cybersecurity Crossword Puzzles
Loopbane in die moderne wêreld 2024-11-14
16 Clues: Surgeon • Director • Attorney • Marketing • Accountant • Data Engineer • Digital Designer • Financial Manager • Financial Analyst • Operations Manager • Computer Programmer • Mechanical Engineer • Cybersecurity Expert • Information Security • Human Resources Manager • Chief Executive Officer
cybersecurity terms 2022-12-16
Across
- a computer connected to a network that has been compromised by a hacker
- a kind of software used to prevent, scan, detect and delete viruses from a computer
- software that enables a user to covert information from another computer by transmitting data from their hard drive
- software that allows an unauthorized user to access a computer
- a type of malware that self replicates and infects other computers
- a class of cyberattacks in which attackers remotely execute commands to place malware or other malicious code on your computer or network
- a type of malware that disguises itself as legitimate code or software\
- software that displays advertising material
- A software-based firewall installed on a desktop or laptop computer to monitor and control its incoming and outgoing network traffic
Down
- a network security device that monitors and filters incoming and outgoing network traffic
- a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages
- malicious software that blocks access to a computer until a sum of money is paid
- an undocumented way of gaining access to a computer system
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- a network of computers with malicious software
- any program that prohibits a pop-up at some point in time
- hackers who use automated techniques to scan specific network ranges and find vulnerable systems
- software updates that address security vulnerabilities
18 Clues: software that displays advertising material • a network of computers with malicious software • software updates that address security vulnerabilities • any program that prohibits a pop-up at some point in time • an undocumented way of gaining access to a computer system • software that allows an unauthorized user to access a computer • ...
Cybersecurity unit 2 vocabulary 2025-09-30
Across
- Data is ensured to be unchanged
- system that prevents and blocks viruses
- Connecting devices using only cables to ensure reliability
- Cables that use pulses of light to carry data
- Storage of data in physical harddrives
- method of ensuring authentication
- protection system that requires a 1 time use password to be used by a user
- Keeping data trustworthy
- cybersecurity situation where you are exposed to danger
Down
- To reduce
- Data can always be used or found
- Ability to reach and use data
- Fundamental cybersecurity model that is composed of 3 ideas
- Ensuring that nobody changed or altered any data
- Barrier between devices that monitors traffic
- Keeping data secret to people who don't need it
- Tool that monitors and blocks suspicious activity
- Tool that monitors for suspicious activity
18 Clues: To reduce • Keeping data trustworthy • Ability to reach and use data • Data is ensured to be unchanged • Data can always be used or found • method of ensuring authentication • Storage of data in physical harddrives • system that prevents and blocks viruses • Tool that monitors for suspicious activity • Barrier between devices that monitors traffic • ...
Raqamli iqtisodiyotning xususiyatlari va xorijiy davlatlarda raqamli iqtisodiyotning rivojlanishi 2025-11-26
15 Clues: Bulut • Ulanish • Yangilik • Xavfsizlik • Aqlli tizim • Tejamkorlik • Qabul qilish • Onlayn tizim • Harakatlilik • Onlayn savdo • Ma’lumot oqimi • Iqtisodiy hajm • Avtomatlashtirish • Raqamli iqtisodiyot • Moliyaviy texnologiya
Cybersecurity terms 2024-03-12
Across
- horse Malicious software disguised innocuously.
- Identity verification using traits.
- Malicious software threat
- Malicious code component.
- security Device-specific protection measures.
- policy Guidelines for security measures.
- Applying software updates regularly.
- Weakness in system security.
Down
- Deceptive email communication.
- testing Ethical hacking simulation.
- Malware with system-level access.
- hygiene Good digital security practices.
- incident Breach or violation event.
- Identity verification using traits.
- Malicious digital intrusion attempt.
- Network security barrier.
- Data protection through scrambling.
- Secure communication technique.
- Software against malicious programs.
- hat Ethical security expert.
20 Clues: Network security barrier. • Malicious software threat • Malicious code component. • Weakness in system security. • Deceptive email communication. • Secure communication technique. • Malware with system-level access. • testing Ethical hacking simulation. • Identity verification using traits. • Identity verification using traits. • Data protection through scrambling. • ...
Cybersecurity Awareness 2023-09-06
Across
- Method of secure communication (12 letters).
- Malware that demands payment to restore access (10 letters).
- Software that collects information without consent (7 letters).
- A group of interconnected devices (7 letters).
- A potential danger or risk (6 letters).
- Software that can infect your computer. (5 letters).
- Information stored on a computer (4 letters).
- Unauthorized access to a computer system (7 letters).
Down
- Process of converting data into a code (11 letters).
- A fraudulent scheme to deceive people (4 letters).
- The practice of using two different authentication methods (10 letters).
- A person who creates software.
- Weakness in a system that can be exploited (13 letters).
- Measures taken to protect against cyber threats (8 letters).
- A person interacting with a computer system (4 letters).
- A network security software. (8 letters).
- A common email-based attack (8 letters).
- Software to protect against malware (9 letters).
18 Clues: A person who creates software. • A potential danger or risk (6 letters). • A common email-based attack (8 letters). • A network security software. (8 letters). • Method of secure communication (12 letters). • Information stored on a computer (4 letters). • A group of interconnected devices (7 letters). • Software to protect against malware (9 letters). • ...
Cybersecurity Awareness 2023-10-03
Across
- A process by which a system verifies the identity of a user who wishes to access it.
- Small piece of data stored on a user's computer by the web browser while browsing a website.
- A set of static analysis tools for investigating and comparing phishing kit content within single or multiple kits.
- Manipulating individuals into divulging confidential information through psychological tactics.
- A type of malicious software that blocks access to a user's data until a sum of money is paid.
- A secure bridge between your device and the internet, often used to keep browsing activity private.
- AI-generated fake content, often video, that looks convincingly real.
- A collection of software and tools to make phishing campaigns easier for attackers.
- Software designed to harm or exploit any device, network, service, or program.
Down
- Targeted phishing attempts directed at specific individuals or companies.
- A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- Malicious code that's activated by a specific condition or event.
- Information used to understand the enemy's strengths and weaknesses.
- Phishing attacks that are executed via SMS.
- Malicious software that records every keystroke to secretly gather personal information.
- Ensuring operations and data adhere to established rules and regulations.
- A network of private computers infected with malicious software and controlled as a group.
- A secret combination, often alphanumeric, used for authentication.
18 Clues: Phishing attacks that are executed via SMS. • Malicious code that's activated by a specific condition or event. • A secret combination, often alphanumeric, used for authentication. • Information used to understand the enemy's strengths and weaknesses. • AI-generated fake content, often video, that looks convincingly real. • ...
Cybersecurity terms 2025-02-10
Across
- - Malicious software designed to damage a system.
- - A hidden method of bypassing security.
- - Gathering personal information using deceptive emails.
- - Coding used to protect information.
- Address - Identifies the connection between a computer and the network provide
- - Hardware that allows communication between a network and the Internet.
- - A network of infected devices controlled by malware.
Down
- - A security system that prevents intrusions.
- - A system update that covers security vulnerabilities.
- - A process that confirms a user’s identity.
- - Someone who tries to gain unauthorized access.
- - Distributed Denial of Service attack.
- - Software that blocks access until money is paid.
- - Virtual Private Network.
- - Malware designed to remain hidden.
- - A decoy system to attract attackers.
- - Taking advantage of a computer’s vulnerability.
- Breach - When information is stolen from a system.
18 Clues: - Virtual Private Network. • - Malware designed to remain hidden. • - Coding used to protect information. • - A decoy system to attract attackers. • - Distributed Denial of Service attack. • - A hidden method of bypassing security. • - A process that confirms a user’s identity. • - A security system that prevents intrusions. • ...
CyF Chapter 1 2023-10-08
Across
- What is the acronym for the intermediate level certification offered by EC-Council that the cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.
- Attacks that originate from within an organization are known as ___________ security threats.
- Which type of cyber attack can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
- Script _____ are teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill.
- DDoS in cyber security means "Distributed ______-of-Service.
- The acronym of this technology which enable people to connect billions of devices to the Internet.
- Criminals can also use rogue devices, such as _____ Wi-Fi access points.
- Information _______ Management Standards provide a framework for implementing cybersecurity measures within an organization.
- Cybersecurity ______ possess the insight to recognize the influence of data and harness that power to build great organizations, provide services and protect people from cyberattacks.
Down
- Criminals use this tool to capture data streams over a network.
- Federated identity management refers to ______ enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
- What is another word used to describe the speed of data.
- A group of grey hat hackers who rally and protest against different political and social ideas.
- At which level are the employees responsible to protect the organization’s reputation, data, and customers.
- Cyber ______ is a weakness that makes a target susceptible to an attack
- The acronym of the practice where people used their own devices to access enterprise information.
- This group of criminals breaks into computers or networks to gain access for various reasons.
- A cybersecurity ______ is the possibility that a harmful event, such as an attack, will occur.
- State _____ Hackers are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- _____ hat attackers are unethical criminals who violate computer and network security for personal gain.
20 Clues: What is another word used to describe the speed of data. • DDoS in cyber security means "Distributed ______-of-Service. • Criminals use this tool to capture data streams over a network. • Cyber ______ is a weakness that makes a target susceptible to an attack • Criminals can also use rogue devices, such as _____ Wi-Fi access points. • ...
