardware and software. • A method that combines channels into one to increase bandwidth. • The wireless access point provides access to a wireless network. • The expected number of times an event will occur in a given time frame. • ...
Lucas' Graduation-Day Crossword 2021-10-14
17 Clues: Pomp • Go... • Graduate • A builder • GCU Color • GCU Street • Black Beans • Lucas's Major • Hat Decoration • Type of Degree • Years in School • group of people • Type of Ceremony • Lucas's Employer • Best type of Tree • Name of GCU Mascot • Grand _ University
TECHNOLOGY 2024-02-14
Panther Cross Word 2022-04-29
Across
- The largest End Point Detection vendor on the market
- The fastest growing area to store company data
- A computer or system that mimics a target that a hacker would go after. It is used as a way to collect data on different attack patterns
- The word used to describe the adding of additional contextual data to alerts in order to cut down on noise. Greynoise helped us with this.
- The acronym used to describe a fully outsourced solution for threat detection
- A 3rd party vendor who acts as a middleman to distribute software
- Refers to data exiting a network
- Refers to data entering into a network
- A receipt of any action performed within a system
- A compliance-driven evaluation that reveals where you're susceptible to an attack
- The acronym used to describe a solution type that detections user behavior for anything malicious
Down
- This compliance is imposed on companies that do business in within the EMEA
- The most utilized cybersecurity framework in the world
- A phrase coined by Panther to describe one of our biggest differentiators
- This compliance is imposed on companies that collect health care data
- The practice of protecting systems, networks, and programs from cyber attacks
- The largest SIEM vendor in the world
- This compliance is imposed on companies that collect credit card data
- A solution that aggregates logs
- Acronym that describes Endpoint detection combined with Threat Detection
- This compliance is imposed on companies that collect other companies information
- Refers to different events being interconnected that paint a conclusion
- A 3rd party vendor who you can outsource your cybersecurity to
- This is typically the gatekeeper for your network and the first line of cyber defense
24 Clues: A solution that aggregates logs • Refers to data exiting a network • The largest SIEM vendor in the world • Refers to data entering into a network • The fastest growing area to store company data • A receipt of any action performed within a system • The largest End Point Detection vendor on the market • The most utilized cybersecurity framework in the world • ...
test 2022-10-25
Cybersecurity Month 2023-07-24
Across
- (Hint: Make a copy of your important files for safety)
- (Hint: Your data is well-protected and out of harm's way)
- (Hint: Being informed and cautious about online risks)
- (Hint: Keep your personal information confidential)
- (Hint: A secret code you create to protect your accounts)
- (Hint: Ensure your online accounts and devices are protected)
- (Hint: Converting data into secret code to keep it safe)
Down
- (Hint: Relating to computers and the internet)
- (Hint: Regularly install software improvements for better security)
- (Hint: A protective barrier that keeps hackers out)
- (Hint: Secure your device with a digital key)
- (Hint: Harmful software that can damage your computer)
- (Hint: Tricky schemes to deceive you online)
- (Hint: A harmful computer program that can spread)
- (Hint: Only rely on reputable sources and websites)
- (Hint: Deceptive emails or messages trying to steal your info)
16 Clues: (Hint: Tricky schemes to deceive you online) • (Hint: Secure your device with a digital key) • (Hint: Relating to computers and the internet) • (Hint: A harmful computer program that can spread) • (Hint: A protective barrier that keeps hackers out) • (Hint: Keep your personal information confidential) • (Hint: Only rely on reputable sources and websites) • ...
청당 빠바 구문독해 6-22 2023-01-18
16 Clues: 절도 • 자동차 • 대리점 • 공동의 • 자동차의 • 입증하다 • 흔히, 보통 • 사이버 보안 • 취약한, 연약한 • 실직한, 실업자인 • 임차하다, 빌리다 • 혜택, 이득; 득을 보다 • (범죄, 사고 등) 사건 • 조정[조절]하다; 적응하다 • (연료, 에너지, 시간을)소모하다 • (자동차 앞창에 있는)유리 닦개(와이퍼)
Cybersecurity Vocabulary 2023-01-25
Across
- A bug where user input is passed as the format argument to printf
- This is when an application reveals sensitive data
- determines strength and validity of passwords.
- A secret entry point into a program.
- can undermine the controls that secure the data of millions
- The result of a mismatch between arithmetic and mathematical arithmetic
- The web server account is incorrectly given access to the system files
- Is the manipulation of people to divulge information or performing actions.
Down
- Somebody who gains illegal access to a phones system.
- An attempt to crack a password by using every combination of letters and digits until a password is cracked.
- bypassing standard authentication or encryption in a computer.
- Mother Nature's actions
- A trapdoor in software that allows easy maintenance
- A subset of the Trojan horse malware.
- A system used to gain authentications by cracking a password hash.
- when a hacker exploits the vulnerability before its fixed.
16 Clues: Mother Nature's actions • A secret entry point into a program. • A subset of the Trojan horse malware. • determines strength and validity of passwords. • This is when an application reveals sensitive data • A trapdoor in software that allows easy maintenance • Somebody who gains illegal access to a phones system. • ...
CyberSecurity Crossword 2023-08-07
Across
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction
- Should be constructed of upper and lower case letters, numbers, and special characters
- verifying identity
- a type of software that is designed to display advertisements on a user's computer or device.
- a type of software or hardware device that is designed to capture and record keystrokes made on a computer or other device
- The “I” in the C-I-A Triad; protection from unauthorized changes
- The “A” in the C-I-A Triad. It ensures authorized users have access
- A fraudulent email purportedly from a reputable company attempting to get personal information
Down
- Threatening behavior facilitated through electronic means such as texting
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- weakness in a computer system that could be exploited to violate the system’s security
- Software that scans a device or a network to detect security threats, alert the user, and neutralize malicious code
- Facebook, Twitter, Instagram, etc. (Two words)
- The process of taking plain text and scrambling it into an unreadable format
- the act of secretly listening to or monitoring the conversations or communications of others without their knowledge or consent
- enables a user to connect securely from outside to their business network, even though they are not located on their office premises
16 Clues: verifying identity • Facebook, Twitter, Instagram, etc. (Two words) • The “I” in the C-I-A Triad; protection from unauthorized changes • The “A” in the C-I-A Triad. It ensures authorized users have access • Threatening behavior facilitated through electronic means such as texting • The process of taking plain text and scrambling it into an unreadable format • ...
CYBERSECURITY DECEMBER 2, 2023 2023-12-03
Across
- A deceptive practice where a person or program successfully masquerades as another.
- A field within cybersecurity that uses investigative techniques to identify and store evidence from a computer device (2 words).
- Describes data that requires power to maintain its contents.
- a fundamental unit of data in computer networking and data communication.
- An authentication method that requires the user to provide two or more verification factors to gain access to a resource. MFA
- an advanced security technology that builds upon the functionality of an IDS. It not only detects suspicious or malicious activities but also takes proactive measures to block or mitigate them in real-time.
- A documented, structured approach for handling security breaches, and cyber threats. (3 words)
- A technology that allows you to create a secure connection over a less secure network, such as the internet. It can also mask your connection origin, making it appear that you are connecting via a different location than where you physically are located.
- _______ Modeling, Risk Modeling, or Risk Analysis is a systematic way of thinking where a system may be vulnerable in order to best defend against possible attacks.
- A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system.
- A phishing attack transmitted by SMS (text) message.
- The world's most famous hacker.
- From Day 1, cybersecurity is built upon a foundation of three principles – private data is kept private.
- Model that describes how data is transmitted through a network.
- a decoy system or resource set up to monitor and analyze the behavior of attackers.
- This cipher was the first documented form of encryption and involves shifting each letter of a message by 3.
- A public-key cryptography algorithm
Down
- Relies on human interaction and often involves tricking people into breaking normal security procedures.
- This color team is made up of offensive security experts who try to (ethically) attack an organization’s cybersecurity defenses.
- An attack in which an attacker injects malicious executable scripts into the code of a trusted application or website.
