cybersecurity Crossword Puzzles
Cybersecurity 2025-09-10
Across
- What Greenwald says his work is mainly focused on: the condition of keeping one's actions, information, and choices safe from outside scrutiny.
- An expressive action people do freely when they believe they are alone and unobserved.
- The deep discomfort and embarrassment shown on someone's face when they are caught in a private act.
- The role the internet was once praised for: allowing people new freedoms and opportunities.
- A state of being alone, unobserved, where actions are performed without others watching.
- The way in which someone acts or conducts oneself, especially towards others.
Down
- A process or state where the internet enabled broader participation and equality, now contrasted with its new surveillance role.
- A global network that was once seen as a tool of openness and freedom but is now described as a zone of surveillance.
- Describes surveillance that is not targeted but affects everyone, as Greenwald says the internet has become.
- The powerful emotion, described by Glenn Greenwald, that someone feels when caught doing something privately and unexpectedly seen by others.
- To secretly watch or observe someone without their knowing, as in the person unexpectedly seeing another in the passage's anecdote.
11 Clues: The way in which someone acts or conducts oneself, especially towards others. • An expressive action people do freely when they believe they are alone and unobserved. • A state of being alone, unobserved, where actions are performed without others watching. • The role the internet was once praised for: allowing people new freedoms and opportunities. • ...
Cybersecurity - JMcBride 2025-08-28
Across
- general term for malicious software
- person who breaks into computer systems
- malware that locks files and demands payment
- software that hides malware from detection
- network security system that monitors and controls traffic
- secret string used for user authentication
- vulnerability unknown to the software maker
- authentication method using two forms of verification
- secure tunnel for internet traffic (abbreviation)
- code that takes advantage of a software vulnerability
- deceptive attempt to steal sensitive information via email or messages
Down
- process of converting data into a secure code
- barrier that blocks unauthorized network access
- software that detects and removes malicious programs
- tool that records everything typed on a keyboard
- hidden way to bypass normal authentication
- software that secretly gathers user data
- malware disguised as legitimate software
- network of infected devices under hacker control
- software update that fixes security vulnerabilities
20 Clues: general term for malicious software • person who breaks into computer systems • software that secretly gathers user data • malware disguised as legitimate software • software that hides malware from detection • hidden way to bypass normal authentication • secret string used for user authentication • vulnerability unknown to the software maker • ...
Cybersecurity 2021-03-01
Across
- Click every traffic light in this image.
- Encrypt files to extort money.
- Fake email link bait.
- Proving your identity.
- Sneaky peek a password.
Down
- Brute force uses many attempts to guess it.
- Denial of Service attacks this.
- Blocks incoming and outgoing connections.
- Automated internet task software.
- Unauthorised access to computer systems.
- Horse with a hidden suprise.
11 Clues: Fake email link bait. • Proving your identity. • Sneaky peek a password. • Horse with a hidden suprise. • Encrypt files to extort money. • Denial of Service attacks this. • Automated internet task software. • Click every traffic light in this image. • Unauthorised access to computer systems. • Blocks incoming and outgoing connections. • ...
CyberSecurity 2024-03-09
Across
- pairs a public key for encryption and a private key for decryption
- software intended to damage a computing system or to take partial control over its operation
- a malicious program that can copy itself and gain access to a computer in an unauthorized way
- encryption involves one key for both encryption and decryption
- a technique that attempts to trick a user into providing personal information
- infomration about an individual that identifies, links, relates or describes them
Down
- a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentification mechanism
- the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- the process of decoding data
- the process of encoding data to prevent unauthorized access
- a wireless access point that give unauthorized access to to secure networks
11 Clues: the process of decoding data • the process of encoding data to prevent unauthorized access • encryption involves one key for both encryption and decryption • pairs a public key for encryption and a private key for decryption • a wireless access point that give unauthorized access to to secure networks • ...
Cybersecurity 2025-10-10
Across
- Strukturierte Darstellung möglicher Angriffswege auf ein System.
- Simulierter Angriff zur Identifikation von Schwachstellen.
- Regelwerk zur Festlegung von Sicherheitszielen und Maßnahmen. (englisches Wort)
- Nachweis, dass ein Benutzer oder System tatsächlich derjenige ist, der er vorgibt zu sein.
- Physisches oder digitales Authentifizierung. (englisches Wort)
Down
- Maßnahme zur Schließung bekannter Schwachstellen in Software.
- Verwaltung und Kontrolle sicherheitsrelevanter Software- oder Hardwarebestandteile.
- Sicherheitsmodell: Kein Standardvertrauen in Geräte oder Nutzer. (englisches Wort)
- Strukturierter Aufbau von IT-Systemen mit Fokus auf Sicherheitsmaßnahmen.
- Schutz von Daten vor unbefugtem Zugriff.
- Systematische Bewertung potenzieller Bedrohungen und Schwachstellen.
11 Clues: Schutz von Daten vor unbefugtem Zugriff. • Simulierter Angriff zur Identifikation von Schwachstellen. • Maßnahme zur Schließung bekannter Schwachstellen in Software. • Physisches oder digitales Authentifizierung. (englisches Wort) • Strukturierte Darstellung möglicher Angriffswege auf ein System. • ...
December 2020 Crossword Puzzle 2020-12-01
Across
- An unsecure network where you can connect to the internet such as from a café
- a popular tool for hosting video calls
- All commercial transactions conducted electronically on the internet
- The Cybersecurity project that pulled Forest Service out of a material weakness
- The top method of cyberattack that most attacks begin with usually via email
- Educating management on the potential threats of unsecure systems
- The 3 core tenants of cybersecurity include confidentiality, integrity, and…
Down
- Who can be a target of a cyberattack?
- A site that cybercriminals create to steal your information
- Any software, hardware, or systems that cybersecurity is not aware of
- The country where most of the fake and fraudulent ecommerce sites are coming from
11 Clues: Who can be a target of a cyberattack? • a popular tool for hosting video calls • A site that cybercriminals create to steal your information • Educating management on the potential threats of unsecure systems • All commercial transactions conducted electronically on the internet • Any software, hardware, or systems that cybersecurity is not aware of • ...
Cybersecurity 2023-10-31
Across
- when you personal data is available (another word for available)
- a hacker that is doing good
- a hacker that works without permission
- when your personal data is kept secret, another word for secret
Down
- Multi-Factor________ something you have, know, and are
- a kind of human engineering with no coding
- the art of protecting devices and data from unauthorized access
- malicious coding that can be a virus, worm, trojan etc
- Internet of __________ (network of connected devices)
- an unusual way to solve a problem
- a hacker that is malicious
11 Clues: a hacker that is malicious • a hacker that is doing good • an unusual way to solve a problem • a hacker that works without permission • a kind of human engineering with no coding • Internet of __________ (network of connected devices) • Multi-Factor________ something you have, know, and are • malicious coding that can be a virus, worm, trojan etc • ...
Cybersecurity 2025-11-03
Across
- A security system that blocks unwanted network traffic.
- A trick that sends users to fake websites to steal personal data.
- A program that finds and removes viruses or malware.
- A person who breaks into computer systems.
- Malware that lets a hacker control your computer remotely.
Down
- The time when a user is actively connected to a system or website.
- Bad software that can harm a computer or steal information.
- Tool that hides your IP address and secures your internet connection.
- Tools used by hackers to create fake websites and steal login details.
- A small software update that fixes bugs or security issues.
- Someone or something that secretly collects information.
11 Clues: A person who breaks into computer systems. • A program that finds and removes viruses or malware. • A security system that blocks unwanted network traffic. • Someone or something that secretly collects information. • Malware that lets a hacker control your computer remotely. • Bad software that can harm a computer or steal information. • ...
Spanish 25 words 2021-04-30
25 Clues: If • Tap • Else • List • Loop • Cyber • Float • Array • Print • Sprite • Commit • Uptime • Python • Integer • If else • Settings • Function • For loop • Variable • Autonomous • While loop • cybersecurity • Binary numbers • nueral networks • Machine learning
cybersecurity crossword 2022-12-02
Across
- software that that enters a computer system without the users knowledge or consent and makes the comuter go bad
- software that prevents you from getting unwanted viruses on your device
- software that runs as a program on the local computer
- an attacker who controls a botnet
- a logical computer network of zombies under the control of an attacker
- software made to stop the spread of malware
- a malicious program designed to enter a computer via a network to take advantage of a vulnerability in a application or an operating system
- a new software made that was better the old one and fixes things that were bad or old in the old software
- software that prevents you from getting infected from differents spyware
- a set of software tools used by an attacker to hide the actions or presence of other types of malware
- software code that gives access to a program or service
Down
- a software program that gives advertising content that is unwanted by the user
- a microsoft windows function that provides info to users and obtains their approval before a program can make a change to the computers settings
- a undate that makes the software better or more efficient
- an infected computer that is under the remote control of an attacker
- getting information from a device without the owner knowing
- a backup of your data saved on a hard
- software that keeps data on where you hit the keyboard
- data that is compromised and wont be given back unless a fee is paid
19 Clues: an attacker who controls a botnet • a backup of your data saved on a hard • software made to stop the spread of malware • software that runs as a program on the local computer • software that keeps data on where you hit the keyboard • software code that gives access to a program or service • a undate that makes the software better or more efficient • ...
Cybersecurity Awareness 2022-10-21
Across
- ___ is a type of software designed to help the user's computer detect viruses and avoid them.
- ___ is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- The terms "bug" and "debugging" are popularly attributed to ___.
- Malicious actors can also use ____ to capture your personal and financial information such as credit card number, CVV, PIN, password and other sensitive information.
- Which malware allows the attacker to access the administrative controls and enables his/her to do almost anything he wants to do with the infected computers.
- ___ is when attackers send malicious emails designed to trick people into falling for a scam.
- ___is a type of software designed to gain unauthorized access or to cause damage to a computer.
Down
- ___ National nodal agency for all measures to protect nation's critical information infrastructure.
- ___ Advertising software can be used to spread malware.
- ___ is actually considered the first computer virus?
- ___ is an authorization protocol being a standard designed to allow a website or application to access resources hosted by other web apps on behalf of a user.
- ___ is a program that secretly records what a user does so that cybercriminals can make use of this information.
- ___ is a cryptographic protocol for encrypting data to be transferred over a network which uses protocol to sets up implicit connection.
- ___ is a type of malware that is disguised as legitimate software.
- ___ is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- ___ locks and encrypts the victim's data, important files and then demands a payment to unlock and decrypt the data.
