cybersecurity Crossword Puzzles

Loopbane in die moderne wêreld 2024-11-14

Loopbane in die moderne wêreld crossword puzzle
Across
  1. Data Engineer
  2. Computer Programmer
  3. Mechanical Engineer
  4. Information Security
  5. Accountant
  6. Attorney
  7. Marketing
Down
  1. Financial Manager
  2. Financial Analyst
  3. Human Resources Manager
  4. Cybersecurity Expert
  5. Digital Designer
  6. Operations Manager
  7. Chief Executive Officer
  8. Director
  9. Surgeon

16 Clues: SurgeonDirectorAttorneyMarketingAccountantData EngineerDigital DesignerFinancial ManagerFinancial AnalystOperations ManagerComputer ProgrammerMechanical EngineerCybersecurity ExpertInformation SecurityHuman Resources ManagerChief Executive Officer

cybersecurity terms 2022-12-16

cybersecurity terms crossword puzzle
Across
  1. a computer connected to a network that has been compromised by a hacker
  2. a kind of software used to prevent, scan, detect and delete viruses from a computer
  3. software that enables a user to covert information from another computer by transmitting data from their hard drive
  4. software that allows an unauthorized user to access a computer
  5. a type of malware that self replicates and infects other computers
  6. a class of cyberattacks in which attackers remotely execute commands to place malware or other malicious code on your computer or network
  7. a type of malware that disguises itself as legitimate code or software\
  8. software that displays advertising material
  9. A software-based firewall installed on a desktop or laptop computer to monitor and control its incoming and outgoing network traffic
Down
  1. a network security device that monitors and filters incoming and outgoing network traffic
  2. a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages
  3. malicious software that blocks access to a computer until a sum of money is paid
  4. an undocumented way of gaining access to a computer system
  5. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  6. a network of computers with malicious software
  7. any program that prohibits a pop-up at some point in time
  8. hackers who use automated techniques to scan specific network ranges and find vulnerable systems
  9. software updates that address security vulnerabilities

18 Clues: software that displays advertising materiala network of computers with malicious softwaresoftware updates that address security vulnerabilitiesany program that prohibits a pop-up at some point in timean undocumented way of gaining access to a computer systemsoftware that allows an unauthorized user to access a computer...

Cybersecurity unit 2 vocabulary 2025-09-30

Cybersecurity unit 2 vocabulary crossword puzzle
Across
  1. Data is ensured to be unchanged
  2. system that prevents and blocks viruses
  3. Connecting devices using only cables to ensure reliability
  4. Cables that use pulses of light to carry data
  5. Storage of data in physical harddrives
  6. method of ensuring authentication
  7. protection system that requires a 1 time use password to be used by a user
  8. Keeping data trustworthy
  9. cybersecurity situation where you are exposed to danger
Down
  1. To reduce
  2. Data can always be used or found
  3. Ability to reach and use data
  4. Fundamental cybersecurity model that is composed of 3 ideas
  5. Ensuring that nobody changed or altered any data
  6. Barrier between devices that monitors traffic
  7. Keeping data secret to people who don't need it
  8. Tool that monitors and blocks suspicious activity
  9. Tool that monitors for suspicious activity

18 Clues: To reduceKeeping data trustworthyAbility to reach and use dataData is ensured to be unchangedData can always be used or foundmethod of ensuring authenticationStorage of data in physical harddrivessystem that prevents and blocks virusesTool that monitors for suspicious activityBarrier between devices that monitors traffic...

Raqamli iqtisodiyotning xususiyatlari va xorijiy davlatlarda raqamli iqtisodiyotning rivojlanishi 2025-11-26

Raqamli iqtisodiyotning xususiyatlari va xorijiy davlatlarda raqamli iqtisodiyotning rivojlanishi crossword puzzle
Across
  1. Xavfsizlik
  2. Onlayn tizim
  3. Ma’lumot oqimi
  4. Harakatlilik
  5. Ulanish
  6. Onlayn savdo
  7. Iqtisodiy hajm
Down
  1. Qabul qilish
  2. Yangilik
  3. Avtomatlashtirish
  4. Aqlli tizim
  5. Raqamli iqtisodiyot
  6. Tejamkorlik
  7. Moliyaviy texnologiya
  8. Bulut

15 Clues: BulutUlanishYangilikXavfsizlikAqlli tizimTejamkorlikQabul qilishOnlayn tizimHarakatlilikOnlayn savdoMa’lumot oqimiIqtisodiy hajmAvtomatlashtirishRaqamli iqtisodiyotMoliyaviy texnologiya

Cybersecurity terms 2024-03-12

Cybersecurity terms crossword puzzle
Across
  1. horse Malicious software disguised innocuously.
  2. Identity verification using traits.
  3. Malicious software threat
  4. Malicious code component.
  5. security Device-specific protection measures.
  6. policy Guidelines for security measures.
  7. Applying software updates regularly.
  8. Weakness in system security.
Down
  1. Deceptive email communication.
  2. testing Ethical hacking simulation.
  3. Malware with system-level access.
  4. hygiene Good digital security practices.
  5. incident Breach or violation event.
  6. Identity verification using traits.
  7. Malicious digital intrusion attempt.
  8. Network security barrier.
  9. Data protection through scrambling.
  10. Secure communication technique.
  11. Software against malicious programs.
  12. hat Ethical security expert.

20 Clues: Network security barrier.Malicious software threatMalicious code component.Weakness in system security.Deceptive email communication.Secure communication technique.Malware with system-level access.testing Ethical hacking simulation.Identity verification using traits.Identity verification using traits.Data protection through scrambling....

Cybersecurity Awareness 2023-09-06

Cybersecurity Awareness crossword puzzle
Across
  1. Method of secure communication (12 letters).
  2. Malware that demands payment to restore access (10 letters).
  3. Software that collects information without consent (7 letters).
  4. A group of interconnected devices (7 letters).
  5. A potential danger or risk (6 letters).
  6. Software that can infect your computer. (5 letters).
  7. Information stored on a computer (4 letters).
  8. Unauthorized access to a computer system (7 letters).
Down
  1. Process of converting data into a code (11 letters).
  2. A fraudulent scheme to deceive people (4 letters).
  3. The practice of using two different authentication methods (10 letters).
  4. A person who creates software.
  5. Weakness in a system that can be exploited (13 letters).
  6. Measures taken to protect against cyber threats (8 letters).
  7. A person interacting with a computer system (4 letters).
  8. A network security software. (8 letters).
  9. A common email-based attack (8 letters).
  10. Software to protect against malware (9 letters).

18 Clues: A person who creates software.A potential danger or risk (6 letters).A common email-based attack (8 letters).A network security software. (8 letters).Method of secure communication (12 letters).Information stored on a computer (4 letters).A group of interconnected devices (7 letters).Software to protect against malware (9 letters)....

Cybersecurity Awareness 2023-10-03

Cybersecurity Awareness crossword puzzle
Across
  1. A process by which a system verifies the identity of a user who wishes to access it.
  2. Small piece of data stored on a user's computer by the web browser while browsing a website.
  3. A set of static analysis tools for investigating and comparing phishing kit content within single or multiple kits.
  4. Manipulating individuals into divulging confidential information through psychological tactics.
  5. A type of malicious software that blocks access to a user's data until a sum of money is paid.
  6. A secure bridge between your device and the internet, often used to keep browsing activity private.
  7. AI-generated fake content, often video, that looks convincingly real.
  8. A collection of software and tools to make phishing campaigns easier for attackers.
  9. Software designed to harm or exploit any device, network, service, or program.
Down
  1. Targeted phishing attempts directed at specific individuals or companies.
  2. A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
  3. Malicious code that's activated by a specific condition or event.
  4. Information used to understand the enemy's strengths and weaknesses.
  5. Phishing attacks that are executed via SMS.
  6. Malicious software that records every keystroke to secretly gather personal information.
  7. Ensuring operations and data adhere to established rules and regulations.
  8. A network of private computers infected with malicious software and controlled as a group.
  9. A secret combination, often alphanumeric, used for authentication.

18 Clues: Phishing attacks that are executed via SMS.Malicious code that's activated by a specific condition or event.A secret combination, often alphanumeric, used for authentication.Information used to understand the enemy's strengths and weaknesses.AI-generated fake content, often video, that looks convincingly real....

Cybersecurity terms 2025-02-10

Cybersecurity terms crossword puzzle
Across
  1. - Malicious software designed to damage a system.
  2. - A hidden method of bypassing security.
  3. - Gathering personal information using deceptive emails.
  4. - Coding used to protect information.
  5. Address - Identifies the connection between a computer and the network provide
  6. - Hardware that allows communication between a network and the Internet.
  7. - A network of infected devices controlled by malware.
Down
  1. - A security system that prevents intrusions.
  2. - A system update that covers security vulnerabilities.
  3. - A process that confirms a user’s identity.
  4. - Someone who tries to gain unauthorized access.
  5. - Distributed Denial of Service attack.
  6. - Software that blocks access until money is paid.
  7. - Virtual Private Network.
  8. - Malware designed to remain hidden.
  9. - A decoy system to attract attackers.
  10. - Taking advantage of a computer’s vulnerability.
  11. Breach - When information is stolen from a system.

18 Clues: - Virtual Private Network.- Malware designed to remain hidden.- Coding used to protect information.- A decoy system to attract attackers.- Distributed Denial of Service attack.- A hidden method of bypassing security.- A process that confirms a user’s identity.- A security system that prevents intrusions....

CyF Chapter 1 2023-10-08

CyF Chapter 1 crossword puzzle
Across
  1. What is the acronym for the intermediate level certification offered by EC-Council that the cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.
  2. Attacks that originate from within an organization are known as ___________ security threats.
  3. Which type of cyber attack can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
  4. Script _____ are teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill.
  5. DDoS in cyber security means "Distributed ______-of-Service.
  6. The acronym of this technology which enable people to connect billions of devices to the Internet.
  7. Criminals can also use rogue devices, such as _____ Wi-Fi access points.
  8. Information _______ Management Standards provide a framework for implementing cybersecurity measures within an organization.
  9. Cybersecurity ______ possess the insight to recognize the influence of data and harness that power to build great organizations, provide services and protect people from cyberattacks.
Down
  1. Criminals use this tool to capture data streams over a network.
  2. Federated identity management refers to ______ enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
  3. What is another word used to describe the speed of data.
  4. A group of grey hat hackers who rally and protest against different political and social ideas.
  5. At which level are the employees responsible to protect the organization’s reputation, data, and customers.
  6. Cyber ______ is a weakness that makes a target susceptible to an attack
  7. The acronym of the practice where people used their own devices to access enterprise information.
  8. This group of criminals breaks into computers or networks to gain access for various reasons.
  9. A cybersecurity ______ is the possibility that a harmful event, such as an attack, will occur.
  10. State _____ Hackers are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
  11. _____ hat attackers are unethical criminals who violate computer and network security for personal gain.

20 Clues: What is another word used to describe the speed of data.DDoS in cyber security means "Distributed ______-of-Service.Criminals use this tool to capture data streams over a network.Cyber ______ is a weakness that makes a target susceptible to an attackCriminals can also use rogue devices, such as _____ Wi-Fi access points....

