cybersecurity Crossword Puzzles

Risk Awareness Month 2024 2024-05-14

Risk Awareness Month 2024 crossword puzzle
Across
  1. _________ can make a difference [Word found in EDM on CRO's message]
  2. _________ effort of every level [Word found in EDM on risk governance framework]
  3. Stay alert on possible _________ attempts [Word found in EDM on cybersecurity risks]
  4. We are not immune to _________ risks [Word found in EDM on cybersecurity risks]
  5. _________ form the 1st line of defence in our risk governance framework [Word found in EDM on risk governance framework]
  6. _________ into Critical Installations [Word found in EDM on operational risks]
Down
  1. Risk_________ Month [Word found in EDM on CRO's message]
  2. Flooding at expressways and major _________ [Word found in EDM on operational risks]
  3. Good _________ marksmanship [Word found in EDM on financial and strategic risk]
  4. Use water _________ appliances and fittings [Word found in EDM on financial and strategic risk]

10 Clues: Risk_________ Month [Word found in EDM on CRO's message]_________ can make a difference [Word found in EDM on CRO's message]_________ into Critical Installations [Word found in EDM on operational risks]Good _________ marksmanship [Word found in EDM on financial and strategic risk]...

all about me 2025-04-24

all about me crossword puzzle
Across
  1. dog -1
  2. avalons weight
  3. second favorite color
  4. 4th period
  5. dog 2
  6. cat 1
  7. 1st period
  8. 3rd period
  9. ashers weight
  10. favorite taylor swift song
  11. 6th period
Down
  1. 2nd period
  2. favorite number
  3. ashers favorite snack
  4. dog 2
  5. favorite lizzo song
  6. favorite sport
  7. 5th period
  8. venus' weight
  9. dog 1
  10. favorite color
  11. 7th period
  12. 8th period

23 Clues: dog 2dog 2cat 1dog 1dog -12nd period4th period1st period3rd period5th period7th period8th period6th periodashers weightvenus' weightavalons weightfavorite sportfavorite colorfavorite numberfavorite lizzo songsecond favorite colorashers favorite snackfavorite taylor swift song

Technology 2025-01-08

Technology crossword puzzle
Across
  1. software
  2. to erase
  3. email address
  4. to surf the web
  5. digital digital era
  6. cellphone
  7. computer science
  8. the influences of technology
Down
  1. text message
  2. cybersecurity
  3. to save
  4. AI
  5. social media
  6. transmit

14 Clues: AIto savesoftwareto erasetransmitcellphonetext messagesocial mediacybersecurityemail addressto surf the webcomputer sciencedigital digital erathe influences of technology

What is Cyber Security: Vocabulary Review 2024-09-04

What is Cyber Security: Vocabulary Review crossword puzzle
Across
  1. the practice of isolating resources and controlling access to them through APIs or strict interfaces
  2. a design technique that separates the functionality of a program into independent, interchangeable components.
  3. the process of breaking down complex cybersecurity models into abstract components to simplify and clearly define their security roles.
  4. the practice of protecting data from unauthorized access, disclosure, or alteration
  5. the protection of data from unauthorized modification or deletion.
  6. a cybersecurity technique that protects processes from each other on an operating system.
  7. a design principle that emphasizes the importance of simplicity in cyber security systems and logics
  8. the practice of concealing information within other data, structures, or media to prevent unauthorized access.
  9. the principle of granting users only the minimum level of access or permissions necessary to perform their job functions
  10. the practice of collecting, processing, and storing only the minimum amount of data needed to complete a specific task.
Down
  1. creating secondary safety nets that bolster network security and mitigate single points of failure throughout the network.
  2. the ability to reliably access and use information in a timely manner.
  3. a cybersecurity strategy that uses multiple layers of security measures to protect an organization's assets.
  4. a process that separates data, processes, and administrative tasks into logical groupings, or domains.
  5. the practice of reducing unnecessary complexity and focusing on what's essential
  6. a way of looking at the world from the perspective of a hacker

16 Clues: a way of looking at the world from the perspective of a hackerthe protection of data from unauthorized modification or deletion.the ability to reliably access and use information in a timely manner.the practice of reducing unnecessary complexity and focusing on what's essential...

IEM July SM Crossword 2022-07-26

IEM July SM Crossword crossword puzzle
Across
  1. Each year, over 500,000 ____ are affected by house fires.
  2. ________ is creating a common baseline for cybersecurity performance goals in critical infrastructure.
  3. National Oceanic & Atmospheric Administration released a _______ Community Guide Tool for community planners and decision makers.
  4. On July 17th is also known as what?
Down
  1. People who regularly have ____ interactions with others tend to live longer, boost their mood, and have a sense of purpose.
  2. The US Postal Service processes and delivers 425.3 ______ pieces of mail each day.
  3. NIST is updating its _____ Framework (CSF) to keep pace with the evolving cybersecurity landscape.
  4. The ___ app provides access to weather alerts, disaster resources and preparedness tips.
  5. ______ bring the risk of fires, injuries, and death.
  6. July 25th is National Hire a _____ day.

10 Clues: On July 17th is also known as what?July 25th is National Hire a _____ day.______ bring the risk of fires, injuries, and death.Each year, over 500,000 ____ are affected by house fires.The US Postal Service processes and delivers 425.3 ______ pieces of mail each day....

IEM's December Social Media Crossword Puzzle 2021-12-20

IEM's December Social Media Crossword Puzzle crossword puzzle
Across
  1. United States Space Force
  2. State Association of Counties Annual Meeting
  3. IEMer who moderated a discussion on wildfire resilience & prevention at #NDRC21 (last name)
  4. Follow Cybersecurity and Infrastructure Security Agency’s ______ best practices
  5. IEM’s innovative GIS ______
  6. IEMer who moderated the panel, Best Practice Programs at the State Level (last name)
  7. FEMA’s interactive Program Planning Toolkit
  8. FEMA’s 2022-2026 ____ ____
  9. Our thoughts are with the communities in Kentucky and the Midwest impacted by
Down
  1. AshBritt-IEM Health had the pleasure of meeting First Lady _____
  2. The IEM family would like to wish you and yours
  3. New FEMA Deputy Administrator (last name)
  4. Have you gotten you flu _____?
  5. It’s time to get into the holiday spirit by breaking out your…
  6. New COVID-19 variant

15 Clues: New COVID-19 variantUnited States Space ForceFEMA’s 2022-2026 ____ ____IEM’s innovative GIS ______Have you gotten you flu _____?New FEMA Deputy Administrator (last name)FEMA’s interactive Program Planning ToolkitState Association of Counties Annual MeetingThe IEM family would like to wish you and yours...

Crossword 2025-05-13

Crossword crossword puzzle
Across
  1. kiristysohjelma
  2. haavoittuvuus
  3. henkilöllisyysvarkaus
Down
  1. vaarantunut
  2. hakkerointi
  3. kyberturvallisuus
  4. tietomurto
  5. kiristys
  6. tietueet
  7. tiedot

10 Clues: tiedotkiristystietueettietomurtovaarantunuthakkerointihaavoittuvuuskiristysohjelmakyberturvallisuushenkilöllisyysvarkaus

Cybersecurity Month 2023-07-24

Cybersecurity Month crossword puzzle
Across
  1. (Hint: Make a copy of your important files for safety)
  2. (Hint: Your data is well-protected and out of harm's way)
  3. (Hint: Being informed and cautious about online risks)
  4. (Hint: Keep your personal information confidential)
  5. (Hint: A secret code you create to protect your accounts)
  6. (Hint: Ensure your online accounts and devices are protected)
  7. (Hint: Converting data into secret code to keep it safe)
Down
  1. (Hint: Relating to computers and the internet)
  2. (Hint: Regularly install software improvements for better security)
  3. (Hint: A protective barrier that keeps hackers out)
  4. (Hint: Secure your device with a digital key)
  5. (Hint: Harmful software that can damage your computer)
  6. (Hint: Tricky schemes to deceive you online)
  7. (Hint: A harmful computer program that can spread)
  8. (Hint: Only rely on reputable sources and websites)
  9. (Hint: Deceptive emails or messages trying to steal your info)

16 Clues: (Hint: Tricky schemes to deceive you online)(Hint: Secure your device with a digital key)(Hint: Relating to computers and the internet)(Hint: A harmful computer program that can spread)(Hint: A protective barrier that keeps hackers out)(Hint: Keep your personal information confidential)(Hint: Only rely on reputable sources and websites)...