- In-order to ensure the security of the data/information, we need to ___ the data.
- ___ is a Network of malware-infected computers which cybercriminals use to perform tasks online without the user’s permission.
- ___ is a self-replicating program that attaches itself to clean files and spreads throughout a computer system, infecting files with malicious code.
- Which Wi-Fi communication protocol is more Secure?
20 Clues: Which Wi-Fi communication protocol is more Secure? • ___ is actually considered the first computer virus? • ___ Advertising software can be used to spread malware. • The terms "bug" and "debugging" are popularly attributed to ___. • ___ is a type of malware that is disguised as legitimate software. • ...
CSAM 2020 2020-09-03
Across
- Someone with elevated access
- Authentication that requires more than just a passcode; usually in the form of a token or generated access code
- Software with malicious characteristics; often used to compromise a system
- A type of phishing that is more personalized to the end user
- Last name of TIAA's CISO
- An attempt at getting gaining vital information from an individual utilizing a variety of social engineering tactics; notoriously in emails
- The protection of internet connected systems and devices
- Label often assigned to devices that are on a network; can be static or dynamic
- An algorithmic method which hides characteristics of communication by converting it into various codes
- TIAA's one stop shop for computer and technical issues
Down
- Ethical hacking; hacking for the greater good
- A tactic often used by cyber criminals to lure in susceptible individuals in the form of urgency or consequence
- In December 2017, one of the most popular credit bureaus in the world that was exposed to a data breach that resulted in over 147 million Americans' information
- Unique hardware identifier; physical layer in the OSI model
- TIAA's cybersecurity mascot
- _ Routing: type of protocol that allows people to communicate anonymously; also a vegetable
- Malicious software which often requires payment in the form of cryptocurrency in order to decrypt data/files
- A concept where all devices are connected to the internet, such as household items
- What does VPN stand for
- A month dedicated to all things cybersecurity (acronym)
20 Clues: What does VPN stand for • Last name of TIAA's CISO • TIAA's cybersecurity mascot • Someone with elevated access • Ethical hacking; hacking for the greater good • TIAA's one stop shop for computer and technical issues • A month dedicated to all things cybersecurity (acronym) • The protection of internet connected systems and devices • ...
ACTIVITY 1: Crossword Puzzle 2A 2024-04-30
Across
- Relating to digital technology.
- Bullying online.
- Protection from harm.
- Protecting digital systems.
- Control over personal information.
- Malicious software.
- Connected to the internet.
- Fraudulent information request.
- Having knowledge and using technology safely and effective
- Malicious self-replicating code.
- Software to access websites.
- Unique characteristics of an individual.
- Interconnected computers.
- Intentional attack on systems.
- Global computer network.
- Secret access code.
- Traces of online activity.
- Unsolicited messages.
- Criminal activities online.
- Hardware with a function.
- Deceptive scheme.
- Information in digital form.
- Computer programs.
Down
- Relating to society.
- the ability to analyze and evaluate infomation.
- A cyber attack that redirects website traffic to a fraudulent site
- Organized and meaningful data.
- Unauthorized system access.
- Moral principles online.
- Traces of online activity.
- Verifying user identity.
- Making a copy of data to protect against loss or damage
- Practices for cybersecurity.
- Communication channels.
- Protecting systems from attacks.
- Converting data into code.
- Ability to use digital tools.
- Understanding cybersecurity threats.
- Laws governing cyberspace.
- Membership in a country.
- Unauthorized use of personal information.
- Network security system.
- A secret codr used to access a computer system or online account
- Data stored by websites.
- Knowledge or perception of a situation.
- Dual authentication.
- Software to detect and remove viruses.
- Device forwarding data.
- Physical computer components.
- Measures for protection.
- Unauthorized data access.
51 Clues: Bullying online. • Deceptive scheme. • Computer programs. • Malicious software. • Secret access code. • Relating to society. • Dual authentication. • Protection from harm. • Unsolicited messages. • Communication channels. • Device forwarding data. • Moral principles online. • Verifying user identity. • Membership in a country. • Network security system. • Data stored by websites. • ...
Raqamli iqtisodiyot indikatorlari va ularning xususiyatlari 2025-11-26
15 Clues: Bulut • Sarmoya • Ulanish • Xavfsizlik • Tejamkorlik • Onlayn tizim • Onlayn savdo • Harakatlilik • Iqtisodiy hajm • Ma’lumot oqimi • Raqamlashtirish • Ish samaradorligi • Yangi texnologiya • Avtomatlashtirish • Internet ashyolari
cybersecurity 2025-12-19
Across
- A fake email or message meant to trick you
- A program like chrome or safari used to view websites.
- Someone who tries to break into computer without permission
- The footprint or history you leave behind online
- A wireless way to connect your device to the internet
- A digital security guard that protects your network
Down
- The secret key you use to log into your accounts.
- the world wide web that connects us all
- Small files that websites use to track your visits.
- Harmful software (like a virus) that can damage your computer
- A websités specific address (it stars with www)
11 Clues: the world wide web that connects us all • A fake email or message meant to trick you • A websités specific address (it stars with www) • The footprint or history you leave behind online • The secret key you use to log into your accounts. • Small files that websites use to track your visits. • A digital security guard that protects your network • ...
Cybersecurity Crossword 2023-01-26
Across
- altered video to spread disinformation
- unique string that identifies device
- helps protect system
- malware that transmits private data
- helps prevent unauthorized network access
- flood website/server until crash
- codes that protect data
- cybersecurity professionals
- designs data communications network
Down
- unauthorized access to sensitive info
- software designed to disrupt system
- plans and implements security
- remote encrypted network access
- helps prevent unauthorized access
- criminal hackers
- requests payment to unlock
- malware hidden inside legitimate file
- mimics legitimate websites/emails
- network of computers used for cyber attacks
19 Clues: criminal hackers • helps protect system • codes that protect data • requests payment to unlock • cybersecurity professionals • plans and implements security • remote encrypted network access • flood website/server until crash • helps prevent unauthorized access • mimics legitimate websites/emails • software designed to disrupt system • malware that transmits private data • ...
Cybersecurity Compliance 2024-05-24
Across
- Scammers use ______ tactics to try to get a fast response.
- If you suspect a link or attachment may be suspicious, _______ download it.
- A good password is __________ for you, but difficult for others to guess.
- If you believe you've clicked a bad link, notify _____ immediately.
- Malware is most likely to enter an organization through __________.
- Never ____________ old passwords.
- Malicious links disguised as legitimate messages.
- Be wary of ______________ attachments.
Down
- Each should be unique and complicated.
- Our e-mail security system is called __________.
- Scams can come through e-mail,_______, phone call, or even in person.
- No platform is ________ to breaches.
- Using a work device for _________ use increases the risk of a cyber threat.
- Two-factor __________ protects your account by requiring a second identity verification.
- Don't use obvious __________ changes like substituting a number for a letter.
- Passwords should never be __________ with anyone.
- If you feel you have fallen prey to a scammer, notify CHN or ___________.
- 65% of people _________ passwords.
- 80% of breaches are related to stolen or ________ passwords.
19 Clues: Never ____________ old passwords. • 65% of people _________ passwords. • No platform is ________ to breaches. • Each should be unique and complicated. • Be wary of ______________ attachments. • Our e-mail security system is called __________. • Passwords should never be __________ with anyone. • Malicious links disguised as legitimate messages. • ...
Healthcare Cybersecurity 2025-04-23
Across
- What patients wear with ID info — keep private!
- What nurses may carry — should never be left unattended
- The ID you scan to enter secure hospital areas
- A place where data might still be written — handle with care
- What goes on a sample — double check and protect
- A device some doctors still use — don’t text PHI on it!
- What you wear — not where you should keep a password
- A doctor’s daily visits — not a time to leave screens unlocked
- A common system used to manage patient records
- Where you access records — lock it when you leave!
- Electronic place where patient records live
Down
- The first step in patient care — and in data entry!
- A sample like blood or urine — never to be mislabeled or emailed unprotected
- A hospital emergency that should never be shared online
- What you do to open a secure door — don’t tailgate!
- When a patient leaves — data must still be secured
- A patient’s OK to share info — must be protected
- Where you relax — but still don’t talk patient info!
- Where patient info is written and stored
- A person who needs to protect patient charts from snooping
20 Clues: Where patient info is written and stored • Electronic place where patient records live • The ID you scan to enter secure hospital areas • A common system used to manage patient records • What patients wear with ID info — keep private! • A patient’s OK to share info — must be protected • What goes on a sample — double check and protect • ...
dasd 2021-04-30
25 Clues: If • Tap • Else • List • Loop • Cyber • Float • Array • Print • Sprite • Commit • Uptime • Python • Integer • If else • Settings • Function • For loop • Variable • Autonomous • While loop • cybersecurity • Binary numbers • nueral networks • Machine learning
Cybersecurity Crossword 2023-05-10
la tecnología #2 2022-04-01
025-1 2024-07-12
Across
- Process of restoring systems or data after an incident
- Unauthorized access to sensitive information
- Related to laws or regulations governing cybersecurity incidents
- Systematic examination to uncover facts about an incident
- Unauthorized transfer of data from a computer or network
- Malicious software demanding payment for data release
- Method used to secure data from unauthorized access
- Scientific analysis used to investigate and solve crimes
- Interruption to normal operations
Down
- Rules and guidelines governing cybersecurity practices
- Weakness in software or hardware that could be exploited
- State of exposing assets to danger or risk
- Process of discovering unauthorized access or activity
- Event that causes disruption or harm
- Identity concealed or not identified
- Digital currency used in ransom demands
- Measures taken to protect against unauthorized access
- Taking advantage of vulnerabilities in software or hardware
- A malicious assault on computer systems
- Effect or influence of the cyberattack
20 Clues: Interruption to normal operations • Event that causes disruption or harm • Identity concealed or not identified • Effect or influence of the cyberattack • Digital currency used in ransom demands • A malicious assault on computer systems • State of exposing assets to danger or risk • Unauthorized access to sensitive information • ...