Hack Your Brain 2024-09-18
Across
- A small device or software used to create a secure encrypted tunnel between two networks
- The unauthorized exploitation of a network to access confidential data or systems
- A simulation-based cybersecurity exercise to assess an organization's defensive capabilities (Two words)
- The process of identifying and analyzing security risks
- A specific type of phishing that targets high-profile individuals, such as executives
- A malicious attempt to disrupt a network by overwhelming it with traffic
- An individual who uses hacking skills for ethical purposes
Down
- An offensive security activity where ethical hackers simulate real-world attacks to test defenses (Two words, hyphenated)
- Teaming A cybersecurity practice where teams work against each other, with attackers and defenders (Two words)
- A technique where attackers attempt to guess passwords by trying all possible combinations
- Shields The world's largest multinational cybersecurity exercise, organized annually by NATO (Two words)
- A widely-used asymmetric encryption algorithm named after its inventors
12 Clues: The process of identifying and analyzing security risks • An individual who uses hacking skills for ethical purposes • A widely-used asymmetric encryption algorithm named after its inventors • A malicious attempt to disrupt a network by overwhelming it with traffic • The unauthorized exploitation of a network to access confidential data or systems • ...
Hack Your Brain 2024-09-18
Across
- A specific type of phishing that targets high-profile individuals, such as executives.
- A technology used to create a secure, encrypted tunnel between two networks.
- A malicious attempt to disrupt a network by overwhelming it with traffic.
- A simulation-based cybersecurity exercise to assess an organization's defensive capabilities.
- A technique where attackers attempt to guess passwords by trying all possible combinations.
- The unauthorized exploitation of a network to access confidential data or systems.
Down
- An individual who uses hacking skills for ethical purposes.
- An offensive security activity where ethical hackers simulate real-world attacks to test defenses (Two words, hyphenated).
- A cybersecurity practice where teams work against each other, with attackers and defenders.
- ... Shields - The world's largest multinational cybersecurity exercise, organized annually by NATO.
- A widely used asymmetric encryption algorithm named after its inventors.
- ... Management - The process of identifying and analyzing issues that could have an unwanted effect on company assets.
12 Clues: An individual who uses hacking skills for ethical purposes. • A widely used asymmetric encryption algorithm named after its inventors. • A malicious attempt to disrupt a network by overwhelming it with traffic. • A technology used to create a secure, encrypted tunnel between two networks. • ...
Trends & Buzzwords 2025-07-23
Across
- Technology helping to preserve the planet.
- Elon Musk's artificial world.
- Multiple tools/controls working together.
- everything as a (not a product)
- Insurance for when your tech gets hit by liabilities.
- Desgined to find and respond to potential cybersecurity threaets.
- Why pay a human to do a job when you can pay to build a robot to do it instead?
Down
- Combing through cybersecurity strategies in a company to find potential vulnerabilities.
- Experiences, but lots of them.
- Not actually intelligent.
- Not stupid business.
- First a password, then an authentication key, then a security question.
- A connection of cloud systems for many purposes.
- Reality, but stretched.
- Desgined to mitigate digital business risks.
- Funky computers that go really fast.
16 Clues: Not stupid business. • Reality, but stretched. • Not actually intelligent. • Elon Musk's artificial world. • Experiences, but lots of them. • everything as a (not a product) • Funky computers that go really fast. • Multiple tools/controls working together. • Technology helping to preserve the planet. • Desgined to mitigate digital business risks. • ...
Cybersecurity Fundamental Chapter 2 2024-06-03
Across
- Ensures that information is accessible only to those authorized to have access.
- The foundational principles of cybersecurity.
- A framework developed by John McCumber to manage and protect networks, domains, and the Internet.
- The three categories of measures used to protect cyberspace: Technologies (devices and products), Policies and Practices (procedures and guidelines), and People (awareness and knowledge)
Down
- The ISO Cybersecurity Model, including ISO 27001 and ISO 27002 standards, provides a framework for managing information security.
- Data that is stored on physical media (e.g., hard drives, USB drives, cloud storage). Protecting data at rest involves encryption, access controls, and physical security measures.
- Data that is being transmitted across networks (e.g., emails, data transfers). Securing data in transit involves using secure communication protocols such as SSL/TLS, VPNs, and encryption.
- Data that is being actively processed by applications. Protecting data in process requires secure coding practices, memory protection mechanisms, and ensuring that applications handle data securely.
- Ensures that information and resources are accessible to authorized users when needed.
- Ensures that information remains accurate and complete throughout its lifecycle.
- The three states in which data can exist and require protection.
11 Clues: The foundational principles of cybersecurity. • The three states in which data can exist and require protection. • Ensures that information is accessible only to those authorized to have access. • Ensures that information remains accurate and complete throughout its lifecycle. • ...
Cybersecurity Scramble 2023-10-24
Across
- Multiple sources sending an overwhelming amount of packets to crash the device.
- Holds computer data hostage in exchange for money.
- Requires end-user initiation.
- Sending an overwhelming amount of packets to crash the device.
- Phishing by impersonating businesses.
- A _ attack that attacks a vulnerability on a network unknown to the vendor.
- Triggers malicious code.
- Creates backdoors in the operating system.
- Replicates using network vulnerabilities
- Sending unauthorized messages to another bluetooth device.
Down
- Scares the victim into infecting their system.
- Phishing using calls.
- Creates ad-popups for the authors to generate revenue.
- Copying a victims information from bluetooth.
- Malware that carries out operations pretending to be something else.
- Phishing using texts.
- Lets the attacker view the actions of the user and their data.
- Phishing that targets high profile individuals.
18 Clues: Phishing using calls. • Phishing using texts. • Triggers malicious code. • Requires end-user initiation. • Phishing by impersonating businesses. • Replicates using network vulnerabilities • Creates backdoors in the operating system. • Copying a victims information from bluetooth. • Scares the victim into infecting their system. • ...
Disruptive Technology 2025-07-23
13 Clues: Mesh • cloud • Reality • Screening • Computing • Automation • technology • Intelligence • Intelligence • Immune System • Authentication • Liability Insurance • Detection and Response
AI TECHNOLOGY AND SOCIETY 2024-03-06
A comparative study of India’s IT Act 2000 vs. GDPR, CCPA, and China’s Cybersecurity Law. How India can strengthen its cyber laws to protect businesses and individuals. 2025-04-07
Across
- China's law mandates data ___ for critical sectors
- GDPR fines can reach 4% of global ___
- California's consumer privacy law
- China's focus in its national data law
- Indian cybersecurity law enacted in 2000
Down
- CCPA lets consumers ___ of data sales
- GDPR's "Right to be ___" allows data deletion
- GDPR principle: "___ by Design"
- IT Act clause on compensation for data negligence
- EU's strict data protection regulation
10 Clues: GDPR principle: "___ by Design" • California's consumer privacy law • CCPA lets consumers ___ of data sales • GDPR fines can reach 4% of global ___ • EU's strict data protection regulation • China's focus in its national data law • Indian cybersecurity law enacted in 2000 • GDPR's "Right to be ___" allows data deletion • IT Act clause on compensation for data negligence • ...
Cybersecurity 2021-02-12
Across
- An unwanted software that monitors and gathers information on a person and how they use their computer, for example monitoring your internet usage to send you harmless but annoying adverts.
- A series of letters, numbers or symbols that protect data in your computer.
- A type of malware that exploits vulnerabilities in the a computer’s operating system and once in uses the system’s resources.
- A person that tries to access your data by getting into your computer, for example by figuring our your passwords.
- Locks a computer, encrypts files, and prevents the user from being able to access the data.
Down
- A more sinister spyware that records every keystroke made by a user.
- It infects a computer and causes it to download or display adverts or pop-ups when the victim is online.
- Being able to edit and view personal files like photos or videos.
- A self-replicating software, to get into the computer it has to be downloaded as part of another file which is then executed on the computer.
- A specific type of computer virus that tricks you into downloading it onto your computer. Once in your computer it might open a ‘back door’ to give an attacker remote access to your computer.
10 Clues: Being able to edit and view personal files like photos or videos. • A more sinister spyware that records every keystroke made by a user. • A series of letters, numbers or symbols that protect data in your computer. • Locks a computer, encrypts files, and prevents the user from being able to access the data. • ...
Cybersecurity 2024-12-24
Across
- A harmful program that damages computers or steals information.
- Rules that guide how computers communicate securely.
- A system that spots unauthorized access to a network.
- A way to verify if someone is who they claim to be.
Down
- When sensitive information is accessed without permission.
- A barrier that protects a computer from harmful connections.
- A weakness in a system that can be exploited by hackers.
- A process that scrambles data to keep it secure.
- An attempt to harm a computer system or steal data.
- A scam where fake emails trick people into giving personal information.
10 Clues: A process that scrambles data to keep it secure. • An attempt to harm a computer system or steal data. • A way to verify if someone is who they claim to be. • Rules that guide how computers communicate securely. • A system that spots unauthorized access to a network. • A weakness in a system that can be exploited by hackers. • ...
Cybersecurity 2025-01-13
Across
- A scam to steal information through fake communication
- A copy of data stored for recovery in case of loss
- Malicious software that secretly tracks your online activity and steals personal information
- A malicious program that replicates itself and spreads to other systems
- A security method requiring two or more ways to verify your identity before granting access
Down
- Malware that demands payment to restore access to data or systems
- A software update to fix vulnerabilities
- A secret key to access your account
- Someone who gains unauthorized access to systems or networks
- The right to control your personal information and keep it protected from unauthorized access.
10 Clues: A secret key to access your account • A software update to fix vulnerabilities • A copy of data stored for recovery in case of loss • A scam to steal information through fake communication • Someone who gains unauthorized access to systems or networks • Malware that demands payment to restore access to data or systems • ...
cybersecurity 2025-03-06
Across
- A cyber attack that tricks people into revealing personal information via fake emails or websites.
- Malicious software that secretly gathers user information.
- Software designed to harm or exploit computer systems.
- A type of malware that disguises itself as legitimate software.
- A secret combination of characters used to access a system.
- A type of malware that locks files and demands payment for decryption.
Down
- A security system that monitors and controls incoming and outgoing network traffic.
- The process of converting data into a secure code to prevent unauthorized access.
- Software that detects and removes malicious programs.
- A person who gains unauthorized access to computer systems.