Hack Your Brain 2024-09-18

Hack Your Brain crossword puzzle
Across
  1. A small device or software used to create a secure encrypted tunnel between two networks
  2. The unauthorized exploitation of a network to access confidential data or systems
  3. A simulation-based cybersecurity exercise to assess an organization's defensive capabilities (Two words)
  4. The process of identifying and analyzing security risks
  5. A specific type of phishing that targets high-profile individuals, such as executives
  6. A malicious attempt to disrupt a network by overwhelming it with traffic
  7. An individual who uses hacking skills for ethical purposes
Down
  1. An offensive security activity where ethical hackers simulate real-world attacks to test defenses (Two words, hyphenated)
  2. Teaming A cybersecurity practice where teams work against each other, with attackers and defenders (Two words)
  3. A technique where attackers attempt to guess passwords by trying all possible combinations
  4. Shields The world's largest multinational cybersecurity exercise, organized annually by NATO (Two words)
  5. A widely-used asymmetric encryption algorithm named after its inventors

12 Clues: The process of identifying and analyzing security risksAn individual who uses hacking skills for ethical purposesA widely-used asymmetric encryption algorithm named after its inventorsA malicious attempt to disrupt a network by overwhelming it with trafficThe unauthorized exploitation of a network to access confidential data or systems...

Hack Your Brain 2024-09-18

Hack Your Brain crossword puzzle
Across
  1. A specific type of phishing that targets high-profile individuals, such as executives.
  2. A technology used to create a secure, encrypted tunnel between two networks.
  3. A malicious attempt to disrupt a network by overwhelming it with traffic.
  4. A simulation-based cybersecurity exercise to assess an organization's defensive capabilities.
  5. A technique where attackers attempt to guess passwords by trying all possible combinations.
  6. The unauthorized exploitation of a network to access confidential data or systems.
Down
  1. An individual who uses hacking skills for ethical purposes.
  2. An offensive security activity where ethical hackers simulate real-world attacks to test defenses (Two words, hyphenated).
  3. A cybersecurity practice where teams work against each other, with attackers and defenders.
  4. ... Shields - The world's largest multinational cybersecurity exercise, organized annually by NATO.
  5. A widely used asymmetric encryption algorithm named after its inventors.
  6. ... Management - The process of identifying and analyzing issues that could have an unwanted effect on company assets.

12 Clues: An individual who uses hacking skills for ethical purposes.A widely used asymmetric encryption algorithm named after its inventors.A malicious attempt to disrupt a network by overwhelming it with traffic.A technology used to create a secure, encrypted tunnel between two networks....

Trends & Buzzwords 2025-07-23

Trends & Buzzwords crossword puzzle
Across
  1. Technology helping to preserve the planet.
  2. Elon Musk's artificial world.
  3. Multiple tools/controls working together.
  4. everything as a (not a product)
  5. Insurance for when your tech gets hit by liabilities.
  6. Desgined to find and respond to potential cybersecurity threaets.
  7. Why pay a human to do a job when you can pay to build a robot to do it instead?
Down
  1. Combing through cybersecurity strategies in a company to find potential vulnerabilities.
  2. Experiences, but lots of them.
  3. Not actually intelligent.
  4. Not stupid business.
  5. First a password, then an authentication key, then a security question.
  6. A connection of cloud systems for many purposes.
  7. Reality, but stretched.
  8. Desgined to mitigate digital business risks.
  9. Funky computers that go really fast.

16 Clues: Not stupid business.Reality, but stretched.Not actually intelligent.Elon Musk's artificial world.Experiences, but lots of them.everything as a (not a product)Funky computers that go really fast.Multiple tools/controls working together.Technology helping to preserve the planet.Desgined to mitigate digital business risks....

Cybersecurity Fundamental Chapter 2 2024-06-03

Cybersecurity Fundamental Chapter 2 crossword puzzle
Across
  1. Ensures that information is accessible only to those authorized to have access.
  2. The foundational principles of cybersecurity.
  3. A framework developed by John McCumber to manage and protect networks, domains, and the Internet.
  4. The three categories of measures used to protect cyberspace: Technologies (devices and products), Policies and Practices (procedures and guidelines), and People (awareness and knowledge)
Down
  1. The ISO Cybersecurity Model, including ISO 27001 and ISO 27002 standards, provides a framework for managing information security.
  2. Data that is stored on physical media (e.g., hard drives, USB drives, cloud storage). Protecting data at rest involves encryption, access controls, and physical security measures.
  3. Data that is being transmitted across networks (e.g., emails, data transfers). Securing data in transit involves using secure communication protocols such as SSL/TLS, VPNs, and encryption.
  4. Data that is being actively processed by applications. Protecting data in process requires secure coding practices, memory protection mechanisms, and ensuring that applications handle data securely.
  5. Ensures that information and resources are accessible to authorized users when needed.
  6. Ensures that information remains accurate and complete throughout its lifecycle.
  7. The three states in which data can exist and require protection.

11 Clues: The foundational principles of cybersecurity.The three states in which data can exist and require protection.Ensures that information is accessible only to those authorized to have access.Ensures that information remains accurate and complete throughout its lifecycle....

Cybersecurity Scramble 2023-10-24

Cybersecurity Scramble crossword puzzle
Across
  1. Multiple sources sending an overwhelming amount of packets to crash the device.
  2. Holds computer data hostage in exchange for money.
  3. Requires end-user initiation.
  4. Sending an overwhelming amount of packets to crash the device.
  5. Phishing by impersonating businesses.
  6. A _ attack that attacks a vulnerability on a network unknown to the vendor.
  7. Triggers malicious code.
  8. Creates backdoors in the operating system.
  9. Replicates using network vulnerabilities
  10. Sending unauthorized messages to another bluetooth device.
Down
  1. Scares the victim into infecting their system.
  2. Phishing using calls.
  3. Creates ad-popups for the authors to generate revenue.
  4. Copying a victims information from bluetooth.
  5. Malware that carries out operations pretending to be something else.
  6. Phishing using texts.
  7. Lets the attacker view the actions of the user and their data.
  8. Phishing that targets high profile individuals.

18 Clues: Phishing using calls.Phishing using texts.Triggers malicious code.Requires end-user initiation.Phishing by impersonating businesses.Replicates using network vulnerabilitiesCreates backdoors in the operating system.Copying a victims information from bluetooth.Scares the victim into infecting their system....

Disruptive Technology 2025-07-23

Disruptive Technology crossword puzzle
Across
  1. cloud
  2. Computing
  3. Liability Insurance
  4. Mesh
  5. Intelligence
  6. Immune System
Down
  1. Detection and Response
  2. Reality
  3. Authentication
  4. Screening
  5. Automation
  6. technology
  7. Intelligence

13 Clues: MeshcloudRealityScreeningComputingAutomationtechnologyIntelligenceIntelligenceImmune SystemAuthenticationLiability InsuranceDetection and Response

AI TECHNOLOGY AND SOCIETY 2024-03-06

AI TECHNOLOGY AND SOCIETY crossword puzzle
Across
  1. Computing
  2. Talkbot
  3. Artificial
  4. 3Dimensional
  5. Automation
Down
  1. Instructions
  2. Information
  3. Protection
  4. Learning
  5. Network
  6. CyberSpace

11 Clues: TalkbotNetworkLearningComputingProtectionArtificialCyberSpaceAutomationInformationInstructions3Dimensional

A comparative study of India’s IT Act 2000 vs. GDPR, CCPA, and China’s Cybersecurity Law. How India can strengthen its cyber laws to protect businesses and individuals. 2025-04-07

A comparative study of India’s IT Act 2000 vs. GDPR, CCPA, and China’s Cybersecurity Law. How India can strengthen its cyber laws to protect businesses and individuals. crossword puzzle
Across
  1. China's law mandates data ___ for critical sectors
  2. GDPR fines can reach 4% of global ___
  3. California's consumer privacy law
  4. China's focus in its national data law
  5. Indian cybersecurity law enacted in 2000
Down
  1. CCPA lets consumers ___ of data sales
  2. GDPR's "Right to be ___" allows data deletion
  3. GDPR principle: "___ by Design"
  4. IT Act clause on compensation for data negligence
  5. EU's strict data protection regulation

10 Clues: GDPR principle: "___ by Design"California's consumer privacy lawCCPA lets consumers ___ of data salesGDPR fines can reach 4% of global ___EU's strict data protection regulationChina's focus in its national data lawIndian cybersecurity law enacted in 2000GDPR's "Right to be ___" allows data deletionIT Act clause on compensation for data negligence...

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. An unwanted software that monitors and gathers information on a person and how they use their computer, for example monitoring your internet usage to send you harmless but annoying adverts.
  2. A series of letters, numbers or symbols that protect data in your computer.
  3. A type of malware that exploits vulnerabilities in the a computer’s operating system and once in uses the system’s resources.
  4. A person that tries to access your data by getting into your computer, for example by figuring our your passwords.
  5. Locks a computer, encrypts files, and prevents the user from being able to access the data.
Down
  1. A more sinister spyware that records every keystroke made by a user.
  2. It infects a computer and causes it to download or display adverts or pop-ups when the victim is online.
  3. Being able to edit and view personal files like photos or videos.
  4. A self-replicating software, to get into the computer it has to be downloaded as part of another file which is then executed on the computer.
  5. A specific type of computer virus that tricks you into downloading it onto your computer. Once in your computer it might open a ‘back door’ to give an attacker remote access to your computer.

10 Clues: Being able to edit and view personal files like photos or videos.A more sinister spyware that records every keystroke made by a user.A series of letters, numbers or symbols that protect data in your computer.Locks a computer, encrypts files, and prevents the user from being able to access the data....

Cybersecurity 2024-12-24

Cybersecurity crossword puzzle
Across
  1. A harmful program that damages computers or steals information.
  2. Rules that guide how computers communicate securely.
  3. A system that spots unauthorized access to a network.
  4. A way to verify if someone is who they claim to be.
Down
  1. When sensitive information is accessed without permission.
  2. A barrier that protects a computer from harmful connections.
  3. A weakness in a system that can be exploited by hackers.
  4. A process that scrambles data to keep it secure.
  5. An attempt to harm a computer system or steal data.
  6. A scam where fake emails trick people into giving personal information.

10 Clues: A process that scrambles data to keep it secure.An attempt to harm a computer system or steal data.A way to verify if someone is who they claim to be.Rules that guide how computers communicate securely.A system that spots unauthorized access to a network.A weakness in a system that can be exploited by hackers....

Cybersecurity 2025-01-13

Cybersecurity crossword puzzle
Across
  1. A scam to steal information through fake communication
  2. A copy of data stored for recovery in case of loss
  3. Malicious software that secretly tracks your online activity and steals personal information
  4. A malicious program that replicates itself and spreads to other systems
  5. A security method requiring two or more ways to verify your identity before granting access
Down
  1. Malware that demands payment to restore access to data or systems
  2. A software update to fix vulnerabilities
  3. A secret key to access your account
  4. Someone who gains unauthorized access to systems or networks
  5. The right to control your personal information and keep it protected from unauthorized access.

10 Clues: A secret key to access your accountA software update to fix vulnerabilitiesA copy of data stored for recovery in case of lossA scam to steal information through fake communicationSomeone who gains unauthorized access to systems or networksMalware that demands payment to restore access to data or systems...

cybersecurity 2025-03-06

cybersecurity crossword puzzle
Across
  1. A cyber attack that tricks people into revealing personal information via fake emails or websites.
  2. Malicious software that secretly gathers user information.
  3. Software designed to harm or exploit computer systems.
  4. A type of malware that disguises itself as legitimate software.
  5. A secret combination of characters used to access a system.
  6. A type of malware that locks files and demands payment for decryption.
Down
  1. A security system that monitors and controls incoming and outgoing network traffic.
  2. The process of converting data into a secure code to prevent unauthorized access.
  3. Software that detects and removes malicious programs.
  4. A person who gains unauthorized access to computer systems.