Cybersecurity Vocabulary 2023-01-25

Cybersecurity Vocabulary crossword puzzle
Across
  1. A bug where user input is passed as the format argument to printf
  2. This is when an application reveals sensitive data
  3. determines strength and validity of passwords.
  4. A secret entry point into a program.
  5. can undermine the controls that secure the data of millions
  6. The result of a mismatch between arithmetic and mathematical arithmetic
  7. The web server account is incorrectly given access to the system files
  8. Is the manipulation of people to divulge information or performing actions.
Down
  1. Somebody who gains illegal access to a phones system.
  2. An attempt to crack a password by using every combination of letters and digits until a password is cracked.
  3. bypassing standard authentication or encryption in a computer.
  4. Mother Nature's actions
  5. A trapdoor in software that allows easy maintenance
  6. A subset of the Trojan horse malware.
  7. A system used to gain authentications by cracking a password hash.
  8. when a hacker exploits the vulnerability before its fixed.

16 Clues: Mother Nature's actionsA secret entry point into a program.A subset of the Trojan horse malware.determines strength and validity of passwords.This is when an application reveals sensitive dataA trapdoor in software that allows easy maintenanceSomebody who gains illegal access to a phones system....

CyberSecurity Crossword 2023-08-07

CyberSecurity Crossword crossword puzzle
Across
  1. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction
  2. Should be constructed of upper and lower case letters, numbers, and special characters
  3. verifying identity
  4. a type of software that is designed to display advertisements on a user's computer or device.
  5. a type of software or hardware device that is designed to capture and record keystrokes made on a computer or other device
  6. The “I” in the C-I-A Triad; protection from unauthorized changes
  7. The “A” in the C-I-A Triad. It ensures authorized users have access
  8. A fraudulent email purportedly from a reputable company attempting to get personal information
Down
  1. Threatening behavior facilitated through electronic means such as texting
  2. A type of malicious software designed to block access to a computer system until a sum of money is paid
  3. weakness in a computer system that could be exploited to violate the system’s security
  4. Software that scans a device or a network to detect security threats, alert the user, and neutralize malicious code
  5. Facebook, Twitter, Instagram, etc. (Two words)
  6. The process of taking plain text and scrambling it into an unreadable format
  7. the act of secretly listening to or monitoring the conversations or communications of others without their knowledge or consent
  8. enables a user to connect securely from outside to their business network, even though they are not located on their office premises

16 Clues: verifying identityFacebook, Twitter, Instagram, etc. (Two words)The “I” in the C-I-A Triad; protection from unauthorized changesThe “A” in the C-I-A Triad. It ensures authorized users have accessThreatening behavior facilitated through electronic means such as textingThe process of taking plain text and scrambling it into an unreadable format...

The Need for a Stronger Indian Cyber Law: Lessons from Global Cybersecurity Frameworks 2025-04-07

The Need for a Stronger Indian Cyber Law: Lessons from Global Cybersecurity Frameworks crossword puzzle
Across
  1. China mandates data ___ for sectors like finance and telecom
  2. China's national priority in its 2017 Cybersecurity Law
  3. CCPA's core feature: consumers can ___ of data sales
  4. IT Act clause on compensation for negligent data handling
  5. India's primary cybersecurity law (enacted in 2000)
  6. GDPR fines can hit 4% of global ___ (hint: revenue)
  7. Indian ID system hit by major 2018 data breach
  8. Urgent need for India's outdated IT Act
Down
  1. GDPR's "___ by Design" mandates proactive data protection
  2. Attack type that crippled AIIMS in 2023
  3. GDPR right allowing users to delete personal data
  4. California law allowing consumers to sue over data breaches
  5. Landmark EU regulation with "Right to be Forgotten"
  6. GDPR-required role: Data Protection ___

14 Clues: Attack type that crippled AIIMS in 2023GDPR-required role: Data Protection ___Urgent need for India's outdated IT ActIndian ID system hit by major 2018 data breachGDPR right allowing users to delete personal dataLandmark EU regulation with "Right to be Forgotten"India's primary cybersecurity law (enacted in 2000)...

Cybersecurity Vocab 2021-09-28

Cybersecurity Vocab crossword puzzle
Across
  1. Secret unknown access point into a system
  2. Flaw or potential for harm
  3. Virus that infects a computer before the operating system loads
  4. Following the rules or standards that have been established
  5. Software that is embedded in hardware
  6. Computer code intentially written to cause some form of harm
  7. Using a lie or scam to obtain private information
  8. Physical token inserted into a computer's usb port
Down
  1. Measurement and analysis of a biological feature
  2. Condition of being pricate or secret
  3. Something that takes a vulnerability to a level where it can be exploited
  4. Encrypts data do user connot access it intil a fee is paid to hacker only
  5. Acions of ,alicous code
  6. Proccess by which something becomes harder it is made harder to hack
  7. State of being complete or uncorrupted
  8. Technology that thracks a users' keystokes on the keyboard

16 Clues: Acions of ,alicous codeFlaw or potential for harmCondition of being pricate or secretSoftware that is embedded in hardwareState of being complete or uncorruptedSecret unknown access point into a systemMeasurement and analysis of a biological featureUsing a lie or scam to obtain private informationPhysical token inserted into a computer's usb port...

cybersecurity awareness 2017-09-28

cybersecurity awareness crossword puzzle
Across
  1. is a string of characters used for authenticating a user on acomputer system
  2. A small, portable flash memory card that plugs into a computer s USB port and functions as a portable hard drive.
  3. is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  4. refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
  5. A criminal act that involves malicious threats intended to cause injury to an individual to compel him or her to do an act against his or her will.
  6. a local or restricted communications network, especially a private network created using World Wide Web software.
  7. an electronic device for storing and processing data
  8. is a type of malware that is often disguised as legitimate software
Down
  1. is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner's private information
  2. is a standalone malware computerprogram that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the targetcomputer to access it.
  3. is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.Feb
  4. is a form of malware in which rogue software code effectively holds a user's computer hostage until a "ransom" fee is paid.
  5. The translation of data into a secret code.The most effective way to achieve data security.
  6. The global communication network that allows almost allcomputers worldwide to connect and exchange information.
  7. the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.
  8. software that is intended to damage or disable computers and computer systems.

16 Clues: an electronic device for storing and processing datais a type of malware that is often disguised as legitimate softwareis a string of characters used for authenticating a user on acomputer systemsoftware that is intended to damage or disable computers and computer systems....

Cybersecurity Crossword 2022-09-07

Cybersecurity Crossword crossword puzzle
Across
  1. umbrella term for malicious software
  2. a software tool used to take advantage of a software or hardware vulnerabilities
  3. self replicating malware that does not require human interaction
  4. software that lets you browse the internet
  5. small files that track browser usage and preferences
  6. email based scamming
  7. software that scans a device to detect threats
Down
  1. day of the week most vendors release patches
  2. malware that encrypts files and demands payment
  3. software that secretly captures info as it is typed
  4. text message based scamming
  5. another word for a software update
  6. copy of computer data for data loss prevention
  7. phone based scamming
  8. any kind of unwanted, unsolicited digital communication
  9. filters unwanted traffic on a network

16 Clues: phone based scammingemail based scammingtext message based scamminganother word for a software updateumbrella term for malicious softwarefilters unwanted traffic on a networksoftware that lets you browse the internetday of the week most vendors release patchescopy of computer data for data loss prevention...

Cybersecurity Puzzle 2025-09-26

Cybersecurity Puzzle crossword puzzle
Across
  1. Incidents where confidential information is stolen, leaked, or disclosed are known as what?
  2. A strong culture equals strong _____.
  3. This security feature requires at least two forms of authentication.
  4. The concept of human firewalls is built on this critical aspect of security.
  5. Attackers using manipulative techniques to scam people is known as what?
  6. Organizational ____ are designed to keep people, data, and devices safe.
  7. What is one of the leading causes of security incidents?
Down
  1. This type of fraud occurs when a scammer uses stolen information to open credit cards in the victim’s name.
  2. What is the top attack method for cybercriminals?
  3. This type of malware encrypts data to prevent access to valuable resources.
  4. The umbrella term covering any form of malicious code that alters the functionality of computers and smart devices.
  5. In recent years, attackers have embraced the convenience of these.
  6. While online threats get the most attention in the world of security, these threats pose just as much risk.
  7. People are the last line of ____.
  8. It is imperative to ensure accounts are protected with these.
  9. If you encounter a phishing attack, what should you do immediately?

16 Clues: People are the last line of ____.A strong culture equals strong _____.What is the top attack method for cybercriminals?What is one of the leading causes of security incidents?It is imperative to ensure accounts are protected with these.In recent years, attackers have embraced the convenience of these....