CSAM 2020 2020-09-03
Across
- A month dedicated to all things cybersecurity (acronym)
- TIAA's cybersecurity mascot
- Label often assigned to devices that are on a network; can be static or dynamic
- The protection of internet connected systems and devices
- A tactic often used by cyber criminals to lure in susceptible individuals in the form of urgency or consequence
- TIAA's one stop shop for computer and technical issues
- Malicious software which often requires payment in the form of cryptocurrency in order to decrypt data/files
- Ethical hacking; hacking for the greater good
- A type of phishing that is more personalized to the end user
- A concept where all devices are connected to the internet, such as household items
- Authentication that requires more than just a passcode; usually in the form of a token or generated access code
Down
- Unique hardware identifier; physical layer in the OSI model
- _ Routing: type of protocol that allows people to communicate anonymously; also a vegetable
- An attempt at getting gaining vital information from an individual utilizing a variety of social engineering tactics; notoriously in emails
- What does VPN stand for
- Someone with elevated access
- Last name of TIAA's CISO
- Software with malicious characteristics; often used to compromise a system
- In December 2017, one of the most popular credit bureaus in the world that was exposed to a data breach that resulted in over 147 million Americans' information
- An algorithmic method which hides characteristics of communication by converting it into various codes
20 Clues: What does VPN stand for • Last name of TIAA's CISO • TIAA's cybersecurity mascot • Someone with elevated access • Ethical hacking; hacking for the greater good • TIAA's one stop shop for computer and technical issues • A month dedicated to all things cybersecurity (acronym) • The protection of internet connected systems and devices • ...
Introduction to Cybersecurity 2024-02-22
Across
- is the act of skirting or breaking through security boundaries.
- a type of hacker that is generally ethical and law-abiding.
- focuses on keeping applications or programs secure throughout their lifecycle.
- certification validates the holders have met the baseline of understanding required by all cybersecurity job positions.
Down
- is based on the key concepts of information assurance.
- an attack in which the attacker is connectedto a network and monitors an authenticated session.
- a set of policies and procedures meant to improve and guide anorganization’s cybersecurity practices.
- Is the protection of digital devices and their connected networks from danger and threats.
- a process in which organizations determine the information about themselves which should be kept private versus what can be shared with the public.
- prevents and protects unauthorized intrusions into the network.
- which is a set of security controls designed to protect payment account security.
- includes threats such as viruses, worms, Trojan horses.
12 Clues: is based on the key concepts of information assurance. • includes threats such as viruses, worms, Trojan horses. • a type of hacker that is generally ethical and law-abiding. • is the act of skirting or breaking through security boundaries. • prevents and protects unauthorized intrusions into the network. • ...
Loopbane in die moderne wêreld 2024-11-14
16 Clues: Surgeon • Director • Attorney • Marketing • Accountant • Data Engineer • Digital Designer • Financial Manager • Financial Analyst • Operations Manager • Computer Programmer • Mechanical Engineer • Cybersecurity Expert • Information Security • Human Resources Manager • Chief Executive Officer
Cybersecurity unit 2 vocabulary 2025-09-30
Across
- Data is ensured to be unchanged
- system that prevents and blocks viruses
- Connecting devices using only cables to ensure reliability
- Cables that use pulses of light to carry data
- Storage of data in physical harddrives
- method of ensuring authentication
- protection system that requires a 1 time use password to be used by a user
- Keeping data trustworthy
- cybersecurity situation where you are exposed to danger
Down
- To reduce
- Data can always be used or found
- Ability to reach and use data
- Fundamental cybersecurity model that is composed of 3 ideas
- Ensuring that nobody changed or altered any data
- Barrier between devices that monitors traffic
- Keeping data secret to people who don't need it
- Tool that monitors and blocks suspicious activity
- Tool that monitors for suspicious activity
18 Clues: To reduce • Keeping data trustworthy • Ability to reach and use data • Data is ensured to be unchanged • Data can always be used or found • method of ensuring authentication • Storage of data in physical harddrives • system that prevents and blocks viruses • Tool that monitors for suspicious activity • Barrier between devices that monitors traffic • ...
cybersecurity terms 2022-12-16
Across
- a computer connected to a network that has been compromised by a hacker
- a kind of software used to prevent, scan, detect and delete viruses from a computer
- software that enables a user to covert information from another computer by transmitting data from their hard drive
- software that allows an unauthorized user to access a computer
- a type of malware that self replicates and infects other computers
- a class of cyberattacks in which attackers remotely execute commands to place malware or other malicious code on your computer or network
- a type of malware that disguises itself as legitimate code or software\
- software that displays advertising material
- A software-based firewall installed on a desktop or laptop computer to monitor and control its incoming and outgoing network traffic
Down
- a network security device that monitors and filters incoming and outgoing network traffic
- a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages
- malicious software that blocks access to a computer until a sum of money is paid
- an undocumented way of gaining access to a computer system
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- a network of computers with malicious software
- any program that prohibits a pop-up at some point in time
- hackers who use automated techniques to scan specific network ranges and find vulnerable systems
- software updates that address security vulnerabilities
18 Clues: software that displays advertising material • a network of computers with malicious software • software updates that address security vulnerabilities • any program that prohibits a pop-up at some point in time • an undocumented way of gaining access to a computer system • software that allows an unauthorized user to access a computer • ...
Raqamli iqtisodiyotning xususiyatlari va xorijiy davlatlarda raqamli iqtisodiyotning rivojlanishi 2025-11-26
15 Clues: Bulut • Ulanish • Yangilik • Xavfsizlik • Aqlli tizim • Tejamkorlik • Qabul qilish • Onlayn tizim • Harakatlilik • Onlayn savdo • Ma’lumot oqimi • Iqtisodiy hajm • Avtomatlashtirish • Raqamli iqtisodiyot • Moliyaviy texnologiya
Cybersecurity terms 2024-03-12
Across
- horse Malicious software disguised innocuously.
- Identity verification using traits.
- Malicious software threat
- Malicious code component.
- security Device-specific protection measures.
- policy Guidelines for security measures.
- Applying software updates regularly.
- Weakness in system security.
Down
- Deceptive email communication.
- testing Ethical hacking simulation.
- Malware with system-level access.
- hygiene Good digital security practices.
- incident Breach or violation event.
- Identity verification using traits.
- Malicious digital intrusion attempt.
- Network security barrier.
- Data protection through scrambling.
- Secure communication technique.
- Software against malicious programs.
- hat Ethical security expert.
20 Clues: Network security barrier. • Malicious software threat • Malicious code component. • Weakness in system security. • Deceptive email communication. • Secure communication technique. • Malware with system-level access. • testing Ethical hacking simulation. • Identity verification using traits. • Identity verification using traits. • Data protection through scrambling. • ...
Cybersecurity Awareness 2023-09-06
Across
- Method of secure communication (12 letters).
- Malware that demands payment to restore access (10 letters).
- Software that collects information without consent (7 letters).
- A group of interconnected devices (7 letters).
- A potential danger or risk (6 letters).
- Software that can infect your computer. (5 letters).
- Information stored on a computer (4 letters).
- Unauthorized access to a computer system (7 letters).
Down
- Process of converting data into a code (11 letters).
- A fraudulent scheme to deceive people (4 letters).
- The practice of using two different authentication methods (10 letters).
- A person who creates software.
- Weakness in a system that can be exploited (13 letters).
- Measures taken to protect against cyber threats (8 letters).
- A person interacting with a computer system (4 letters).
- A network security software. (8 letters).
- A common email-based attack (8 letters).
- Software to protect against malware (9 letters).
18 Clues: A person who creates software. • A potential danger or risk (6 letters). • A common email-based attack (8 letters). • A network security software. (8 letters). • Method of secure communication (12 letters). • Information stored on a computer (4 letters). • A group of interconnected devices (7 letters). • Software to protect against malware (9 letters). • ...
Cybersecurity Awareness 2023-10-03
Across
- A process by which a system verifies the identity of a user who wishes to access it.
- Small piece of data stored on a user's computer by the web browser while browsing a website.
- A set of static analysis tools for investigating and comparing phishing kit content within single or multiple kits.
- Manipulating individuals into divulging confidential information through psychological tactics.
- A type of malicious software that blocks access to a user's data until a sum of money is paid.
- A secure bridge between your device and the internet, often used to keep browsing activity private.
- AI-generated fake content, often video, that looks convincingly real.
- A collection of software and tools to make phishing campaigns easier for attackers.
- Software designed to harm or exploit any device, network, service, or program.
Down
- Targeted phishing attempts directed at specific individuals or companies.
- A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- Malicious code that's activated by a specific condition or event.
- Information used to understand the enemy's strengths and weaknesses.
- Phishing attacks that are executed via SMS.
- Malicious software that records every keystroke to secretly gather personal information.
- Ensuring operations and data adhere to established rules and regulations.
- A network of private computers infected with malicious software and controlled as a group.
- A secret combination, often alphanumeric, used for authentication.
18 Clues: Phishing attacks that are executed via SMS. • Malicious code that's activated by a specific condition or event. • A secret combination, often alphanumeric, used for authentication. • Information used to understand the enemy's strengths and weaknesses. • AI-generated fake content, often video, that looks convincingly real. • ...
Cybersecurity terms 2025-02-10
Across
- - Malicious software designed to damage a system.
- - A hidden method of bypassing security.
- - Gathering personal information using deceptive emails.
- - Coding used to protect information.
- Address - Identifies the connection between a computer and the network provide
- - Hardware that allows communication between a network and the Internet.
- - A network of infected devices controlled by malware.
Down
- - A security system that prevents intrusions.
- - A system update that covers security vulnerabilities.
- - A process that confirms a user’s identity.
- - Someone who tries to gain unauthorized access.
- - Distributed Denial of Service attack.
- - Software that blocks access until money is paid.
- - Virtual Private Network.
- - Malware designed to remain hidden.
- - A decoy system to attract attackers.
- - Taking advantage of a computer’s vulnerability.
- Breach - When information is stolen from a system.
18 Clues: - Virtual Private Network. • - Malware designed to remain hidden. • - Coding used to protect information. • - A decoy system to attract attackers. • - Distributed Denial of Service attack. • - A hidden method of bypassing security. • - A process that confirms a user’s identity. • - A security system that prevents intrusions. • ...
CyF Chapter 1 2023-10-08
Across
- What is the acronym for the intermediate level certification offered by EC-Council that the cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.
- Attacks that originate from within an organization are known as ___________ security threats.
- Which type of cyber attack can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
- Script _____ are teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill.
- DDoS in cyber security means "Distributed ______-of-Service.
- The acronym of this technology which enable people to connect billions of devices to the Internet.
- Criminals can also use rogue devices, such as _____ Wi-Fi access points.
- Information _______ Management Standards provide a framework for implementing cybersecurity measures within an organization.
- Cybersecurity ______ possess the insight to recognize the influence of data and harness that power to build great organizations, provide services and protect people from cyberattacks.
Down
- Criminals use this tool to capture data streams over a network.