- In this kind of cipher, both the encryption and decryption process use the same key,
- From Day 1,cybersecurity is built upon a foundation of three principles. This is one of them which means that data can be used by any authorized parties.
- This term (2 words) refers to limiting who (subjects) can read or write which resources (objects: e.g. files)
- A SQL_______ vulnerability arises when the original SQL query can be altered to form an altogether different query.
- From Day 1, cybersecurity is built upon a foundation of three principles. This is one of them which means that data is modified only by authorized parties.
- Software tool that allows users to capture and inspect data packets on a computer network.
- This software examines requests to access the network and determines if it should pass through.
- A number used to identify specific services or processes running on a computer or network device.
28 Clues: The world's most famous hacker. • A public-key cryptography algorithm • A phishing attack transmitted by SMS (text) message. • Describes data that requires power to maintain its contents. • Model that describes how data is transmitted through a network. • a fundamental unit of data in computer networking and data communication. • ...
cybersecurity awareness 2017-09-28
Across
- is a string of characters used for authenticating a user on acomputer system
- A small, portable flash memory card that plugs into a computer s USB port and functions as a portable hard drive.
- is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
- A criminal act that involves malicious threats intended to cause injury to an individual to compel him or her to do an act against his or her will.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- an electronic device for storing and processing data
- is a type of malware that is often disguised as legitimate software
Down
- is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner's private information
- is a standalone malware computerprogram that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the targetcomputer to access it.
- is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.Feb
- is a form of malware in which rogue software code effectively holds a user's computer hostage until a "ransom" fee is paid.
- The translation of data into a secret code.The most effective way to achieve data security.
- The global communication network that allows almost allcomputers worldwide to connect and exchange information.
- the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.
- software that is intended to damage or disable computers and computer systems.
16 Clues: an electronic device for storing and processing data • is a type of malware that is often disguised as legitimate software • is a string of characters used for authenticating a user on acomputer system • software that is intended to damage or disable computers and computer systems. • ...
Cybersecurity Vocab 2021-09-28
Across
- Secret unknown access point into a system
- Flaw or potential for harm
- Virus that infects a computer before the operating system loads
- Following the rules or standards that have been established
- Software that is embedded in hardware
- Computer code intentially written to cause some form of harm
- Using a lie or scam to obtain private information
- Physical token inserted into a computer's usb port
Down
- Measurement and analysis of a biological feature
- Condition of being pricate or secret
- Something that takes a vulnerability to a level where it can be exploited
- Encrypts data do user connot access it intil a fee is paid to hacker only
- Acions of ,alicous code
- Proccess by which something becomes harder it is made harder to hack
- State of being complete or uncorrupted
- Technology that thracks a users' keystokes on the keyboard
16 Clues: Acions of ,alicous code • Flaw or potential for harm • Condition of being pricate or secret • Software that is embedded in hardware • State of being complete or uncorrupted • Secret unknown access point into a system • Measurement and analysis of a biological feature • Using a lie or scam to obtain private information • Physical token inserted into a computer's usb port • ...
Cybersecurity Crossword 2022-09-07
Across
- umbrella term for malicious software
- a software tool used to take advantage of a software or hardware vulnerabilities
- self replicating malware that does not require human interaction
- software that lets you browse the internet
- small files that track browser usage and preferences
- email based scamming
- software that scans a device to detect threats
Down
- day of the week most vendors release patches
- malware that encrypts files and demands payment
- software that secretly captures info as it is typed
- text message based scamming
- another word for a software update
- copy of computer data for data loss prevention
- phone based scamming
- any kind of unwanted, unsolicited digital communication
- filters unwanted traffic on a network
16 Clues: phone based scamming • email based scamming • text message based scamming • another word for a software update • umbrella term for malicious software • filters unwanted traffic on a network • software that lets you browse the internet • day of the week most vendors release patches • copy of computer data for data loss prevention • ...
NVH September Trivia 2022-08-24
Across
- Ext. 7060
- Policy keeper
- NVH Lab blood supplier
- Personal ______ Equipment
- Cybersecurity Training
- Code Call for Combative Person
- Coffee Shop
- Extended Care "Family"
- John Caitlynn & Liz Therapy
Down
- TFMC ARNP
- Zzz Service
- payroll software
- BOC Meeting Day
- Purchaser
- Resuscitation Quality Improvement
- Drs. Dhillon & Jex Service
- The next EHR
- New mammo system
18 Clues: TFMC ARNP • Ext. 7060 • Purchaser • Zzz Service • Coffee Shop • The next EHR • Policy keeper • BOC Meeting Day • payroll software • New mammo system • NVH Lab blood supplier • Cybersecurity Training • Extended Care "Family" • Personal ______ Equipment • Drs. Dhillon & Jex Service • John Caitlynn & Liz Therapy • Code Call for Combative Person • Resuscitation Quality Improvement
Dbl AA November 16! 2022-11-16
Across
- Favorite TV
- Favorite outdoor hobby
- Older vehicle
- Zoom zoom
- Grodhaus Family game
- Cute youngster
- Sisters of mom
- Grandma appreciated Aaron’s
- Walking with cat in
- Fun with Lizzy’s hair
Down
- Love spark established
- Kit for picking
- Impressive talent
- special older woman
- Cute girl
- Favorite indoor hobby
- Work interest
- Teal Team
- Quail Hollow
- Your mama
20 Clues: Zoom zoom • Cute girl • Teal Team • Your mama • Favorite TV • Quail Hollow • Older vehicle • Work interest • Cute youngster • Sisters of mom • Kit for picking • Impressive talent • special older woman • Walking with cat in • Grodhaus Family game • Favorite indoor hobby • Fun with Lizzy’s hair • Love spark established • Favorite outdoor hobby • Grandma appreciated Aaron’s
Cyber Security 2023-09-08
Across
- data encryption ransom
- compromised computer network
- psychological manipulation
- system manager
- identifying threats
- unwanted advertisements
- multiple verification layers
- secret access keys
- protecting digital systems.
- interconnected devices
Down
- stolen identity
- data encrypt
- secure network connection
- wireless technology
- unauthorized access point
- internet address
- malicious digital actions
- digital information
- malicious software
- computer programs
20 Clues: data encrypt • system manager • stolen identity • internet address • computer programs • malicious software • secret access keys • wireless technology • identifying threats • digital information • data encryption ransom • interconnected devices • unwanted advertisements • secure network connection • unauthorized access point • malicious digital actions • psychological manipulation • ...
revision 2022-09-14
10 Clues: захист • кібербезпека • злиття_акцій • штаб-квартира • власники_акцій • під_керівництвом • виявляти_загрози • розсувати кордони • комплексні_рішення • проривні_технології
Cybersecurity 2022-05-16
Across
- the location a hacker typically want to get access to
- An activity which is carried out over or through the Internet.
- a method to get sensitive data
- when you create something according to a plan
- target of an SQL-Injection
- the most famous programming language for web applications
Down
- a famous whistleblower
- the good kind of hacker
- an activity which is carried out over or through the Internet.
- a word which describes a relative geographic location
10 Clues: a famous whistleblower • the good kind of hacker • target of an SQL-Injection • a method to get sensitive data • when you create something according to a plan • the location a hacker typically want to get access to • a word which describes a relative geographic location • the most famous programming language for web applications • ...
Cybersecurity 2023-03-08
Across
- the use of a computer to gain unauthorized access to data in a system.
- The state of being protected against the criminal or unauthorized use of electronic data.
- a person who uses computers to gain unauthorized access to data.
- Tells a computer what actions to take
- what movie character was on the signs?
Down
- Where did this story take place?
- A broad range of information, or an opinion, that could identify an individual.
- breach results in information being accessed without authorization.
- What was hacked in this story?
- A part of a computer system or network which is designed to block unauthorized access
10 Clues: What was hacked in this story? • Where did this story take place? • Tells a computer what actions to take • what movie character was on the signs? • a person who uses computers to gain unauthorized access to data. • breach results in information being accessed without authorization. • the use of a computer to gain unauthorized access to data in a system. • ...
Cybersecurity 2024-03-13
Across
- A computer attack aimed at making a service unavailable.