10 Clues: Software that detects and removes malicious programs. • Software designed to harm or exploit computer systems. • Malicious software that secretly gathers user information. • A person who gains unauthorized access to computer systems. • A secret combination of characters used to access a system. • A type of malware that disguises itself as legitimate software. • ...
Cybersecurity 2023-10-31
Across
- a hacker that is malicious
- the art of protecting devices and data from unauthorized access
- a hacker that is doing good
- when your personal data is kept secret
Down
- a hacker that works without permission
- when you personal data is available
- Multi-Factor________ something you have, know, and are
- Internet of __________
- a kind of human engineering
- an unusual way to solve a problem
10 Clues: Internet of __________ • a hacker that is malicious • a hacker that is doing good • a kind of human engineering • an unusual way to solve a problem • when you personal data is available • a hacker that works without permission • when your personal data is kept secret • Multi-Factor________ something you have, know, and are • ...
cybersecurity 2024-12-04
Across
- Malware that takes user data hostage
- Act of illegally retrieving confidential information
- Type of virus spread via emails or links
- Protective measures put in place against attacks
- Tool used to connect to a private network securely
Down
- Set of techniques to secure a business against cyberattacks
- Malware designed to spy on the user without them realizing it
- Term designating a computer attack consisting of overwhelming a server with requests to render it inoperable
- Secure authentication method using two separate elements
- that takes user data hostage
10 Clues: that takes user data hostage • Malware that takes user data hostage • Type of virus spread via emails or links • Protective measures put in place against attacks • Tool used to connect to a private network securely • Act of illegally retrieving confidential information • Secure authentication method using two separate elements • ...
Cybersecurity 2025-05-05
Across
- Forging the sender's address in emails
- sending fake messages/links to steal persona data.
- A series of small attacks
- unauthorized means,
- Copying or distributing unauthorized software
- Altering data before entering into computer system
Down
- Taking control of a website
- creating fake documents
- A type of malware disguised
- Sending large volumes of unwanted mails
10 Clues: unauthorized means, • creating fake documents • A series of small attacks • Taking control of a website • A type of malware disguised • Forging the sender's address in emails • Sending large volumes of unwanted mails • Copying or distributing unauthorized software • sending fake messages/links to steal persona data. • Altering data before entering into computer system
Cybersecurity 2021-06-02
Across
- Intention to damage a person.
- The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
- It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
- Ability of a user to access information or resources in a specified location and in the correct format.
- Illegal access to a computer system for the purpose od causing damage.
Down
- Malicious software designed to damage.
- Without permission or authorization
- Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
- It's the protection of personal information.
10 Clues: Intention to damage a person. • Without permission or authorization • Malicious software designed to damage. • It's the protection of personal information. • Illegal access to a computer system for the purpose od causing damage. • It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses. • ...
Cybersecurity 2022-06-29
11 Clues: physical asset • Tangible asset • tangible asset • Intangible asset • Purchasing of asset • hardware and software • plumbing installation • Wear and tear situation • Digital media and content • Costlier than traditional • Longeststage of asset lifecycle
CYBERSECURITY 2025-10-27
Across
- A fake message that tries to trick you into giving personal information.
- A scam website pretending to be a trusted one.
- A test to prove you are human, not a robot
- Software that protects your computer from viruses.
- Harmful software designed to damage or access your computer.
- A secret word or phrase used to protect your accounts.
Down
- Connecting to the internet without using wires
- The act of stealing someone’s personal information online
- Footprint The trace of information you leave online.
- A combination of letters, numbers, and symbols that makes a password strong.
10 Clues: A test to prove you are human, not a robot • Connecting to the internet without using wires • A scam website pretending to be a trusted one. • Software that protects your computer from viruses. • Footprint The trace of information you leave online. • A secret word or phrase used to protect your accounts. • The act of stealing someone’s personal information online • ...
Recognition and 2025-04-09
14 Clues: Set. • Admin • Produce. • Security. • Open door • Go fishing • Operation.. • Aware of... • Self moving. • Threats to.. • Confiability. • Concrete info. • Before its all lost. • LEARNING Smart Robot.
Cybersecurity 2022-09-16
Across
- update to an operating system to repair an bug or vulnerability
- tool installed to give an attacker easier access to the compromised system
- Electronic junk mail or junk newsgroup postings.
- generic term for a number of different types of malicious code.
- User acting with malicious intent to compromise a system
- term to describe connecting multiple separate networks together.
Down
- use a computer to gain unauthorized access to data in a system
- program that can retrieve and display information from servers on the World Wide Web
- Malware that locks/encrypts computers
- e-mails that try to trick a user into entering valid credentials at a fake website
10 Clues: Malware that locks/encrypts computers • Electronic junk mail or junk newsgroup postings. • User acting with malicious intent to compromise a system • use a computer to gain unauthorized access to data in a system • update to an operating system to repair an bug or vulnerability • generic term for a number of different types of malicious code. • ...
Cybersecurity 2023-10-31
Across
- a hacker that is malicious
- the art of protecting devices and data from unauthorized access
- a hacker that is doing good
- when your personal data is kept secret, another word for secret
Down
- a hacker that works without permission
- when you personal data is available (another word for available)
- Multi-Factor________ something you have, know, and are
- Internet of __________ (network of connected devices)
- a kind of human engineering with no coding
- an unusual way to solve a problem
10 Clues: a hacker that is malicious • a hacker that is doing good • an unusual way to solve a problem • a hacker that works without permission • a kind of human engineering with no coding • Internet of __________ (network of connected devices) • Multi-Factor________ something you have, know, and are • the art of protecting devices and data from unauthorized access • ...
Cybersecurity 2023-11-15
Across
- A cryptographic attack on hash collisions
- A sudden unplanned event.
- Something built in to or used in a system to address gaps or weaknesses in the controls that could otherwise lead to an exploit.
- An attack that seeks to obtain personal or private financial information through domain spoofing
- The action of multiple attackers planning a cyberattack
Down
- The art of exploiting bugs and weaknesses that exist in the telephone system
- A process of changing hardware and software configurations to make computers and devices as secure as possible.
- The capture and monitoring of network IP packets using a packet sniffer
- A type of fraud in which an attacker attempts to trick the victim into providing private information.
- The act of unscrambling ciphertext into plaintext
10 Clues: A sudden unplanned event. • A cryptographic attack on hash collisions • The act of unscrambling ciphertext into plaintext • The action of multiple attackers planning a cyberattack • The capture and monitoring of network IP packets using a packet sniffer • The art of exploiting bugs and weaknesses that exist in the telephone system • ...
CYBERSECURITY 2024-01-14
10 Clues: Online storage. • Ransomware type. • Harmful software. • Ensuring privacy. • Data preservation. • Encrypting malware. • Securely lock files. • Decryption necessity. • Fake software tactic. • Remote access method.
Cybersecurity 2024-07-19
Across
- gained technology access when not authorized
- protecting patient healthcare information
- safeguards data during transmission and storage
- patient data remaining accessible
Down
- passwords recommended for "logging in"
- patient information kept private
- patient records remaining accurate and intact
- healthcare leading cause of security breaches
- digitalized complete patient health information
- recommended regularly for software integrity
10 Clues: patient information kept private • patient data remaining accessible • passwords recommended for "logging in" • protecting patient healthcare information • gained technology access when not authorized • recommended regularly for software integrity • patient records remaining accurate and intact • healthcare leading cause of security breaches • ...
Cybersecurity 2024-04-03
Across
- A computer attack aimed at making a service unavailable.
- A program/device that protects a network.
- A type of malware that looks like a legimate program and is undetected by the anti-virus
- A network of computers infected by malware that are under the control of a single attacking party.
- A technique for protecting data by transforming it irreversibly.
Down
- A technique of symmetric encryption.
- A hashing algorithm which is the most used in secret-keys transfert.
- A known certfication authority who offers free certificates.
- A brand that makes cybersecurity devices especially for companies.
- A technique used by fraudsters to obtain personal information with the aim of committing identity theft.
10 Clues: A technique of symmetric encryption. • A program/device that protects a network. • A computer attack aimed at making a service unavailable. • A known certfication authority who offers free certificates. • A technique for protecting data by transforming it irreversibly. • A brand that makes cybersecurity devices especially for companies. • ...
Cybersecurity 2024-05-04
Across
- Weaknesses or flaws in software, hardware, or network infrastructure that can be exploited by attackers to compromise the security of a system.
- The process of converting data into a form that is unreadable without the correct decryption key, thereby protecting it from unauthorized access.
- The process of verifying the identity of a user or device attempting to access a system, often through passwords, biometric scans, or two-factor authentication methods.
Down
- Deliberate actions taken by hackers or malicious entities to disrupt, damage, or gain unauthorized access to computer systems, networks, or data.
- A type of cyber attack in which attackers impersonate legitimate entities to deceive individuals into providing sensitive information, such as passwords or financial data.
- Unauthorized access or attempted access to a computer system or network by an individual or automated process.
- Authentication techniques that rely on unique biological characteristics, such as fingerprints, iris scans, or facial recognition, to verify the identity of individuals accessing a system or device.
- A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data, often spread through email attachments, infected websites, or removable media.
- A software update designed to fix security vulnerabilities or address other issues within a program or operating system.
10 Clues: Unauthorized access or attempted access to a computer system or network by an individual or automated process. • A software update designed to fix security vulnerabilities or address other issues within a program or operating system. • ...
Cybersecurity 2024-04-29
Across
- Unsolicited or unwanted email, often containing malicious links or attachments.
- Unauthorized access or exposure of sensitive information.
- A security mechanism that uses unique physical or behavioral characteristics to authenticate users.
- Manipulating individuals into divulging confidential information or performing actions that compromise security.
- Measures taken to protect the integrity and confidentiality of data transmitted over a network.
Down
- Malware that encrypts files or systems and demands payment for their release.