- Federated identity management refers to ______ enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
- What is another word used to describe the speed of data.
- A group of grey hat hackers who rally and protest against different political and social ideas.
- At which level are the employees responsible to protect the organization’s reputation, data, and customers.
- Cyber ______ is a weakness that makes a target susceptible to an attack
- The acronym of the practice where people used their own devices to access enterprise information.
- This group of criminals breaks into computers or networks to gain access for various reasons.
- A cybersecurity ______ is the possibility that a harmful event, such as an attack, will occur.
- State _____ Hackers are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- _____ hat attackers are unethical criminals who violate computer and network security for personal gain.
20 Clues: What is another word used to describe the speed of data. • DDoS in cyber security means "Distributed ______-of-Service. • Criminals use this tool to capture data streams over a network. • Cyber ______ is a weakness that makes a target susceptible to an attack • Criminals can also use rogue devices, such as _____ Wi-Fi access points. • ...
Hack Your Brain 2024-09-18
Across
- A small device or software used to create a secure encrypted tunnel between two networks
- The unauthorized exploitation of a network to access confidential data or systems
- A simulation-based cybersecurity exercise to assess an organization's defensive capabilities (Two words)
- The process of identifying and analyzing security risks
- A specific type of phishing that targets high-profile individuals, such as executives
- A malicious attempt to disrupt a network by overwhelming it with traffic
- An individual who uses hacking skills for ethical purposes
Down
- An offensive security activity where ethical hackers simulate real-world attacks to test defenses (Two words, hyphenated)
- Teaming A cybersecurity practice where teams work against each other, with attackers and defenders (Two words)
- A technique where attackers attempt to guess passwords by trying all possible combinations
- Shields The world's largest multinational cybersecurity exercise, organized annually by NATO (Two words)
- A widely-used asymmetric encryption algorithm named after its inventors
12 Clues: The process of identifying and analyzing security risks • An individual who uses hacking skills for ethical purposes • A widely-used asymmetric encryption algorithm named after its inventors • A malicious attempt to disrupt a network by overwhelming it with traffic • The unauthorized exploitation of a network to access confidential data or systems • ...
Cybersecurity Scramble 2023-10-24
Across
- Multiple sources sending an overwhelming amount of packets to crash the device.
- Holds computer data hostage in exchange for money.
- Requires end-user initiation.
- Sending an overwhelming amount of packets to crash the device.
- Phishing by impersonating businesses.
- A _ attack that attacks a vulnerability on a network unknown to the vendor.
- Triggers malicious code.
- Creates backdoors in the operating system.
- Replicates using network vulnerabilities
- Sending unauthorized messages to another bluetooth device.
Down
- Scares the victim into infecting their system.
- Phishing using calls.
- Creates ad-popups for the authors to generate revenue.
- Copying a victims information from bluetooth.
- Malware that carries out operations pretending to be something else.
- Phishing using texts.
- Lets the attacker view the actions of the user and their data.
- Phishing that targets high profile individuals.
18 Clues: Phishing using calls. • Phishing using texts. • Triggers malicious code. • Requires end-user initiation. • Phishing by impersonating businesses. • Replicates using network vulnerabilities • Creates backdoors in the operating system. • Copying a victims information from bluetooth. • Scares the victim into infecting their system. • ...
Hack Your Brain 2024-09-18
Across
- A specific type of phishing that targets high-profile individuals, such as executives.
- A technology used to create a secure, encrypted tunnel between two networks.
- A malicious attempt to disrupt a network by overwhelming it with traffic.
- A simulation-based cybersecurity exercise to assess an organization's defensive capabilities.
- A technique where attackers attempt to guess passwords by trying all possible combinations.
- The unauthorized exploitation of a network to access confidential data or systems.
Down
- An individual who uses hacking skills for ethical purposes.
- An offensive security activity where ethical hackers simulate real-world attacks to test defenses (Two words, hyphenated).
- A cybersecurity practice where teams work against each other, with attackers and defenders.
- ... Shields - The world's largest multinational cybersecurity exercise, organized annually by NATO.
- A widely used asymmetric encryption algorithm named after its inventors.
- ... Management - The process of identifying and analyzing issues that could have an unwanted effect on company assets.
12 Clues: An individual who uses hacking skills for ethical purposes. • A widely used asymmetric encryption algorithm named after its inventors. • A malicious attempt to disrupt a network by overwhelming it with traffic. • A technology used to create a secure, encrypted tunnel between two networks. • ...
Trends & Buzzwords 2025-07-23
Across
- Technology helping to preserve the planet.
- Elon Musk's artificial world.
- Multiple tools/controls working together.
- everything as a (not a product)
- Insurance for when your tech gets hit by liabilities.
- Desgined to find and respond to potential cybersecurity threaets.
- Why pay a human to do a job when you can pay to build a robot to do it instead?
Down
- Combing through cybersecurity strategies in a company to find potential vulnerabilities.
- Experiences, but lots of them.
- Not actually intelligent.
- Not stupid business.
- First a password, then an authentication key, then a security question.
- A connection of cloud systems for many purposes.
- Reality, but stretched.
- Desgined to mitigate digital business risks.
- Funky computers that go really fast.
16 Clues: Not stupid business. • Reality, but stretched. • Not actually intelligent. • Elon Musk's artificial world. • Experiences, but lots of them. • everything as a (not a product) • Funky computers that go really fast. • Multiple tools/controls working together. • Technology helping to preserve the planet. • Desgined to mitigate digital business risks. • ...
Cybersecurity Fundamental Chapter 2 2024-06-03
Across
- Ensures that information is accessible only to those authorized to have access.
- The foundational principles of cybersecurity.
- A framework developed by John McCumber to manage and protect networks, domains, and the Internet.
- The three categories of measures used to protect cyberspace: Technologies (devices and products), Policies and Practices (procedures and guidelines), and People (awareness and knowledge)
Down
- The ISO Cybersecurity Model, including ISO 27001 and ISO 27002 standards, provides a framework for managing information security.
- Data that is stored on physical media (e.g., hard drives, USB drives, cloud storage). Protecting data at rest involves encryption, access controls, and physical security measures.
- Data that is being transmitted across networks (e.g., emails, data transfers). Securing data in transit involves using secure communication protocols such as SSL/TLS, VPNs, and encryption.
- Data that is being actively processed by applications. Protecting data in process requires secure coding practices, memory protection mechanisms, and ensuring that applications handle data securely.
- Ensures that information and resources are accessible to authorized users when needed.
- Ensures that information remains accurate and complete throughout its lifecycle.
- The three states in which data can exist and require protection.
11 Clues: The foundational principles of cybersecurity. • The three states in which data can exist and require protection. • Ensures that information is accessible only to those authorized to have access. • Ensures that information remains accurate and complete throughout its lifecycle. • ...
Disruptive Technology 2025-07-23
13 Clues: Mesh • cloud • Reality • Screening • Computing • Automation • technology • Intelligence • Intelligence • Immune System • Authentication • Liability Insurance • Detection and Response
AI TECHNOLOGY AND SOCIETY 2024-03-06
A comparative study of India’s IT Act 2000 vs. GDPR, CCPA, and China’s Cybersecurity Law. How India can strengthen its cyber laws to protect businesses and individuals. 2025-04-07
Across
- China's law mandates data ___ for critical sectors
- GDPR fines can reach 4% of global ___
- California's consumer privacy law
- China's focus in its national data law
- Indian cybersecurity law enacted in 2000
Down
- CCPA lets consumers ___ of data sales
- GDPR's "Right to be ___" allows data deletion
- GDPR principle: "___ by Design"
- IT Act clause on compensation for data negligence
- EU's strict data protection regulation
10 Clues: GDPR principle: "___ by Design" • California's consumer privacy law • CCPA lets consumers ___ of data sales • GDPR fines can reach 4% of global ___ • EU's strict data protection regulation • China's focus in its national data law • Indian cybersecurity law enacted in 2000 • GDPR's "Right to be ___" allows data deletion • IT Act clause on compensation for data negligence • ...
Cybersecurity 2022-09-16
Across
- update to an operating system to repair an bug or vulnerability
- tool installed to give an attacker easier access to the compromised system
- Electronic junk mail or junk newsgroup postings.
- generic term for a number of different types of malicious code.
- User acting with malicious intent to compromise a system
- term to describe connecting multiple separate networks together.
Down
- use a computer to gain unauthorized access to data in a system
- program that can retrieve and display information from servers on the World Wide Web
- Malware that locks/encrypts computers
- e-mails that try to trick a user into entering valid credentials at a fake website
10 Clues: Malware that locks/encrypts computers • Electronic junk mail or junk newsgroup postings. • User acting with malicious intent to compromise a system • use a computer to gain unauthorized access to data in a system • update to an operating system to repair an bug or vulnerability • generic term for a number of different types of malicious code. • ...
Cybersecurity 2023-10-31
Across
- a hacker that is malicious
- the art of protecting devices and data from unauthorized access
- a hacker that is doing good
- when your personal data is kept secret, another word for secret
Down
- a hacker that works without permission
- when you personal data is available (another word for available)
- Multi-Factor________ something you have, know, and are
- Internet of __________ (network of connected devices)
- a kind of human engineering with no coding
- an unusual way to solve a problem
10 Clues: a hacker that is malicious • a hacker that is doing good • an unusual way to solve a problem • a hacker that works without permission • a kind of human engineering with no coding • Internet of __________ (network of connected devices) • Multi-Factor________ something you have, know, and are • the art of protecting devices and data from unauthorized access • ...
Cybersecurity 2023-11-15
Across
- A cryptographic attack on hash collisions
- A sudden unplanned event.
- Something built in to or used in a system to address gaps or weaknesses in the controls that could otherwise lead to an exploit.
- An attack that seeks to obtain personal or private financial information through domain spoofing
- The action of multiple attackers planning a cyberattack
Down
- The art of exploiting bugs and weaknesses that exist in the telephone system
- A process of changing hardware and software configurations to make computers and devices as secure as possible.
- The capture and monitoring of network IP packets using a packet sniffer
- A type of fraud in which an attacker attempts to trick the victim into providing private information.
- The act of unscrambling ciphertext into plaintext
10 Clues: A sudden unplanned event. • A cryptographic attack on hash collisions • The act of unscrambling ciphertext into plaintext • The action of multiple attackers planning a cyberattack • The capture and monitoring of network IP packets using a packet sniffer • The art of exploiting bugs and weaknesses that exist in the telephone system • ...