10 Clues: Software that detects and removes malicious programs.Software designed to harm or exploit computer systems.Malicious software that secretly gathers user information.A person who gains unauthorized access to computer systems.A secret combination of characters used to access a system.A type of malware that disguises itself as legitimate software....

Cybersecurity 2023-10-31

Cybersecurity crossword puzzle
Across
  1. a hacker that is malicious
  2. the art of protecting devices and data from unauthorized access
  3. a hacker that is doing good
  4. when your personal data is kept secret
Down
  1. a hacker that works without permission
  2. when you personal data is available
  3. Multi-Factor________ something you have, know, and are
  4. Internet of __________
  5. a kind of human engineering
  6. an unusual way to solve a problem

10 Clues: Internet of __________a hacker that is maliciousa hacker that is doing gooda kind of human engineeringan unusual way to solve a problemwhen you personal data is availablea hacker that works without permissionwhen your personal data is kept secretMulti-Factor________ something you have, know, and are...

cybersecurity 2024-12-04

cybersecurity crossword puzzle
Across
  1. Malware that takes user data hostage
  2. Act of illegally retrieving confidential information
  3. Type of virus spread via emails or links
  4. Protective measures put in place against attacks
  5. Tool used to connect to a private network securely
Down
  1. Set of techniques to secure a business against cyberattacks
  2. Malware designed to spy on the user without them realizing it
  3. Term designating a computer attack consisting of overwhelming a server with requests to render it inoperable
  4. Secure authentication method using two separate elements
  5. that takes user data hostage

10 Clues: that takes user data hostageMalware that takes user data hostageType of virus spread via emails or linksProtective measures put in place against attacksTool used to connect to a private network securelyAct of illegally retrieving confidential informationSecure authentication method using two separate elements...

Cybersecurity 2025-05-05

Cybersecurity crossword puzzle
Across
  1. Forging the sender's address in emails
  2. sending fake messages/links to steal persona data.
  3. A series of small attacks
  4. unauthorized means,
  5. Copying or distributing unauthorized software
  6. Altering data before entering into computer system
Down
  1. Taking control of a website
  2. creating fake documents
  3. A type of malware disguised
  4. Sending large volumes of unwanted mails

10 Clues: unauthorized means,creating fake documentsA series of small attacksTaking control of a websiteA type of malware disguisedForging the sender's address in emailsSending large volumes of unwanted mailsCopying or distributing unauthorized softwaresending fake messages/links to steal persona data.Altering data before entering into computer system

Cybersecurity 2021-06-02

Cybersecurity crossword puzzle
Across
  1. Intention to damage a person.
  2. The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  3. Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
  4. It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
  5. Ability of a user to access information or resources in a specified location and in the correct format.
  6. Illegal access to a computer system for the purpose od causing damage.
Down
  1. Malicious software designed to damage.
  2. Without permission or authorization
  3. Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
  4. It's the protection of personal information.

10 Clues: Intention to damage a person.Without permission or authorizationMalicious software designed to damage.It's the protection of personal information.Illegal access to a computer system for the purpose od causing damage.It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses....

Cybersecurity 2022-06-29

Cybersecurity crossword puzzle
Across
  1. Purchasing of asset
  2. hardware and software
  3. Longeststage of asset lifecycle
  4. Tangible asset
  5. Intangible asset
  6. tangible asset
Down
  1. physical asset
  2. Digital media and content
  3. Wear and tear situation
  4. Costlier than traditional
  5. plumbing installation

11 Clues: physical assetTangible assettangible assetIntangible assetPurchasing of assethardware and softwareplumbing installationWear and tear situationDigital media and contentCostlier than traditionalLongeststage of asset lifecycle

CYBERSECURITY 2025-10-27

CYBERSECURITY crossword puzzle
Across
  1. A fake message that tries to trick you into giving personal information.
  2. A scam website pretending to be a trusted one.
  3. A test to prove you are human, not a robot
  4. Software that protects your computer from viruses.
  5. Harmful software designed to damage or access your computer.
  6. A secret word or phrase used to protect your accounts.
Down
  1. Connecting to the internet without using wires
  2. The act of stealing someone’s personal information online
  3. Footprint The trace of information you leave online.
  4. A combination of letters, numbers, and symbols that makes a password strong.

10 Clues: A test to prove you are human, not a robotConnecting to the internet without using wiresA scam website pretending to be a trusted one.Software that protects your computer from viruses.Footprint The trace of information you leave online.A secret word or phrase used to protect your accounts.The act of stealing someone’s personal information online...

Recognition and 2025-04-09

Recognition and crossword puzzle
Across
  1. Concrete info.
  2. Self moving.
  3. Security.
  4. Aware of...
  5. Threats to..
  6. Set.
Down
  1. Before its all lost.
  2. LEARNING Smart Robot.
  3. Produce.
  4. Operation..
  5. Go fishing
  6. Admin
  7. Open door
  8. Confiability.

14 Clues: Set.AdminProduce.Security.Open doorGo fishingOperation..Aware of...Self moving.Threats to..Confiability.Concrete info.Before its all lost.LEARNING Smart Robot.

Cybersecurity 2022-09-16

Cybersecurity crossword puzzle
Across
  1. update to an operating system to repair an bug or vulnerability
  2. tool installed to give an attacker easier access to the compromised system
  3. Electronic junk mail or junk newsgroup postings.
  4. generic term for a number of different types of malicious code.
  5. User acting with malicious intent to compromise a system
  6. term to describe connecting multiple separate networks together.
Down
  1. use a computer to gain unauthorized access to data in a system
  2. program that can retrieve and display information from servers on the World Wide Web
  3. Malware that locks/encrypts computers
  4. e-mails that try to trick a user into entering valid credentials at a fake website

10 Clues: Malware that locks/encrypts computersElectronic junk mail or junk newsgroup postings.User acting with malicious intent to compromise a systemuse a computer to gain unauthorized access to data in a systemupdate to an operating system to repair an bug or vulnerabilitygeneric term for a number of different types of malicious code....

Cybersecurity 2023-10-31

Cybersecurity crossword puzzle
Across
  1. a hacker that is malicious
  2. the art of protecting devices and data from unauthorized access
  3. a hacker that is doing good
  4. when your personal data is kept secret, another word for secret
Down
  1. a hacker that works without permission
  2. when you personal data is available (another word for available)
  3. Multi-Factor________ something you have, know, and are
  4. Internet of __________ (network of connected devices)
  5. a kind of human engineering with no coding
  6. an unusual way to solve a problem

10 Clues: a hacker that is maliciousa hacker that is doing goodan unusual way to solve a problema hacker that works without permissiona kind of human engineering with no codingInternet of __________ (network of connected devices)Multi-Factor________ something you have, know, and arethe art of protecting devices and data from unauthorized access...

Cybersecurity 2023-11-15

Cybersecurity crossword puzzle
Across
  1. A cryptographic attack on hash collisions
  2. A sudden unplanned event.
  3. Something built in to or used in a system to address gaps or weaknesses in the controls that could otherwise lead to an exploit.
  4. An attack that seeks to obtain personal or private financial information through domain spoofing
  5. The action of multiple attackers planning a cyberattack
Down
  1. The art of exploiting bugs and weaknesses that exist in the telephone system
  2. A process of changing hardware and software configurations to make computers and devices as secure as possible.
  3. The capture and monitoring of network IP packets using a packet sniffer
  4. A type of fraud in which an attacker attempts to trick the victim into providing private information.
  5. The act of unscrambling ciphertext into plaintext

10 Clues: A sudden unplanned event.A cryptographic attack on hash collisionsThe act of unscrambling ciphertext into plaintextThe action of multiple attackers planning a cyberattackThe capture and monitoring of network IP packets using a packet snifferThe art of exploiting bugs and weaknesses that exist in the telephone system...

CYBERSECURITY 2024-01-14

CYBERSECURITY crossword puzzle
Across
  1. Online storage.
  2. Decryption necessity.
  3. Securely lock files.
  4. Harmful software.
  5. Fake software tactic.
Down
  1. Ransomware type.
  2. Encrypting malware.
  3. Ensuring privacy.
  4. Data preservation.
  5. Remote access method.

10 Clues: Online storage.Ransomware type.Harmful software.Ensuring privacy.Data preservation.Encrypting malware.Securely lock files.Decryption necessity.Fake software tactic.Remote access method.

Cybersecurity 2024-07-19

Cybersecurity crossword puzzle
Across
  1. gained technology access when not authorized
  2. protecting patient healthcare information
  3. safeguards data during transmission and storage
  4. patient data remaining accessible
Down
  1. passwords recommended for "logging in"
  2. patient information kept private
  3. patient records remaining accurate and intact
  4. healthcare leading cause of security breaches
  5. digitalized complete patient health information
  6. recommended regularly for software integrity

10 Clues: patient information kept privatepatient data remaining accessiblepasswords recommended for "logging in"protecting patient healthcare informationgained technology access when not authorizedrecommended regularly for software integritypatient records remaining accurate and intacthealthcare leading cause of security breaches...

Cybersecurity 2024-04-03

Cybersecurity crossword puzzle
Across
  1. A computer attack aimed at making a service unavailable.
  2. A program/device that protects a network.
  3. A type of malware that looks like a legimate program and is undetected by the anti-virus
  4. A network of computers infected by malware that are under the control of a single attacking party.
  5. A technique for protecting data by transforming it irreversibly.
Down
  1. A technique of symmetric encryption.
  2. A hashing algorithm which is the most used in secret-keys transfert.
  3. A known certfication authority who offers free certificates.
  4. A brand that makes cybersecurity devices especially for companies.
  5. A technique used by fraudsters to obtain personal information with the aim of committing identity theft.

10 Clues: A technique of symmetric encryption.A program/device that protects a network.A computer attack aimed at making a service unavailable.A known certfication authority who offers free certificates.A technique for protecting data by transforming it irreversibly.A brand that makes cybersecurity devices especially for companies....

Cybersecurity 2024-05-04

Cybersecurity crossword puzzle
Across
  1. Weaknesses or flaws in software, hardware, or network infrastructure that can be exploited by attackers to compromise the security of a system.
  2. The process of converting data into a form that is unreadable without the correct decryption key, thereby protecting it from unauthorized access.
  3. The process of verifying the identity of a user or device attempting to access a system, often through passwords, biometric scans, or two-factor authentication methods.
Down
  1. Deliberate actions taken by hackers or malicious entities to disrupt, damage, or gain unauthorized access to computer systems, networks, or data.
  2. A type of cyber attack in which attackers impersonate legitimate entities to deceive individuals into providing sensitive information, such as passwords or financial data.
  3. Unauthorized access or attempted access to a computer system or network by an individual or automated process.
  4. Authentication techniques that rely on unique biological characteristics, such as fingerprints, iris scans, or facial recognition, to verify the identity of individuals accessing a system or device.
  5. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  6. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data, often spread through email attachments, infected websites, or removable media.
  7. A software update designed to fix security vulnerabilities or address other issues within a program or operating system.

10 Clues: Unauthorized access or attempted access to a computer system or network by an individual or automated process.A software update designed to fix security vulnerabilities or address other issues within a program or operating system....

Cybersecurity 2024-04-29

Cybersecurity crossword puzzle
Across
  1. Unsolicited or unwanted email, often containing malicious links or attachments.
  2. Unauthorized access or exposure of sensitive information.
  3. A security mechanism that uses unique physical or behavioral characteristics to authenticate users.
  4. Manipulating individuals into divulging confidential information or performing actions that compromise security.
  5. Measures taken to protect the integrity and confidentiality of data transmitted over a network.
Down
  1. Malware that encrypts files or systems and demands payment for their release.
  2. A form of MFA that requires users to provide two different authentication factors.
  3. Knowledge and understanding of cybersecurity risks, threats, and best practices.
  4. The process of responding to and mitigating the effects of a cybersecurity incident.
  5. Software designed to detect, prevent, and remove malicious software from computer systems.