- A brand that makes cybersecurity devices especially for companies.
- A program/device that protects a network.
- A technique for protecting data by transforming it irreversibly.
- A technique used by fraudsters to obtain personal information with the aim of committing identity theft.
- A network of computers infected by malware that are under the control of a single attacking party.
Down
- A technique of symmetric encryption.
- A hashing algorithm which is the most used in secret-keys transfert.
- A known certfication authority who offers free certificates.
9 Clues: A technique of symmetric encryption. • A program/device that protects a network. • A computer attack aimed at making a service unavailable. • A known certfication authority who offers free certificates. • A technique for protecting data by transforming it irreversibly. • A brand that makes cybersecurity devices especially for companies. • ...
Cybersecurity 2024-02-21
Across
- Find hidden messages or attacks within innocent-looking files.
- Malware that collects information about you
- A wall or partition designed to inhibit or prevent the spread of fire.
- Manifestation signifying hostile intention, the plan to cause harm.
- The practice of sending emails to reveal personal information, such as passwords and credit card numbers.
Down
- Malware that blocks access and demands ransom
- A cyber security professional who deal with testing vulnerabilities to help owners of application or website
- A type of malware that is often masked as genuine software
- Improve or correct by inserting a patch. It's a synonym of update
9 Clues: Malware that collects information about you • Malware that blocks access and demands ransom • A type of malware that is often masked as genuine software • Find hidden messages or attacks within innocent-looking files. • Improve or correct by inserting a patch. It's a synonym of update • Manifestation signifying hostile intention, the plan to cause harm. • ...
Chris's Crossword 2023-11-29
14 Clues: @_ • Coat closet • Green Thing • Ending, say • Motion for _ • NATO Drafter? • Chuckles, say • Reporter's tool • Number of senators • Legislative roundup • Yearly certification • Kentucky Derby Lover? • A General and employer • Type of fruit and fearless leader
Women in Tech 2023-02-22
Cybersecurity Crossword 2021-08-05
Across
- is a malware aimed to corrupt or modify data on one computer before spreading to others.
- a sequence of letters, characters, and numbers used for authentication
- is a technique used in order to manipulate and deceive people into handing over sensitive information.
- is a network device that determines what information is able to enter a system based on the rules in place.
- a technique to obtain sensitive information typically through text messaging
- is the process of encoding data so that it can only be accessed by its intended recipient.
- the state of being exposed to the possibility of being attacked
- is a method of attacking a computer by alternating a program while making it appear to function normally
Down
- are the measures taken in order to protect systems and their data.
- is a network that uses encryption in order to in order to maintain privacy.
- a technique to obtain sensitive information typically through email.
- a form of malware that takes control of data and holds it hostage until a ransom is paid.
- is short for malicious software, and is any intrusive software developed to wreak havoc on systems.
- a sequence of words used for authentication.
- is the act of confirmation through evidence of somethings validity.
15 Clues: a sequence of words used for authentication. • the state of being exposed to the possibility of being attacked • are the measures taken in order to protect systems and their data. • is the act of confirmation through evidence of somethings validity. • a technique to obtain sensitive information typically through email. • ...
Cybersecurity awareness 2023-06-13
Cybersecurity 2021-08-03
Across
- provides the validation of a message's origin.
- Ensures that data is not modified or tampered with.
- The degree of protection against danger, damage, loss, and criminal activity.
- Ensures that a system is up so that data is available when needed.
- Anything that has the potential to cause the loss of an asset.
Down
- An act, procedure, or piece of software that takes advantage of a vulnerability to carry out an attack.
- Ensures that data is not disclosed to unintended persons.
- An opening or weakness in the system.
- agent The person or entity that attempt or carries out a threat.
- Something that has value to an individual or an organization.
10 Clues: An opening or weakness in the system. • provides the validation of a message's origin. • Ensures that data is not modified or tampered with. • Ensures that data is not disclosed to unintended persons. • Something that has value to an individual or an organization. • Anything that has the potential to cause the loss of an asset. • ...
Cybersecurity 2024-04-22
Across
- A good practice for authorised users is to use unique ________ passwords
- ____________ type of cyber attack aims to steal data from the computers
- cybersecurity aims to secure _______ components from attackers
- __________ is a person who attempts to get unauthorised access to the computer system
- __________ is a virtual wall between the protected computer and the internet
Down
- __________ are dummy computers that attract hackers to keep the remaining computers safe
- _________ softwares must be used to protect computers against cyberattacks
- Man in the __________ is a type of cyberattack where the communication line is intercepted
- common type of attack which includes trojans and adwares
9 Clues: common type of attack which includes trojans and adwares • cybersecurity aims to secure _______ components from attackers • ____________ type of cyber attack aims to steal data from the computers • A good practice for authorised users is to use unique ________ passwords • _________ softwares must be used to protect computers against cyberattacks • ...
Cybersecurity Risk 2021-08-04
Across
- Malware aimed to corrupt or modify data on one computer before spreading to others.
- a sequence of letters, characters, and numbers used for authentication
- a technique used in order to manipulate and deceive people into handing over sensitive information.
- A network device that determines what information is able to enter a system based on the rules in place.
- a technique to obtain sensitive information typically through text messaging
- the process of encoding data so that it can only be accessed by its intended recipient.
- the state of being exposed to the possibility of being attacked
- the act of appearing to be someone or thing that you are not
Down
- measures taken in order to protect systems and their data.
- A network that uses encryption in order to in order to maintain privacy.
- a technique to obtain sensitive information typically through email.
- Software that locks your device and hold the data hostage and demands a price.
- intrusive software developed to wreak havoc on systems; also known as malicious software
- a sequence of words used for authentication.
- is the act of confirmation through evidence of somethings validity.
15 Clues: a sequence of words used for authentication. • measures taken in order to protect systems and their data. • the act of appearing to be someone or thing that you are not • the state of being exposed to the possibility of being attacked • is the act of confirmation through evidence of somethings validity. • ...
Cybersecurity fun 2022-04-28
Across
- legal constraints that govern how data can be used or stored. Permission is often required from individual as to these elements
- possibility of undesired outcome occurring
- information classification
- Electronic or digital method to control how devices operate or control how they can or can not be used
- any security incident where sensitive, protected, or confidential data is accessed or stolen by an unauthorized party
- the original form of a message
- protect before an event happens
Down
- all the information on a website
- a conventional type of encryption
- the process of adding our signature to the document to show integrity
- someone who is responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
- a process of encoding a message so that its meaning is not obvious
- the a in CIA triad
- ways to protect vulnerabilities
- copies of data
15 Clues: copies of data • the a in CIA triad • information classification • the original form of a message • ways to protect vulnerabilities • protect before an event happens • all the information on a website • a conventional type of encryption • possibility of undesired outcome occurring • a process of encoding a message so that its meaning is not obvious • ...
Cybersecurity 2023-05-30
Across
- kübervahendite turvalisus ja turvalisus kübervahendite talitluse kaudu tekkivate/tekitatavate ohtude suhtes
- teadmised küberturvalisuse kohta ning kuidas ennast kaitsta
- on riiklikult oluliste kübervahendite julgeolek ja julgeolek kübervahendite talitluse kaudu tekkivate/tekitatavate ohtude suhtes
- isiku v. mingi toimingu identsuse automaatne kontroll
Down
- tarkvara ja andmeid hävitav v. andmetöötlust häiriv väike programm, mis end arvutisüsteemides ise paljundab
- kui ohver tegutseb petturliku e-kirja alusel, mis nõuab kiiret tegutsemist.
- on kübervahendite turve ja on turve kübervahendite talitluse kaudu tekkivate/tekitatavate ohtude suhtes
- usalduslik, salajane
- pahatahtlik inimene või grupp kes murravafd sisse inimeste või ettevõtete privatsetesse keskkondadesse
9 Clues: usalduslik, salajane • isiku v. mingi toimingu identsuse automaatne kontroll • teadmised küberturvalisuse kohta ning kuidas ennast kaitsta • kui ohver tegutseb petturliku e-kirja alusel, mis nõuab kiiret tegutsemist. • pahatahtlik inimene või grupp kes murravafd sisse inimeste või ettevõtete privatsetesse keskkondadesse • ...