- A form of MFA that requires users to provide two different authentication factors.
- Knowledge and understanding of cybersecurity risks, threats, and best practices.
- The process of responding to and mitigating the effects of a cybersecurity incident.
- Software designed to detect, prevent, and remove malicious software from computer systems.
10 Clues: Unauthorized access or exposure of sensitive information. • Malware that encrypts files or systems and demands payment for their release. • Unsolicited or unwanted email, often containing malicious links or attachments. • Knowledge and understanding of cybersecurity risks, threats, and best practices. • ...
Cybersecurity 2024-05-07
Across
- when you lose data this policy lets you restore it
- a program that allows hackers access to data without detect
- hacking under the onwers consent
- security actions like protecting the computer
- A self-replicating program
Down
- hacker that violates laws but not for malicious intent
- Basically rules and regulations
- protecting data from digital attacks
- Hacking with malicious intent
- A malicious program that is desguised
10 Clues: A self-replicating program • Hacking with malicious intent • Basically rules and regulations • hacking under the onwers consent • protecting data from digital attacks • A malicious program that is desguised • security actions like protecting the computer • when you lose data this policy lets you restore it • hacker that violates laws but not for malicious intent • ...
Cybersecurity 2024-09-22
Across
- The highest level of access in a computer system
- Security technology that uses physical characteristics like fingerprints or facial recognition
- A security principle that ensures data has not been altered or tampered with
- A security threat that originates from within an organization
- The process of confirming the identity of a user or device
Down
- A hidden method of bypassing normal authentication to gain access to a system
- the science of encrypting and decrypting data
- is a key goal of cyber security
- The use of investigative techniques to examine digital crimes or security breaches
- one of the world's largest ransomware attacks in history
10 Clues: is a key goal of cyber security • the science of encrypting and decrypting data • The highest level of access in a computer system • one of the world's largest ransomware attacks in history • The process of confirming the identity of a user or device • A security threat that originates from within an organization • ...
Cybersecurity 2025-04-25
Across
- Oberbegriff für schädliche Software
- Psychologische Manipulation zur Informationsgewinnung
- Kryptografische Prüfziffer von Daten
- Täuschungsmethode, um an persönliche Daten zu gelangen
- Angriff auf eine bisher unbekannte Sicherheitslücke
Down
- Simulierter Angriff zur Sicherheitsüberprüfung
- Erpresst Nutzer durch Verschlüsselung ihrer Daten
- Authentifizierungsmethode mit zusätzlicher Sicherheit
- Wird zum Entschlüsseln in der asymmetrischen Kryptographie verwendet
- Schützt Netzwerke vor unautorisierten Zugriffen
10 Clues: Oberbegriff für schädliche Software • Kryptografische Prüfziffer von Daten • Simulierter Angriff zur Sicherheitsüberprüfung • Schützt Netzwerke vor unautorisierten Zugriffen • Erpresst Nutzer durch Verschlüsselung ihrer Daten • Angriff auf eine bisher unbekannte Sicherheitslücke • Authentifizierungsmethode mit zusätzlicher Sicherheit • ...
cybersecurity 2025-11-27
Across
- Attack that overwhelms a service
- Malware that demands payment
- Software that secretly monitors activity
- Fraudulent attempt to steal information
- Malware disguised as legitimate software
- Network of compromised devices
Down
- Self-replicating malicious program
- Barrier that filters network traffic
- Technique to protect data
- Malicious software
10 Clues: Malicious software • Technique to protect data • Malware that demands payment • Network of compromised devices • Attack that overwhelms a service • Self-replicating malicious program • Barrier that filters network traffic • Fraudulent attempt to steal information • Software that secretly monitors activity • Malware disguised as legitimate software
Group Activity 2024-09-20
Across
- limited access of any resources
- encrypted messages
- example of integrity
- example of integrity
Down
- It involves a range of technologies, processes and practices designed to safeguard the CIA of information
- data at-rest
- Component of cybersecurity
- combination of date and time
- reading by authorized parties
- authorized parties are able to modify
10 Clues: data at-rest • encrypted messages • example of integrity • example of integrity • Component of cybersecurity • combination of date and time • reading by authorized parties • limited access of any resources • authorized parties are able to modify • It involves a range of technologies, processes and practices designed to safeguard the CIA of information
i think theres someone hanging there 2025-07-23
13 Clues: (EDR) • Mesh, • cloud, • Detection • Computing, • Screening, • technology, • Reality (XR), • Intelligence (AI), • Intelligence (BI), • Immune System (DIS), • Liability Insurance, • Automation, Multi-Factor Authentication (MFA),
Cybersecurity 2021-06-02
Across
- Intention to damage a person
- The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
- It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
- Ability of a user to access information or resources in a specified location and in the correct format.
- Illegal access to a computer system for the purpose od causing damage.
Down
- Malicious software designed to damage.
- Without permission or authorization
- Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
- It's the protection of personal information.
10 Clues: Intention to damage a person • Without permission or authorization • Malicious software designed to damage. • It's the protection of personal information. • Illegal access to a computer system for the purpose od causing damage. • It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses. • ...
cybersecurity 2022-05-06
Across
- eg.: 192.160.81.1
- A network security system
- background process of stealing data
- Virtual Private Network
- A man who hacks
Down
- sharing negative content about someone else
- denial of internet service attack
- baiting to reveal personal information
- A type of malware that steals data
- privileged acces managemen (or a brawl stars character)
10 Clues: A man who hacks • eg.: 192.160.81.1 • Virtual Private Network • A network security system • denial of internet service attack • A type of malware that steals data • background process of stealing data • baiting to reveal personal information • sharing negative content about someone else • privileged acces managemen (or a brawl stars character)
Cybersecurity 2022-11-17
10 Clues: covid • irritating • chats for you • shops for you • rigs elections • forced advertising • ransoms your files • knowingly downloaded • wastes network bandwidth • attacks specific servers
cybersecurity 2023-10-02
Across
- malware that is designed to steal personal information, such as passwords , CC numbers
- A process of identifying, assessing, and mitigating security risks
- A set of rules & procedures that govern the security of an organization's information systems.
- A system that prevents unauthorized access to a computer network
- Type of attack that attempts to trick users into revealing confidential information
- The process of verifying the identity of a user or device
Down
- process of granting access to resources based on a user's identity and permissions
- Encrypts a victim's files and demands payment to decrypt them
- Control to protect integrity of information
- A system that monitors a network for suspicious activity
10 Clues: Control to protect integrity of information • A system that monitors a network for suspicious activity • The process of verifying the identity of a user or device • Encrypts a victim's files and demands payment to decrypt them • A system that prevents unauthorized access to a computer network • A process of identifying, assessing, and mitigating security risks • ...
Cybersecurity 2024-02-18
Across
- Code red is a type of computer _______.
- Its Chakravyuh feature is an end-point anti- malware and antivirus software that creates a virtual layer between the user and the internet, blocking hackers from accessing sensitive data.which OS is refered here.
- In ethical hacking and cyber security, there are ______types of scanning.
- what is transformed with the help of a cipher algorithm.
- The technique used to hide information inside a picture.
Down
- It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the
- Oldest phone hacking technique used by hackers to make free calls.
- The malware which does not replicate or clone through an infection.
- The debian based OS which has 2 virtual machines and focuses on preserving user's data.
- A type of attack which uses a fraudulent server with a relay address.
10 Clues: Code red is a type of computer _______. • what is transformed with the help of a cipher algorithm. • The technique used to hide information inside a picture. • Oldest phone hacking technique used by hackers to make free calls. • The malware which does not replicate or clone through an infection. • ...
CyberSecurity 2024-02-24
10 Clues: What was he in? • who attacked him? • What first changed? • Was the car new or old? • What type of breech was it? • What did the hackers want to do? • What did the video call the car? • How to prevent this from happening • What else did the attackers turn off? • How did the attacker get into the car computer?
CYBERSECURITY 2020-06-13
Across
- An occasion when private information can be seen by people who should not be able to see it is called data ... .
- A string of characters that allows access to a computer system or service.
- A web page or screen that updates often to show the latest information.
- The manner in which the components of a computer or computer system are organized and integrated.
Down
- A piece of code which is capable of copying itself and can corrupt the system or destroy data.
- A software designed to interfere with a computer´s normal functioning.
- The action to make something stronger or more important is called ... up.
- A type of utility used for scanning and removing viruses from a computer is called anti-virus ... .
- An attempt by hackers to damage or destroy a computer network or system.
- The practice of examining large pre-existing databases in order to generate new information is called data ...
10 Clues: A software designed to interfere with a computer´s normal functioning. • A web page or screen that updates often to show the latest information. • An attempt by hackers to damage or destroy a computer network or system. • The action to make something stronger or more important is called ... up. • ...
Cybersecurity 2024-03-19
Across
- Secret code used to access a device or network
- Process of verifying identity
- Software designed to harm a device or network
- Unauthorized access to a device or network
Down
- Criminal activity carried out using technology
- Malicious attempt to damage or disrupt a computer system
- Weakness in a system that can be exploited
- Fraudulent attempt to gain sensitive information
- System designed to prevent unauthorized access
- Method of protecting information
10 Clues: Process of verifying identity • Method of protecting information • Weakness in a system that can be exploited • Unauthorized access to a device or network • Software designed to harm a device or network • Criminal activity carried out using technology • Secret code used to access a device or network • System designed to prevent unauthorized access • ...
cybersecurity 2024-02-21
Across
- Cyber-attack
- Action that guarantee the identity of a computer
- Error checking method
- Hash function
Down
- Unpredictable number generated by an algorithm
- Systems that are connected by each others
- Technological process for telling a computer which tasks to perform in order to solve problems
- One way encryption
- Internet protocol part of the transport layer
- Reference model of system interconnection
10 Clues: Cyber-attack • Hash function • One way encryption • Error checking method • Systems that are connected by each others • Reference model of system interconnection • Internet protocol part of the transport layer • Unpredictable number generated by an algorithm • Action that guarantee the identity of a computer • ...
cybersecurity 2024-11-12
Across
- What do you call the set of secret characters used to access accounts and secure information?