Disruptive Technology 2025-07-23

Disruptive Technology crossword puzzle
Across
  1. Authentication
  2. Immune System
  3. Liability Insurance
  4. Screening, Quantum Computing
  5. Reality
Down
  1. Mesh
  2. Automation
  3. technology
  4. Intelligence
  5. cloud
  6. Intelligence
  7. Detection

12 Clues: MeshcloudRealityDetectionAutomationtechnologyIntelligenceIntelligenceImmune SystemAuthenticationLiability InsuranceScreening, Quantum Computing

test 2022-10-25

test crossword puzzle
Across
  1. djfglijd hfgikjf
  2. fdgsdgsd
  3. gfdsgds
Down
  1. gdfgfs
  2. sgfdsgsdrg
  3. gfdsgdsg
  4. gfdsgd
  5. fdgdfsgfds
  6. gdsgsdgfd
  7. gdfsgds

10 Clues: gdfgfsgfdsgdgdfsgdsgfdsgdsgfdsgdsgfdgsdgsdgdsgsdgfdsgfdsgsdrgfdgdfsgfdsdjfglijd hfgikjf

Digital Literacy 2025-07-03

Digital Literacy crossword puzzle
Across
  1. ที่เก็บข้อมูลออนไลน์
  2. ประมวลผลข้อมูลใกล้แหล่งใช้งาน
  3. เครือข่ายไร้สายรุ่นที่ห้า
  4. การวิเคราะห์ข้อมูลเพื่อค้นหา insight
  5. อุปกรณ์อัจฉริยะที่เชื่อมต่ออินเทอร์เน็ต
Down
  1. ป้องกันภัยคุกคามทางไซเบอร์
  2. เครื่องจักรกลอัตโนมัติทุกชนิดที่ออกแบบให้สามารถทำงานแทนมนุษย์
  3. ข้อมูลจำนวนมหาศาล
  4. สมองกลที่เลียนแบบความคิดมนุษย์
  5. เครือข่ายที่ควบคุมตัวเองได้

10 Clues: ข้อมูลจำนวนมหาศาลที่เก็บข้อมูลออนไลน์เครือข่ายไร้สายรุ่นที่ห้าป้องกันภัยคุกคามทางไซเบอร์เครือข่ายที่ควบคุมตัวเองได้ประมวลผลข้อมูลใกล้แหล่งใช้งานสมองกลที่เลียนแบบความคิดมนุษย์การวิเคราะห์ข้อมูลเพื่อค้นหา insightอุปกรณ์อัจฉริยะที่เชื่อมต่ออินเทอร์เน็ตเครื่องจักรกลอัตโนมัติทุกชนิดที่ออกแบบให้สามารถทำงานแทนมนุษย์

Management Modules 2025-04-03

Management Modules crossword puzzle
Across
  1. Widely referenced cybersecurity management model originally published as British Standard BS7799.
  2. Management Model that provides advice about the implementation of controls and objectives for cybersecurity
  3. Organization that created COBIT
Down
  1. Cybersecurity framework series
  2. Collection of methods and practices for managing the development and operation of IT infrastructures.
  3. Framework for improving critical infrastructure security support for cybersecurity event recovery

6 Clues: Cybersecurity framework seriesOrganization that created COBITWidely referenced cybersecurity management model originally published as British Standard BS7799.Framework for improving critical infrastructure security support for cybersecurity event recovery...

NVH September Trivia 2022-08-24

NVH September Trivia crossword puzzle
Across
  1. Ext. 7060
  2. Policy keeper
  3. NVH Lab blood supplier
  4. Personal ______ Equipment
  5. Cybersecurity Training
  6. Code Call for Combative Person
  7. Coffee Shop
  8. Extended Care "Family"
  9. John Caitlynn & Liz Therapy
Down
  1. TFMC ARNP
  2. Zzz Service
  3. payroll software
  4. BOC Meeting Day
  5. Purchaser
  6. Resuscitation Quality Improvement
  7. Drs. Dhillon & Jex Service
  8. The next EHR
  9. New mammo system

18 Clues: TFMC ARNPExt. 7060PurchaserZzz ServiceCoffee ShopThe next EHRPolicy keeperBOC Meeting Daypayroll softwareNew mammo systemNVH Lab blood supplierCybersecurity TrainingExtended Care "Family"Personal ______ EquipmentDrs. Dhillon & Jex ServiceJohn Caitlynn & Liz TherapyCode Call for Combative PersonResuscitation Quality Improvement

Panther Cross Word 2022-04-29

Panther Cross Word crossword puzzle
Across
  1. The largest End Point Detection vendor on the market
  2. The fastest growing area to store company data
  3. A computer or system that mimics a target that a hacker would go after. It is used as a way to collect data on different attack patterns
  4. The word used to describe the adding of additional contextual data to alerts in order to cut down on noise. Greynoise helped us with this.
  5. The acronym used to describe a fully outsourced solution for threat detection
  6. A 3rd party vendor who acts as a middleman to distribute software
  7. Refers to data exiting a network
  8. Refers to data entering into a network
  9. A receipt of any action performed within a system
  10. A compliance-driven evaluation that reveals where you're susceptible to an attack
  11. The acronym used to describe a solution type that detections user behavior for anything malicious
Down
  1. This compliance is imposed on companies that do business in within the EMEA
  2. The most utilized cybersecurity framework in the world
  3. A phrase coined by Panther to describe one of our biggest differentiators
  4. This compliance is imposed on companies that collect health care data
  5. The practice of protecting systems, networks, and programs from cyber attacks
  6. The largest SIEM vendor in the world
  7. This compliance is imposed on companies that collect credit card data
  8. A solution that aggregates logs
  9. Acronym that describes Endpoint detection combined with Threat Detection
  10. This compliance is imposed on companies that collect other companies information
  11. Refers to different events being interconnected that paint a conclusion
  12. A 3rd party vendor who you can outsource your cybersecurity to
  13. This is typically the gatekeeper for your network and the first line of cyber defense

24 Clues: A solution that aggregates logsRefers to data exiting a networkThe largest SIEM vendor in the worldRefers to data entering into a networkThe fastest growing area to store company dataA receipt of any action performed within a systemThe largest End Point Detection vendor on the marketThe most utilized cybersecurity framework in the world...

청당 빠바 구문독해 6-22 2023-01-18

청당 빠바 구문독해 6-22 crossword puzzle
Across
  1. 실직한, 실업자인
  2. (자동차 앞창에 있는)유리 닦개(와이퍼)
  3. 공동의
  4. 흔히, 보통
  5. (범죄, 사고 등) 사건
  6. 입증하다
  7. 사이버 보안
Down
  1. 자동차의
  2. (연료, 에너지, 시간을)소모하다
  3. 절도
  4. 자동차
  5. 대리점
  6. 혜택, 이득; 득을 보다
  7. 임차하다, 빌리다
  8. 취약한, 연약한
  9. 조정[조절]하다; 적응하다

16 Clues: 절도자동차대리점공동의자동차의입증하다흔히, 보통사이버 보안취약한, 연약한실직한, 실업자인임차하다, 빌리다혜택, 이득; 득을 보다(범죄, 사고 등) 사건조정[조절]하다; 적응하다(연료, 에너지, 시간을)소모하다(자동차 앞창에 있는)유리 닦개(와이퍼)

TECHNOLOGY 2024-02-14

TECHNOLOGY crossword puzzle
Across
  1. ACHEINM
  2. CITYSECUREBYR
  3. BISTROCOO
  4. Rivaltu LAYTIRE
  5. GUMCONPIT
  6. NONECOGYNAHTOL
  7. TINRENET
Down
  1. CIANEDSETCA
  2. RATTAILIFIC GENTLENICELIT
  3. CRYCUERAPTORNY

10 Clues: ACHEINMTINRENETBISTROCOOGUMCONPITCIANEDSETCACITYSECUREBYRCRYCUERAPTORNYNONECOGYNAHTOLRivaltu LAYTIRERATTAILIFIC GENTLENICELIT

hahahha 2024-08-24

hahahha crossword puzzle
Across
  1. TWINS
  2. SHOP
  3. network
  4. Banking
  5. 1.0
  6. MESH
Down
  1. LEARNING
  2. Betners-Lee
  3. TAIL
  4. WEB
  5. of Things
  6. 3.0

12 Clues: WEB1.03.0TAILSHOPMESHTWINSnetworkBankingLEARNINGof ThingsBetners-Lee

Cybersecurity Awareness 2025-01-16

Cybersecurity Awareness crossword puzzle
Across
  1. The opposite of risky.
  2. A secret used to unlock your account.
  3. When sensitive info gets exposed.
  4. Software that fights against malware.
  5. A common way hackers send fake messages.
  6. A virtual barrier that blocks bad stuff online.
  7. What you shouldn't do without checking the link first.
  8. To scramble data so only the right person can read it.
Down
  1. The prefix for security in the digital world.
  2. What keeps your software secure and current.
  3. A fake email trying to steal your information.
  4. Unwanted emails clogging your inbox.
  5. What you use to protect your phone or laptop screen.
  6. A copy of your files in case something goes wrong.
  7. Something you shouldn't give to suspicious websites.
  8. A second step to prove it'd really you.