Cybersecurity 2022-04-26
9 Clues: chief officer • an actual attack • self replicating infection • potential issue in security • program that causes problems • email that mimics other people • program that uses vulnerability • program that hides inside another • program that infects other programs
CyberSecurity 2022-08-25
Across
- The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs; freedom to be let alone
- Detailed report, usually about a person
- rules for interacting politely online
- files stored on your computer (cell phone) that tell browsers how to remember your favorites and your previous searches
- the practice of protecting systems, networks, and programs from digital attacks
- Someone who intentionally targets people for harm using online chat rooms or social media.
Down
- The ability to act in a safe and responsible way on the Internet and other connected environments.
- A site or online community where people with like experiences or interests communicate with each other and share information, resources, etc.
- Information about you and what you do online
9 Clues: rules for interacting politely online • Detailed report, usually about a person • Information about you and what you do online • the practice of protecting systems, networks, and programs from digital attacks • Someone who intentionally targets people for harm using online chat rooms or social media. • ...
Cybersecurity 2022-09-08
Across
- Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems
- A popular programming language used in security scripts
- A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system
- A type of malicious software designed to block access to a computer system until a sum of money is paid
Down
- Software that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
- A barrier between a trusted network and untrusted network that controls/monitors incoming and outgoing network traffic
- A type of social engineering, online scam where criminals send alluring emails to the organization, user, and more to collect sensitive information
- Computer programming that is used to track internet activity and gather sensitive information
- A that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
9 Clues: A popular programming language used in security scripts • Computer programming that is used to track internet activity and gather sensitive information • A type of malicious software designed to block access to a computer system until a sum of money is paid • ...
Cybersecurity 2023-09-04
Across
- Make sure you set a strong one by using upper, lowercase, numbers and characters
- Organized and unauthorized use of an app to send thousands of messages to its users, either by fake or hacked profiles
- Common messaging platform for attackers to use for cyberattacks
- An attempt to obtain sensitive information such as usernames, passwords etc. often for malicious reasons by disguising as a trustworthy entity in an electronic communication
- Type of cyberattack that uses malware disguised as a legitimate file to infect a system or device. Named by a famous wooden horse
Down
- Malicious software that encrypts files or locks your computer, and retains control until you pay a certain amount of money
- Cyber-attackers use creative ways to trick you to enable them to steal it
- Type of cyber-attack that uses multiple computers or devices to send overwhelming traffic to a targeted website or network. The attack aims to cause the target to slow down or completely stop functioning
- Form of malware that poses a security program. If clicked, it pretends to scan for threats and malware on your PC and then lures you into paying real money in exchange for resolving the imaginary threat
9 Clues: Common messaging platform for attackers to use for cyberattacks • Cyber-attackers use creative ways to trick you to enable them to steal it • Make sure you set a strong one by using upper, lowercase, numbers and characters • Organized and unauthorized use of an app to send thousands of messages to its users, either by fake or hacked profiles • ...
Cybersecurity 2022-05-11
Across
- computer program that hides and replicates
- most common type of social engineering
- inspects network traffic
- octets network address
Down
- appears to be a legitimate file or program
- user of programs to overcome technical obstacles
- database that contains the login account information
- hexadecimal address
- system that detects incoming threats
9 Clues: hexadecimal address • octets network address • inspects network traffic • system that detects incoming threats • most common type of social engineering • appears to be a legitimate file or program • computer program that hides and replicates • user of programs to overcome technical obstacles • database that contains the login account information
Cybersecurity 2022-05-11
Across
- computer program that hides and replicates
- most common type of social engineering
- inspects network traffic
- octets network address
Down
- appears to be a legitimate file or program
- user of programs to overcome technical obstacles
- database that contains the login account information
- hexadecimal address
- system that detects incoming threats
9 Clues: hexadecimal address • octets network address • inspects network traffic • system that detects incoming threats • most common type of social engineering • appears to be a legitimate file or program • computer program that hides and replicates • user of programs to overcome technical obstacles • database that contains the login account information
cybersecurity 2023-05-25
Across
- A software designed to detect and remove viruses, malware, spyware, and other malicious programs from a computer system or network.
- The process of converting information into a code or cipher to prevent unauthorized access. Encryption is commonly used to secure sensitive information such as passwords, financial data, and personal information.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized intrusions and cyber attacks.
- Unsolicited and unwanted emails or messages sent out in bulk. Spam can be used to deliver malware, phishing attempts, or other types of unwanted content.
- A weakness or security flaw in a computer system or network that can be exploited by attackers. Vulnerabilities can be caused by outdated software, misconfigured systems, or human error.
Down
- A type of cyber attack where attackers create fake websites or emails to trick individuals into revealing personal or sensitive information. Phishing attacks often attempt to mimic legitimate websites or companies.
- A secret code or word that allows you to access certain devices or services. It is important to create a strong password to protect yourself from cyber threats.
- The process of verifying the identity of a user or device trying to access a system or network. Authentication is often done through the use of usernames and passwords, biometrics, or security tokens.
- A software that is designed to harm or damage computer systems and networks. Malware can include viruses, trojans, ransomware, and other malicious programs.
9 Clues: A software designed to detect and remove viruses, malware, spyware, and other malicious programs from a computer system or network. • Unsolicited and unwanted emails or messages sent out in bulk. Spam can be used to deliver malware, phishing attempts, or other types of unwanted content. • ...
Cybersecurity 2022-04-05
Across
- A type of malware disguised as bona fide software, applications, or files to deceive users into downloading it and, unknowingly, granting control of their devices.
- A type of malware that infiltrates devices without the owner’s knowledge. This is often for the purpose of spying on internet activity, tracking log in and password information, or collecting sensitive information that can be used for fraudulent purposes.
- A type of malware that comes from ads on legitimate websites. You can fall victim to malvertising by clicking on an infected ad — cybercriminals may even pay to place these on websites — or by visiting a website that is home to a corrupted ad.
Down
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks a program that crawls the internet looking for holes in security infrastructures to exploit, and the hacking is done automatically — or robotically if you will.
- A standalone malware computer program that replicates itself in order to spread to other computers.
- A type of malware that comes with a ransom. It locks and encrypts a victim’s device or data and demands a ransom to restore access.
- A type of malware that grants cybercriminals remote control of victims’ devices, oftentimes without the victims’ knowledge.
- Malware that involves advertising.
- A type of malware that uses software, applications, and protocols already built-in or native to device operating systems to install and execute malicious activities. In other words, no files are needed to download this type of malware.
9 Clues: Malware that involves advertising. • A standalone malware computer program that replicates itself in order to spread to other computers. • A type of malware that grants cybercriminals remote control of victims’ devices, oftentimes without the victims’ knowledge. • ...
cybersecurity 2021-02-12
9 Clues: send ransom money • used by the romans • scam emails or calls • allows the hacker to spy on you • a piece of coding copying itself • your computer will have many pop ups • the other use for the word of a animal • what makes your computer harder to hack • a person who takes or uses your computer information
Cybersecurity 2020-04-07
9 Clues: dominio • ipermediale • regole comuni • ragnatela grande • elettrodomestici evoluti • linguaggio delle pagine web • gestire il proprio conto corrente • dimostra chi è veramente il mittente • inserirlo nella barra degli indirizzi
EZOREF Weekly Bulletin Crossword 2021-07-05
Across
- much like standard AV, having an effective ------ solution is vital
- While Secpod provides an array of solutions to your corporate pain points, it was primarily introduced as a ----- management tool
- Quick Heal's Enterprise Grade cybersecurity brand
- Konnect Insights is identified as a next-gen social -------
- Global leader, ethos being 'The truth in information'
Down
- Forescout is positioned as a Modern ---
- founded in 1987, providing unparalleled cybersecurity solution now known as the device to cloud cybersecurity company
- IOB is an acronym for the Internet of ---------
- A ------- consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.