10 Clues: Unauthorized access or exposure of sensitive information.Malware that encrypts files or systems and demands payment for their release.Unsolicited or unwanted email, often containing malicious links or attachments.Knowledge and understanding of cybersecurity risks, threats, and best practices....

Cybersecurity 2024-05-07

Cybersecurity crossword puzzle
Across
  1. when you lose data this policy lets you restore it
  2. a program that allows hackers access to data without detect
  3. hacking under the onwers consent
  4. security actions like protecting the computer
  5. A self-replicating program
Down
  1. hacker that violates laws but not for malicious intent
  2. Basically rules and regulations
  3. protecting data from digital attacks
  4. Hacking with malicious intent
  5. A malicious program that is desguised

10 Clues: A self-replicating programHacking with malicious intentBasically rules and regulationshacking under the onwers consentprotecting data from digital attacksA malicious program that is desguisedsecurity actions like protecting the computerwhen you lose data this policy lets you restore ithacker that violates laws but not for malicious intent...

Cybersecurity 2024-09-22

Cybersecurity crossword puzzle
Across
  1. The highest level of access in a computer system
  2. Security technology that uses physical characteristics like fingerprints or facial recognition
  3. A security principle that ensures data has not been altered or tampered with
  4. A security threat that originates from within an organization
  5. The process of confirming the identity of a user or device
Down
  1. A hidden method of bypassing normal authentication to gain access to a system
  2. the science of encrypting and decrypting data
  3. is a key goal of cyber security
  4. The use of investigative techniques to examine digital crimes or security breaches
  5. one of the world's largest ransomware attacks in history

10 Clues: is a key goal of cyber securitythe science of encrypting and decrypting dataThe highest level of access in a computer systemone of the world's largest ransomware attacks in historyThe process of confirming the identity of a user or deviceA security threat that originates from within an organization...

Cybersecurity 2025-04-25

Cybersecurity crossword puzzle
Across
  1. Oberbegriff für schädliche Software
  2. Psychologische Manipulation zur Informationsgewinnung
  3. Kryptografische Prüfziffer von Daten
  4. Täuschungsmethode, um an persönliche Daten zu gelangen
  5. Angriff auf eine bisher unbekannte Sicherheitslücke
Down
  1. Simulierter Angriff zur Sicherheitsüberprüfung
  2. Erpresst Nutzer durch Verschlüsselung ihrer Daten
  3. Authentifizierungsmethode mit zusätzlicher Sicherheit
  4. Wird zum Entschlüsseln in der asymmetrischen Kryptographie verwendet
  5. Schützt Netzwerke vor unautorisierten Zugriffen

10 Clues: Oberbegriff für schädliche SoftwareKryptografische Prüfziffer von DatenSimulierter Angriff zur SicherheitsüberprüfungSchützt Netzwerke vor unautorisierten ZugriffenErpresst Nutzer durch Verschlüsselung ihrer DatenAngriff auf eine bisher unbekannte SicherheitslückeAuthentifizierungsmethode mit zusätzlicher Sicherheit...

cybersecurity 2025-11-27

cybersecurity crossword puzzle
Across
  1. Attack that overwhelms a service
  2. Malware that demands payment
  3. Software that secretly monitors activity
  4. Fraudulent attempt to steal information
  5. Malware disguised as legitimate software
  6. Network of compromised devices
Down
  1. Self-replicating malicious program
  2. Barrier that filters network traffic
  3. Technique to protect data
  4. Malicious software

10 Clues: Malicious softwareTechnique to protect dataMalware that demands paymentNetwork of compromised devicesAttack that overwhelms a serviceSelf-replicating malicious programBarrier that filters network trafficFraudulent attempt to steal informationSoftware that secretly monitors activityMalware disguised as legitimate software

Group Activity 2024-09-20

Group Activity crossword puzzle
Across
  1. limited access of any resources
  2. encrypted messages
  3. example of integrity
  4. example of integrity
Down
  1. It involves a range of technologies, processes and practices designed to safeguard the CIA of information
  2. data at-rest
  3. Component of cybersecurity
  4. combination of date and time
  5. reading by authorized parties
  6. authorized parties are able to modify

10 Clues: data at-restencrypted messagesexample of integrityexample of integrityComponent of cybersecuritycombination of date and timereading by authorized partieslimited access of any resourcesauthorized parties are able to modifyIt involves a range of technologies, processes and practices designed to safeguard the CIA of information

i think theres someone hanging there 2025-07-23

i think theres someone hanging there crossword puzzle
Across
  1. Computing,
  2. Intelligence (AI),
  3. Immune System (DIS),
  4. Reality (XR),
  5. Screening,
  6. Liability Insurance,
  7. Detection
  8. cloud,
Down
  1. technology,
  2. (EDR)
  3. Mesh,
  4. Automation, Multi-Factor Authentication (MFA),
  5. Intelligence (BI),

13 Clues: (EDR)Mesh,cloud,DetectionComputing,Screening,technology,Reality (XR),Intelligence (AI),Intelligence (BI),Immune System (DIS),Liability Insurance,Automation, Multi-Factor Authentication (MFA),

Cybersecurity 2021-06-02

Cybersecurity crossword puzzle
Across
  1. Intention to damage a person
  2. The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  3. Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
  4. It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
  5. Ability of a user to access information or resources in a specified location and in the correct format.
  6. Illegal access to a computer system for the purpose od causing damage.
Down
  1. Malicious software designed to damage.
  2. Without permission or authorization
  3. Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
  4. It's the protection of personal information.

10 Clues: Intention to damage a personWithout permission or authorizationMalicious software designed to damage.It's the protection of personal information.Illegal access to a computer system for the purpose od causing damage.It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses....

cybersecurity 2022-05-06

cybersecurity crossword puzzle
Across
  1. eg.: 192.160.81.1
  2. A network security system
  3. background process of stealing data
  4. Virtual Private Network
  5. A man who hacks
Down
  1. sharing negative content about someone else
  2. denial of internet service attack
  3. baiting to reveal personal information
  4. A type of malware that steals data
  5. privileged acces managemen (or a brawl stars character)

10 Clues: A man who hackseg.: 192.160.81.1Virtual Private NetworkA network security systemdenial of internet service attackA type of malware that steals databackground process of stealing databaiting to reveal personal informationsharing negative content about someone elseprivileged acces managemen (or a brawl stars character)

Cybersecurity 2022-11-17

Cybersecurity crossword puzzle
Across
  1. chats for you
  2. irritating
  3. attacks specific servers
  4. covid
  5. rigs elections
Down
  1. forced advertising
  2. knowingly downloaded
  3. ransoms your files
  4. wastes network bandwidth
  5. shops for you

10 Clues: covidirritatingchats for youshops for yourigs electionsforced advertisingransoms your filesknowingly downloadedwastes network bandwidthattacks specific servers

cybersecurity 2023-10-02

cybersecurity crossword puzzle
Across
  1. malware that is designed to steal personal information, such as passwords , CC numbers
  2. A process of identifying, assessing, and mitigating security risks
  3. A set of rules & procedures that govern the security of an organization's information systems.
  4. A system that prevents unauthorized access to a computer network
  5. Type of attack that attempts to trick users into revealing confidential information
  6. The process of verifying the identity of a user or device
Down
  1. process of granting access to resources based on a user's identity and permissions
  2. Encrypts a victim's files and demands payment to decrypt them
  3. Control to protect integrity of information
  4. A system that monitors a network for suspicious activity

10 Clues: Control to protect integrity of informationA system that monitors a network for suspicious activityThe process of verifying the identity of a user or deviceEncrypts a victim's files and demands payment to decrypt themA system that prevents unauthorized access to a computer networkA process of identifying, assessing, and mitigating security risks...

Cybersecurity 2024-02-18

Cybersecurity crossword puzzle
Across
  1. Code red is a type of computer _______.
  2. Its Chakravyuh feature is an end-point anti- malware and antivirus software that creates a virtual layer between the user and the internet, blocking hackers from accessing sensitive data.which OS is refered here.
  3. In ethical hacking and cyber security, there are ______types of scanning.
  4. what is transformed with the help of a cipher algorithm.
  5. The technique used to hide information inside a picture.
Down
  1. It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. it is known as the
  2. Oldest phone hacking technique used by hackers to make free calls.
  3. The malware which does not replicate or clone through an infection.
  4. The debian based OS which has 2 virtual machines and focuses on preserving user's data.
  5. A type of attack which uses a fraudulent server with a relay address.

10 Clues: Code red is a type of computer _______.what is transformed with the help of a cipher algorithm.The technique used to hide information inside a picture.Oldest phone hacking technique used by hackers to make free calls.The malware which does not replicate or clone through an infection....

CyberSecurity 2024-02-24

CyberSecurity crossword puzzle
Across
  1. What first changed?
  2. What else did the attackers turn off?
  3. How did the attacker get into the car computer?
  4. How to prevent this from happening
  5. What type of breech was it?
Down
  1. What did the hackers want to do?
  2. What did the video call the car?
  3. Was the car new or old?
  4. who attacked him?
  5. What was he in?

10 Clues: What was he in?who attacked him?What first changed?Was the car new or old?What type of breech was it?What did the hackers want to do?What did the video call the car?How to prevent this from happeningWhat else did the attackers turn off?How did the attacker get into the car computer?

CYBERSECURITY 2020-06-13

CYBERSECURITY crossword puzzle
Across
  1. An occasion when private information can be seen by people who should not be able to see it is called data ... .
  2. A string of characters that allows access to a computer system or service.
  3. A web page or screen that updates often to show the latest information.
  4. The manner in which the components of a computer or computer system are organized and integrated.
Down
  1. A piece of code which is capable of copying itself and can corrupt the system or destroy data.
  2. A software designed to interfere with a computer´s normal functioning.
  3. The action to make something stronger or more important is called ... up.
  4. A type of utility used for scanning and removing viruses from a computer is called anti-virus ... .
  5. An attempt by hackers to damage or destroy a computer network or system.
  6. The practice of examining large pre-existing databases in order to generate new information is called data ...

10 Clues: A software designed to interfere with a computer´s normal functioning.A web page or screen that updates often to show the latest information.An attempt by hackers to damage or destroy a computer network or system.The action to make something stronger or more important is called ... up....