16 Clues: The opposite of risky.When sensitive info gets exposed.Unwanted emails clogging your inbox.A secret used to unlock your account.Software that fights against malware.A second step to prove it'd really you.A common way hackers send fake messages.What keeps your software secure and current.The prefix for security in the digital world....

Legislation 2025-08-12

Legislation crossword puzzle
Across
  1. This Act covers personal data being used criminally
  2. This covers development and deployment of AI
  3. The rules that cover sharing information
  4. Regulatory framework to protect financial institutions
  5. Regulates the network security
Down
  1. A regulation aimed at strengthening cybersecurity
  2. What is the acronym for this that protects personal data
  3. To improve cybersecurity of products and services
  4. This law about transmitting automated marketing

9 Clues: Regulates the network securityThe rules that cover sharing informationThis covers development and deployment of AIThis law about transmitting automated marketingA regulation aimed at strengthening cybersecurityTo improve cybersecurity of products and servicesThis Act covers personal data being used criminally...

Dbl AA November 16! 2022-11-16

Dbl AA November 16! crossword puzzle
Across
  1. Favorite TV
  2. Favorite outdoor hobby
  3. Older vehicle
  4. Zoom zoom
  5. Grodhaus Family game
  6. Cute youngster
  7. Sisters of mom
  8. Grandma appreciated Aaron’s
  9. Walking with cat in
  10. Fun with Lizzy’s hair
Down
  1. Love spark established
  2. Kit for picking
  3. Impressive talent
  4. special older woman
  5. Cute girl
  6. Favorite indoor hobby
  7. Work interest
  8. Teal Team
  9. Quail Hollow
  10. Your mama

20 Clues: Zoom zoomCute girlTeal TeamYour mamaFavorite TVQuail HollowOlder vehicleWork interestCute youngsterSisters of momKit for pickingImpressive talentspecial older womanWalking with cat inGrodhaus Family gameFavorite indoor hobbyFun with Lizzy’s hairLove spark establishedFavorite outdoor hobbyGrandma appreciated Aaron’s

Cyber Security 2023-09-08

Cyber Security crossword puzzle
Across
  1. data encryption ransom
  2. compromised computer network
  3. psychological manipulation
  4. system manager
  5. identifying threats
  6. unwanted advertisements
  7. multiple verification layers
  8. secret access keys
  9. protecting digital systems.
  10. interconnected devices
Down
  1. stolen identity
  2. data encrypt
  3. secure network connection
  4. wireless technology
  5. unauthorized access point
  6. internet address
  7. malicious digital actions
  8. digital information
  9. malicious software
  10. computer programs

20 Clues: data encryptsystem managerstolen identityinternet addresscomputer programsmalicious softwaresecret access keyswireless technologyidentifying threatsdigital informationdata encryption ransominterconnected devicesunwanted advertisementssecure network connectionunauthorized access pointmalicious digital actionspsychological manipulation...

Cybersecurity 2024-09-05

Cybersecurity crossword puzzle
Across
  1. Malicious act that seeks to damage data, steal data, or disrupt digital life in general
  2. Scam by text
  3. Helps you protect your accounts
  4. A software designed to prevent, detect, and remove viruses and malware from computers, networks, and devices.
Down
  1. Someone that tries to gain unauthorized access to data
  2. Scam by email
  3. Intrusive software developed by hackers to steal data and damage or destroy computers and computer systems
  4. Scam by phone
  5. Cybercrime activity that takes place over the internet or on email

9 Clues: Scam by textScam by emailScam by phoneHelps you protect your accountsSomeone that tries to gain unauthorized access to dataCybercrime activity that takes place over the internet or on emailMalicious act that seeks to damage data, steal data, or disrupt digital life in general...

Cybersecurity 2023-03-08

Cybersecurity crossword puzzle
Across
  1. the use of a computer to gain unauthorized access to data in a system.
  2. The state of being protected against the criminal or unauthorized use of electronic data.
  3. a person who uses computers to gain unauthorized access to data.
  4. Tells a computer what actions to take
  5. what movie character was on the signs?
Down
  1. Where did this story take place?
  2. A broad range of information, or an opinion, that could identify an individual.
  3. breach results in information being accessed without authorization.
  4. What was hacked in this story?
  5. A part of a computer system or network which is designed to block unauthorized access

10 Clues: What was hacked in this story?Where did this story take place?Tells a computer what actions to takewhat movie character was on the signs?a person who uses computers to gain unauthorized access to data.breach results in information being accessed without authorization.the use of a computer to gain unauthorized access to data in a system....

Cybersecurity 2022-05-16

Cybersecurity crossword puzzle
Across
  1. the location a hacker typically want to get access to
  2. An activity which is carried out over or through the Internet.
  3. a method to get sensitive data
  4. when you create something according to a plan
  5. target of an SQL-Injection
  6. the most famous programming language for web applications
Down
  1. a famous whistleblower
  2. the good kind of hacker
  3. an activity which is carried out over or through the Internet.
  4. a word which describes a relative geographic location

10 Clues: a famous whistleblowerthe good kind of hackertarget of an SQL-Injectiona method to get sensitive datawhen you create something according to a planthe location a hacker typically want to get access toa word which describes a relative geographic locationthe most famous programming language for web applications...

Cybersecurity 2025-03-09

Cybersecurity crossword puzzle
Across
  1. A type of link or file that could be dangerous and may infect your device
  2. A process to help ensure your online activity is safe and private
  3. What you should create for each online account to make it harder to guess
  4. This type of attack often involves tricking users into revealing sensitive info by pretending to be a trustworthy entity
Down
  1. This term refers to the act of protecting your data by limiting access to authorized users
  2. The action of regularly installing updates to fix security vulnerabilities
  3. The type of software that protects your devices from harmful programs
  4. The authentication method of verifying your identity with a second factor like a code sent to your phone
  5. A term for unsolicited or harmful emails that try to trick you into giving personal info

9 Clues: A process to help ensure your online activity is safe and privateThe type of software that protects your devices from harmful programsA type of link or file that could be dangerous and may infect your deviceWhat you should create for each online account to make it harder to guess...

Cybersecurity 2024-11-04

Cybersecurity crossword puzzle
Across
  1. Security system blocking unauthorized access.
  2. Protection against online threats and attacks.
  3. A copy or imitation intended to deceive.
  4. Scam to trick people into sharing private info.
  5. To erase or remove completely.
  6. Wireless system connecting devices to the internet
Down
  1. Harmful software that damages or disrupts.
  2. Unique number identifying a device on the internet.
  3. Someone who breaks into computer systems.

9 Clues: To erase or remove completely.A copy or imitation intended to deceive.Someone who breaks into computer systems.Harmful software that damages or disrupts.Security system blocking unauthorized access.Protection against online threats and attacks.Scam to trick people into sharing private info.Wireless system connecting devices to the internet...

Cybersecurity 2024-03-13

Cybersecurity crossword puzzle
Across
  1. A computer attack aimed at making a service unavailable.
  2. A brand that makes cybersecurity devices especially for companies.
  3. A program/device that protects a network.
  4. A technique for protecting data by transforming it irreversibly.
  5. A technique used by fraudsters to obtain personal information with the aim of committing identity theft.
  6. A network of computers infected by malware that are under the control of a single attacking party.
Down
  1. A technique of symmetric encryption.
  2. A hashing algorithm which is the most used in secret-keys transfert.
  3. A known certfication authority who offers free certificates.

9 Clues: A technique of symmetric encryption.A program/device that protects a network.A computer attack aimed at making a service unavailable.A known certfication authority who offers free certificates.A technique for protecting data by transforming it irreversibly.A brand that makes cybersecurity devices especially for companies....