- This technology works by securing data flowing to and from in-house IT architectures and cloud vendor environments using an organization's security policies.
10 Clues: Forescout is positioned as a Modern --- • IOB is an acronym for the Internet of --------- • Quick Heal's Enterprise Grade cybersecurity brand • Global leader, ethos being 'The truth in information' • Konnect Insights is identified as a next-gen social ------- • much like standard AV, having an effective ------ solution is vital • ...
Cybersecurity 2024-02-06
Across
- A piece of software designed to fix security vulnerabilities or improve functionality.
- The process of converting information into a code to prevent unauthorized access.
- Software designed to harm or exploit computer systems and data.
- Authentication based on physical or behavioral characteristics, such as fingerprints or voice patterns.
Down
- Network security device that monitors and controls incoming and outgoing network traffic.
- Process of verifying the identity of a user, system, or application.
- The practice of protecting systems, networks, and programs from digital attacks.
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
- Malicious software that can replicate itself and spread to other computers.
9 Clues: Software designed to harm or exploit computer systems and data. • Process of verifying the identity of a user, system, or application. • Malicious software that can replicate itself and spread to other computers. • The practice of protecting systems, networks, and programs from digital attacks. • ...
Cybersecurity 2022-03-29
Across
- DNS ____ is when a hacker pretends to be a DNS server and feeds your computer the wrong IP Address for a given website, sending you to a false website.
- Multi-factor _____ is an authentication method that requires the user to provide two or more verification factors to gain access.
- A ____ attack is spamming a web server with so many requests so close together that it crashes.
- A type of spyware that records every keystroke (and sometimes also mouse movements) made by a computer user in order to gain access to passwords and other confidential info
- ____ is any program code that explicitly attempts to bypass appropriate authorization safeguards and/or perform unauthorized functions.
Down
- A ___ is information stored on your computer by a website you visit. They often store your settings for a website, such as your login status and preferred language or location.
- ____ is an attempt by cybercriminals posing as legitimate institutions, usually via email, to obtain sensitive information from targeted individuals.
- ____ guessing is an attempt to gain access to a computer system by methodically trying to determine a user’s password
- The digital ____is a gap between those who have access to new technology and those who do not.
9 Clues: The digital ____is a gap between those who have access to new technology and those who do not. • A ____ attack is spamming a web server with so many requests so close together that it crashes. • ____ guessing is an attempt to gain access to a computer system by methodically trying to determine a user’s password • ...
Cybersecurity Crossword 2021-02-03
Across
- A technology that allows us to access our files through the internet from anywhere in the world
- A piece of malware that can replicate itself in order to spread the infection to other connected computers
- An internet version of a home address for your computer, which identifies it when it’s connected to the internet
- An umbrella term that describes all forms of malicious software designed to cause havoc on a computer
- A technique hackers use to hide their identity to pretend to be someone else or simply try to fool you over the internet
- A person who uses programming skills to cause damage to a computer system, steal data and in general conduct illegal cyber activities
- A weakness in computer software
Down
- A computer system that has been infected by malware and is now part of a hacker’s botnet
- A group of computers, printers and devices that are interconnected and governed as a whole
- A defensive technology focused on keeping the bad guys out
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
- A malicious application or script that can be used to take advantage of a computer’s vulnerability
- An acronym that stands for Distributed Denial of Service
- An extra copy of data from a computer
- A piece of malware that often allows a hacker to gain remote access to a computer
15 Clues: A weakness in computer software • An extra copy of data from a computer • An acronym that stands for Distributed Denial of Service • A defensive technology focused on keeping the bad guys out • A piece of malware that often allows a hacker to gain remote access to a computer • ...
Cybersecurity Definitions 2023-01-25
Across
- hack into telecommunications systems, especially to obtain free calls.
- a type of network attack used to gain unauthorized access to systems within a security perimeter
- a person who uses computers to gain unauthorized access to data
- If users are unable to achieve the defined goal.
- are useful in passwordless and multi-factor authentication. Hidden form field is used to store session information of a client
- the condition of an electronics, software, or other system where the system's substantive behavior is dependent on the sequence or timing of oth
- Where the attacker intercepts and relays messages between two parties who believe they are communicating with each other
- someone who broke into computer systems, bypassed passwords or licenses in computer programs, or in other ways intentionally breached computer security.
- Is a more advanced technique to get user’s credentials by making effort to enter users into the website
Down
- Used by hijacking to gain access to a targets computer or online accounts
- The act of entering false information into a DNS cache
- a systematic approach to managing all changes made to a product or system
- Espionage or trespass occurs when an unauthorized individual attempts to gain illegal access to organizational information
- a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution
- A technique whereby packet data flowing across the network is detected and observed
15 Clues: If users are unable to achieve the defined goal. • The act of entering false information into a DNS cache • a person who uses computers to gain unauthorized access to data • hack into telecommunications systems, especially to obtain free calls. • Used by hijacking to gain access to a targets computer or online accounts • ...
Cybersecurity Terms 2022-04-28
Across
- "pretty good privacy"
- private modification
- corrective measures
- private readability
- pick out at risk information
- react
- awareness of intrusions
- data restoration
Down
- converting plain text for confidentiality
- ability to access
- multi-use accounts
- illegal activity in cyberspace
- verifying logins (acronym)
- copyright protection
- putting in controls
15 Clues: react • data restoration • ability to access • multi-use accounts • corrective measures • private readability • putting in controls • private modification • copyright protection • "pretty good privacy" • awareness of intrusions • verifying logins (acronym) • pick out at risk information • illegal activity in cyberspace • converting plain text for confidentiality
Cybersecurity Terms 2023-10-27
15 Clues: GRC • Purple • Razeen • Toddlers • Checkmarx • Teel Tech • Picus Security • Philip Cherian • Video Forensics • Incident Response • Mobile Acquisition • #NotTraditionalPAM • Data Classification • Mobile Device Management • External Threat Landscape
Cybersecurity Crossword 2021-02-02
Across
- A technology that allows us to access our files through the internet from anywhere in the world
- A piece of malware that can replicate itself in order to spread the infection to other connected computers
- An internet version of a home address for your computer, which identifies it when it’s connected to the internet
- An umbrella term that describes all forms of malicious software designed to cause havoc on a computer
- A technique hackers use to hide their identity pretend to be someone else or simply try to fool you over the internet
- A person who uses programming skills to cause damage to a computer system, steal data and in general conduct illegal cyber activities
- A weakness in computer software
Down
- A computer system that has been infected by malware and is now part of a hacker’s botnet
- A group of computers, printers and devices that are interconnected and governed as a whole
- A defensive technology focused on keeping the bad guys out
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
- A malicious application or script that can be used to take advantage of a computer’s vulnerability
- An acronym that stands for distributed denial of service
- An extra copy of data from a computer
- A piece of malware that often allows a hacker to gain remote access to a computer
15 Clues: A weakness in computer software • An extra copy of data from a computer • An acronym that stands for distributed denial of service • A defensive technology focused on keeping the bad guys out • A piece of malware that often allows a hacker to gain remote access to a computer • ...
Cybersecurity Crossword 2022-05-16
Across
- To figure out or break a code or cipher.
- The science of analyzing or breaking secret codes or ciphers to reveal hidden messages.
- Central Intelligence Agency
- a message written in code or cipher; the encrypted message that must be decoded.
- a message written out in “plain” English that anyone can read; it has not been encoded.
- The science of writing hidden or concealed messages using secret codes or ciphers.
- To put words into code or cipher form.
Down
- A system where symbols, groups of letters or numbers, pictures or words, are substituted to represent other words or phrases.
- a person who secretly collects and reports information on the activities, movements, and plans of an enemy or competitor.
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- Central Security Service
- National Security Agency
- A system where one letter or symbol is methodically substituted for another letter or symbol.
- The science of studying codes and ciphers.
- A systematic, minute, and thorough attempt to learn the facts about something complex or hidden
15 Clues: Central Security Service • National Security Agency • Central Intelligence Agency • To put words into code or cipher form. • To figure out or break a code or cipher. • The science of studying codes and ciphers. • a message written in code or cipher; the encrypted message that must be decoded. • ...