CYBERSECURITY 2024-01-14
10 Clues: Online storage. • Ransomware type. • Harmful software. • Ensuring privacy. • Data preservation. • Encrypting malware. • Securely lock files. • Decryption necessity. • Fake software tactic. • Remote access method.
Cybersecurity 2024-07-19
Across
- gained technology access when not authorized
- protecting patient healthcare information
- safeguards data during transmission and storage
- patient data remaining accessible
Down
- passwords recommended for "logging in"
- patient information kept private
- patient records remaining accurate and intact
- healthcare leading cause of security breaches
- digitalized complete patient health information
- recommended regularly for software integrity
10 Clues: patient information kept private • patient data remaining accessible • passwords recommended for "logging in" • protecting patient healthcare information • gained technology access when not authorized • recommended regularly for software integrity • patient records remaining accurate and intact • healthcare leading cause of security breaches • ...
Cybersecurity 2024-04-03
Across
- A computer attack aimed at making a service unavailable.
- A program/device that protects a network.
- A type of malware that looks like a legimate program and is undetected by the anti-virus
- A network of computers infected by malware that are under the control of a single attacking party.
- A technique for protecting data by transforming it irreversibly.
Down
- A technique of symmetric encryption.
- A hashing algorithm which is the most used in secret-keys transfert.
- A known certfication authority who offers free certificates.
- A brand that makes cybersecurity devices especially for companies.
- A technique used by fraudsters to obtain personal information with the aim of committing identity theft.
10 Clues: A technique of symmetric encryption. • A program/device that protects a network. • A computer attack aimed at making a service unavailable. • A known certfication authority who offers free certificates. • A technique for protecting data by transforming it irreversibly. • A brand that makes cybersecurity devices especially for companies. • ...
Cybersecurity 2024-05-04
Across
- Weaknesses or flaws in software, hardware, or network infrastructure that can be exploited by attackers to compromise the security of a system.
- The process of converting data into a form that is unreadable without the correct decryption key, thereby protecting it from unauthorized access.
- The process of verifying the identity of a user or device attempting to access a system, often through passwords, biometric scans, or two-factor authentication methods.
Down
- Deliberate actions taken by hackers or malicious entities to disrupt, damage, or gain unauthorized access to computer systems, networks, or data.
- A type of cyber attack in which attackers impersonate legitimate entities to deceive individuals into providing sensitive information, such as passwords or financial data.
- Unauthorized access or attempted access to a computer system or network by an individual or automated process.
- Authentication techniques that rely on unique biological characteristics, such as fingerprints, iris scans, or facial recognition, to verify the identity of individuals accessing a system or device.
- A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data, often spread through email attachments, infected websites, or removable media.
- A software update designed to fix security vulnerabilities or address other issues within a program or operating system.
10 Clues: Unauthorized access or attempted access to a computer system or network by an individual or automated process. • A software update designed to fix security vulnerabilities or address other issues within a program or operating system. • ...
Cybersecurity 2024-04-29
Across
- Unsolicited or unwanted email, often containing malicious links or attachments.
- Unauthorized access or exposure of sensitive information.
- A security mechanism that uses unique physical or behavioral characteristics to authenticate users.
- Manipulating individuals into divulging confidential information or performing actions that compromise security.
- Measures taken to protect the integrity and confidentiality of data transmitted over a network.
Down
- Malware that encrypts files or systems and demands payment for their release.
- A form of MFA that requires users to provide two different authentication factors.
- Knowledge and understanding of cybersecurity risks, threats, and best practices.
- The process of responding to and mitigating the effects of a cybersecurity incident.
- Software designed to detect, prevent, and remove malicious software from computer systems.
10 Clues: Unauthorized access or exposure of sensitive information. • Malware that encrypts files or systems and demands payment for their release. • Unsolicited or unwanted email, often containing malicious links or attachments. • Knowledge and understanding of cybersecurity risks, threats, and best practices. • ...
Cybersecurity 2024-05-07
Across
- when you lose data this policy lets you restore it
- a program that allows hackers access to data without detect
- hacking under the onwers consent
- security actions like protecting the computer
- A self-replicating program
Down
- hacker that violates laws but not for malicious intent
- Basically rules and regulations
- protecting data from digital attacks
- Hacking with malicious intent
- A malicious program that is desguised
10 Clues: A self-replicating program • Hacking with malicious intent • Basically rules and regulations • hacking under the onwers consent • protecting data from digital attacks • A malicious program that is desguised • security actions like protecting the computer • when you lose data this policy lets you restore it • hacker that violates laws but not for malicious intent • ...
Cybersecurity 2024-09-22
Across
- The highest level of access in a computer system
- Security technology that uses physical characteristics like fingerprints or facial recognition
- A security principle that ensures data has not been altered or tampered with
- A security threat that originates from within an organization
- The process of confirming the identity of a user or device
Down
- A hidden method of bypassing normal authentication to gain access to a system
- the science of encrypting and decrypting data
- is a key goal of cyber security
- The use of investigative techniques to examine digital crimes or security breaches
- one of the world's largest ransomware attacks in history
10 Clues: is a key goal of cyber security • the science of encrypting and decrypting data • The highest level of access in a computer system • one of the world's largest ransomware attacks in history • The process of confirming the identity of a user or device • A security threat that originates from within an organization • ...
Cybersecurity 2025-04-25
Across
- Oberbegriff für schädliche Software
- Psychologische Manipulation zur Informationsgewinnung
- Kryptografische Prüfziffer von Daten
- Täuschungsmethode, um an persönliche Daten zu gelangen
- Angriff auf eine bisher unbekannte Sicherheitslücke
Down
- Simulierter Angriff zur Sicherheitsüberprüfung
- Erpresst Nutzer durch Verschlüsselung ihrer Daten
- Authentifizierungsmethode mit zusätzlicher Sicherheit
- Wird zum Entschlüsseln in der asymmetrischen Kryptographie verwendet
- Schützt Netzwerke vor unautorisierten Zugriffen
10 Clues: Oberbegriff für schädliche Software • Kryptografische Prüfziffer von Daten • Simulierter Angriff zur Sicherheitsüberprüfung • Schützt Netzwerke vor unautorisierten Zugriffen • Erpresst Nutzer durch Verschlüsselung ihrer Daten • Angriff auf eine bisher unbekannte Sicherheitslücke • Authentifizierungsmethode mit zusätzlicher Sicherheit • ...
cybersecurity 2025-11-27
Across
- Attack that overwhelms a service
- Malware that demands payment
- Software that secretly monitors activity
- Fraudulent attempt to steal information
- Malware disguised as legitimate software
- Network of compromised devices
Down
- Self-replicating malicious program
- Barrier that filters network traffic
- Technique to protect data
- Malicious software
10 Clues: Malicious software • Technique to protect data • Malware that demands payment • Network of compromised devices • Attack that overwhelms a service • Self-replicating malicious program • Barrier that filters network traffic • Fraudulent attempt to steal information • Software that secretly monitors activity • Malware disguised as legitimate software
Cybersecurity 2026-03-27
Across
- stop a specific person from contacting you online
- a person constantly putting another person down (words, actions, etc)
- Belief someone is honest and reliable
- sending/receiving sexual messages online
- picture of what is on your screen
- telling someone of power an incident that has occurred
Down
- someone who just watches another person getting bullied, does nothing
- Using a different identity to deceive or manipulate
- secret code to keeping personal information/accounts safe
- permission granted from ALL involved parties
10 Clues: picture of what is on your screen • Belief someone is honest and reliable • sending/receiving sexual messages online • permission granted from ALL involved parties • stop a specific person from contacting you online • Using a different identity to deceive or manipulate • telling someone of power an incident that has occurred • ...
Cybersecurity 2021-02-12
Across
- An unwanted software that monitors and gathers information on a person and how they use their computer, for example monitoring your internet usage to send you harmless but annoying adverts.
- A series of letters, numbers or symbols that protect data in your computer.
- A type of malware that exploits vulnerabilities in the a computer’s operating system and once in uses the system’s resources.
- A person that tries to access your data by getting into your computer, for example by figuring our your passwords.
- Locks a computer, encrypts files, and prevents the user from being able to access the data.
Down
- A more sinister spyware that records every keystroke made by a user.
- It infects a computer and causes it to download or display adverts or pop-ups when the victim is online.
- Being able to edit and view personal files like photos or videos.
- A self-replicating software, to get into the computer it has to be downloaded as part of another file which is then executed on the computer.
- A specific type of computer virus that tricks you into downloading it onto your computer. Once in your computer it might open a ‘back door’ to give an attacker remote access to your computer.
10 Clues: Being able to edit and view personal files like photos or videos. • A more sinister spyware that records every keystroke made by a user. • A series of letters, numbers or symbols that protect data in your computer. • Locks a computer, encrypts files, and prevents the user from being able to access the data. • ...
Cybersecurity 2024-12-24
Across
- A harmful program that damages computers or steals information.
- Rules that guide how computers communicate securely.
- A system that spots unauthorized access to a network.
- A way to verify if someone is who they claim to be.
Down
- When sensitive information is accessed without permission.
- A barrier that protects a computer from harmful connections.
- A weakness in a system that can be exploited by hackers.
- A process that scrambles data to keep it secure.
- An attempt to harm a computer system or steal data.
- A scam where fake emails trick people into giving personal information.
10 Clues: A process that scrambles data to keep it secure. • An attempt to harm a computer system or steal data. • A way to verify if someone is who they claim to be. • Rules that guide how computers communicate securely. • A system that spots unauthorized access to a network. • A weakness in a system that can be exploited by hackers. • ...
Cybersecurity 2025-01-13
Across
- A scam to steal information through fake communication
- A copy of data stored for recovery in case of loss
- Malicious software that secretly tracks your online activity and steals personal information
- A malicious program that replicates itself and spreads to other systems
- A security method requiring two or more ways to verify your identity before granting access
Down
- Malware that demands payment to restore access to data or systems
- A software update to fix vulnerabilities
- A secret key to access your account
- Someone who gains unauthorized access to systems or networks
- The right to control your personal information and keep it protected from unauthorized access.
10 Clues: A secret key to access your account • A software update to fix vulnerabilities • A copy of data stored for recovery in case of loss • A scam to steal information through fake communication • Someone who gains unauthorized access to systems or networks • Malware that demands payment to restore access to data or systems • ...
cybersecurity 2025-03-06
Across
- A cyber attack that tricks people into revealing personal information via fake emails or websites.
- Malicious software that secretly gathers user information.
- Software designed to harm or exploit computer systems.