Cybersecurity 2024-02-21

Cybersecurity crossword puzzle
Across
  1. Find hidden messages or attacks within innocent-looking files.
  2. Malware that collects information about you
  3. A wall or partition designed to inhibit or prevent the spread of fire.
  4. Manifestation signifying hostile intention, the plan to cause harm.
  5. The practice of sending emails to reveal personal information, such as passwords and credit card numbers.
Down
  1. Malware that blocks access and demands ransom
  2. A cyber security professional who deal with testing vulnerabilities to help owners of application or website
  3. A type of malware that is often masked as genuine software
  4. Improve or correct by inserting a patch. It's a synonym of update

9 Clues: Malware that collects information about youMalware that blocks access and demands ransomA type of malware that is often masked as genuine softwareFind hidden messages or attacks within innocent-looking files.Improve or correct by inserting a patch. It's a synonym of updateManifestation signifying hostile intention, the plan to cause harm....

CS240-1 Students 2024-09-01

CS240-1 Students crossword puzzle
Across
  1. Ran a sub 20minute 5k
  2. Lived in both Brazil & Spain.
  3. CIS Sandbox Tutor
  4. Wants to be a forensic accountant
  5. I desire to help people professionally and personally
  6. I'm definitely putting Boston in my rear view mirror someday
  7. I'm good at analyzing markets and equities on a technical level.
  8. In high school, my graduating class only had 100 kids.
  9. Really good at First Person Shooter games
  10. My ideal job would be in gaming
  11. I love all things cybersecurity related
  12. My brain absorbs information like a sponge
  13. I can improvise to solve problems creatively and efficiently
Down
  1. I created a board game
  2. I don't procrastinate
  3. I like my role as a tutor.
  4. Pursuing CPA after graduation
  5. I will someday have my own Cybersecurity firm
  6. Loves a challenge and does not settle for things that are easy.
  7. I'm from Georgia (not the one in the US)
  8. I am a really fast learner.
  9. Grew up on Cape Cod, MA
  10. Really good at time management
  11. I used to be a procrastinator
  12. Lacrosse Team Member
  13. I'm trying to improve my golf game.

26 Clues: CIS Sandbox TutorLacrosse Team MemberI don't procrastinateRan a sub 20minute 5kI created a board gameGrew up on Cape Cod, MAI like my role as a tutor.I am a really fast learner.Lived in both Brazil & Spain.Pursuing CPA after graduationI used to be a procrastinatorReally good at time managementMy ideal job would be in gaming...

CYBERSECURITY DECEMBER 2, 2023 2023-12-03

CYBERSECURITY DECEMBER 2, 2023 crossword puzzle
Across
  1. A deceptive practice where a person or program successfully masquerades as another.
  2. A field within cybersecurity that uses investigative techniques to identify and store evidence from a computer device (2 words).
  3. Describes data that requires power to maintain its contents.
  4. a fundamental unit of data in computer networking and data communication.
  5. An authentication method that requires the user to provide two or more verification factors to gain access to a resource. MFA
  6. an advanced security technology that builds upon the functionality of an IDS. It not only detects suspicious or malicious activities but also takes proactive measures to block or mitigate them in real-time.
  7. A documented, structured approach for handling security breaches, and cyber threats. (3 words)
  8. A technology that allows you to create a secure connection over a less secure network, such as the internet. It can also mask your connection origin, making it appear that you are connecting via a different location than where you physically are located.
  9. _______ Modeling, Risk Modeling, or Risk Analysis is a systematic way of thinking where a system may be vulnerable in order to best defend against possible attacks.
  10. A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system.
  11. A phishing attack transmitted by SMS (text) message.
  12. The world's most famous hacker.
  13. From Day 1, cybersecurity is built upon a foundation of three principles – private data is kept private.
  14. Model that describes how data is transmitted through a network.
  15. a decoy system or resource set up to monitor and analyze the behavior of attackers.
  16. This cipher was the first documented form of encryption and involves shifting each letter of a message by 3.
  17. A public-key cryptography algorithm
Down
  1. Relies on human interaction and often involves tricking people into breaking normal security procedures.
  2. This color team is made up of offensive security experts who try to (ethically) attack an organization’s cybersecurity defenses.
  3. An attack in which an attacker injects malicious executable scripts into the code of a trusted application or website.
  4. In this kind of cipher, both the encryption and decryption process use the same key,
  5. From Day 1,cybersecurity is built upon a foundation of three principles. This is one of them which means that data can be used by any authorized parties.
  6. This term (2 words) refers to limiting who (subjects) can read or write which resources (objects: e.g. files)
  7. A SQL_______ vulnerability arises when the original SQL query can be altered to form an altogether different query.
  8. From Day 1, cybersecurity is built upon a foundation of three principles. This is one of them which means that data is modified only by authorized parties.
  9. Software tool that allows users to capture and inspect data packets on a computer network.
  10. This software examines requests to access the network and determines if it should pass through.
  11. A number used to identify specific services or processes running on a computer or network device.

28 Clues: The world's most famous hacker.A public-key cryptography algorithmA phishing attack transmitted by SMS (text) message.Describes data that requires power to maintain its contents.Model that describes how data is transmitted through a network.a fundamental unit of data in computer networking and data communication....

Cybersecurity 2021-08-03

Cybersecurity crossword puzzle
Across
  1. provides the validation of a message's origin.
  2. Ensures that data is not modified or tampered with.
  3. The degree of protection against danger, damage, loss, and criminal activity.
  4. Ensures that a system is up so that data is available when needed.
  5. Anything that has the potential to cause the loss of an asset.
Down
  1. An act, procedure, or piece of software that takes advantage of a vulnerability to carry out an attack.
  2. Ensures that data is not disclosed to unintended persons.
  3. An opening or weakness in the system.
  4. agent The person or entity that attempt or carries out a threat.
  5. Something that has value to an individual or an organization.

10 Clues: An opening or weakness in the system.provides the validation of a message's origin.Ensures that data is not modified or tampered with.Ensures that data is not disclosed to unintended persons.Something that has value to an individual or an organization.Anything that has the potential to cause the loss of an asset....

Cybersecurity 2024-04-22

Cybersecurity crossword puzzle
Across
  1. A good practice for authorised users is to use unique ________ passwords
  2. ____________ type of cyber attack aims to steal data from the computers
  3. cybersecurity aims to secure _______ components from attackers
  4. __________ is a person who attempts to get unauthorised access to the computer system
  5. __________ is a virtual wall between the protected computer and the internet
Down
  1. __________ are dummy computers that attract hackers to keep the remaining computers safe
  2. _________ softwares must be used to protect computers against cyberattacks
  3. Man in the __________ is a type of cyberattack where the communication line is intercepted
  4. common type of attack which includes trojans and adwares

9 Clues: common type of attack which includes trojans and adwarescybersecurity aims to secure _______ components from attackers____________ type of cyber attack aims to steal data from the computersA good practice for authorised users is to use unique ________ passwords_________ softwares must be used to protect computers against cyberattacks...

Cybersecurity 2024-10-10

Cybersecurity crossword puzzle
Across
  1. Protecting data by scrambling it mathematically
  2. Data which requires special limited access that can cause harm if disclosed
  3. Sending fraudulent communications to take data or trick others into performing certain actions, usually by text or email
  4. A piece of code that adversely affects computers; typically to corrupt the system, steal data, or gain access
Down
  1. Network security device that monitors and filters incoming and outgoing network traffic
  2. Software designed to detect and destroy computer viruses
  3. Data that pertains directly to the company and has restricted access
  4. A person who uses computers to gain unauthorized access to data
  5. Data that is freely accessible to all

9 Clues: Data that is freely accessible to allProtecting data by scrambling it mathematicallySoftware designed to detect and destroy computer virusesA person who uses computers to gain unauthorized access to dataData that pertains directly to the company and has restricted accessData which requires special limited access that can cause harm if disclosed...

Cybersecurity Crossword 2021-08-05

Cybersecurity Crossword crossword puzzle
Across
  1. is a malware aimed to corrupt or modify data on one computer before spreading to others.
  2. a sequence of letters, characters, and numbers used for authentication
  3. is a technique used in order to manipulate and deceive people into handing over sensitive information.
  4. is a network device that determines what information is able to enter a system based on the rules in place.
  5. a technique to obtain sensitive information typically through text messaging
  6. is the process of encoding data so that it can only be accessed by its intended recipient.
  7. the state of being exposed to the possibility of being attacked
  8. is a method of attacking a computer by alternating a program while making it appear to function normally
Down
  1. are the measures taken in order to protect systems and their data.
  2. is a network that uses encryption in order to in order to maintain privacy.
  3. a technique to obtain sensitive information typically through email.
  4. a form of malware that takes control of data and holds it hostage until a ransom is paid.
  5. is short for malicious software, and is any intrusive software developed to wreak havoc on systems.
  6. a sequence of words used for authentication.
  7. is the act of confirmation through evidence of somethings validity.