Cybersecurity Crossword 2023-05-15
Across
- writing statements in order to create a program
- the programs that perform actions on a device like operating systems
- devices that are connected together for the purpose of sharing information
- accessing a device or network without permission or authorization
- a global open network that allows information dispersal and instantaneous communication
- identifies specific devices on a network
- an instruction set to a computer in order to perform an action
- a specific set of multiple instructions used to perform actions on a device
- information that is returned or transmitted by a device
- using codes to secure information
Down
- the physical electronic objects like a computer
- the unauthorized collection of secure or private information
- precautions taken to guard against crime that involves the internet
- accomplished when data is sent to a device
- an electronic device used to create and access information
15 Clues: using codes to secure information • identifies specific devices on a network • accomplished when data is sent to a device • the physical electronic objects like a computer • writing statements in order to create a program • information that is returned or transmitted by a device • an electronic device used to create and access information • ...
Cybersecurity Crossword 2023-01-17
Across
- Software that monitors user activities and reports them to a third party
- A test that outlines the steps to restoring data after a severe setback
- A successful hack to gain control of a network and leak its data
- A scan hackers use to detect areas of weakness via sending messages to identify activity
- a type of computer network device that interconnects with other networks using the same protocol
- An intermediary server between a user and the internet that protects the enterprise from outside intrusion
- The practice of adhering to standards and regulatory requirements
Down
- An AI-manipulated video in someone’s likeness to spread misleading information
- Malicious software often in the form of spam emails
- A misleading computer program with a name deriving from Greek history
- A scam perpetrated by a hacker posing as a legitimate
- A small update to fix bugs in existing programs
- A special code to protect your digital information
- An internal computer network closed to outsiders
- A network that disguises users’ IP addresses with its own to deter hackers
15 Clues: A small update to fix bugs in existing programs • An internal computer network closed to outsiders • A special code to protect your digital information • Malicious software often in the form of spam emails • A scam perpetrated by a hacker posing as a legitimate • A successful hack to gain control of a network and leak its data • ...
CIS178 Jake Stevenson 2023-01-25
Across
- virtual private network
- posing as authorized user
- type of malware
- protects you from virus
- protecting online data
- explicitly allowed
- security system
- malicious software
- explicitly not allowed
- not human
- gaining unauthorized access
Down
- network of networks
- type of scam
- protects you from malware
- harassment on the internet
- unsolicited advertisements
- two-factor authentication
- another word for information
- securing data
- human verification test
20 Clues: not human • type of scam • securing data • type of malware • security system • explicitly allowed • malicious software • network of networks • protecting online data • explicitly not allowed • virtual private network • protects you from virus • human verification test • posing as authorized user • protects you from malware • two-factor authentication • harassment on the internet • ...
Cybersecurity Challenge 2019-10-11
Across
- Northern Bank's Core Values
- Location of the Bank's Disaster Recovery Site
- A way to access the Bank’s resources remotely
- Programs installed on your phone
- Password should always be?
- Key word used to send secure email
- Think before you -- ?
- Type of an Operating system
- A device you should not plug in
Down
- A type of malware that encrypts your file
- A type of an email scam
- Department to call for computer issues
- Most likely NFL team to win the superbowl in 2020
- Last name of the VP of IT
- Location of the Bank's Head Quarter
15 Clues: Think before you -- ? • A type of an email scam • Last name of the VP of IT • Password should always be? • Northern Bank's Core Values • Type of an Operating system • A device you should not plug in • Programs installed on your phone • Key word used to send secure email • Location of the Bank's Head Quarter • Department to call for computer issues • ...
Cybersecurity Risk 2021-09-03
Across
- Convert an item, such as data, into a code or cipher.
- Short for malicious software
- Software that encrypts data on someone's device until that person agrees to pay to regain access.
- Similar to a password but uses multiple words together.
- Legitimate of innocent-looking emails asking you to respond with personal data or to click on a link.
- Disguising an email address or phone number to convince you that you are interacting with a trusted friend or source.
- False or inaccurate information.
- Acronym for Pause, Ask, Think.
- Range of activities that guide how we manage digital data.
Down
- Measures taken to protect computer systems.
- Type of identity that is established by an internet user.
- Software written to damage a computer's performance, steal, or alter data.
- The practice of phishing using text messages
- Type of data that can be found as part of public record.
- Type of data that should be protected from public view.
15 Clues: Short for malicious software • Acronym for Pause, Ask, Think. • False or inaccurate information. • Measures taken to protect computer systems. • The practice of phishing using text messages • Convert an item, such as data, into a code or cipher. • Similar to a password but uses multiple words together. • Type of data that should be protected from public view. • ...
Vocabulary Test LKE Media A 2022-03-14
11 Clues: durchsetzen • unbeschränkt • Suchmaschine • technikaffin • offline gehen • Verkaufszahlen • Berichterstattung • Sicherheit im Netz • eine Webseite schließen • jemanden oder etwas misstrauen • die aktuellsten Nachrichten über
Cybersecurity & Web Exploitation Crossword 2022-11-16
Across
- CSRF attacks use the ___ of other users without their knowledge.
- "Access control" is ensuring users cannot act outside of intended ___.
- You access web applications with this.
- As the ___ of web apps increase, the possibility of vulnerabilities also increase.
- When a malicious actor hijacks clicks meant for a visible top-level site.
- For security reasons, by default, web apps should not ___ data from the browser.
- The OSI model has ___ layers.
Down
- Denial-of-Service attacks ___ a target site with fake requests to disrupt service.
- In cybersecurity, blue teams do this.
- Acronym for the organization set up to improve software security in 2001.
- SQL injection attacks can give ___ to data users typically can't retrieve.
- What does the "I" in OSI stand for?
- In cybersecurity, red teams do this.
- ___ hat hackers hack unethically, for personal gain.
- ___ sanitization is the modification of user data so that it can't run scripts.
15 Clues: The OSI model has ___ layers. • What does the "I" in OSI stand for? • In cybersecurity, red teams do this. • In cybersecurity, blue teams do this. • You access web applications with this. • ___ hat hackers hack unethically, for personal gain. • CSRF attacks use the ___ of other users without their knowledge. • ...
INFORMATION TECHNOLOGY 2021-06-27
Cybersecurity and Healthcare 2021-05-31
Across
- Limiting the risks or impacts of a cyber threat.
- Generic term for computer viruses, trojans, etc. designed for malicious purposes.
- A type of cyberattack that holds your systems or information hostage until a ransom is paid.
- You should never share this.
- The policies and measures taken to ensure the authenticity, availability, and integrity of electronic information.
Down
- When should you report an IT breach or potential breach?
- A cyberattack attempting to discover your personal information.
- Federal law protecting patient privacy.
- The US Food and Drug Administration.
- Whose responsibility is cybersecurity?
10 Clues: You should never share this. • The US Food and Drug Administration. • Whose responsibility is cybersecurity? • Federal law protecting patient privacy. • Limiting the risks or impacts of a cyber threat. • When should you report an IT breach or potential breach? • A cyberattack attempting to discover your personal information. • ...
book day 2023-05-17
Across
- asas pendawaian
- engineering ethics fourth edition
- networking basics 2 edition
- sistem bekalan elektrik dan pengagihan
- instrumentasi
- design for hackers
- perak good food guide
- key concepts in information & communication technology
- design for software
- embedded system
- cybersecurity
Down
- website optimization
- compliance
- koleksi menu orang bujang
- computer network security
- wireless communication principles & practise
- intelectuals creativity & intolerance
- teknologi biotenaga
- writing for impact
- android phones for dummies
20 Clues: compliance • instrumentasi • cybersecurity • asas pendawaian • embedded system • design for hackers • writing for impact • teknologi biotenaga • design for software • website optimization • perak good food guide • koleksi menu orang bujang • computer network security • android phones for dummies • networking basics 2 edition • engineering ethics fourth edition • ...