Cybersecurity 2024-03-19

Cybersecurity crossword puzzle
Across
  1. Secret code used to access a device or network
  2. Process of verifying identity
  3. Software designed to harm a device or network
  4. Unauthorized access to a device or network
Down
  1. Criminal activity carried out using technology
  2. Malicious attempt to damage or disrupt a computer system
  3. Weakness in a system that can be exploited
  4. Fraudulent attempt to gain sensitive information
  5. System designed to prevent unauthorized access
  6. Method of protecting information

10 Clues: Process of verifying identityMethod of protecting informationWeakness in a system that can be exploitedUnauthorized access to a device or networkSoftware designed to harm a device or networkCriminal activity carried out using technologySecret code used to access a device or networkSystem designed to prevent unauthorized access...

cybersecurity 2024-02-21

cybersecurity crossword puzzle
Across
  1. Cyber-attack
  2. Action that guarantee the identity of a computer
  3. Error checking method
  4. Hash function
Down
  1. Unpredictable number generated by an algorithm
  2. Systems that are connected by each others
  3. Technological process for telling a computer which tasks to perform in order to solve problems
  4. One way encryption
  5. Internet protocol part of the transport layer
  6. Reference model of system interconnection

10 Clues: Cyber-attackHash functionOne way encryptionError checking methodSystems that are connected by each othersReference model of system interconnectionInternet protocol part of the transport layerUnpredictable number generated by an algorithmAction that guarantee the identity of a computer...

cybersecurity 2024-11-12

cybersecurity crossword puzzle
Across
  1. What do you call the set of secret characters used to access accounts and secure information?
  2. What is malicious software that disguises itself as legitimate software?
  3. What is the term for a digital attack in which hackers demand payment to unlock encrypted files?
  4. What is a deceptive email that tricks users into giving sensitive information?
  5. What is the practice of protecting systems, networks, and programs from digital attacks?
Down
  1. What is the process of verifying the identity of a user before granting access to a system?
  2. What type of attack overwhelms a system with traffic, causing it to crash?
  3. What do you call a software program that replicates itself and spreads to other computers?
  4. What is the act of attempting to gain unauthorized access to a computer or network?
  5. What is a tool that filters incoming and outgoing network traffic to secure a network?

10 Clues: What is malicious software that disguises itself as legitimate software?What type of attack overwhelms a system with traffic, causing it to crash?What is a deceptive email that tricks users into giving sensitive information?What is the act of attempting to gain unauthorized access to a computer or network?...

CYBERSECURITY 2025-02-08

CYBERSECURITY crossword puzzle
Across
  1. A person who tries to break into systems.
  2. A fake email trying to trick you.
  3. Someone you do not know online.
  4. Relating to computers and the internet.
  5. Software designed to harm your device.
Down
  1. The action of entering username/password.
  2. A secret code to keep your account safe.
  3. A way to send messages online.
  4. Keeping your personal information safe.
  5. A harmful program that damages a computer.

10 Clues: A way to send messages online.Someone you do not know online.A fake email trying to trick you.Software designed to harm your device.Keeping your personal information safe.Relating to computers and the internet.A secret code to keep your account safe.The action of entering username/password.A person who tries to break into systems....

Cybersecurity 2025-05-26

Cybersecurity crossword puzzle
Across
  1. Malware disguised as legitimate software
  2. Process of verifying user identity
  3. A vulnerability exploited before being publicly known
  4. Deceptive attempt to steal user credentials via fake emails
  5. Software that secretly gathers user information
Down
  1. Process of converting data into a secure format
  2. System that filters incoming and outgoing network traffic
  3. Malware that encrypts files and demands payment
  4. General term for harmful software like viruses or worms
  5. Program designed to detect and remove malware

10 Clues: Process of verifying user identityMalware disguised as legitimate softwareProgram designed to detect and remove malwareProcess of converting data into a secure formatMalware that encrypts files and demands paymentSoftware that secretly gathers user informationA vulnerability exploited before being publicly known...

Cybersecurity 2025-06-25

Cybersecurity crossword puzzle
Across
  1. Being trustworthy
  2. The state of being exposed to an attack
  3. The practice of protecting systems from attacks
  4. Software that obtains seccret information
  5. The action of decoding
Down
  1. The action of encoding
  2. Malicius software
  3. Software used to prevent, and remove malicius software
  4. An attmept by hackers to damage a computer
  5. Reveal personal information from fraudulent emails

10 Clues: Malicius softwareBeing trustworthyThe action of encodingThe action of decodingThe state of being exposed to an attackAn attmept by hackers to damage a computerSoftware that obtains seccret informationThe practice of protecting systems from attacksReveal personal information from fraudulent emails...

Cybersecurity 2025-07-29

Cybersecurity crossword puzzle
Across
  1. Network of private computers infected with malicious software
  2. Technique of making data unreadable to unauthorized users
  3. Fraudulent attempt to obtain sensitive information
  4. Barrier between a trusted network and untrusted networks
  5. Software designed to damage, disrupt, or gain unauthorized access
  6. Secret string used to authenticate access
Down
  1. Attacker tricks someone into breaking security procedures
  2. Attempts to guess a password by trying many combinations
  3. Method of verifying identity using fingerprints, retina, etc.
  4. Security flaw allowing attackers to access restricted data

10 Clues: Secret string used to authenticate accessFraudulent attempt to obtain sensitive informationAttempts to guess a password by trying many combinationsBarrier between a trusted network and untrusted networksAttacker tricks someone into breaking security proceduresTechnique of making data unreadable to unauthorized users...

Cybersecurity 2025-02-03

Cybersecurity crossword puzzle
Across
  1. A potential cause of harm to a system, such as an attacker or malicious software
  2. The process of verifying the identity of a user or system
  3. A small piece of data used to verify a user’s identity during authentication
  4. Writing software with built-in security measures to prevent vulnerabilities
  5. A weakness in a system that can be exploited by attackers
Down
  1. Process of converting data into a code to prevent unauthorized access
  2. A piece of software designed to fix vulnerabilities or improve functionality
  3. Software designed to disrupt, damage, or gain unauthorized access to a computer system
  4. A method of attempting to acquire sensitive information by pretending to be a trustworthy entity
  5. A system designed to prevent unauthorized access to or from a private network

10 Clues: The process of verifying the identity of a user or systemA weakness in a system that can be exploited by attackersProcess of converting data into a code to prevent unauthorized accessWriting software with built-in security measures to prevent vulnerabilitiesA piece of software designed to fix vulnerabilities or improve functionality...

Cybersecurity 2025-09-05

Cybersecurity crossword puzzle
Across
  1. Wie nennt man die übergeordneten Sicherheitsziele wie Vertraulichkeit, Integrität und Verfügbarkeit, die im Security Concept verankert sind?
  2. Welches Dokument fasst die Cybersecurity-Ziele und -Anforderungen eines Items zusammen und leitet daraus Schutzmaßnahmen ab?(englisches Wort)
  3. Welcher Schritt ist Teil des Security Concepts und untersucht, welche Angriffe realistisch sind?
  4. Welche Prüfaktivität simuliert Angriffe, um Schwachstellen in einem System aufzudecken?
Down
  1. Wie nennt man den Unterschied zwischen erwartetem und tatsächlichem Testergebnis im Testbericht?
  2. Welcher Mechanismus stellt sicher, dass nur autorisierte Personen Fahrzeugdiagnosen durchführen können?(englisches Wort)
  3. Welcher Begriff beschreibt, wie tief und breit ein Penetrationstest durchgeführt wird
  4. Wie heißt das typische Verfahren, bei dem ein Steuergerät eine Herausforderung stellt und der Tester den passenden Schlüssel liefern muss? (deutsch und englisches Wort)
  5. Wie nennt man den praktischen Nachweis, dass eine Schwachstelle während eines Pentests ausnutzbar ist?
  6. Welches Dokument fasst die Ergebnisse von Tests zusammen und zeigt, ob Anforderungen erfüllt wurden?"),

10 Clues: Welcher Begriff beschreibt, wie tief und breit ein Penetrationstest durchgeführt wirdWelche Prüfaktivität simuliert Angriffe, um Schwachstellen in einem System aufzudecken?Wie nennt man den Unterschied zwischen erwartetem und tatsächlichem Testergebnis im Testbericht?...

Cybersecurity 2021-02-28

Cybersecurity crossword puzzle
Across
  1. Your data was not corrupted even though it crashed due to which feature of your NTFS system drive?
  2. The type of operating system that is permanently programmed into a hardware device.
  3. A _____ determines how memory is used.
  4. The most common Mobile OS.
Down
  1. The type of software license that allows a predetermined number of people to use the account at the same time.
  2. What is saved even when in private browsing?
  3. Your web browser is showing an outdated picture on a website that you visit often. Which of the following would be the best choice for attempting to fix this issue? Clear _____
  4. The most popular OS for desktops and laptops.
  5. An alert pops up on your screen informing you of a possible vulnerability in your system. Which security method is most likely responsible for sending this alert? _____ software
  6. The ____ accounts are responsible for creating new user accounts and setting permissions.

10 Clues: The most common Mobile OS.A _____ determines how memory is used.What is saved even when in private browsing?The most popular OS for desktops and laptops.The type of operating system that is permanently programmed into a hardware device.The ____ accounts are responsible for creating new user accounts and setting permissions....

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. Needs to be downloaded as part of another file which is then executed on the computer.
  2. It can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts
  3. Much similar to phishing but uses an SMS message
  4. Is software that is designed to gain access to your computer with malicious intent.
  5. Locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
Down
  1. Specific type of computer virus that tricks you into downloading it onto your computer.
  2. Unwanted software that monitors and gathers information on a person and how they use their computer.
  3. Replicate themselves but do not attach themselves to files as a virus does.
  4. Is a cybercrime in which a target/s are contacted by email, text message or telephone by posing as a legitimate institution.
  5. A secret word/phrase used to protect important log-in info on different websites

10 Clues: Much similar to phishing but uses an SMS messageReplicate themselves but do not attach themselves to files as a virus does.A secret word/phrase used to protect important log-in info on different websitesIs software that is designed to gain access to your computer with malicious intent....

Cybersecurity! 2022-09-22

Cybersecurity! crossword puzzle
Across
  1. person who uses computers to gain access to computers without consent
  2. stopping something from happening
  3. a type of malicious software that is installed without the user knowing to gain sensitive information on a system.
  4. protects your computer from attacks
  5. something a user clicks on to go to another page
Down
  1. guidelines for workplace procedures
  2. an attempt to damage or destroy a network
  3. keep safe from harm
  4. knowing of a situation or fact
  5. emails or texts sent to try and get personal information

10 Clues: keep safe from harmknowing of a situation or factstopping something from happeningguidelines for workplace proceduresprotects your computer from attacksan attempt to damage or destroy a networksomething a user clicks on to go to another pageemails or texts sent to try and get personal information...

Cybersecurity 2022-12-05

Cybersecurity crossword puzzle
Across
  1. it’s when a hacker changes the IP address of an email so that it seems to come from a trusted source.
  2. A wiper is a type of malware with a single purpose: to erase user data and ensure it can’t be recovered.
  3. While someone is tricked into clicking on one object on a web page when they want to click on another, this practice is known as clickjacking.
  4. A rootkit is software that gives malicious actors remote control of a victim’s computer with full administrative privileges.
  5. A form of malware used by hackers to spy on you and your computer activities.
Down
  1. a wide variety of bad software used to infect and/or damage a system, most often delivered via spam emails.
  2. Worms target vulnerabilities in operating systems to install themselves into networks.
  3. A scam where a hacker poses as a legitimate business or organization (especially credit card companies, banks, charities, Internet providers, other utilities) in order to fool the victim
  4. it kidnaps your computer and holds it for ransom, hence the clever name.
  5. disguises itself as desirable code

10 Clues: disguises itself as desirable codeit kidnaps your computer and holds it for ransom, hence the clever name.A form of malware used by hackers to spy on you and your computer activities.Worms target vulnerabilities in operating systems to install themselves into networks....

cybersecurity 2024-10-10

cybersecurity crossword puzzle
Across
  1. theft: The crime of obtaining personal information and using it to assume someone else's identity.
  2. This is the overall practice of protecting systems, networks, and data from digital attacks.
  3. A piece of software designed to fix a vulnerability or bug.
  4. Malicious software designed to disrupt computer operations, steal data, or gain unauthorized access to a computer system.
  5. A weakness in a computer system that can be exploited by attackers.
  6. A type of malware that restricts access to a computer system or data until a ransom is paid.
Down
  1. A cyberattack where a hacker poses as a trusted entity to trick a user into providing sensitive information.
  2. The process of converting information into a secret code to prevent unauthorized access.
  3. authentication (2FA): A security process that requires two forms of identification, such as a password and a code sent to your phone.
  4. A network security system that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic.