- A type of malware that disguises itself as legitimate software.
- A secret combination of characters used to access a system.
- A type of malware that locks files and demands payment for decryption.
Down
- A security system that monitors and controls incoming and outgoing network traffic.
- The process of converting data into a secure code to prevent unauthorized access.
- Software that detects and removes malicious programs.
- A person who gains unauthorized access to computer systems.
10 Clues: Software that detects and removes malicious programs. • Software designed to harm or exploit computer systems. • Malicious software that secretly gathers user information. • A person who gains unauthorized access to computer systems. • A secret combination of characters used to access a system. • A type of malware that disguises itself as legitimate software. • ...
Cybersecurity 2023-10-31
Across
- a hacker that is malicious
- the art of protecting devices and data from unauthorized access
- a hacker that is doing good
- when your personal data is kept secret
Down
- a hacker that works without permission
- when you personal data is available
- Multi-Factor________ something you have, know, and are
- Internet of __________
- a kind of human engineering
- an unusual way to solve a problem
10 Clues: Internet of __________ • a hacker that is malicious • a hacker that is doing good • a kind of human engineering • an unusual way to solve a problem • when you personal data is available • a hacker that works without permission • when your personal data is kept secret • Multi-Factor________ something you have, know, and are • ...
cybersecurity 2024-12-04
Across
- Malware that takes user data hostage
- Act of illegally retrieving confidential information
- Type of virus spread via emails or links
- Protective measures put in place against attacks
- Tool used to connect to a private network securely
Down
- Set of techniques to secure a business against cyberattacks
- Malware designed to spy on the user without them realizing it
- Term designating a computer attack consisting of overwhelming a server with requests to render it inoperable
- Secure authentication method using two separate elements
- that takes user data hostage
10 Clues: that takes user data hostage • Malware that takes user data hostage • Type of virus spread via emails or links • Protective measures put in place against attacks • Tool used to connect to a private network securely • Act of illegally retrieving confidential information • Secure authentication method using two separate elements • ...
Cybersecurity 2025-05-05
Across
- Forging the sender's address in emails
- sending fake messages/links to steal persona data.
- A series of small attacks
- unauthorized means,
- Copying or distributing unauthorized software
- Altering data before entering into computer system
Down
- Taking control of a website
- creating fake documents
- A type of malware disguised
- Sending large volumes of unwanted mails
10 Clues: unauthorized means, • creating fake documents • A series of small attacks • Taking control of a website • A type of malware disguised • Forging the sender's address in emails • Sending large volumes of unwanted mails • Copying or distributing unauthorized software • sending fake messages/links to steal persona data. • Altering data before entering into computer system
Cybersecurity 2021-06-02
Across
- Intention to damage a person.
- The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
- It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
- Ability of a user to access information or resources in a specified location and in the correct format.
- Illegal access to a computer system for the purpose od causing damage.
Down
- Malicious software designed to damage.
- Without permission or authorization
- Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
- It's the protection of personal information.
10 Clues: Intention to damage a person. • Without permission or authorization • Malicious software designed to damage. • It's the protection of personal information. • Illegal access to a computer system for the purpose od causing damage. • It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses. • ...
Cybersecurity 2022-06-29
11 Clues: physical asset • Tangible asset • tangible asset • Intangible asset • Purchasing of asset • hardware and software • plumbing installation • Wear and tear situation • Digital media and content • Costlier than traditional • Longeststage of asset lifecycle
CYBERSECURITY 2025-10-27
Across
- A fake message that tries to trick you into giving personal information.
- A scam website pretending to be a trusted one.
- A test to prove you are human, not a robot
- Software that protects your computer from viruses.
- Harmful software designed to damage or access your computer.
- A secret word or phrase used to protect your accounts.
Down
- Connecting to the internet without using wires
- The act of stealing someone’s personal information online
- Footprint The trace of information you leave online.
- A combination of letters, numbers, and symbols that makes a password strong.
10 Clues: A test to prove you are human, not a robot • Connecting to the internet without using wires • A scam website pretending to be a trusted one. • Software that protects your computer from viruses. • Footprint The trace of information you leave online. • A secret word or phrase used to protect your accounts. • The act of stealing someone’s personal information online • ...
Recognition and 2025-04-09
14 Clues: Set. • Admin • Produce. • Security. • Open door • Go fishing • Operation.. • Aware of... • Self moving. • Threats to.. • Confiability. • Concrete info. • Before its all lost. • LEARNING Smart Robot.
Grade 10 - Theme 8 2026-04-01
14 Clues: Aygıt • şifre • takipçi • uygulama • kablosuz • masaüstü • dijital çağ • profil resmi • öncü,etkileyen • siber güvenlik • sanal gerçeklik • Karşıya yüklemek • indirmek(bir dosyayı vs.) • etiketleme(sosyal medyada)
i think theres someone hanging there 2025-07-23
13 Clues: (EDR) • Mesh, • cloud, • Detection • Computing, • Screening, • technology, • Reality (XR), • Intelligence (AI), • Intelligence (BI), • Immune System (DIS), • Liability Insurance, • Automation, Multi-Factor Authentication (MFA),
Group Activity 2024-09-20
Across
- limited access of any resources
- encrypted messages
- example of integrity
- example of integrity
Down
- It involves a range of technologies, processes and practices designed to safeguard the CIA of information
- data at-rest
- Component of cybersecurity
- combination of date and time
- reading by authorized parties
- authorized parties are able to modify
10 Clues: data at-rest • encrypted messages • example of integrity • example of integrity • Component of cybersecurity • combination of date and time • reading by authorized parties • limited access of any resources • authorized parties are able to modify • It involves a range of technologies, processes and practices designed to safeguard the CIA of information
Cybersecurity 2021-02-28
Across
- Your data was not corrupted even though it crashed due to which feature of your NTFS system drive?
- The type of operating system that is permanently programmed into a hardware device.
- A _____ determines how memory is used.
- The most common Mobile OS.
Down
- The type of software license that allows a predetermined number of people to use the account at the same time.
- What is saved even when in private browsing?
- Your web browser is showing an outdated picture on a website that you visit often. Which of the following would be the best choice for attempting to fix this issue? Clear _____
- The most popular OS for desktops and laptops.
- An alert pops up on your screen informing you of a possible vulnerability in your system. Which security method is most likely responsible for sending this alert? _____ software
- The ____ accounts are responsible for creating new user accounts and setting permissions.
10 Clues: The most common Mobile OS. • A _____ determines how memory is used. • What is saved even when in private browsing? • The most popular OS for desktops and laptops. • The type of operating system that is permanently programmed into a hardware device. • The ____ accounts are responsible for creating new user accounts and setting permissions. • ...
Cybersecurity 2021-02-12
Across
- Needs to be downloaded as part of another file which is then executed on the computer.
- It can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts
- Much similar to phishing but uses an SMS message
- Is software that is designed to gain access to your computer with malicious intent.
- Locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
Down
- Specific type of computer virus that tricks you into downloading it onto your computer.
- Unwanted software that monitors and gathers information on a person and how they use their computer.
- Replicate themselves but do not attach themselves to files as a virus does.
- Is a cybercrime in which a target/s are contacted by email, text message or telephone by posing as a legitimate institution.
- A secret word/phrase used to protect important log-in info on different websites
10 Clues: Much similar to phishing but uses an SMS message • Replicate themselves but do not attach themselves to files as a virus does. • A secret word/phrase used to protect important log-in info on different websites • Is software that is designed to gain access to your computer with malicious intent. • ...
Cybersecurity! 2022-09-22
Across
- person who uses computers to gain access to computers without consent
- stopping something from happening
- a type of malicious software that is installed without the user knowing to gain sensitive information on a system.
- protects your computer from attacks
- something a user clicks on to go to another page
Down
- guidelines for workplace procedures
- an attempt to damage or destroy a network
- keep safe from harm
- knowing of a situation or fact
- emails or texts sent to try and get personal information
10 Clues: keep safe from harm • knowing of a situation or fact • stopping something from happening • guidelines for workplace procedures • protects your computer from attacks • an attempt to damage or destroy a network • something a user clicks on to go to another page • emails or texts sent to try and get personal information • ...
Cybersecurity 2022-12-05
Across
- it’s when a hacker changes the IP address of an email so that it seems to come from a trusted source.
- A wiper is a type of malware with a single purpose: to erase user data and ensure it can’t be recovered.
- While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking.
- A rootkit is software that gives malicious actors remote control of a victim’s computer with full administrative privileges.
- A form of malware used by hackers to spy on you and your computer activities.
Down
- a wide variety of bad software used to infect and/or damage a system, most often delivered via spam emails.
- Worms target vulnerabilities in operating systems to install themselves into networks.
- A scam where a hacker poses as a legitimate business or organization (especially credit card companies, banks, charities, Internet providers, other utilities) in order to fool the victim
- it kidnaps your computer and holds it for ransom, hence the clever name.
- disguises itself as desirable code
10 Clues: disguises itself as desirable code • it kidnaps your computer and holds it for ransom, hence the clever name. • A form of malware used by hackers to spy on you and your computer activities. • Worms target vulnerabilities in operating systems to install themselves into networks. • ...
cybersecurity 2024-10-10
Across
- theft: The crime of obtaining personal information and using it to assume someone else's identity.
- This is the overall practice of protecting systems, networks, and data from digital attacks.
- A piece of software designed to fix a vulnerability or bug.
- Malicious software designed to disrupt computer operations, steal data, or gain unauthorized access to a computer system.
- A weakness in a computer system that can be exploited by attackers.
- A type of malware that restricts access to a computer system or data until a ransom is paid.
Down
- A cyberattack where a hacker poses as a trusted entity to trick a user into providing sensitive information.
- The process of converting information into a secret code to prevent unauthorized access.
- authentication (2FA): A security process that requires two forms of identification, such as a password and a code sent to your phone.
- A network security system that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic.
10 Clues: A piece of software designed to fix a vulnerability or bug. • A weakness in a computer system that can be exploited by attackers. • The process of converting information into a secret code to prevent unauthorized access. • This is the overall practice of protecting systems, networks, and data from digital attacks. • ...
cybersecurity 2024-11-12
Across
- What do you call the set of secret characters used to access accounts and secure information?
- What is malicious software that disguises itself as legitimate software?
- What is the term for a digital attack in which hackers demand payment to unlock encrypted files?
- What is a deceptive email that tricks users into giving sensitive information?
- What is the practice of protecting systems, networks, and programs from digital attacks?