FIND THE WORDS 2023-05-17
Across
- Asas Pendawaian
- Engineering Ethics Fourth Edition
- Networking Basics 2 Edition
- Sistem Bekalan Elektrik&Pengagihan
- Instrumentasi
- Design for Hackers
- Perak Good Food Guide
- Key Concepts in Information&Communication Technology
- Design for Software
- Embedded System
- Cybersecurity
Down
- Website Optimization
- Compliance
- Koleksi Menu Orang Bujang
- Computer Network Security
- Wireless Communication Principles&Practise
- Intelectuals Creativity&Intolerance
- Teknologi Biotenaga
- Writing for Impact
- Android Phones for Dummies
20 Clues: Compliance • Instrumentasi • Cybersecurity • Asas Pendawaian • Embedded System • Design for Hackers • Writing for Impact • Teknologi Biotenaga • Design for Software • Website Optimization • Perak Good Food Guide • Koleksi Menu Orang Bujang • Computer Network Security • Android Phones for Dummies • Networking Basics 2 Edition • Engineering Ethics Fourth Edition • ...
Cybersecurity Crossword 2022-04-28
Across
- Filters traffic on a network
- Linux tool to encrypt and decrypt
- Encryption that only uses a public and private key
- A way of accessing a system remotely
- Linux command to search a file for a string
- I in CIA
- Tricks people into making themselves vulnerable
Down
- Stores files in itself
- Physical, Technical, Procedural and Legal controls that can be applied; second framework concept
- Ethical hacking
- Use of shifting characters to hide a message
- Keeping information offsite for easy recovery
- Malicious software
- File that contains information about previous interactions with a system or network
14 Clues: I in CIA • Ethical hacking • Malicious software • Stores files in itself • Filters traffic on a network • Linux tool to encrypt and decrypt • A way of accessing a system remotely • Linux command to search a file for a string • Use of shifting characters to hide a message • Keeping information offsite for easy recovery • Tricks people into making themselves vulnerable • ...
Hapebeast career advice gang 2021-12-28
Across
- IT manager for an FMCG company in Singapore
- The Career advice channel podcast host
- The guy with 6,000 lines in this discord
- Hapelinked founder
- The healthcare investor
- Founder of a creative agency (and 15 other companies...) in Portland
- Our dropshipping entrepreneur
- Hey, can you help us pin this?
- Ecommerce B2B specialist
- IT specialist in healthcare and insurance
- Cybersecurity in banking
- Our Canadian social media influencer with 3 million followers
- Car mechanic in Switzerland
- Land investor across the US
- Aspiring architect from New Jersey
- Investor and artist in LA
Down
- The investor who works in Republic Realm
- A financial manager for the US Military
- The investment banker
- A student / sneakerhead based in Singapore
- A real estate agent who was also a D3 basketball player
- Hapelinked co-founder
- Social media manager who was a professional chef
- The one and only
- Corporate finance advisor in one of the "Big 4"
- Investment consultant in Chicago
- Electrical Engineer with experience in renewable sector
- Cybersecurity specialist in Pennsylvania
- Our LA law firm partner
- Ecommerce, international freight entrepreneur.
30 Clues: The one and only • Hapelinked founder • The investment banker • Hapelinked co-founder • The healthcare investor • Our LA law firm partner • Ecommerce B2B specialist • Cybersecurity in banking • Investor and artist in LA • Car mechanic in Switzerland • Land investor across the US • Our dropshipping entrepreneur • Hey, can you help us pin this? • Investment consultant in Chicago • ...
Criss-Cross Compliance 2022-07-21
15 Clues: peeps • web armor • vocal hack • I did that! • doorway hacker • call me anytime • harmless watchmen • don't get hooked! • my lips are sealed • law abiding citizen • this goes both ways • make yourself useful • think outside the box • obedient water elephant • do it right the first time
CyberSecurity Awareness 2016-09-30
Across
- Electronic messages NOT handled by the Post Office
- A copy of the data to be used if needed
- Abbreviation for Instant Messaging
- A mobile phone built on a mobile computing platform that is not dumb
- A computer program that can retrieve and display information from the Internet
- Software that is loaded onto a computer to identify and remove viruses
- Abbreviation for Protected Health Information
Down
- Unauthorized person who tries to break into your system or network
- A shortened name for malicious software
- A secret series of characters used to authenticate a person's identity
- A computer network, that an organization uses for its own internal sites like MyNews or PurplePages.
- A technique made to scramble data making it unreadable and unusable
- Method used by criminals to HOOK you into giving up sensitive information.
- Unsolicited email sent to you also a canned meat
14 Clues: Abbreviation for Instant Messaging • A shortened name for malicious software • A copy of the data to be used if needed • Abbreviation for Protected Health Information • Unsolicited email sent to you also a canned meat • Electronic messages NOT handled by the Post Office • Unauthorized person who tries to break into your system or network • ...
Cybersecurity trainning 2018-03-12
Across
- a hostile message that may contain obscene language.
- techniques used by people who want to sexually harm children and young people get close to them and gain their trust.
- willful, repeated harm through electronic text.
- a trail of the user’s activity in cyberspace.
- information about your visit recorded automatically on your computer
- sending, receiving, or forwarding sexually explicit messages, photographs or images
- malicious software or code designed to damage computer or collect information.
Down
- unsolicited e-mail, or junk mail.
- engine an Internet service that helps you search for information on the web.
- Internet gamers who intentionally cause problems and/or cyberbully other gamers.
- Rules for interacting courteously with others online
- allows you to block certain types of content from being displayed.
- type of online fraud, where someone tries to trick the victim into revealing sensitive details.
- a program that lets you find, see, and hear material on web pages
14 Clues: unsolicited e-mail, or junk mail. • a trail of the user’s activity in cyberspace. • willful, repeated harm through electronic text. • a hostile message that may contain obscene language. • Rules for interacting courteously with others online • a program that lets you find, see, and hear material on web pages • ...
Cybersecurity terms 2023-09-29
Across
- Barrier between a trusted network and an untrustworthy network.
- A collection of programs or software tools that allow hackers to remotely access and control a computer or network.
- A form of fraud that involves contacting victims through email, telephone, or text to trick them into sharing personal information.
- It refers to protecting information from unauthorized user
- A form of malware used by hackers to spy on you and your computer activities.
Down
- Visit the global policy database and find the title of MFC-STA-023
- Also referred to as two-factor authentication
- Short for malicious software
- The process of converting information into a code to prevent unauthorized access.
- It means data are trustworthy and have not been accidentally altered or modified by an unauthorized access
- It is the process of converting coded or encrypted data to its original form.
- It means data are accessible when you need them
- It relates to rights to control the sharing and use of one’s personal information
- A network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.
14 Clues: Short for malicious software • Also referred to as two-factor authentication • It means data are accessible when you need them • It refers to protecting information from unauthorized user • Barrier between a trusted network and an untrustworthy network. • Visit the global policy database and find the title of MFC-STA-023 • ...
Cybersecurity Crossword Puzzle 2021-08-14
Across
- Fake organisations will send SMSes that usually contain spelling or --- errors
- Although strictly not under cybersecurity, --- activities via digital devices are becoming common.
- Scams involve emotions such as fear and ---
- A good way is to use password --- apps
- Seniors should use uppercase and --- letters, numbers or symbols to make passwords harder to crack
- The third topic that we discussed is Handling ---
- Fear messages are meant to force the seniors into --- action without stopping to think
- DAs are encouraged to use real-life --- in sharing cybersecurity information with seniors
Down
- Share with seniors how to --- between legitimate and fake organisations
- Legitimate organisations will never ask for personal --- information such as passwords, bank account and OTPs
- A common scam these days : –-- jobs with high salaries
- Seniors can use 2 notebooks as a way to remember passwords and personal information but they must keep the 2 notebooks ---
- Seniors are encouraged to use a strong ---
- Use --- bells as imagery
- Seniors should be wary of providing --- information
- Not sure, --- back
- Online --- apps will most likely make seniors lose money
- Seniors should never click on unknown links or ---
18 Clues: Not sure, --- back • Use --- bells as imagery • A good way is to use password --- apps • Seniors are encouraged to use a strong --- • Scams involve emotions such as fear and --- • The third topic that we discussed is Handling --- • Seniors should never click on unknown links or --- • Seniors should be wary of providing --- information • ...