- What is malicious software that disguises itself as legitimate software?
- What is the term for a digital attack in which hackers demand payment to unlock encrypted files?
- What is a deceptive email that tricks users into giving sensitive information?
- What is the practice of protecting systems, networks, and programs from digital attacks?
Down
- What is the process of verifying the identity of a user before granting access to a system?
- What type of attack overwhelms a system with traffic, causing it to crash?
- What do you call a software program that replicates itself and spreads to other computers?
- What is the act of attempting to gain unauthorized access to a computer or network?
- What is a tool that filters incoming and outgoing network traffic to secure a network?
10 Clues: What is malicious software that disguises itself as legitimate software? • What type of attack overwhelms a system with traffic, causing it to crash? • What is a deceptive email that tricks users into giving sensitive information? • What is the act of attempting to gain unauthorized access to a computer or network? • ...
CYBERSECURITY 2025-02-08
Across
- A person who tries to break into systems.
- A fake email trying to trick you.
- Someone you do not know online.
- Relating to computers and the internet.
- Software designed to harm your device.
Down
- The action of entering username/password.
- A secret code to keep your account safe.
- A way to send messages online.
- Keeping your personal information safe.
- A harmful program that damages a computer.
10 Clues: A way to send messages online. • Someone you do not know online. • A fake email trying to trick you. • Software designed to harm your device. • Keeping your personal information safe. • Relating to computers and the internet. • A secret code to keep your account safe. • The action of entering username/password. • A person who tries to break into systems. • ...
Cybersecurity 2025-05-26
Across
- Malware disguised as legitimate software
- Process of verifying user identity
- A vulnerability exploited before being publicly known
- Deceptive attempt to steal user credentials via fake emails
- Software that secretly gathers user information
Down
- Process of converting data into a secure format
- System that filters incoming and outgoing network traffic
- Malware that encrypts files and demands payment
- General term for harmful software like viruses or worms
- Program designed to detect and remove malware
10 Clues: Process of verifying user identity • Malware disguised as legitimate software • Program designed to detect and remove malware • Process of converting data into a secure format • Malware that encrypts files and demands payment • Software that secretly gathers user information • A vulnerability exploited before being publicly known • ...
Cybersecurity 2025-06-25
Across
- Being trustworthy
- The state of being exposed to an attack
- The practice of protecting systems from attacks
- Software that obtains seccret information
- The action of decoding
Down
- The action of encoding
- Malicius software
- Software used to prevent, and remove malicius software
- An attmept by hackers to damage a computer
- Reveal personal information from fraudulent emails
10 Clues: Malicius software • Being trustworthy • The action of encoding • The action of decoding • The state of being exposed to an attack • An attmept by hackers to damage a computer • Software that obtains seccret information • The practice of protecting systems from attacks • Reveal personal information from fraudulent emails • ...
Cybersecurity 2025-07-29
Across
- Network of private computers infected with malicious software
- Technique of making data unreadable to unauthorized users
- Fraudulent attempt to obtain sensitive information
- Barrier between a trusted network and untrusted networks
- Software designed to damage, disrupt, or gain unauthorized access
- Secret string used to authenticate access
Down
- Attacker tricks someone into breaking security procedures
- Attempts to guess a password by trying many combinations
- Method of verifying identity using fingerprints, retina, etc.
- Security flaw allowing attackers to access restricted data
10 Clues: Secret string used to authenticate access • Fraudulent attempt to obtain sensitive information • Attempts to guess a password by trying many combinations • Barrier between a trusted network and untrusted networks • Attacker tricks someone into breaking security procedures • Technique of making data unreadable to unauthorized users • ...
Cybersecurity 2025-02-03
Across
- A potential cause of harm to a system, such as an attacker or malicious software
- The process of verifying the identity of a user or system
- A small piece of data used to verify a user’s identity during authentication
- Writing software with built-in security measures to prevent vulnerabilities
- A weakness in a system that can be exploited by attackers
Down
- Process of converting data into a code to prevent unauthorized access
- A piece of software designed to fix vulnerabilities or improve functionality
- Software designed to disrupt, damage, or gain unauthorized access to a computer system
- A method of attempting to acquire sensitive information by pretending to be a trustworthy entity
- A system designed to prevent unauthorized access to or from a private network
10 Clues: The process of verifying the identity of a user or system • A weakness in a system that can be exploited by attackers • Process of converting data into a code to prevent unauthorized access • Writing software with built-in security measures to prevent vulnerabilities • A piece of software designed to fix vulnerabilities or improve functionality • ...
Cybersecurity 2025-09-05
Across
- Wie nennt man die übergeordneten Sicherheitsziele wie Vertraulichkeit, Integrität und Verfügbarkeit, die im Security Concept verankert sind?
- Welches Dokument fasst die Cybersecurity-Ziele und -Anforderungen eines Items zusammen und leitet daraus Schutzmaßnahmen ab?(englisches Wort)
- Welcher Schritt ist Teil des Security Concepts und untersucht, welche Angriffe realistisch sind?
- Welche Prüfaktivität simuliert Angriffe, um Schwachstellen in einem System aufzudecken?
Down
- Wie nennt man den Unterschied zwischen erwartetem und tatsächlichem Testergebnis im Testbericht?
- Welcher Mechanismus stellt sicher, dass nur autorisierte Personen Fahrzeugdiagnosen durchführen können?(englisches Wort)
- Welcher Begriff beschreibt, wie tief und breit ein Penetrationstest durchgeführt wird
- Wie heißt das typische Verfahren, bei dem ein Steuergerät eine Herausforderung stellt und der Tester den passenden Schlüssel liefern muss? (deutsch und englisches Wort)
- Wie nennt man den praktischen Nachweis, dass eine Schwachstelle während eines Pentests ausnutzbar ist?
- Welches Dokument fasst die Ergebnisse von Tests zusammen und zeigt, ob Anforderungen erfüllt wurden?"),
10 Clues: Welcher Begriff beschreibt, wie tief und breit ein Penetrationstest durchgeführt wird • Welche Prüfaktivität simuliert Angriffe, um Schwachstellen in einem System aufzudecken? • Wie nennt man den Unterschied zwischen erwartetem und tatsächlichem Testergebnis im Testbericht? • ...
Cybersecurity 2021-02-28
Across
- Your data was not corrupted even though it crashed due to which feature of your NTFS system drive?
- The type of operating system that is permanently programmed into a hardware device.
- A _____ determines how memory is used.
- The most common Mobile OS.
Down
- The type of software license that allows a predetermined number of people to use the account at the same time.
- What is saved even when in private browsing?
- Your web browser is showing an outdated picture on a website that you visit often. Which of the following would be the best choice for attempting to fix this issue? Clear _____
- The most popular OS for desktops and laptops.
- An alert pops up on your screen informing you of a possible vulnerability in your system. Which security method is most likely responsible for sending this alert? _____ software
- The ____ accounts are responsible for creating new user accounts and setting permissions.
10 Clues: The most common Mobile OS. • A _____ determines how memory is used. • What is saved even when in private browsing? • The most popular OS for desktops and laptops. • The type of operating system that is permanently programmed into a hardware device. • The ____ accounts are responsible for creating new user accounts and setting permissions. • ...
Cybersecurity 2021-02-12
Across
- Needs to be downloaded as part of another file which is then executed on the computer.
- It can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts
- Much similar to phishing but uses an SMS message
- Is software that is designed to gain access to your computer with malicious intent.
- Locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
Down
- Specific type of computer virus that tricks you into downloading it onto your computer.
- Unwanted software that monitors and gathers information on a person and how they use their computer.
- Replicate themselves but do not attach themselves to files as a virus does.
- Is a cybercrime in which a target/s are contacted by email, text message or telephone by posing as a legitimate institution.
- A secret word/phrase used to protect important log-in info on different websites
10 Clues: Much similar to phishing but uses an SMS message • Replicate themselves but do not attach themselves to files as a virus does. • A secret word/phrase used to protect important log-in info on different websites • Is software that is designed to gain access to your computer with malicious intent. • ...
Cybersecurity! 2022-09-22
Across
- person who uses computers to gain access to computers without consent
- stopping something from happening
- a type of malicious software that is installed without the user knowing to gain sensitive information on a system.
- protects your computer from attacks
- something a user clicks on to go to another page
Down
- guidelines for workplace procedures
- an attempt to damage or destroy a network
- keep safe from harm
- knowing of a situation or fact
- emails or texts sent to try and get personal information
10 Clues: keep safe from harm • knowing of a situation or fact • stopping something from happening • guidelines for workplace procedures • protects your computer from attacks • an attempt to damage or destroy a network • something a user clicks on to go to another page • emails or texts sent to try and get personal information • ...
Cybersecurity 2022-12-05
Across
- it’s when a hacker changes the IP address of an email so that it seems to come from a trusted source.
- A wiper is a type of malware with a single purpose: to erase user data and ensure it can’t be recovered.
- While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking.
- A rootkit is software that gives malicious actors remote control of a victim’s computer with full administrative privileges.
- A form of malware used by hackers to spy on you and your computer activities.
Down
- a wide variety of bad software used to infect and/or damage a system, most often delivered via spam emails.
- Worms target vulnerabilities in operating systems to install themselves into networks.
- A scam where a hacker poses as a legitimate business or organization (especially credit card companies, banks, charities, Internet providers, other utilities) in order to fool the victim
- it kidnaps your computer and holds it for ransom, hence the clever name.