Down
- What is the process of verifying the identity of a user before granting access to a system?
- What type of attack overwhelms a system with traffic, causing it to crash?
- What do you call a software program that replicates itself and spreads to other computers?
- What is the act of attempting to gain unauthorized access to a computer or network?
- What is a tool that filters incoming and outgoing network traffic to secure a network?
10 Clues: What is malicious software that disguises itself as legitimate software? • What type of attack overwhelms a system with traffic, causing it to crash? • What is a deceptive email that tricks users into giving sensitive information? • What is the act of attempting to gain unauthorized access to a computer or network? • ...
Cybersecurity 2025-05-02
Across
- Software that secretly gathers information about a person or organization without their knowledge.
- The process of converting data into a coded format to prevent unauthorized access.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules.
- Malicious software designed to harm, exploit, or otherwise compromise a computer or network.
- A software update designed to fix vulnerabilities or bugs in a program or system.
- A network of infected devices controlled remotely by an attacker, often used for large-scale attacks.
Down
- The method of verifying the identity of a user, device, or system before granting access.
- A type of malware disguised as legitimate software to trick users into installing it.
- A type of cyberattack where attackers trick users into revealing sensitive information through deceptive emails or messages.
- Malware that locks or encrypts a victim’s data and demands payment for its release.
10 Clues: A software update designed to fix vulnerabilities or bugs in a program or system. • The process of converting data into a coded format to prevent unauthorized access. • Malware that locks or encrypts a victim’s data and demands payment for its release. • A type of malware disguised as legitimate software to trick users into installing it. • ...
Cybersecurity 2025-04-25
Across
- Oberbegriff für schädliche Software
- Psychologische Manipulation zur Informationsgewinnung
- Kryptografische Prüfziffer von Daten
- Täuschungsmethode, um an persönliche Daten zu gelangen
- Angriff auf eine bisher unbekannte Sicherheitslücke
Down
- Simulierter Angriff zur Sicherheitsüberprüfung
- Erpresst Nutzer durch Verschlüsselung ihrer Daten
- Authentifizierungsmethode mit zusätzlicher Sicherheit
- Wird zum Entschlüsseln in der asymmetrischen Kryptographie verwendet
- Schützt Netzwerke vor unautorisierten Zugriffen
10 Clues: Oberbegriff für schädliche Software • Kryptografische Prüfziffer von Daten • Simulierter Angriff zur Sicherheitsüberprüfung • Schützt Netzwerke vor unautorisierten Zugriffen • Erpresst Nutzer durch Verschlüsselung ihrer Daten • Angriff auf eine bisher unbekannte Sicherheitslücke • Authentifizierungsmethode mit zusätzlicher Sicherheit • ...
CYBERSECURITY 2025-01-03
Across
- A digital security barrier that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- The act of intentionally accessing a system or network without authorization, often to steal data or damage the system.
- A secure connection that allows users to access the internet privately by routing their connection through a server, masking their IP address.
- A weakness or flaw in a system, software, or network that can be exploited by attackers to gain unauthorized access or cause harm.
- A type of malware that locks or encrypts a victim’s files, demanding payment (ransom) for their release.
Down
- Malicious software that pretends to be legitimate or harmless software to gain unauthorized access to a system.
- The process of converting information into a code to prevent unauthorized access, ensuring data remains private.
- A type of cyber attack where attackers impersonate legitimate entities to trick individuals into revealing sensitive information.
- A general term for malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
- Software that secretly monitors and collects a user's activities and personal information without their consent.
10 Clues: A type of malware that locks or encrypts a victim’s files, demanding payment (ransom) for their release. • Malicious software that pretends to be legitimate or harmless software to gain unauthorized access to a system. • The process of converting information into a code to prevent unauthorized access, ensuring data remains private. • ...
Cybersecurity 2025-07-10
Across
- A person who gains unauthorized access to systems
- Malicious software
- Method used to convert data into unreadable format
- Unauthorized attempt to access data or systems
- Keeping software up to date (two words, no space)
Down
- A secret word or phrase used to authenticate
- Security method requiring two forms of verification (abbr.)
- Virtual barrier separating internal network from external access
- Software used to detect and remove malware
- Common social engineering attack using fake emails
10 Clues: Malicious software • Software used to detect and remove malware • A secret word or phrase used to authenticate • Unauthorized attempt to access data or systems • A person who gains unauthorized access to systems • Keeping software up to date (two words, no space) • Method used to convert data into unreadable format • Common social engineering attack using fake emails • ...
Cybersecurity 2025-07-06
Across
- A person who gains unauthorized access to computer system
- A flaw or weakness in a system
- Software designed to detect and remove malicious programs
- A secret word or phrase used to gain access
Down
- Type of attack where users are tricked into giving information
- A program that appears legitimate but is harmful
- The process of converting information into code
- A harmful program that replicates itself
- A physical device used for authentication
- Unsolicited email, often for advertising
10 Clues: A flaw or weakness in a system • A harmful program that replicates itself • Unsolicited email, often for advertising • A physical device used for authentication • A secret word or phrase used to gain access • The process of converting information into code • A program that appears legitimate but is harmful • A person who gains unauthorized access to computer system • ...
CYBERSECURITY 2025-10-27
Across
- Connecting to the internet without using wires
- A scam website pretending to be a trusted one.
- Software that protects your computer from viruses.
- A test to prove you are human, not a robot
- A fake message that tries to trick you into giving personal information.
- A combination of letters, numbers, and symbols that makes a
Down
- The act of stealing someone’s personal information online
- Harmful software designed to damage or access your computer.
- Footprint The trace of information you leave online.
- A secret word or phrase used to protect your accounts.
- strong.
11 Clues: strong. • A test to prove you are human, not a robot • Connecting to the internet without using wires • A scam website pretending to be a trusted one. • Software that protects your computer from viruses. • Footprint The trace of information you leave online. • A secret word or phrase used to protect your accounts. • ...
Cybersecurity 2025-11-10
Across
- gain unauthorized access to a computer system
- capable of being easily hurt
- refers to any external entity who may have access to private data
- security risk who cause the program to crash
- network of maliciously installed bots
- records or transmits a user's keystrokes
Down
- cyber exploit directed at online card players
- unauthorized duplication or deletion of an organization's electronic information
- security mechanism for separating running programs
- software tools used by a third party
10 Clues: capable of being easily hurt • software tools used by a third party • network of maliciously installed bots • records or transmits a user's keystrokes • security risk who cause the program to crash • cyber exploit directed at online card players • gain unauthorized access to a computer system • security mechanism for separating running programs • ...
Cybersecurity 2025-11-10
Across
- Malicious computer software
- records or transmits a user's keystrokes
- secure time-limited credential
- take advantage of a particular error
- used to flood a target server
Down
- software tools used by a third party
- possible source of harm
- network of maliciously installed bots
- injecting malicious scripts into legitimate web pages
- bypassing normal authentication or security mechanisms
10 Clues: possible source of harm • Malicious computer software • used to flood a target server • secure time-limited credential • software tools used by a third party • take advantage of a particular error • network of maliciously installed bots • records or transmits a user's keystrokes • injecting malicious scripts into legitimate web pages • ...
Cybersecurity Awareness 2021-10-27
Across
- records keystrokes and sends its info to a hacker
- (three words) a term used to describe everyday objects that connect to the internet (such as fridges, thermostats, and smart speakers)
- verifying your identity with a username, password, or other piece of information
- hackers demand a ransom for the return of information after deploying this
- an audio or video clip that has been edited and changed to seem believable
- malware disguised as legitimate software
- the most common form of cryptocurrency
Down
- (two words) manipulating and deceiving people to get sensitive and private info; lying
- the practice of protecting critical systems and sensitive information from digital attacks
- emails, text messages, or other communication designed to convince you to give the sender personal information
- sends information from your computer to a third party without your knowledge
- short for malicious software
- use this to protect your information
- a way of hiding information
- a network security device that filters incoming and outgoing websites
- displays unauthorized ads on a user's screen
- short for virtual private network
17 Clues: a way of hiding information • short for malicious software • short for virtual private network • use this to protect your information • the most common form of cryptocurrency • malware disguised as legitimate software • displays unauthorized ads on a user's screen • records keystrokes and sends its info to a hacker • ...
Cybersecurity 2021-06-02
Across
- Intention to damage a person
- The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
- It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
- Ability of a user to access information or resources in a specified location and in the correct format.
- Illegal access to a computer system for the purpose od causing damage.
Down
- Malicious software designed to damage.
- Without permission or authorization
- Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
- It's the protection of personal information.
10 Clues: Intention to damage a person • Without permission or authorization • Malicious software designed to damage. • It's the protection of personal information. • Illegal access to a computer system for the purpose od causing damage. • It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses. • ...
cybersecurity 2022-05-06
Across
- eg.: 192.160.81.1
- A network security system
- background process of stealing data
- Virtual Private Network
- A man who hacks
Down
- sharing negative content about someone else
- denial of internet service attack
- baiting to reveal personal information
- A type of malware that steals data
- privileged acces managemen (or a brawl stars character)
10 Clues: A man who hacks • eg.: 192.160.81.1 • Virtual Private Network • A network security system • denial of internet service attack • A type of malware that steals data • background process of stealing data • baiting to reveal personal information • sharing negative content about someone else • privileged acces managemen (or a brawl stars character)
Cybersecurity 2022-11-17
10 Clues: covid • irritating • chats for you • shops for you • rigs elections • forced advertising • ransoms your files • knowingly downloaded • wastes network bandwidth • attacks specific servers
cybersecurity 2023-10-02
Across
- malware that is designed to steal personal information, such as passwords , CC numbers
- A process of identifying, assessing, and mitigating security risks
- A set of rules & procedures that govern the security of an organization's information systems.
- A system that prevents unauthorized access to a computer network
- Type of attack that attempts to trick users into revealing confidential information
- The process of verifying the identity of a user or device
Down
- process of granting access to resources based on a user's identity and permissions
- Encrypts a victim's files and demands payment to decrypt them
- Control to protect integrity of information
- A system that monitors a network for suspicious activity
10 Clues: Control to protect integrity of information • A system that monitors a network for suspicious activity • The process of verifying the identity of a user or device • Encrypts a victim's files and demands payment to decrypt them • A system that prevents unauthorized access to a computer network • A process of identifying, assessing, and mitigating security risks • ...
Cybersecurity 2024-02-18
Across
- Code red is a type of computer _______.
- Its Chakravyuh feature is an end-point anti- malware and antivirus software that creates a virtual layer between the user and the internet, blocking hackers from accessing sensitive data.which OS is refered here.