Farah thee Sattar 2023-11-20
14 Clues: one r • thing 2 • da who? • thing 1 • flip the pan • signature look • he will be found • the other f word • be careful online • the spice of life • 40th birthday gift • farah's first friend • where was farah born • the best yogurt variety
Information Security 2023-12-12
Across
- 57% of organizations see at least weekly phishing attempts
- The most common target of phishing attacks are ____
- The US holds ____ place in the tanks of countries targeted for cybersecurity tasks
- 94% of malware is delivered by ____
- You should ____ over a link in an email to preview the actual address before clicking
Down
- Lock your ____ when you step away
- German American's Information Security Officer is
- ____ is one of the most common and dangerous forms of cyber crime
- Phishing is an attempt to obtain sensitive ____ with malicious intent
- Display names and email domains can be ____ hiding the true identity and appearing trustworthy
- Report spam/suspicious emails through the ____ button on the Outlook toolbar
- Our first line of defense against cybersecurity attacks and fraud is ___
- At German American, _____ is responsible for information security
13 Clues: Lock your ____ when you step away • 94% of malware is delivered by ____ • German American's Information Security Officer is • The most common target of phishing attacks are ____ • 57% of organizations see at least weekly phishing attempts • ____ is one of the most common and dangerous forms of cyber crime • ...
Clément_34_Cyberattack,nuclear weapon, destruction 2020-02-27
10 Clues: injuries • oil train • Gain access • online fight • non civilian • virtual attack • refineries science • most powerful bomb • impossible situation • science of online security
FSRW - MS Digital Tools 2021-10-05
14 Clues: Training • Lisa Golia • Eco friendly • quick 1-800 tool • Secured Approval • credit protection • consolidated accounts • great for happy hours • Self-Service Platform • secure document sharing • generates recommendations • substitute for pen and paper • Protecting digital information • client can do it instead of FA
Bridal Shower 2022-04-18
Across
- Bride's Maiden Name
- City Where Wedding will be Held
- College Where Couple Graduated From
- Groom
- Where Bride grew up
- Month Bride was Born
- Honeymoon
- Site of Gift Registry
- Month of Wedding
Down
- Bride's car
- Instrument Groom Plays
- Josh's Major in College
- Number of Attendants
- Bride's High School Sport
- Last Name of Groom
- Groom's car
- Groom's sport
- Month the Groom was born
18 Clues: Groom • Honeymoon • Bride's car • Groom's car • Groom's sport • Month of Wedding • Last Name of Groom • Bride's Maiden Name • Where Bride grew up • Number of Attendants • Month Bride was Born • Site of Gift Registry • Instrument Groom Plays • Josh's Major in College • Month the Groom was born • Bride's High School Sport • City Where Wedding will be Held • College Where Couple Graduated From
Cybersecurity 2023-05-10
Across
- Defensive computer technology, software or hardware-based, created and installed to keep hackers and malware out. The firewall filters interactions with a computer, allowing or denying entry, to keep systems secure.
- Algorithmic technique utilized to change the contents of a file into something unreadable by anyone outside a specific chain of communication.
- A type of hacker. Whitehat hackers use their skills for good, helping organizations test their cybersecurity measures and find vulnerabilities.
Down
- A type of hacker. A blackhat hacker is an individual that uses their skills to cause damage like breaking into a computer system and stealing confidential information.
- Type of malware that prevents access to computer files. When a computer is infected with ransomware, the malicious software will encrypt files and request a ransom for decryption.
- Computer systems that have been infected by malware. The malware then allows the hacker to connect infected computers creating a network. This network, instructed by the hacker, can be used to carry out malicious attacks.
- Malware used to cause damage on personal computers, aimed at changing, erasing, or modifying data.
- To protect digital data, a consistently updated copy of files should be stored safely offline, in case a system is hacked and data is encrypted or lost.
8 Clues: Malware used to cause damage on personal computers, aimed at changing, erasing, or modifying data. • Algorithmic technique utilized to change the contents of a file into something unreadable by anyone outside a specific chain of communication. • ...
Cybersecurity 2023-09-20
Across
- A security protocol that ensures data integrity
- A type of attack that floods a network with traffic
- Method of verifying a user's identity
- A system's first line of defense
Down
- A piece of information used to access an account
- A common social engineering tactic
- A set of rules that filters network traffic
- A program that appears legitimate but is malicious
8 Clues: A system's first line of defense • A common social engineering tactic • Method of verifying a user's identity • A set of rules that filters network traffic • A security protocol that ensures data integrity • A piece of information used to access an account • A program that appears legitimate but is malicious • A type of attack that floods a network with traffic
Cybersecurity 2024-02-21
Across
- Technique of asymmetric encryption
- Malicious program capable of replicating and spreading
- Another protocol for securing internet communications
- Authentication system based on something the user possesses
Down
- Protocol for securing internet communications
- Technique for protecting data by transforming it irreversibly
- Type of attack that involves making a service unavailable
- International organization establishing information security standards
8 Clues: Technique of asymmetric encryption • Protocol for securing internet communications • Another protocol for securing internet communications • Malicious program capable of replicating and spreading • Type of attack that involves making a service unavailable • Authentication system based on something the user possesses • ...
Technologies 2024-01-30
Across
- interconnected
- Customer
- Talk online
- Programme
- device used to select items
- enter data into a computer for processing
- secret word
- set of keys
- state of being safe from electronic crime
- Unit of data
Down
- Problem-solving steps
- computer part
- Computer memory
- organised data retrieved by a computer
- collection of related data
- primary display screen
- transfer
- single worldwide computer network
- the capacity of a computer
- to remove defects
20 Clues: Customer • transfer • Programme • Talk online • secret word • set of keys • Unit of data • computer part • interconnected • Computer memory • to remove defects • Problem-solving steps • primary display screen • collection of related data • the capacity of a computer • device used to select items • single worldwide computer network • organised data retrieved by a computer • ...
cybersecurity 2024-02-27
Basic of Cyber Sercurity 2019-07-10
Across
- items or people of value online
- making sure every individual working with an information system has specific responsibilities for information assurance
- preventing unauthorized access to information and actively detecting, documenting, and counteracting such threats
- the virtual, online world
- provides a way for denial to be impossible
- a weakness or gap in our effort to protect ourselves
- assures online information is trustworthy and accurate
Down
- infrastructure government term describing assets that keep society and the economy functioning (including national and economic security, public health and safety, communication, transportation, and electricity generation)
- guarantee of reliable access to information
- three-pronged system of cybersecurity
- the practice of protecting digital and non-digital information
- a set of rules limiting access to certain information, much like privacy
- the state of being protected against criminal or unauthorized online activity
- guarantee that the message, transaction, or other exchange of information has shown its proof of identity
14 Clues: the virtual, online world • items or people of value online • three-pronged system of cybersecurity • provides a way for denial to be impossible • guarantee of reliable access to information • a weakness or gap in our effort to protect ourselves • assures online information is trustworthy and accurate • the practice of protecting digital and non-digital information • ...
CyberAware&Prep 2023-04-14
Across
- You should always ____ your screen when stepping away from the computer
- a _____ should be difficult for attackers to guess, but easy for you to remember
- The people responsible for cybersecurity
Down
- if you receive a strange email, never open any ___
- You can flag suspicious emails asking for information using the 'report ____' option
- the abbreviation for multiple layers of access control/login protections
- Frequent software ___ can help keep systems secure
- ____ are the weakest link in cybersecurity
- always ___ out when you are done using a website
- Shoulder ____ is when someone tries to gain information from a device by peeking over your shoulder
10 Clues: The people responsible for cybersecurity • ____ are the weakest link in cybersecurity • always ___ out when you are done using a website • if you receive a strange email, never open any ___ • Frequent software ___ can help keep systems secure • You should always ____ your screen when stepping away from the computer • ...