- disguises itself as desirable code
10 Clues: disguises itself as desirable code • it kidnaps your computer and holds it for ransom, hence the clever name. • A form of malware used by hackers to spy on you and your computer activities. • Worms target vulnerabilities in operating systems to install themselves into networks. • ...
cybersecurity 2024-10-10
Across
- theft: The crime of obtaining personal information and using it to assume someone else's identity.
- This is the overall practice of protecting systems, networks, and data from digital attacks.
- A piece of software designed to fix a vulnerability or bug.
- Malicious software designed to disrupt computer operations, steal data, or gain unauthorized access to a computer system.
- A weakness in a computer system that can be exploited by attackers.
- A type of malware that restricts access to a computer system or data until a ransom is paid.
Down
- A cyberattack where a hacker poses as a trusted entity to trick a user into providing sensitive information.
- The process of converting information into a secret code to prevent unauthorized access.
- authentication (2FA): A security process that requires two forms of identification, such as a password and a code sent to your phone.
- A network security system that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic.
10 Clues: A piece of software designed to fix a vulnerability or bug. • A weakness in a computer system that can be exploited by attackers. • The process of converting information into a secret code to prevent unauthorized access. • This is the overall practice of protecting systems, networks, and data from digital attacks. • ...
cybersecurity 2024-11-12
Across
- What do you call the set of secret characters used to access accounts and secure information?
- What is malicious software that disguises itself as legitimate software?
- What is the term for a digital attack in which hackers demand payment to unlock encrypted files?
- What is a deceptive email that tricks users into giving sensitive information?
- What is the practice of protecting systems, networks, and programs from digital attacks?
Down
- What is the process of verifying the identity of a user before granting access to a system?
- What type of attack overwhelms a system with traffic, causing it to crash?
- What do you call a software program that replicates itself and spreads to other computers?
- What is the act of attempting to gain unauthorized access to a computer or network?
- What is a tool that filters incoming and outgoing network traffic to secure a network?
10 Clues: What is malicious software that disguises itself as legitimate software? • What type of attack overwhelms a system with traffic, causing it to crash? • What is a deceptive email that tricks users into giving sensitive information? • What is the act of attempting to gain unauthorized access to a computer or network? • ...
Cybersecurity 2025-05-02
Across
- Software that secretly gathers information about a person or organization without their knowledge.
- The process of converting data into a coded format to prevent unauthorized access.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules.
- Malicious software designed to harm, exploit, or otherwise compromise a computer or network.
- A software update designed to fix vulnerabilities or bugs in a program or system.
- A network of infected devices controlled remotely by an attacker, often used for large-scale attacks.
Down
- The method of verifying the identity of a user, device, or system before granting access.
- A type of malware disguised as legitimate software to trick users into installing it.
- A type of cyberattack where attackers trick users into revealing sensitive information through deceptive emails or messages.
- Malware that locks or encrypts a victim’s data and demands payment for its release.
10 Clues: A software update designed to fix vulnerabilities or bugs in a program or system. • The process of converting data into a coded format to prevent unauthorized access. • Malware that locks or encrypts a victim’s data and demands payment for its release. • A type of malware disguised as legitimate software to trick users into installing it. • ...
Cybersecurity 2025-04-25
Across
- Oberbegriff für schädliche Software
- Psychologische Manipulation zur Informationsgewinnung
- Kryptografische Prüfziffer von Daten
- Täuschungsmethode, um an persönliche Daten zu gelangen
- Angriff auf eine bisher unbekannte Sicherheitslücke
Down
- Simulierter Angriff zur Sicherheitsüberprüfung
- Erpresst Nutzer durch Verschlüsselung ihrer Daten
- Authentifizierungsmethode mit zusätzlicher Sicherheit
- Wird zum Entschlüsseln in der asymmetrischen Kryptographie verwendet
- Schützt Netzwerke vor unautorisierten Zugriffen
10 Clues: Oberbegriff für schädliche Software • Kryptografische Prüfziffer von Daten • Simulierter Angriff zur Sicherheitsüberprüfung • Schützt Netzwerke vor unautorisierten Zugriffen • Erpresst Nutzer durch Verschlüsselung ihrer Daten • Angriff auf eine bisher unbekannte Sicherheitslücke • Authentifizierungsmethode mit zusätzlicher Sicherheit • ...
CYBERSECURITY 2025-01-03
Across
- A digital security barrier that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- The act of intentionally accessing a system or network without authorization, often to steal data or damage the system.
- A secure connection that allows users to access the internet privately by routing their connection through a server, masking their IP address.
- A weakness or flaw in a system, software, or network that can be exploited by attackers to gain unauthorized access or cause harm.
- A type of malware that locks or encrypts a victim’s files, demanding payment (ransom) for their release.
Down
- Malicious software that pretends to be legitimate or harmless software to gain unauthorized access to a system.
- The process of converting information into a code to prevent unauthorized access, ensuring data remains private.
- A type of cyber attack where attackers impersonate legitimate entities to trick individuals into revealing sensitive information.
- A general term for malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
- Software that secretly monitors and collects a user's activities and personal information without their consent.
10 Clues: A type of malware that locks or encrypts a victim’s files, demanding payment (ransom) for their release. • Malicious software that pretends to be legitimate or harmless software to gain unauthorized access to a system. • The process of converting information into a code to prevent unauthorized access, ensuring data remains private. • ...
Cybersecurity 2025-07-10
Across
- A person who gains unauthorized access to systems
- Malicious software
- Method used to convert data into unreadable format
- Unauthorized attempt to access data or systems
- Keeping software up to date (two words, no space)
Down
- A secret word or phrase used to authenticate
- Security method requiring two forms of verification (abbr.)
- Virtual barrier separating internal network from external access
- Software used to detect and remove malware
- Common social engineering attack using fake emails
10 Clues: Malicious software • Software used to detect and remove malware • A secret word or phrase used to authenticate • Unauthorized attempt to access data or systems • A person who gains unauthorized access to systems • Keeping software up to date (two words, no space) • Method used to convert data into unreadable format • Common social engineering attack using fake emails • ...
Cybersecurity 2025-07-06
Across
- A person who gains unauthorized access to computer system
- A flaw or weakness in a system
- Software designed to detect and remove malicious programs
- A secret word or phrase used to gain access
Down
- Type of attack where users are tricked into giving information
- A program that appears legitimate but is harmful
- The process of converting information into code
- A harmful program that replicates itself
- A physical device used for authentication
- Unsolicited email, often for advertising
10 Clues: A flaw or weakness in a system • A harmful program that replicates itself • Unsolicited email, often for advertising • A physical device used for authentication • A secret word or phrase used to gain access • The process of converting information into code • A program that appears legitimate but is harmful • A person who gains unauthorized access to computer system • ...
CYBERSECURITY 2025-10-27
Across
- Connecting to the internet without using wires
- A scam website pretending to be a trusted one.
- Software that protects your computer from viruses.
- A test to prove you are human, not a robot
- A fake message that tries to trick you into giving personal information.
- A combination of letters, numbers, and symbols that makes a
Down
- The act of stealing someone’s personal information online
- Harmful software designed to damage or access your computer.
- Footprint The trace of information you leave online.
- A secret word or phrase used to protect your accounts.
- strong.
11 Clues: strong. • A test to prove you are human, not a robot • Connecting to the internet without using wires • A scam website pretending to be a trusted one. • Software that protects your computer from viruses. • Footprint The trace of information you leave online. • A secret word or phrase used to protect your accounts. • ...
Cybersecurity 2025-11-10
Across
- gain unauthorized access to a computer system
- capable of being easily hurt
- refers to any external entity who may have access to private data
- security risk who cause the program to crash
- network of maliciously installed bots
- records or transmits a user's keystrokes
Down
- cyber exploit directed at online card players
- unauthorized duplication or deletion of an organization's electronic information
- security mechanism for separating running programs
- software tools used by a third party
10 Clues: capable of being easily hurt • software tools used by a third party • network of maliciously installed bots • records or transmits a user's keystrokes • security risk who cause the program to crash • cyber exploit directed at online card players • gain unauthorized access to a computer system • security mechanism for separating running programs • ...
Cybersecurity 2025-11-10
Across
- Malicious computer software
- records or transmits a user's keystrokes
- secure time-limited credential
- take advantage of a particular error
- used to flood a target server
Down
- software tools used by a third party
- possible source of harm
- network of maliciously installed bots
- injecting malicious scripts into legitimate web pages
- bypassing normal authentication or security mechanisms
10 Clues: possible source of harm • Malicious computer software • used to flood a target server • secure time-limited credential • software tools used by a third party • take advantage of a particular error • network of maliciously installed bots • records or transmits a user's keystrokes • injecting malicious scripts into legitimate web pages • ...
Cybersecurity Awareness 2021-10-27
Across
- records keystrokes and sends its info to a hacker
- (three words) a term used to describe everyday objects that connect to the internet (such as fridges, thermostats, and smart speakers)
- verifying your identity with a username, password, or other piece of information
- hackers demand a ransom for the return of information after deploying this
- an audio or video clip that has been edited and changed to seem believable
- malware disguised as legitimate software
- the most common form of cryptocurrency
Down
- (two words) manipulating and deceiving people to get sensitive and private info; lying
- the practice of protecting critical systems and sensitive information from digital attacks
- emails, text messages, or other communication designed to convince you to give the sender personal information
- sends information from your computer to a third party without your knowledge
- short for malicious software
- use this to protect your information
- a way of hiding information
- a network security device that filters incoming and outgoing websites
- displays unauthorized ads on a user's screen
- short for virtual private network
17 Clues: a way of hiding information • short for malicious software • short for virtual private network • use this to protect your information • the most common form of cryptocurrency • malware disguised as legitimate software • displays unauthorized ads on a user's screen • records keystrokes and sends its info to a hacker • ...