10 Clues: A piece of software designed to fix a vulnerability or bug.A weakness in a computer system that can be exploited by attackers.The process of converting information into a secret code to prevent unauthorized access.This is the overall practice of protecting systems, networks, and data from digital attacks....

cybersecurity 2024-11-12

cybersecurity crossword puzzle
Across
  1. What do you call the set of secret characters used to access accounts and secure information?
  2. What is malicious software that disguises itself as legitimate software?
  3. What is the term for a digital attack in which hackers demand payment to unlock encrypted files?
  4. What is a deceptive email that tricks users into giving sensitive information?
  5. What is the practice of protecting systems, networks, and programs from digital attacks?
Down
  1. What is the process of verifying the identity of a user before granting access to a system?
  2. What type of attack overwhelms a system with traffic, causing it to crash?
  3. What do you call a software program that replicates itself and spreads to other computers?
  4. What is the act of attempting to gain unauthorized access to a computer or network?
  5. What is a tool that filters incoming and outgoing network traffic to secure a network?

10 Clues: What is malicious software that disguises itself as legitimate software?What type of attack overwhelms a system with traffic, causing it to crash?What is a deceptive email that tricks users into giving sensitive information?What is the act of attempting to gain unauthorized access to a computer or network?...

Cybersecurity 2025-05-02

Cybersecurity crossword puzzle
Across
  1. Software that secretly gathers information about a person or organization without their knowledge.
  2. The process of converting data into a coded format to prevent unauthorized access.
  3. A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules.
  4. Malicious software designed to harm, exploit, or otherwise compromise a computer or network.
  5. A software update designed to fix vulnerabilities or bugs in a program or system.
  6. A network of infected devices controlled remotely by an attacker, often used for large-scale attacks.
Down
  1. The method of verifying the identity of a user, device, or system before granting access.
  2. A type of malware disguised as legitimate software to trick users into installing it.
  3. A type of cyberattack where attackers trick users into revealing sensitive information through deceptive emails or messages.
  4. Malware that locks or encrypts a victim’s data and demands payment for its release.

10 Clues: A software update designed to fix vulnerabilities or bugs in a program or system.The process of converting data into a coded format to prevent unauthorized access.Malware that locks or encrypts a victim’s data and demands payment for its release.A type of malware disguised as legitimate software to trick users into installing it....

Cybersecurity 2025-04-25

Cybersecurity crossword puzzle
Across
  1. Oberbegriff für schädliche Software
  2. Psychologische Manipulation zur Informationsgewinnung
  3. Kryptografische Prüfziffer von Daten
  4. Täuschungsmethode, um an persönliche Daten zu gelangen
  5. Angriff auf eine bisher unbekannte Sicherheitslücke
Down
  1. Simulierter Angriff zur Sicherheitsüberprüfung
  2. Erpresst Nutzer durch Verschlüsselung ihrer Daten
  3. Authentifizierungsmethode mit zusätzlicher Sicherheit
  4. Wird zum Entschlüsseln in der asymmetrischen Kryptographie verwendet
  5. Schützt Netzwerke vor unautorisierten Zugriffen

10 Clues: Oberbegriff für schädliche SoftwareKryptografische Prüfziffer von DatenSimulierter Angriff zur SicherheitsüberprüfungSchützt Netzwerke vor unautorisierten ZugriffenErpresst Nutzer durch Verschlüsselung ihrer DatenAngriff auf eine bisher unbekannte SicherheitslückeAuthentifizierungsmethode mit zusätzlicher Sicherheit...

CYBERSECURITY 2025-01-03

CYBERSECURITY crossword puzzle
Across
  1. A digital security barrier that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  2. The act of intentionally accessing a system or network without authorization, often to steal data or damage the system.
  3. A secure connection that allows users to access the internet privately by routing their connection through a server, masking their IP address.
  4. A weakness or flaw in a system, software, or network that can be exploited by attackers to gain unauthorized access or cause harm.
  5. A type of malware that locks or encrypts a victim’s files, demanding payment (ransom) for their release.
Down
  1. Malicious software that pretends to be legitimate or harmless software to gain unauthorized access to a system.
  2. The process of converting information into a code to prevent unauthorized access, ensuring data remains private.
  3. A type of cyber attack where attackers impersonate legitimate entities to trick individuals into revealing sensitive information.
  4. A general term for malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. Software that secretly monitors and collects a user's activities and personal information without their consent.

10 Clues: A type of malware that locks or encrypts a victim’s files, demanding payment (ransom) for their release.Malicious software that pretends to be legitimate or harmless software to gain unauthorized access to a system.The process of converting information into a code to prevent unauthorized access, ensuring data remains private....

Cybersecurity 2025-07-10

Cybersecurity crossword puzzle
Across
  1. A person who gains unauthorized access to systems
  2. Malicious software
  3. Method used to convert data into unreadable format
  4. Unauthorized attempt to access data or systems
  5. Keeping software up to date (two words, no space)
Down
  1. A secret word or phrase used to authenticate
  2. Security method requiring two forms of verification (abbr.)
  3. Virtual barrier separating internal network from external access
  4. Software used to detect and remove malware
  5. Common social engineering attack using fake emails

10 Clues: Malicious softwareSoftware used to detect and remove malwareA secret word or phrase used to authenticateUnauthorized attempt to access data or systemsA person who gains unauthorized access to systemsKeeping software up to date (two words, no space)Method used to convert data into unreadable formatCommon social engineering attack using fake emails...

Cybersecurity 2025-07-06

Cybersecurity crossword puzzle
Across
  1. A person who gains unauthorized access to computer system
  2. A flaw or weakness in a system
  3. Software designed to detect and remove malicious programs
  4. A secret word or phrase used to gain access
Down
  1. Type of attack where users are tricked into giving information
  2. A program that appears legitimate but is harmful
  3. The process of converting information into code
  4. A harmful program that replicates itself
  5. A physical device used for authentication
  6. Unsolicited email, often for advertising

10 Clues: A flaw or weakness in a systemA harmful program that replicates itselfUnsolicited email, often for advertisingA physical device used for authenticationA secret word or phrase used to gain accessThe process of converting information into codeA program that appears legitimate but is harmfulA person who gains unauthorized access to computer system...

CYBERSECURITY 2025-10-27

CYBERSECURITY crossword puzzle
Across
  1. Connecting to the internet without using wires
  2. A scam website pretending to be a trusted one.
  3. Software that protects your computer from viruses.
  4. A test to prove you are human, not a robot
  5. A fake message that tries to trick you into giving personal information.
  6. A combination of letters, numbers, and symbols that makes a
Down
  1. The act of stealing someone’s personal information online
  2. Harmful software designed to damage or access your computer.
  3. Footprint The trace of information you leave online.
  4. A secret word or phrase used to protect your accounts.
  5. strong.

11 Clues: strong.A test to prove you are human, not a robotConnecting to the internet without using wiresA scam website pretending to be a trusted one.Software that protects your computer from viruses.Footprint The trace of information you leave online.A secret word or phrase used to protect your accounts....

Cybersecurity 2025-11-10

Cybersecurity crossword puzzle
Across
  1. gain unauthorized access to a computer system
  2. capable of being easily hurt
  3. refers to any external entity who may have access to private data
  4. security risk who cause the program to crash
  5. network of maliciously installed bots
  6. records or transmits a user's keystrokes
Down
  1. cyber exploit directed at online card players
  2. unauthorized duplication or deletion of an organization's electronic information
  3. security mechanism for separating running programs
  4. software tools used by a third party

10 Clues: capable of being easily hurtsoftware tools used by a third partynetwork of maliciously installed botsrecords or transmits a user's keystrokessecurity risk who cause the program to crashcyber exploit directed at online card playersgain unauthorized access to a computer systemsecurity mechanism for separating running programs...

Cybersecurity 2025-11-10

Cybersecurity crossword puzzle
Across
  1. Malicious computer software
  2. records or transmits a user's keystrokes
  3. secure time-limited credential
  4. take advantage of a particular error
  5. used to flood a target server
Down
  1. software tools used by a third party
  2. possible source of harm
  3. network of maliciously installed bots
  4. injecting malicious scripts into legitimate web pages
  5. bypassing normal authentication or security mechanisms

10 Clues: possible source of harmMalicious computer softwareused to flood a target serversecure time-limited credentialsoftware tools used by a third partytake advantage of a particular errornetwork of maliciously installed botsrecords or transmits a user's keystrokesinjecting malicious scripts into legitimate web pages...

Cybersecurity Awareness 2021-10-27

Cybersecurity Awareness crossword puzzle
Across
  1. records keystrokes and sends its info to a hacker
  2. (three words) a term used to describe everyday objects that connect to the internet (such as fridges, thermostats, and smart speakers)
  3. verifying your identity with a username, password, or other piece of information
  4. hackers demand a ransom for the return of information after deploying this
  5. an audio or video clip that has been edited and changed to seem believable
  6. malware disguised as legitimate software
  7. the most common form of cryptocurrency
Down
  1. (two words) manipulating and deceiving people to get sensitive and private info; lying
  2. the practice of protecting critical systems and sensitive information from digital attacks
  3. emails, text messages, or other communication designed to convince you to give the sender personal information
  4. sends information from your computer to a third party without your knowledge
  5. short for malicious software
  6. use this to protect your information
  7. a way of hiding information
  8. a network security device that filters incoming and outgoing websites
  9. displays unauthorized ads on a user's screen
  10. short for virtual private network

17 Clues: a way of hiding informationshort for malicious softwareshort for virtual private networkuse this to protect your informationthe most common form of cryptocurrencymalware disguised as legitimate softwaredisplays unauthorized ads on a user's screenrecords keystrokes and sends its info to a hacker...