15 Clues: a sequence of words used for authentication.the state of being exposed to the possibility of being attackedare the measures taken in order to protect systems and their data.is the act of confirmation through evidence of somethings validity.a technique to obtain sensitive information typically through email....

Cybersecurity awareness 2023-06-13

Cybersecurity awareness crossword puzzle
Across
  1. 9
  2. E
  3. A
  4. 2
  5. C
  6. 1 across
  7. 8
Down
  1. B
  2. 4
  3. D
  4. 5
  5. 7
  6. 6
  7. 3
  8. 1 down

15 Clues: 9B4ED576A32C81 down1 across

Healthcare Cybersecurity 2024-04-10

Healthcare Cybersecurity crossword puzzle
Across
  1. Helps pay for your healthcare, often checked online
  2. Law that protects your private health information
  3. Blood or urine check ordered by a doctor
  4. Seeing a doctor using video or phone
  5. Message that tells you about an upcoming appointment
  6. Website where patients can see their health records
Down
  1. Booking a doctor’s appointment online
  2. Important health signs like heart rate and blood pressure
  3. Person who often uses computers to track patient care
  4. Uses technology to review test results and notes
  5. Protecting health information from hackers
  6. Place that fills prescriptions, often linked to your records
  7. Being able to see your own medical records
  8. Digital version of a patient’s medical chart
  9. Tool on your phone that helps manage health

15 Clues: Seeing a doctor using video or phoneBooking a doctor’s appointment onlineBlood or urine check ordered by a doctorProtecting health information from hackersBeing able to see your own medical recordsTool on your phone that helps manage healthDigital version of a patient’s medical chartUses technology to review test results and notes...

Cybersecurity 2022-04-05

Cybersecurity crossword puzzle
Across
  1. A type of malware disguised as bona fide software, applications, or files to deceive users into downloading it and, unknowingly, granting control of their devices.
  2. A type of malware that infiltrates devices without the owner’s knowledge. This is often for the purpose of spying on internet activity, tracking log in and password information, or collecting sensitive information that can be used for fraudulent purposes.
  3. A type of malware that comes from ads on legitimate websites. You can fall victim to malvertising by clicking on an infected ad — cybercriminals may even pay to place these on websites — or by visiting a website that is home to a corrupted ad.
Down
  1. are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks a program that crawls the internet looking for holes in security infrastructures to exploit, and the hacking is done automatically — or robotically if you will.
  2. A standalone malware computer program that replicates itself in order to spread to other computers.
  3. A type of malware that comes with a ransom. It locks and encrypts a victim’s device or data and demands a ransom to restore access.
  4. A type of malware that grants cybercriminals remote control of victims’ devices, oftentimes without the victims’ knowledge.
  5. Malware that involves advertising.
  6. A type of malware that uses software, applications, and protocols already built-in or native to device operating systems to install and execute malicious activities. In other words, no files are needed to download this type of malware.

9 Clues: Malware that involves advertising.A standalone malware computer program that replicates itself in order to spread to other computers.A type of malware that grants cybercriminals remote control of victims’ devices, oftentimes without the victims’ knowledge....

cybersecurity 2021-02-12

cybersecurity crossword puzzle
Across
  1. your computer will have many pop ups
  2. a piece of coding copying itself
  3. send ransom money
  4. used by the romans
Down
  1. what makes your computer harder to hack
  2. a person who takes or uses your computer information
  3. the other use for the word of a animal
  4. allows the hacker to spy on you
  5. scam emails or calls

9 Clues: send ransom moneyused by the romansscam emails or callsallows the hacker to spy on youa piece of coding copying itselfyour computer will have many pop upsthe other use for the word of a animalwhat makes your computer harder to hacka person who takes or uses your computer information

Cybersecurity 2020-04-07

Cybersecurity crossword puzzle
Across
  1. elettrodomestici evoluti
  2. inserirlo nella barra degli indirizzi
  3. dimostra chi è veramente il mittente
  4. ipermediale
  5. linguaggio delle pagine web
Down
  1. gestire il proprio conto corrente
  2. dominio
  3. regole comuni
  4. ragnatela grande

9 Clues: dominioipermedialeregole comuniragnatela grandeelettrodomestici evolutilinguaggio delle pagine webgestire il proprio conto correntedimostra chi è veramente il mittenteinserirlo nella barra degli indirizzi

cybersecurity 2024-11-20

cybersecurity crossword puzzle
Across
  1. protocol for securing internet communications
  2. malware that watch your online activities without you knowing
  3. type of attack that involves trying all possibilities to find a password or codes
  4. design flaw in a computer program
  5. encrypt messages with keys
Down
  1. weakness in a computer system allowing an attacker to harm the integrity of that system
  2. check the data flows and what types of communications are allowed on a computer network.
  3. computer attack that aims to obtain personal data by relying on identity theft
  4. block access to the computer or files and demand payment

9 Clues: encrypt messages with keysdesign flaw in a computer programprotocol for securing internet communicationsblock access to the computer or files and demand paymentmalware that watch your online activities without you knowingcomputer attack that aims to obtain personal data by relying on identity theft...

Cybersecurity 2025-11-03

Cybersecurity crossword puzzle
Across
  1. Software designed to harm or exploit devices
  2. Process of converting data into a coded form
  3. Security system that blocks unauthorized access
  4. Person who tries to gain unauthorized access to systems
  5. Program that protects your computer from viruses
Down
  1. Incident where sensitive information is exposed
  2. Software That secretly monitors your activity
  3. Scam where attackers trick you into giving personal info
  4. Secret word or phrase used for access

9 Clues: Secret word or phrase used for accessSoftware designed to harm or exploit devicesProcess of converting data into a coded formSoftware That secretly monitors your activityIncident where sensitive information is exposedSecurity system that blocks unauthorized accessProgram that protects your computer from viruses...

Cybersecurity 2023-05-30

Cybersecurity crossword puzzle
Across
  1. kübervahendite turvalisus ja turvalisus kübervahendite talitluse kaudu tekkivate/tekitatavate ohtude suhtes
  2. teadmised küberturvalisuse kohta ning kuidas ennast kaitsta
  3. on riiklikult oluliste kübervahendite julgeolek ja julgeolek kübervahendite talitluse kaudu tekkivate/tekitatavate ohtude suhtes
  4. isiku v. mingi toimingu identsuse automaatne kontroll
Down
  1. tarkvara ja andmeid hävitav v. andmetöötlust häiriv väike programm, mis end arvutisüsteemides ise paljundab
  2. kui ohver tegutseb petturliku e-kirja alusel, mis nõuab kiiret tegutsemist.
  3. on kübervahendite turve ja on turve kübervahendite talitluse kaudu tekkivate/tekitatavate ohtude suhtes
  4. usalduslik, salajane
  5. pahatahtlik inimene või grupp kes murravafd sisse inimeste või ettevõtete privatsetesse keskkondadesse

9 Clues: usalduslik, salajaneisiku v. mingi toimingu identsuse automaatne kontrollteadmised küberturvalisuse kohta ning kuidas ennast kaitstakui ohver tegutseb petturliku e-kirja alusel, mis nõuab kiiret tegutsemist.pahatahtlik inimene või grupp kes murravafd sisse inimeste või ettevõtete privatsetesse keskkondadesse...

Cybersecurity 2022-04-26

Cybersecurity crossword puzzle
Across
  1. chief officer
  2. potential issue in security
  3. program that causes problems
Down
  1. email that mimics other people
  2. program that hides inside another
  3. an actual attack
  4. self replicating infection
  5. program that infects other programs
  6. program that uses vulnerability

9 Clues: chief officeran actual attackself replicating infectionpotential issue in securityprogram that causes problemsemail that mimics other peopleprogram that uses vulnerabilityprogram that hides inside anotherprogram that infects other programs

CyberSecurity 2022-08-25

CyberSecurity crossword puzzle
Across
  1. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs; freedom to be let alone
  2. Detailed report, usually about a person
  3. rules for interacting politely online
  4. files stored on your computer (cell phone) that tell browsers how to remember your favorites and your previous searches
  5. the practice of protecting systems, networks, and programs from digital attacks
  6. Someone who intentionally targets people for harm using online chat rooms or social media.
Down
  1. The ability to act in a safe and responsible way on the Internet and other connected environments.
  2. A site or online community where people with like experiences or interests communicate with each other and share information, resources, etc.
  3. Information about you and what you do online

9 Clues: rules for interacting politely onlineDetailed report, usually about a personInformation about you and what you do onlinethe practice of protecting systems, networks, and programs from digital attacksSomeone who intentionally targets people for harm using online chat rooms or social media....