- In ethical hacking and cyber security, there are ______types of scanning.
- what is transformed with the help of a cipher algorithm.
- The technique used to hide information inside a picture.
Down
- It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the
- Oldest phone hacking technique used by hackers to make free calls.
- The malware which does not replicate or clone through an infection.
- The debian based OS which has 2 virtual machines and focuses on preserving user's data.
- A type of attack which uses a fraudulent server with a relay address.
10 Clues: Code red is a type of computer _______. • what is transformed with the help of a cipher algorithm. • The technique used to hide information inside a picture. • Oldest phone hacking technique used by hackers to make free calls. • The malware which does not replicate or clone through an infection. • ...
CyberSecurity 2024-02-24
10 Clues: What was he in? • who attacked him? • What first changed? • Was the car new or old? • What type of breech was it? • What did the hackers want to do? • What did the video call the car? • How to prevent this from happening • What else did the attackers turn off? • How did the attacker get into the car computer?
CYBERSECURITY 2020-06-13
Across
- An occasion when private information can be seen by people who should not be able to see it is called data ... .
- A string of characters that allows access to a computer system or service.
- A web page or screen that updates often to show the latest information.
- The manner in which the components of a computer or computer system are organized and integrated.
Down
- A piece of code which is capable of copying itself and can corrupt the system or destroy data.
- A software designed to interfere with a computer´s normal functioning.
- The action to make something stronger or more important is called ... up.
- A type of utility used for scanning and removing viruses from a computer is called anti-virus ... .
- An attempt by hackers to damage or destroy a computer network or system.
- The practice of examining large pre-existing databases in order to generate new information is called data ...
10 Clues: A software designed to interfere with a computer´s normal functioning. • A web page or screen that updates often to show the latest information. • An attempt by hackers to damage or destroy a computer network or system. • The action to make something stronger or more important is called ... up. • ...
Cybersecurity 2024-03-19
Across
- Secret code used to access a device or network
- Process of verifying identity
- Software designed to harm a device or network
- Unauthorized access to a device or network
Down
- Criminal activity carried out using technology
- Malicious attempt to damage or disrupt a computer system
- Weakness in a system that can be exploited
- Fraudulent attempt to gain sensitive information
- System designed to prevent unauthorized access
- Method of protecting information
10 Clues: Process of verifying identity • Method of protecting information • Weakness in a system that can be exploited • Unauthorized access to a device or network • Software designed to harm a device or network • Criminal activity carried out using technology • Secret code used to access a device or network • System designed to prevent unauthorized access • ...
cybersecurity 2024-02-21
Across
- Cyber-attack
- Action that guarantee the identity of a computer
- Error checking method
- Hash function
Down
- Unpredictable number generated by an algorithm
- Systems that are connected by each others
- Technological process for telling a computer which tasks to perform in order to solve problems
- One way encryption
- Internet protocol part of the transport layer
- Reference model of system interconnection
10 Clues: Cyber-attack • Hash function • One way encryption • Error checking method • Systems that are connected by each others • Reference model of system interconnection • Internet protocol part of the transport layer • Unpredictable number generated by an algorithm • Action that guarantee the identity of a computer • ...
cybersecurity 2024-11-12
Across
- What do you call the set of secret characters used to access accounts and secure information?
- What is malicious software that disguises itself as legitimate software?
- What is the term for a digital attack in which hackers demand payment to unlock encrypted files?
- What is a deceptive email that tricks users into giving sensitive information?
- What is the practice of protecting systems, networks, and programs from digital attacks?
Down
- What is the process of verifying the identity of a user before granting access to a system?
- What type of attack overwhelms a system with traffic, causing it to crash?
- What do you call a software program that replicates itself and spreads to other computers?
- What is the act of attempting to gain unauthorized access to a computer or network?
- What is a tool that filters incoming and outgoing network traffic to secure a network?
10 Clues: What is malicious software that disguises itself as legitimate software? • What type of attack overwhelms a system with traffic, causing it to crash? • What is a deceptive email that tricks users into giving sensitive information? • What is the act of attempting to gain unauthorized access to a computer or network? • ...
CYBERSECURITY 2025-02-08
Across
- A person who tries to break into systems.
- A fake email trying to trick you.
- Someone you do not know online.
- Relating to computers and the internet.
- Software designed to harm your device.
Down
- The action of entering username/password.
- A secret code to keep your account safe.
- A way to send messages online.
- Keeping your personal information safe.
- A harmful program that damages a computer.
10 Clues: A way to send messages online. • Someone you do not know online. • A fake email trying to trick you. • Software designed to harm your device. • Keeping your personal information safe. • Relating to computers and the internet. • A secret code to keep your account safe. • The action of entering username/password. • A person who tries to break into systems. • ...
Cybersecurity 2025-05-26
Across
- Malware disguised as legitimate software
- Process of verifying user identity
- A vulnerability exploited before being publicly known
- Deceptive attempt to steal user credentials via fake emails
- Software that secretly gathers user information
Down
- Process of converting data into a secure format
- System that filters incoming and outgoing network traffic
- Malware that encrypts files and demands payment
- General term for harmful software like viruses or worms
- Program designed to detect and remove malware
10 Clues: Process of verifying user identity • Malware disguised as legitimate software • Program designed to detect and remove malware • Process of converting data into a secure format • Malware that encrypts files and demands payment • Software that secretly gathers user information • A vulnerability exploited before being publicly known • ...
Cybersecurity 2025-06-25
Across
- Being trustworthy
- The state of being exposed to an attack
- The practice of protecting systems from attacks
- Software that obtains seccret information
- The action of decoding
Down
- The action of encoding
- Malicius software
- Software used to prevent, and remove malicius software
- An attmept by hackers to damage a computer
- Reveal personal information from fraudulent emails
10 Clues: Malicius software • Being trustworthy • The action of encoding • The action of decoding • The state of being exposed to an attack • An attmept by hackers to damage a computer • Software that obtains seccret information • The practice of protecting systems from attacks • Reveal personal information from fraudulent emails • ...
Cybersecurity 2025-07-29
Across
- Network of private computers infected with malicious software
- Technique of making data unreadable to unauthorized users
- Fraudulent attempt to obtain sensitive information
- Barrier between a trusted network and untrusted networks
- Software designed to damage, disrupt, or gain unauthorized access
- Secret string used to authenticate access
Down
- Attacker tricks someone into breaking security procedures
- Attempts to guess a password by trying many combinations
- Method of verifying identity using fingerprints, retina, etc.
- Security flaw allowing attackers to access restricted data
10 Clues: Secret string used to authenticate access • Fraudulent attempt to obtain sensitive information • Attempts to guess a password by trying many combinations • Barrier between a trusted network and untrusted networks • Attacker tricks someone into breaking security procedures • Technique of making data unreadable to unauthorized users • ...
Cybersecurity 2025-02-03
Across
- A potential cause of harm to a system, such as an attacker or malicious software
- The process of verifying the identity of a user or system
- A small piece of data used to verify a user’s identity during authentication
- Writing software with built-in security measures to prevent vulnerabilities
- A weakness in a system that can be exploited by attackers
Down
- Process of converting data into a code to prevent unauthorized access
- A piece of software designed to fix vulnerabilities or improve functionality
- Software designed to disrupt, damage, or gain unauthorized access to a computer system
- A method of attempting to acquire sensitive information by pretending to be a trustworthy entity
- A system designed to prevent unauthorized access to or from a private network
10 Clues: The process of verifying the identity of a user or system • A weakness in a system that can be exploited by attackers • Process of converting data into a code to prevent unauthorized access • Writing software with built-in security measures to prevent vulnerabilities • A piece of software designed to fix vulnerabilities or improve functionality • ...
Cybersecurity 2025-09-05
Across
- Wie nennt man die übergeordneten Sicherheitsziele wie Vertraulichkeit, Integrität und Verfügbarkeit, die im Security Concept verankert sind?
- Welches Dokument fasst die Cybersecurity-Ziele und -Anforderungen eines Items zusammen und leitet daraus Schutzmaßnahmen ab?(englisches Wort)
- Welcher Schritt ist Teil des Security Concepts und untersucht, welche Angriffe realistisch sind?
- Welche Prüfaktivität simuliert Angriffe, um Schwachstellen in einem System aufzudecken?
Down
- Wie nennt man den Unterschied zwischen erwartetem und tatsächlichem Testergebnis im Testbericht?
- Welcher Mechanismus stellt sicher, dass nur autorisierte Personen Fahrzeugdiagnosen durchführen können?(englisches Wort)
- Welcher Begriff beschreibt, wie tief und breit ein Penetrationstest durchgeführt wird
- Wie heißt das typische Verfahren, bei dem ein Steuergerät eine Herausforderung stellt und der Tester den passenden Schlüssel liefern muss? (deutsch und englisches Wort)
- Wie nennt man den praktischen Nachweis, dass eine Schwachstelle während eines Pentests ausnutzbar ist?
- Welches Dokument fasst die Ergebnisse von Tests zusammen und zeigt, ob Anforderungen erfüllt wurden?"),
10 Clues: Welcher Begriff beschreibt, wie tief und breit ein Penetrationstest durchgeführt wird • Welche Prüfaktivität simuliert Angriffe, um Schwachstellen in einem System aufzudecken? • Wie nennt man den Unterschied zwischen erwartetem und tatsächlichem Testergebnis im Testbericht? • ...
Cybersecurity Glosary 2025-10-07
Across
- Security principle ensuring that data is not altered or tampered with
- Type of malware that locks data until a payment is made
- Permission to access certain resources or perform actions
- Fraudulent attempt to get sensitive information by pretending to be a trusted empty
- Company that provides users access to the Internet
- Malicious program disguised as legitimate software
- Network of connected devices that communicate over the Internet
- Unauthorized takeover of a system, network or online session
- Process that converts data into unreadable code to protect it
- Manipulating people to reveal confidential information
Down
- Weak Points in a system that attackers can exploit
- Security principle ensuring that systems and data are accesible when needed
- Process of verifying someone's identity before granting access
- Secret string of characters used for authentication
- Probability that a threat will exploit a vulnerability
- Software that secretly collects user data and send it to others
- Risks that come from employees or people inside an organization
17 Clues: Weak Points in a system that attackers can exploit • Company that provides users access to the Internet • Malicious program disguised as legitimate software • Secret string of characters used for authentication • Probability that a threat will exploit a vulnerability • Manipulating people to reveal confidential information • ...