Cybersecurity Glosary 2025-10-07

Cybersecurity Glosary crossword puzzle
Across
  1. Security principle ensuring that data is not altered or tampered with
  2. Type of malware that locks data until a payment is made
  3. Permission to access certain resources or perform actions
  4. Fraudulent attempt to get sensitive information by pretending to be a trusted empty
  5. Company that provides users access to the Internet
  6. Malicious program disguised as legitimate software
  7. Network of connected devices that communicate over the Internet
  8. Unauthorized takeover of a system, network or online session
  9. Process that converts data into unreadable code to protect it
  10. Manipulating people to reveal confidential information
Down
  1. Weak Points in a system that attackers can exploit
  2. Security principle ensuring that systems and data are accesible when needed
  3. Process of verifying someone's identity before granting access
  4. Secret string of characters used for authentication
  5. Probability that a threat will exploit a vulnerability
  6. Software that secretly collects user data and send it to others
  7. Risks that come from employees or people inside an organization

17 Clues: Weak Points in a system that attackers can exploitCompany that provides users access to the InternetMalicious program disguised as legitimate softwareSecret string of characters used for authenticationProbability that a threat will exploit a vulnerabilityManipulating people to reveal confidential information...

dasd 2021-04-30

dasd crossword puzzle
Across
  1. List
  2. flotante, Float
  3. entero, Integer
  4. Sprite
  5. Loop
  6. Variable
  7. Autonomous
  8. binarios Binary numbers
  9. Else
  10. If
  11. Cyber
  12. automático, Machine learning
  13. If else
  14. neuronales, nueral networks
Down
  1. Settings
  2. cybersecurity
  3. Function
  4. Python
  5. el lazo, For loop
  6. Print
  7. Commit
  8. Array
  9. while, While loop
  10. activo, Uptime
  11. Tap

25 Clues: IfTapListLoopElsePrintArrayCyberSpritePythonCommitIf elseSettingsFunctionVariableAutonomouscybersecurityactivo, Uptimeflotante, Floatentero, Integerel lazo, For loopwhile, While loopbinarios Binary numbersneuronales, nueral networksautomático, Machine learning

dasd 2021-04-30

dasd crossword puzzle
Across
  1. List
  2. flotante, Float
  3. entero, Integer
  4. Sprite
  5. Loop
  6. Variable
  7. Autonomous
  8. binarios Binary numbers
  9. Else
  10. If
  11. Cyber
  12. automático Machine learning
  13. If else
  14. neuronales nueral networks
Down
  1. Settings
  2. cybersecurity
  3. Function
  4. Python
  5. el lazo, For loop
  6. Print
  7. Commit
  8. Array
  9. while, While loop
  10. activo, Uptime
  11. Tap

25 Clues: IfTapListLoopElsePrintArrayCyberSpritePythonCommitIf elseSettingsFunctionVariableAutonomouscybersecurityactivo, Uptimeflotante, Floatentero, Integerel lazo, For loopwhile, While loopbinarios Binary numbersneuronales nueral networksautomático Machine learning

Year 12 Cybersecurity 2023-08-16

Year 12 Cybersecurity crossword puzzle
Across
  1. A hacker who operates between ethical and unethical boundaries, often exposing vulnerabilities without permission.
  2. An individual who simulates cyberattacks to evaluate the security of a system.
  3. A hacker who uses their skills to help organizations identify and fix security vulnerabilities.
  4. Measures taken to protect physical assets and facilities from unauthorized access or harm.
  5. The accuracy and reliability of data, protected from unauthorized alteration.
  6. A hacker who engages in malicious activities for personal gain or to cause harm.
  7. Mistakes made by individuals that can lead to security breaches.
  8. Creating multiple security layers to prevent unauthorized access at different levels.
  9. Covert agents who gather information on behalf of a government or organization.
  10. An individual or group that uses cyberattacks to create fear and chaos for political or ideological reasons.
Down
  1. Ensuring that sensitive information is accessible only to authorized individuals.
  2. The ability to identify and recognize cybersecurity threats and incidents.
  3. Making sure that data is accessible when needed, without unauthorized disruptions.
  4. Individuals with advanced computer skills who manipulate software or systems for various purposes.
  5. Covert activities aimed at gathering confidential information from competitors or enemies.
  6. Individuals who engage in illegal activities on the internet for financial gain.
  7. People within an organization who have access to sensitive information and can pose security risks.
  8. Implementing measures to discourage potential attackers from targeting a system or organization.
  9. Introducing obstacles and barriers to slow down attackers' progress.
  10. The process of restoring systems and data after a cybersecurity breach or incident.
  11. Taking swift actions to address and mitigate cybersecurity incidents.

21 Clues: Mistakes made by individuals that can lead to security breaches.Introducing obstacles and barriers to slow down attackers' progress.Taking swift actions to address and mitigate cybersecurity incidents.The ability to identify and recognize cybersecurity threats and incidents....

hour puzzle 2025-11-18

hour puzzle crossword puzzle
Across
  1. spirit bowl
  2. stupid machine
  3. our mascot
  4. best group
  5. lab
  6. hard to install
  7. debate
  8. CyBear
  9. vroom
  10. senator ___ Kennedy
  11. put the desks together
Down
  1. the worst class
  2. spinny
  3. daily task
  4. favorite period
  5. the good old days
  6. phantom program
  7. bruno mars song about cybersecurity THREATS

18 Clues: labvroomspinnydebateCyBeardaily taskour mascotbest groupspirit bowlstupid machinethe worst classfavorite periodphantom programhard to installthe good old dayssenator ___ Kennedyput the desks togetherbruno mars song about cybersecurity THREATS

The trends and buzzwords associated with disruptive technology 2025-08-07

The trends and buzzwords associated with disruptive technology crossword puzzle
Across
  1. Mesh
  2. Intelligence (AI)
  3. technology
  4. (XaaS)
  5. cloud
  6. Detection and Response (EDR)
Down
  1. Liability Insurance
  2. Immune System (DIS)
  3. Automation
  4. Intelligence (BI)
  5. Screening
  6. Computing
  7. Reality (XR)
  8. Authentication (MFA)

14 Clues: Meshcloud(XaaS)ScreeningComputingAutomationtechnologyReality (XR)Intelligence (BI)Intelligence (AI)Liability InsuranceImmune System (DIS)Authentication (MFA)Detection and Response (EDR)

Internal Audit Holiday Fun 2023-12-14

Internal Audit Holiday Fun crossword puzzle
Across
  1. TEST
  2. UNLOCK
  3. SWEET
  4. TECH SAFETY
  5. CHEAT
  6. CHEAT
  7. WENDY'S TREAT
Down
  1. PROCESS SAFETY MEASURES
  2. MEAN ONE
  3. PROBABILITY
  4. JOLLY
  5. APPROVAL
  6. RED NOSE

13 Clues: TESTJOLLYSWEETCHEATCHEATUNLOCKMEAN ONEAPPROVALRED NOSEPROBABILITYTECH SAFETYWENDY'S TREATPROCESS SAFETY MEASURES

INF Crossword Puzzle 2024-01-24

INF Crossword Puzzle crossword puzzle
Across
  1. Game Changers
  2. Safety Protocol
  3. Private
  4. Machinery
  5. Code
  6. Man-Made
Down
  1. Design
  2. Storage
  3. Connections
  4. Computer Procedure
  5. Login

11 Clues: CodeLoginDesignStoragePrivateMan-MadeMachineryConnectionsGame ChangersSafety ProtocolComputer Procedure

Lucas' Graduation-Day Crossword 2021-10-14

Lucas' Graduation-Day Crossword crossword puzzle
Across
  1. Grand _ University
  2. Type of Ceremony
  3. GCU Street
  4. Years in School
  5. Type of Degree
  6. Lucas's Employer
  7. Graduate
  8. GCU Color
  9. Black Beans
Down
  1. Name of GCU Mascot
  2. Go...
  3. Lucas's Major
  4. Pomp
  5. group of people
  6. Hat Decoration
  7. A builder
  8. Best type of Tree

17 Clues: PompGo...GraduateA builderGCU ColorGCU StreetBlack BeansLucas's MajorHat DecorationType of DegreeYears in Schoolgroup of peopleType of CeremonyLucas's EmployerBest type of TreeName of GCU MascotGrand _ University

Cybersecurity 2022-11-28

Cybersecurity crossword puzzle
Across
  1. manipulation of people into performing actions or give up confidential information.
  2. causes your computer to download or display malicious adverts or pop-ups
  3. a group of Internet-connected devices, each of which runs one or more bots. can be used to perform Distributed Denial-of-Service (DDoS)
  4. Designed to gain access to your computer with malicious intent.
  5. a type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information to the attacker
Down
  1. When infected, they locks/encrypted your computer or files, and demand money or else they will delete or publish it.
  2. replicate itself by maliciously modifying other computer programs and inserting code.
  3. Any malware that misleads users of its true intent. The term is derived from the Ancient Greek story.
  4. replicate itself in order to create traffic and slowing down the system.
  5. describes a social engineering act of obtaining someone else's personal information without their consent.

10 Clues: Designed to gain access to your computer with malicious intent.causes your computer to download or display malicious adverts or pop-upsreplicate itself in order to create traffic and slowing down the system.manipulation of people into performing actions or give up confidential information....

Cybersecurity 2022-11-18

Cybersecurity crossword puzzle
Across
  1. the protection of internet-connected systems such as hardware, software and data from cyberthreats
  2. engineering the term used for a broad range of malicious activities accomplished through human interactions.
  3. testing an authorized simulated attack performed on a computer system to evaluate its security
  4. category of malicious cyber-attacks that hackers or cybercriminals employ
  5. information such as facts and numbers used to analyze something or make decisions
  6. network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
  1. the measurement and statistical analysis of people's unique physical and behavioral characteristics
  2. when attackers send malicious emails designed to trick people into falling for a scam
  3. allow users to keep their software programs updated without having to check for and install available updates manually
  4. software designed to interfere with a computer's normal functioning

10 Clues: software designed to interfere with a computer's normal functioningcategory of malicious cyber-attacks that hackers or cybercriminals employinformation such as facts and numbers used to analyze something or make decisionswhen attackers send malicious emails designed to trick people into falling for a scam...

CyberSecurity 2023-01-05

CyberSecurity crossword puzzle
Across
  1. Should be constructed of upper and lower case letters, numbers, and special characters
  2. A flawed or weakness in computer system that could be exploited to violate the system's security.
  3. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  4. Hardware or software designed to prevent unauthorized access to or from a private network.
  5. Unauthorized access to a network, information systems, or application.
Down
  1. Verifying identity
  2. Fraudulent email purportedly from a reputable company attempting to get a personal information.
  3. Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
  4. The address of a webpage. Check the validity of it before clicking on it.
  5. A sequence of words or text used to control access to a computer; similar to a password.

10 Clues: Verifying identityUnauthorized access to a network, information systems, or application.The address of a webpage. Check the validity of it before clicking on it.Should be constructed of upper and lower case letters, numbers, and special charactersA sequence of words or text used to control access to a computer; similar to a password....

Cybersecurity 2021-03-08

Cybersecurity crossword puzzle
Across
  1. making a copy of original data
  2. software that causes harm to a computer
  3. a malicious computer program that is hidden in an application
  4. software that tracks the key strokes on the keyboard
  5. defrauding an online account holder of financial information by posing as a legitimate company
Down
  1. software that lets a user obtain covert information on your computer activities
  2. someone who exploits weaknesses in a computer system
  3. Software designed to detect and destroy a virus
  4. a standalone malicious computer program that replicates and spreads on a computer system
  5. software that encodes data and requires a key to decode

10 Clues: making a copy of original datasoftware that causes harm to a computerSoftware designed to detect and destroy a virussomeone who exploits weaknesses in a computer systemsoftware that tracks the key strokes on the keyboardsoftware that encodes data and requires a key to decodea malicious computer program that is hidden in an application...

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. data dater that has personal information such as your maiden name or your date of birth
  2. a person who uses computers to gain unauthorized access to data.
  3. you use it to login to websites and files
  4. Need to be attached to a file
  5. not known or seen or not meant to be known or seen by others.
Down
  1. what you do without getting permission to do it first
  2. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. Opens a back door which allows more malware to be loaded
  4. Uses vulnerabilities to move into your machine.
  5. when somebody sends an email giving you false information to make you give them something

10 Clues: Need to be attached to a fileyou use it to login to websites and filesUses vulnerabilities to move into your machine.what you do without getting permission to do it firstOpens a back door which allows more malware to be loadednot known or seen or not meant to be known or seen by others....

Cybersecurity 2021-02-12

Cybersecurity crossword puzzle
Across
  1. data dater that has personal information such as your maiden name or your date of birth
  2. a person who uses computers to gain unauthorized access to data.
  3. you use it to login to websites and files
  4. Need to be attached to a file
  5. not known or seen or not meant to be known or seen by others.
Down
  1. what you do without getting permission to do it first
  2. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. Opens a back door which allows more malware to be loaded
  4. Uses vulnerabilities to move into your machine.
  5. when somebody sends an email giving you false information to make you give them something

10 Clues: Need to be attached to a fileyou use it to login to websites and filesUses vulnerabilities to move into your machine.what you do without getting permission to do it firstOpens a back door which allows more malware to be loadednot known or seen or not meant to be known or seen by others....