Cybersecurity 2022-09-08

Cybersecurity crossword puzzle
Across
  1. Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems
  2. A popular programming language used in security scripts
  3. A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system
  4. A type of malicious software designed to block access to a computer system until a sum of money is paid
Down
  1. Software that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
  2. A barrier between a trusted network and untrusted network that controls/monitors incoming and outgoing network traffic
  3. A type of social engineering, online scam where criminals send alluring emails to the organization, user, and more to collect sensitive information
  4. Computer programming that is used to track internet activity and gather sensitive information
  5. A that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information

9 Clues: A popular programming language used in security scriptsComputer programming that is used to track internet activity and gather sensitive informationA type of malicious software designed to block access to a computer system until a sum of money is paid...

Cybersecurity 2023-09-04

Cybersecurity crossword puzzle
Across
  1. Make sure you set a strong one by using upper, lowercase, numbers and characters
  2. Organized and unauthorized use of an app to send thousands of messages to its users, either by fake or hacked profiles
  3. Common messaging platform for attackers to use for cyberattacks
  4. An attempt to obtain sensitive information such as usernames, passwords etc. often for malicious reasons by disguising as a trustworthy entity in an electronic communication
  5. Type of cyberattack that uses malware disguised as a legitimate file to infect a system or device. Named by a famous wooden horse
Down
  1. Malicious software that encrypts files or locks your computer, and retains control until you pay a certain amount of money
  2. Cyber-attackers use creative ways to trick you to enable them to steal it
  3. Type of cyber-attack that uses multiple computers or devices to send overwhelming traffic to a targeted website or network. The attack aims to cause the target to slow down or completely stop functioning
  4. Form of malware that poses a security program. If clicked, it pretends to scan for threats and malware on your PC and then lures you into paying real money in exchange for resolving the imaginary threat

9 Clues: Common messaging platform for attackers to use for cyberattacksCyber-attackers use creative ways to trick you to enable them to steal itMake sure you set a strong one by using upper, lowercase, numbers and charactersOrganized and unauthorized use of an app to send thousands of messages to its users, either by fake or hacked profiles...

Cybersecurity 2022-05-11

Cybersecurity crossword puzzle
Across
  1. computer program that hides and replicates
  2. most common type of social engineering
  3. inspects network traffic
  4. octets network address
Down
  1. appears to be a legitimate file or program
  2. user of programs to overcome technical obstacles
  3. database that contains the login account information
  4. hexadecimal address
  5. system that detects incoming threats

9 Clues: hexadecimal addressoctets network addressinspects network trafficsystem that detects incoming threatsmost common type of social engineeringappears to be a legitimate file or programcomputer program that hides and replicatesuser of programs to overcome technical obstaclesdatabase that contains the login account information

Cybersecurity 2022-05-11

Cybersecurity crossword puzzle
Across
  1. computer program that hides and replicates
  2. most common type of social engineering
  3. inspects network traffic
  4. octets network address
Down
  1. appears to be a legitimate file or program
  2. user of programs to overcome technical obstacles
  3. database that contains the login account information
  4. hexadecimal address
  5. system that detects incoming threats

9 Clues: hexadecimal addressoctets network addressinspects network trafficsystem that detects incoming threatsmost common type of social engineeringappears to be a legitimate file or programcomputer program that hides and replicatesuser of programs to overcome technical obstaclesdatabase that contains the login account information

cybersecurity 2023-05-25

cybersecurity crossword puzzle
Across
  1. A software designed to detect and remove viruses, malware, spyware, and other malicious programs from a computer system or network.
  2. The process of converting information into a code or cipher to prevent unauthorized access. Encryption is commonly used to secure sensitive information such as passwords, financial data, and personal information.
  3. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized intrusions and cyber attacks.
  4. Unsolicited and unwanted emails or messages sent out in bulk. Spam can be used to deliver malware, phishing attempts, or other types of unwanted content.
  5. A weakness or security flaw in a computer system or network that can be exploited by attackers. Vulnerabilities can be caused by outdated software, misconfigured systems, or human error.
Down
  1. A type of cyber attack where attackers create fake websites or emails to trick individuals into revealing personal or sensitive information. Phishing attacks often attempt to mimic legitimate websites or companies.
  2. A secret code or word that allows you to access certain devices or services. It is important to create a strong password to protect yourself from cyber threats.
  3. The process of verifying the identity of a user or device trying to access a system or network. Authentication is often done through the use of usernames and passwords, biometrics, or security tokens.
  4. A software that is designed to harm or damage computer systems and networks. Malware can include viruses, trojans, ransomware, and other malicious programs.

9 Clues: A software designed to detect and remove viruses, malware, spyware, and other malicious programs from a computer system or network.Unsolicited and unwanted emails or messages sent out in bulk. Spam can be used to deliver malware, phishing attempts, or other types of unwanted content....

Cybersecurity Risk 2021-08-04

Cybersecurity Risk crossword puzzle
Across
  1. Malware aimed to corrupt or modify data on one computer before spreading to others.
  2. a sequence of letters, characters, and numbers used for authentication
  3. a technique used in order to manipulate and deceive people into handing over sensitive information.
  4. A network device that determines what information is able to enter a system based on the rules in place.
  5. a technique to obtain sensitive information typically through text messaging
  6. the process of encoding data so that it can only be accessed by its intended recipient.
  7. the state of being exposed to the possibility of being attacked
  8. the act of appearing to be someone or thing that you are not
Down
  1. measures taken in order to protect systems and their data.
  2. A network that uses encryption in order to in order to maintain privacy.
  3. a technique to obtain sensitive information typically through email.
  4. Software that locks your device and hold the data hostage and demands a price.
  5. intrusive software developed to wreak havoc on systems; also known as malicious software
  6. a sequence of words used for authentication.
  7. is the act of confirmation through evidence of somethings validity.

15 Clues: a sequence of words used for authentication.measures taken in order to protect systems and their data.the act of appearing to be someone or thing that you are notthe state of being exposed to the possibility of being attackedis the act of confirmation through evidence of somethings validity....

Cybersecurity fun 2022-04-28

Cybersecurity fun crossword puzzle
Across
  1. legal constraints that govern how data can be used or stored. Permission is often required from individual as to these elements
  2. possibility of undesired outcome occurring
  3. information classification
  4. Electronic or digital method to control how devices operate or control how they can or can not be used
  5. any security incident where sensitive, protected, or confidential data is accessed or stolen by an unauthorized party
  6. the original form of a message
  7. protect before an event happens
Down
  1. all the information on a website
  2. a conventional type of encryption
  3. the process of adding our signature to the document to show integrity
  4. someone who is responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
  5. a process of encoding a message so that its meaning is not obvious
  6. the a in CIA triad
  7. ways to protect vulnerabilities
  8. copies of data

15 Clues: copies of datathe a in CIA triadinformation classificationthe original form of a messageways to protect vulnerabilitiesprotect before an event happensall the information on a websitea conventional type of encryptionpossibility of undesired outcome occurringa process of encoding a message so that its meaning is not obvious...

Chapter 1 2025-02-04

Chapter 1 crossword puzzle
Across
  1. Masquerades as legitimate communications Common via email, text, social media
  2. First line of defense
  3. Data protection in cloud storage
  4. The practice of protecting systems, networks, and programs from digital attacks
  5. Malicious software designed to harm systems
Down
  1. Encrypts victim's files Demands payment for decryption
  2. A cybersecurity best practice. Makes it difficult for hackers to crack the user's password
  3. ransomware attack on a critical US energy infrastructure. Threatened distribution of gas and jet fuel
  4. type of hacking method that involves hacker cracking user's password
  5. type of malware

10 Clues: type of malwareFirst line of defenseData protection in cloud storageMalicious software designed to harm systemsEncrypts victim's files Demands payment for decryptiontype of hacking method that involves hacker cracking user's passwordMasquerades as legitimate communications Common via email, text, social media...