Cybersecurity Glosary 2025-10-07
Across
- Security principle ensuring that data is not altered or tampered with
- Type of malware that locks data until a payment is made
- Permission to access certain resources or perform actions
- Fraudulent attempt to get sensitive information by pretending to be a trusted empty
- Company that provides users access to the Internet
- Malicious program disguised as legitimate software
- Network of connected devices that communicate over the Internet
- Unauthorized takeover of a system, network or online session
- Process that converts data into unreadable code to protect it
- Manipulating people to reveal confidential information
Down
- Weak Points in a system that attackers can exploit
- Security principle ensuring that systems and data are accesible when needed
- Process of verifying someone's identity before granting access
- Secret string of characters used for authentication
- Probability that a threat will exploit a vulnerability
- Software that secretly collects user data and send it to others
- Risks that come from employees or people inside an organization
17 Clues: Weak Points in a system that attackers can exploit • Company that provides users access to the Internet • Malicious program disguised as legitimate software • Secret string of characters used for authentication • Probability that a threat will exploit a vulnerability • Manipulating people to reveal confidential information • ...
dasd 2021-04-30
25 Clues: If • Tap • List • Loop • Else • Print • Array • Cyber • Sprite • Python • Commit • If else • Settings • Function • Variable • Autonomous • cybersecurity • activo, Uptime • flotante, Float • entero, Integer • el lazo, For loop • while, While loop • binarios Binary numbers • neuronales, nueral networks • automático, Machine learning
dasd 2021-04-30
25 Clues: If • Tap • List • Loop • Else • Print • Array • Cyber • Sprite • Python • Commit • If else • Settings • Function • Variable • Autonomous • cybersecurity • activo, Uptime • flotante, Float • entero, Integer • el lazo, For loop • while, While loop • binarios Binary numbers • neuronales nueral networks • automático Machine learning
Year 12 Cybersecurity 2023-08-16
Across
- A hacker who operates between ethical and unethical boundaries, often exposing vulnerabilities without permission.
- An individual who simulates cyberattacks to evaluate the security of a system.
- A hacker who uses their skills to help organizations identify and fix security vulnerabilities.
- Measures taken to protect physical assets and facilities from unauthorized access or harm.
- The accuracy and reliability of data, protected from unauthorized alteration.
- A hacker who engages in malicious activities for personal gain or to cause harm.
- Mistakes made by individuals that can lead to security breaches.
- Creating multiple security layers to prevent unauthorized access at different levels.
- Covert agents who gather information on behalf of a government or organization.
- An individual or group that uses cyberattacks to create fear and chaos for political or ideological reasons.
Down
- Ensuring that sensitive information is accessible only to authorized individuals.
- The ability to identify and recognize cybersecurity threats and incidents.
- Making sure that data is accessible when needed, without unauthorized disruptions.
- Individuals with advanced computer skills who manipulate software or systems for various purposes.
- Covert activities aimed at gathering confidential information from competitors or enemies.
- Individuals who engage in illegal activities on the internet for financial gain.
- People within an organization who have access to sensitive information and can pose security risks.
- Implementing measures to discourage potential attackers from targeting a system or organization.
- Introducing obstacles and barriers to slow down attackers' progress.
- The process of restoring systems and data after a cybersecurity breach or incident.
- Taking swift actions to address and mitigate cybersecurity incidents.
21 Clues: Mistakes made by individuals that can lead to security breaches. • Introducing obstacles and barriers to slow down attackers' progress. • Taking swift actions to address and mitigate cybersecurity incidents. • The ability to identify and recognize cybersecurity threats and incidents. • ...
hour puzzle 2025-11-18
18 Clues: lab • vroom • spinny • debate • CyBear • daily task • our mascot • best group • spirit bowl • stupid machine • the worst class • favorite period • phantom program • hard to install • the good old days • senator ___ Kennedy • put the desks together • bruno mars song about cybersecurity THREATS
The trends and buzzwords associated with disruptive technology 2025-08-07
14 Clues: Mesh • cloud • (XaaS) • Screening • Computing • Automation • technology • Reality (XR) • Intelligence (BI) • Intelligence (AI) • Liability Insurance • Immune System (DIS) • Authentication (MFA) • Detection and Response (EDR)
Internal Audit Holiday Fun 2023-12-14
INF Crossword Puzzle 2024-01-24
Lucas' Graduation-Day Crossword 2021-10-14
17 Clues: Pomp • Go... • Graduate • A builder • GCU Color • GCU Street • Black Beans • Lucas's Major • Hat Decoration • Type of Degree • Years in School • group of people • Type of Ceremony • Lucas's Employer • Best type of Tree • Name of GCU Mascot • Grand _ University
Cybersecurity 2022-11-28
Across
- manipulation of people into performing actions or give up confidential information.
- causes your computer to download or display malicious adverts or pop-ups
- a group of Internet-connected devices, each of which runs one or more bots. can be used to perform Distributed Denial-of-Service (DDoS)
- Designed to gain access to your computer with malicious intent.
- a type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information to the attacker
Down
- When infected, they locks/encrypted your computer or files, and demand money or else they will delete or publish it.
- replicate itself by maliciously modifying other computer programs and inserting code.
- Any malware that misleads users of its true intent. The term is derived from the Ancient Greek story.
- replicate itself in order to create traffic and slowing down the system.
- describes a social engineering act of obtaining someone else's personal information without their consent.
10 Clues: Designed to gain access to your computer with malicious intent. • causes your computer to download or display malicious adverts or pop-ups • replicate itself in order to create traffic and slowing down the system. • manipulation of people into performing actions or give up confidential information. • ...
Cybersecurity 2022-11-18
Across
- the protection of internet-connected systems such as hardware, software and data from cyberthreats
- engineering the term used for a broad range of malicious activities accomplished through human interactions.
- testing an authorized simulated attack performed on a computer system to evaluate its security
- category of malicious cyber-attacks that hackers or cybercriminals employ
- information such as facts and numbers used to analyze something or make decisions
- network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
- the measurement and statistical analysis of people's unique physical and behavioral characteristics
- when attackers send malicious emails designed to trick people into falling for a scam
- allow users to keep their software programs updated without having to check for and install available updates manually
- software designed to interfere with a computer's normal functioning
10 Clues: software designed to interfere with a computer's normal functioning • category of malicious cyber-attacks that hackers or cybercriminals employ • information such as facts and numbers used to analyze something or make decisions • when attackers send malicious emails designed to trick people into falling for a scam • ...
CyberSecurity 2023-01-05
Across
- Should be constructed of upper and lower case letters, numbers, and special characters
- A flawed or weakness in computer system that could be exploited to violate the system's security.
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- Hardware or software designed to prevent unauthorized access to or from a private network.
- Unauthorized access to a network, information systems, or application.
Down
- Verifying identity
- Fraudulent email purportedly from a reputable company attempting to get a personal information.
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- The address of a webpage. Check the validity of it before clicking on it.
- A sequence of words or text used to control access to a computer; similar to a password.
10 Clues: Verifying identity • Unauthorized access to a network, information systems, or application. • The address of a webpage. Check the validity of it before clicking on it. • Should be constructed of upper and lower case letters, numbers, and special characters • A sequence of words or text used to control access to a computer; similar to a password. • ...
Cybersecurity 2021-03-08
Across
- making a copy of original data
- software that causes harm to a computer
- a malicious computer program that is hidden in an application
- software that tracks the key strokes on the keyboard
- defrauding an online account holder of financial information by posing as a legitimate company
Down
- software that lets a user obtain covert information on your computer activities
- someone who exploits weaknesses in a computer system
- Software designed to detect and destroy a virus
- a standalone malicious computer program that replicates and spreads on a computer system
- software that encodes data and requires a key to decode
10 Clues: making a copy of original data • software that causes harm to a computer • Software designed to detect and destroy a virus • someone who exploits weaknesses in a computer system • software that tracks the key strokes on the keyboard • software that encodes data and requires a key to decode • a malicious computer program that is hidden in an application • ...
Cybersecurity 2021-02-12
Across
- data dater that has personal information such as your maiden name or your date of birth
- a person who uses computers to gain unauthorized access to data.
- you use it to login to websites and files
- Need to be attached to a file
- not known or seen or not meant to be known or seen by others.
Down
- what you do without getting permission to do it first
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- Opens a back door which allows more malware to be loaded
- Uses vulnerabilities to move into your machine.
- when somebody sends an email giving you false information to make you give them something
10 Clues: Need to be attached to a file • you use it to login to websites and files • Uses vulnerabilities to move into your machine. • what you do without getting permission to do it first • Opens a back door which allows more malware to be loaded • not known or seen or not meant to be known or seen by others. • ...
Cybersecurity 2021-02-12
Across
- data dater that has personal information such as your maiden name or your date of birth
- a person who uses computers to gain unauthorized access to data.
- you use it to login to websites and files
- Need to be attached to a file
- not known or seen or not meant to be known or seen by others.
Down
- what you do without getting permission to do it first
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- Opens a back door which allows more malware to be loaded
- Uses vulnerabilities to move into your machine.
- when somebody sends an email giving you false information to make you give them something
10 Clues: Need to be attached to a file • you use it to login to websites and files • Uses vulnerabilities to move into your machine. • what you do without getting permission to do it first • Opens a back door which allows more malware to be loaded • not known or seen or not meant to be known or seen by others. • ...