CYBERSECURITY 2021-10-18

CYBERSECURITY crossword puzzle
Across
  1. The short form of malicious software - Malware
  2. A software that covertly monitors your online behavior
  3. A software or hardware device designed to protect your private data
  4. A tool that helps mask to location of the user to guarantee anonymity
  5. The practice of sending fraudulent communications that appear to come from a reputable source
Down
  1. HORSE A piece of malware that often allows a hacker to gain remote access to a computer through a back door
  2. A piece of malicious code that can replicate itself in order to spread the infection to other connected computers
  3. A technology that enables us to access our files through the internet remotely
  4. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
  5. An incident where a hacker gains unauthorized access to a computer or device

10 Clues: The short form of malicious software - MalwareA software that covertly monitors your online behaviorA software or hardware device designed to protect your private dataA tool that helps mask to location of the user to guarantee anonymityAn incident where a hacker gains unauthorized access to a computer or device...

cybersecurity 2023-04-02

cybersecurity crossword puzzle
Across
  1. worm A type of malware that spreads itself by copying itself to other computers on the same network (9 letters): _________ worm
  2. Malicious software that is designed to gain access to a computer system without the user's consent (7 letters): ________
  3. A technique used to trick users into revealing sensitive information, such as passwords or credit card numbers (9 letters): _________ing
  4. A type of attack that involves intercepting and altering communication between two parties (10 letters): _________-in-the-middle attack
  5. of Service A type of attack that attempts to make a computer or network resource unavailable to its intended users (8 letters): _________ of Service
Down
  1. exploit A type of attack that targets vulnerabilities in software or hardware to gain unauthorized access (8 letters): _________ exploit
  2. force A type of attack that involves guessing a password by trying many different combinations (9 letters): _________ force attack
  3. The process of converting data into an unreadable format to prevent unauthorized access (8 letters): _________tion
  4. A security protocol used to encrypt internet traffic (4 letters): ______
  5. A type of authentication that uses physical characteristics, such as fingerprints or facial

10 Clues: A security protocol used to encrypt internet traffic (4 letters): ______A type of authentication that uses physical characteristics, such as fingerprints or facialThe process of converting data into an unreadable format to prevent unauthorized access (8 letters): _________tion...

Cybersecurity 2023-08-23

Cybersecurity crossword puzzle
Across
  1. A string of characters that allows access to a computer system or service.
  2. Before an application goes live, it needs to go through a security ___.
  3. Process of updating to address security vulnerabilities.
  4. If a cyber attack is suspected, it should be reported to the ___ response team.
  5. SIEM tool from IBM.
Down
  1. A type of social engineering attack involving communication that pretends to be legitimate.
  2. We are all cyber ___.
  3. Used in cryptography to prove authenticity of a device, server, or user.
  4. FIM checks OS, database, and application software files to uncover tampering. What is the I in FIM?
  5. Linux distro used for ethical hacking.

10 Clues: SIEM tool from IBM.We are all cyber ___.Linux distro used for ethical hacking.Process of updating to address security vulnerabilities.Before an application goes live, it needs to go through a security ___.Used in cryptography to prove authenticity of a device, server, or user....

Cybersecurity 2023-11-24

Cybersecurity crossword puzzle
Across
  1. when your data is confidential, available and keeps it's integrity
  2. a special way of decrypting a cipher such as pigpen, morse code, or caesar
  3. internet of things
  4. hacker that does bad
  5. words or text that needs a key to decode
  6. hacker that does good but without permission
Down
  1. hiding a file or text in a picture
  2. hacking people without code
  3. authentication that is something you are, know or have
  4. hacker that does good

10 Clues: internet of thingshacker that does badhacker that does goodhacking people without codehiding a file or text in a picturewords or text that needs a key to decodehacker that does good but without permissionauthentication that is something you are, know or havewhen your data is confidential, available and keeps it's integrity...

Cybersecurity 2024-03-20

Cybersecurity crossword puzzle
Across
  1. A scam where a hacker poses as a legitimate business or organization in order to fool the victim into giving them sensitive personal information
  2. shield users against viruses, spyware, trojans, and worms that can damage computer hardware through email or web browsing.
  3. a network security device that monitors traffic to or from your network.
  4. Coding used to protect your information from hackers.
Down
  1. A hacker who is invited to test out computer systems and servers, looking for vulnerabilities "hacker ____ __ "
  2. The process of identifying a user’s identity
  3. malicious attempt to disrupt normal traffic to a web property.
  4. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
  5. a method of connecting a series of computers and devices in a private encrypted network,
  6. A piece of audio or video that has been altered and changed to make it seem authentic or credible.

10 Clues: The process of identifying a user’s identityCoding used to protect your information from hackers.malicious attempt to disrupt normal traffic to a web property.a network security device that monitors traffic to or from your network.a method of connecting a series of computers and devices in a private encrypted network,...

Cybersecurity 2024-05-07

Cybersecurity crossword puzzle
Across
  1. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  2. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  4. Unauthorized access to a network, information systems, or application.
  5. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying dat
Down
  1. The process of converting information or data into a code, especially to prevent unauthorized access.
  2. The process of recognizing a user's identity to ensure that individuals are who they claim to be.
  3. A type of surveillance software that has the capability to record every keystroke made on a computer.
  4. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
  5. A service that allows you to connect to the internet via a server run by a provider, creating a secure connection.

10 Clues: Unauthorized access to a network, information systems, or application.The process of recognizing a user's identity to ensure that individuals are who they claim to be.The process of converting information or data into a code, especially to prevent unauthorized access....

Cybersecurity 2025-02-16

Cybersecurity crossword puzzle
Across
  1. A cybersecurity measure that verifies identity using something you know and something you have.
  2. A cybersecurity practice that scrambles data to protect it.
  3. A fake website designed to steal login credentials.
  4. A type of cyberattack that floods a server with traffic to take it down.
  5. A type of virus that disguises itself as a legitimate program.
Down
  1. The process of confirming that a user is who they claim to be.
  2. A program that secretly records what a user types to steal passwords.
  3. A type of attack where hackers encrypt files and demand payment.
  4. A malicious software that spreads without user action.
  5. Tricking someone into revealing personal information through fake emails.

10 Clues: A fake website designed to steal login credentials.A malicious software that spreads without user action.A cybersecurity practice that scrambles data to protect it.The process of confirming that a user is who they claim to be.A type of virus that disguises itself as a legitimate program....

Cybersecurity 2025-04-08

Cybersecurity crossword puzzle
Across
  1. to decide the quality or importance of something
  2. a residence that uses internet-connected devices
  3. the chance that something will happen
  4. the activity of getting into someone else's computer system without permission
Down
  1. the quality of being vulnerable
  2. a detailed plan for achieving success in situations
  3. a member of a group of people who move from one place to another
  4. a suggestion that something unpleasant or violent will happen
  5. a set of ideas or a plan of what to do in particular situations
  6. the possibility of something bad happening

10 Clues: the quality of being vulnerablethe chance that something will happenthe possibility of something bad happeningto decide the quality or importance of somethinga residence that uses internet-connected devicesa detailed plan for achieving success in situationsa suggestion that something unpleasant or violent will happen...

Cybersecurity 2024-09-16

Cybersecurity crossword puzzle
Across
  1. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
  2. Malware that locks or encrypts data, demanding payment for its release
  3. A person who gains unauthorized access to systems or networks
  4. Process of converting data into a code to prevent unauthorized access
Down
  1. A secret word or phrase used to authenticate access to data or systems
  2. Software that secretly monitors user activity and collects information
  3. Malicious software designed to harm, exploit, or disable computers
  4. A security system that monitors and controls incoming and outgoing network traffic
  5. Software used to detect, prevent, and remove malicious software
  6. A secure network connection that allows users to send and receive data as if they were on a private network

10 Clues: A person who gains unauthorized access to systems or networksSoftware used to detect, prevent, and remove malicious softwareMalicious software designed to harm, exploit, or disable computersProcess of converting data into a code to prevent unauthorized accessA secret word or phrase used to authenticate access to data or systems...

cybersecurity 2025-11-17

cybersecurity crossword puzzle
Across
  1. :malware that intervenes with the aim of harming the computer user
  2. : security method based on identity and access management which requires two forms of identification to access resources and data.
  3. : essential network devices that operate at the data link layer of the OSI model
  4. : a person who is looking for ways to bypass software and hardware protections
  5. : a kind of binder in which we store various files.
  6. : Set of remote servers offering services accessible via the Internet.
Down
  1. : a type of operating system commonly used on computers and laptops
  2. : method used in cryptanalysis to find a password or a key
  3. : an attack that takes advantage of a security vulnerability for which no patch has been implemented
  4. : Software capable of detecting and eliminating computer viruses.

10 Clues: : a kind of binder in which we store various files.: method used in cryptanalysis to find a password or a key: Software capable of detecting and eliminating computer viruses.:malware that intervenes with the aim of harming the computer user: a type of operating system commonly used on computers and laptops...

IT Cybersecurity 2023-03-29

IT Cybersecurity crossword puzzle
Across
  1. Wireless network that requires no authentication.
  2. A method that allows the frequency of the wireless network to be fine-tuned. Each channel is approximately 20 MHz wide.
  3. Wireless communication technology that allows two devices to connect to each other over a short distance.
  4. Combines multiple channels—or lanes—to increase the amount of traffic that a modem's highway can comfortably support.
  5. A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
  6. Wireless authentication method that allows for automatic connection between a device and the wireless access point.
  7. The wireless access point provides access to a wireless network.
  8. An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices.
  9. A communication method that allows two-way communication between two devices within a few centimeters of each other.
  10. Wireless authentication method that uses a passphrase to authenticate users.
  11. A method that combines channels into one to increase bandwidth.
Down
  1. Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest versions in use.
  2. Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
  3. An enhancement that allows multiple antennas to use the same radio frequency.
  4. The expected number of times an event will occur in a given time frame.
  5. Conceals the data's original meaning to prevent it from being known or used.
  6. An Ethernet cable provides the connection between a device connected to the network port and the switch.
  7. The interface between a computer's hardware and software.

18 Clues: Wireless network that requires no authentication.The interface between a computer's hardware and software.A method that combines channels into one to increase bandwidth.The wireless access point provides access to a wireless network.The expected number of times an event will occur in a given time frame....

cybersecurity Crossword 2025-10-14

cybersecurity Crossword crossword puzzle
Across
  1. acts as a security camera which watches for any suspicious activity
  2. ensuring data is accurate, complete, and secure
  3. storing data on a device not connected to a network
  4. used to detect, prevent, and remove any malicious software
  5. transmits data as pulses of light
  6. the proccess of proving your identity and ensuring authorization
  7. a security system which acts as a barrier between private and external ones and monitors incoming and outgoing traffic
Down
  1. ensuring timely access to information
  2. two step process to verifying identity
  3. relies on physical connections, which makes it difficult to hack
  4. ensures that someone can't unsend anything or deny any action online
  5. to reduce the potential harm of a threat
  6. tool which monitora network traffic and blocks off any sort of malicious activity
  7. stands for confidentiality, integrity, and availability and also means keeping data secret and secure
  8. ways to verify a user's identity
  9. the possibility of an unfortunate event occuring
  10. keeping data private and accessible only to those who are authorized

17 Clues: ways to verify a user's identitytransmits data as pulses of lightensuring timely access to informationtwo step process to verifying identityto reduce the potential harm of a threatensuring data is accurate, complete, and securethe possibility of an unfortunate event occuringstoring data on a device not connected to a network...