CYBERSECURITY 2021-10-18
Across
- The short form of malicious software - Malware
- A software that covertly monitors your online behavior
- A software or hardware device designed to protect your private data
- A tool that helps mask to location of the user to guarantee anonymity
- The practice of sending fraudulent communications that appear to come from a reputable source
Down
- HORSE A piece of malware that often allows a hacker to gain remote access to a computer through a back door
- A piece of malicious code that can replicate itself in order to spread the infection to other connected computers
- A technology that enables us to access our files through the internet remotely
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
- An incident where a hacker gains unauthorized access to a computer or device
10 Clues: The short form of malicious software - Malware • A software that covertly monitors your online behavior • A software or hardware device designed to protect your private data • A tool that helps mask to location of the user to guarantee anonymity • An incident where a hacker gains unauthorized access to a computer or device • ...
cybersecurity 2023-04-02
Across
- worm A type of malware that spreads itself by copying itself to other computers on the same network (9 letters): _________ worm
- Malicious software that is designed to gain access to a computer system without the user's consent (7 letters): ________
- A technique used to trick users into revealing sensitive information, such as passwords or credit card numbers (9 letters): _________ing
- A type of attack that involves intercepting and altering communication between two parties (10 letters): _________-in-the-middle attack
- of Service A type of attack that attempts to make a computer or network resource unavailable to its intended users (8 letters): _________ of Service
Down
- exploit A type of attack that targets vulnerabilities in software or hardware to gain unauthorized access (8 letters): _________ exploit
- force A type of attack that involves guessing a password by trying many different combinations (9 letters): _________ force attack
- The process of converting data into an unreadable format to prevent unauthorized access (8 letters): _________tion
- A security protocol used to encrypt internet traffic (4 letters): ______
- A type of authentication that uses physical characteristics, such as fingerprints or facial
10 Clues: A security protocol used to encrypt internet traffic (4 letters): ______ • A type of authentication that uses physical characteristics, such as fingerprints or facial • The process of converting data into an unreadable format to prevent unauthorized access (8 letters): _________tion • ...
Cybersecurity 2023-08-23
Across
- A string of characters that allows access to a computer system or service.
- Before an application goes live, it needs to go through a security ___.
- Process of updating to address security vulnerabilities.
- If a cyber attack is suspected, it should be reported to the ___ response team.
- SIEM tool from IBM.
Down
- A type of social engineering attack involving communication that pretends to be legitimate.
- We are all cyber ___.
- Used in cryptography to prove authenticity of a device, server, or user.
- FIM checks OS, database, and application software files to uncover tampering. What is the I in FIM?
- Linux distro used for ethical hacking.
10 Clues: SIEM tool from IBM. • We are all cyber ___. • Linux distro used for ethical hacking. • Process of updating to address security vulnerabilities. • Before an application goes live, it needs to go through a security ___. • Used in cryptography to prove authenticity of a device, server, or user. • ...
Cybersecurity 2023-11-24
Across
- when your data is confidential, available and keeps it's integrity
- a special way of decrypting a cipher such as pigpen, morse code, or caesar
- internet of things
- hacker that does bad
- words or text that needs a key to decode
- hacker that does good but without permission
Down
- hiding a file or text in a picture
- hacking people without code
- authentication that is something you are, know or have
- hacker that does good
10 Clues: internet of things • hacker that does bad • hacker that does good • hacking people without code • hiding a file or text in a picture • words or text that needs a key to decode • hacker that does good but without permission • authentication that is something you are, know or have • when your data is confidential, available and keeps it's integrity • ...
Cybersecurity 2024-03-20
Across
- A scam where a hacker poses as a legitimate business or organization in order to fool the victim into giving them sensitive personal information
- shield users against viruses, spyware, trojans, and worms that can damage computer hardware through email or web browsing.
- a network security device that monitors traffic to or from your network.
- Coding used to protect your information from hackers.
Down
- A hacker who is invited to test out computer systems and servers, looking for vulnerabilities "hacker ____ __ "
- The process of identifying a user’s identity
- malicious attempt to disrupt normal traffic to a web property.
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
- a method of connecting a series of computers and devices in a private encrypted network,
- A piece of audio or video that has been altered and changed to make it seem authentic or credible.
10 Clues: The process of identifying a user’s identity • Coding used to protect your information from hackers. • malicious attempt to disrupt normal traffic to a web property. • a network security device that monitors traffic to or from your network. • a method of connecting a series of computers and devices in a private encrypted network, • ...
Cybersecurity 2024-05-07
Across
- A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- Unauthorized access to a network, information systems, or application.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying dat
Down
- The process of converting information or data into a code, especially to prevent unauthorized access.
- The process of recognizing a user's identity to ensure that individuals are who they claim to be.
- A type of surveillance software that has the capability to record every keystroke made on a computer.
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
- A service that allows you to connect to the internet via a server run by a provider, creating a secure connection.
10 Clues: Unauthorized access to a network, information systems, or application. • The process of recognizing a user's identity to ensure that individuals are who they claim to be. • The process of converting information or data into a code, especially to prevent unauthorized access. • ...
Cybersecurity 2025-02-16
Across
- A cybersecurity measure that verifies identity using something you know and something you have.
- A cybersecurity practice that scrambles data to protect it.
- A fake website designed to steal login credentials.
- A type of cyberattack that floods a server with traffic to take it down.
- A type of virus that disguises itself as a legitimate program.
Down
- The process of confirming that a user is who they claim to be.
- A program that secretly records what a user types to steal passwords.
- A type of attack where hackers encrypt files and demand payment.
- A malicious software that spreads without user action.
- Tricking someone into revealing personal information through fake emails.
10 Clues: A fake website designed to steal login credentials. • A malicious software that spreads without user action. • A cybersecurity practice that scrambles data to protect it. • The process of confirming that a user is who they claim to be. • A type of virus that disguises itself as a legitimate program. • ...
Cybersecurity 2025-04-08
Across
- to decide the quality or importance of something
- a residence that uses internet-connected devices
- the chance that something will happen
- the activity of getting into someone else's computer system without permission
Down
- the quality of being vulnerable
- a detailed plan for achieving success in situations
- a member of a group of people who move from one place to another
- a suggestion that something unpleasant or violent will happen
- a set of ideas or a plan of what to do in particular situations
- the possibility of something bad happening
10 Clues: the quality of being vulnerable • the chance that something will happen • the possibility of something bad happening • to decide the quality or importance of something • a residence that uses internet-connected devices • a detailed plan for achieving success in situations • a suggestion that something unpleasant or violent will happen • ...
Cybersecurity 2024-09-16
Across
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
- Malware that locks or encrypts data, demanding payment for its release
- A person who gains unauthorized access to systems or networks
- Process of converting data into a code to prevent unauthorized access
Down
- A secret word or phrase used to authenticate access to data or systems
- Software that secretly monitors user activity and collects information
- Malicious software designed to harm, exploit, or disable computers
- A security system that monitors and controls incoming and outgoing network traffic
- Software used to detect, prevent, and remove malicious software
- A secure network connection that allows users to send and receive data as if they were on a private network
10 Clues: A person who gains unauthorized access to systems or networks • Software used to detect, prevent, and remove malicious software • Malicious software designed to harm, exploit, or disable computers • Process of converting data into a code to prevent unauthorized access • A secret word or phrase used to authenticate access to data or systems • ...
cybersecurity 2025-11-17
Across
- :malware that intervenes with the aim of harming the computer user
- : security method based on identity and access management which requires two forms of identification to access resources and data.
- : essential network devices that operate at the data link layer of the OSI model
- : a person who is looking for ways to bypass software and hardware protections
- : a kind of binder in which we store various files.
- : Set of remote servers offering services accessible via the Internet.
Down
- : a type of operating system commonly used on computers and laptops
- : method used in cryptanalysis to find a password or a key
- : an attack that takes advantage of a security vulnerability for which no patch has been implemented
- : Software capable of detecting and eliminating computer viruses.
10 Clues: : a kind of binder in which we store various files. • : method used in cryptanalysis to find a password or a key • : Software capable of detecting and eliminating computer viruses. • :malware that intervenes with the aim of harming the computer user • : a type of operating system commonly used on computers and laptops • ...
IT Cybersecurity 2023-03-29
Across
- Wireless network that requires no authentication.
- A method that allows the frequency of the wireless network to be fine-tuned. Each channel is approximately 20 MHz wide.
- Wireless communication technology that allows two devices to connect to each other over a short distance.
- Combines multiple channels—or lanes—to increase the amount of traffic that a modem's highway can comfortably support.
- A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
- Wireless authentication method that allows for automatic connection between a device and the wireless access point.
- The wireless access point provides access to a wireless network.
- An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices.
- A communication method that allows two-way communication between two devices within a few centimeters of each other.
- Wireless authentication method that uses a passphrase to authenticate users.
- A method that combines channels into one to increase bandwidth.
Down
- Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest versions in use.
- Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
- An enhancement that allows multiple antennas to use the same radio frequency.
- The expected number of times an event will occur in a given time frame.
- Conceals the data's original meaning to prevent it from being known or used.
- An Ethernet cable provides the connection between a device connected to the network port and the switch.
- The interface between a computer's hardware and software.
18 Clues: Wireless network that requires no authentication. • The interface between a computer's hardware and software. • A method that combines channels into one to increase bandwidth. • The wireless access point provides access to a wireless network. • The expected number of times an event will occur in a given time frame. • ...
cybersecurity Crossword 2025-10-14
Across
- acts as a security camera which watches for any suspicious activity
- ensuring data is accurate, complete, and secure
- storing data on a device not connected to a network
- used to detect, prevent, and remove any malicious software
- transmits data as pulses of light
- the proccess of proving your identity and ensuring authorization
- a security system which acts as a barrier between private and external ones and monitors incoming and outgoing traffic
Down
- ensuring timely access to information
- two step process to verifying identity
- relies on physical connections, which makes it difficult to hack
- ensures that someone can't unsend anything or deny any action online
- to reduce the potential harm of a threat
- tool which monitora network traffic and blocks off any sort of malicious activity
- stands for confidentiality, integrity, and availability and also means keeping data secret and secure
- ways to verify a user's identity
- the possibility of an unfortunate event occuring
- keeping data private and accessible only to those who are authorized
17 Clues: ways to verify a user's identity • transmits data as pulses of light • ensuring timely access to information • two step process to verifying identity • to reduce the potential harm of a threat • ensuring data is accurate, complete, and secure • the possibility of an unfortunate event occuring • storing data on a device not connected to a network • ...