Cybersecurity Crossword 2021-02-03

Cybersecurity Crossword crossword puzzle
Across
  1. A technology that allows us to access our files through the internet from anywhere in the world
  2. A piece of malware that can replicate itself in order to spread the infection to other connected computers
  3. An internet version of a home address for your computer, which identifies it when it’s connected to the internet
  4. An umbrella term that describes all forms of malicious software designed to cause havoc on a computer
  5. A technique hackers use to hide their identity to pretend to be someone else or simply try to fool you over the internet
  6. A person who uses programming skills to cause damage to a computer system, steal data and in general conduct illegal cyber activities
  7. A weakness in computer software
Down
  1. A computer system that has been infected by malware and is now part of a hacker’s botnet
  2. A group of computers, printers and devices that are interconnected and governed as a whole
  3. A defensive technology focused on keeping the bad guys out
  4. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
  5. A malicious application or script that can be used to take advantage of a computer’s vulnerability
  6. An acronym that stands for Distributed Denial of Service
  7. An extra copy of data from a computer
  8. A piece of malware that often allows a hacker to gain remote access to a computer

15 Clues: A weakness in computer softwareAn extra copy of data from a computerAn acronym that stands for Distributed Denial of ServiceA defensive technology focused on keeping the bad guys outA piece of malware that often allows a hacker to gain remote access to a computer...

Cybersecurity Terms 2023-10-27

Cybersecurity Terms crossword puzzle
Across
  1. Mobile Acquisition
  2. Picus Security
  3. Incident Response
  4. GRC
  5. Razeen
  6. Toddlers
  7. Data Classification
  8. Philip Cherian
Down
  1. Mobile Device Management
  2. Video Forensics
  3. Checkmarx
  4. External Threat Landscape
  5. #NotTraditionalPAM
  6. Purple
  7. Teel Tech

15 Clues: GRCPurpleRazeenToddlersCheckmarxTeel TechPicus SecurityPhilip CherianVideo ForensicsIncident ResponseMobile Acquisition#NotTraditionalPAMData ClassificationMobile Device ManagementExternal Threat Landscape

Cybersecurity Awareness 2024-09-06

Cybersecurity Awareness crossword puzzle
Across
  1. measures that reduce the likelihood of an unwanted occurrence or lessen its consequences
  2. software that compromises the operation of a system by performing an unauthorized function or process
  3. a computer program that can replicate itself, infect a computer without permission or knowledge of the user, and spread further
  4. an attack method that uses trial and error to crack passwords
  5. abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages
  6. a type of malware that conceals its true content to fool a user into thinking it's a harmless file
  7. the fraudulent practice of sending test messages purporting to be form reputable companies in order to convince individuals to reveal personal information
Down
  1. the ability to adapt to changing conditions and prepare for, withstand, and rapidly recover from disruption
  2. a digital form of social engineering to deceive individuals into providing sensitive information or exposing their system to malware
  3. limits network traffic between networks or systems
  4. an unauthorized user who attempts to or gains access to an information system
  5. the process of verifying one's identity
  6. a technology that allows a program to interact with the internals of another program running on a different machine
  7. An attempt to gain unauthorized access to system services, resources, or information
  8. a string of characters used to authenticate an identity or to verify authorizes access

15 Clues: the process of verifying one's identitylimits network traffic between networks or systemsan attack method that uses trial and error to crack passwordsan unauthorized user who attempts to or gains access to an information systemAn attempt to gain unauthorized access to system services, resources, or information...

Cybersecurity Definitions 2023-01-25

Cybersecurity Definitions crossword puzzle
Across
  1. hack into telecommunications systems, especially to obtain free calls.
  2. a type of network attack used to gain unauthorized access to systems within a security perimeter
  3. a person who uses computers to gain unauthorized access to data
  4. If users are unable to achieve the defined goal.
  5. are useful in passwordless and multi-factor authentication. Hidden form field is used to store session information of a client
  6. the condition of an electronics, software, or other system where the system's substantive behavior is dependent on the sequence or timing of oth
  7. Where the attacker intercepts and relays messages between two parties who believe they are communicating with each other
  8. someone who broke into computer systems, bypassed passwords or licenses in computer programs, or in other ways intentionally breached computer security.
  9. Is a more advanced technique to get user’s credentials by making effort to enter users into the website
Down
  1. Used by hijacking to gain access to a targets computer or online accounts
  2. The act of entering false information into a DNS cache
  3. a systematic approach to managing all changes made to a product or system
  4. Espionage or trespass occurs when an unauthorized individual attempts to gain illegal access to organizational information
  5. a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution
  6. A technique whereby packet data flowing across the network is detected and observed

15 Clues: If users are unable to achieve the defined goal.The act of entering false information into a DNS cachea person who uses computers to gain unauthorized access to datahack into telecommunications systems, especially to obtain free calls.Used by hijacking to gain access to a targets computer or online accounts...

Cybersecurity Terms 2022-04-28

Cybersecurity Terms crossword puzzle
Across
  1. "pretty good privacy"
  2. private modification
  3. corrective measures
  4. private readability
  5. pick out at risk information
  6. react
  7. awareness of intrusions
  8. data restoration
Down
  1. converting plain text for confidentiality
  2. ability to access
  3. multi-use accounts
  4. illegal activity in cyberspace
  5. verifying logins (acronym)
  6. copyright protection
  7. putting in controls

15 Clues: reactdata restorationability to accessmulti-use accountscorrective measuresprivate readabilityputting in controlsprivate modificationcopyright protection"pretty good privacy"awareness of intrusionsverifying logins (acronym)pick out at risk informationillegal activity in cyberspaceconverting plain text for confidentiality

Cybersecurity terms 2024-09-22

Cybersecurity terms crossword puzzle
Across
  1. the process of converting plaintext data into a coded format to prevent unauthorized access
  2. a type of malicious software that automatically downloads advertisements on a device
  3. process of converting data into a fixed-size string of characters for unique identificaton
  4. a type of malicious software that disguises itself as legitimate or useful software
  5. the process of monitoring network or system activities for malicious activities
  6. technique that isolates applications or processes in a controlled environment
Down
  1. a type of malicious software or hardware that records keystrokes made by a user
  2. a security approach that allows only pre-approved users to access a network
  3. an incident of unauthorized access to sensitive, protected or confidential data
  4. the practice of securing information by transforming it into an unreadable format
  5. a network of compromised computers that are controlled remotely by a hacker to perform automated tasks
  6. a malicious software designed to gain unauthorized access to a network while hiding its presence
  7. a software update designed to fix vulnerabilities, bugs, or improve functionality
  8. any device that connects to a network and serves as a point of entry for data
  9. a simulated cyber attack on a system conducted to identify and vulnerabilities

15 Clues: a security approach that allows only pre-approved users to access a networkany device that connects to a network and serves as a point of entry for datatechnique that isolates applications or processes in a controlled environmenta simulated cyber attack on a system conducted to identify and vulnerabilities...

Cybersecurity Terms 2025-04-09

Cybersecurity Terms crossword puzzle
Across
  1. A software update to fix security flaws. (5 letters)
  2. Manipulating people to divulge confidential information. (15 letters)
  3. Granting permissions to access resources. (13 letters)
  4. System that monitors networks for suspicious activity. (3 letters)
  5. Malware that encrypts files and demands payment. (11 letters)
  6. A network security system that blocks unauthorized access. (8 letters)
  7. Weakness in a system that can be exploited. (12 letters)
  8. Securely connects a user to a network over the internet. (3 letters)
  9. Exploit targeting a previously unknown vulnerability. (8 letters)
  10. Attack that overwhelms a system with traffic to crash it. (4 letters)
Down
  1. Security method requiring two types of verification. (10 letters, hyphenated)
  2. Scrambling data to make it unreadable without a key. (10 letters)
  3. Malicious software designed to harm or exploit systems. (7 letters)
  4. Process of verifying a user’s identity. (14 letters)
  5. Deceptive emails or messages to steal sensitive data. (8 letters)

15 Clues: A software update to fix security flaws. (5 letters)Process of verifying a user’s identity. (14 letters)Granting permissions to access resources. (13 letters)Weakness in a system that can be exploited. (12 letters)Malware that encrypts files and demands payment. (11 letters)Scrambling data to make it unreadable without a key. (10 letters)...

Cybersecurity Crossword 2021-02-02

Cybersecurity Crossword crossword puzzle
Across
  1. A technology that allows us to access our files through the internet from anywhere in the world
  2. A piece of malware that can replicate itself in order to spread the infection to other connected computers
  3. An internet version of a home address for your computer, which identifies it when it’s connected to the internet
  4. An umbrella term that describes all forms of malicious software designed to cause havoc on a computer
  5. A technique hackers use to hide their identity pretend to be someone else or simply try to fool you over the internet
  6. A person who uses programming skills to cause damage to a computer system, steal data and in general conduct illegal cyber activities
  7. A weakness in computer software
Down
  1. A computer system that has been infected by malware and is now part of a hacker’s botnet
  2. A group of computers, printers and devices that are interconnected and governed as a whole
  3. A defensive technology focused on keeping the bad guys out
  4. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
  5. A malicious application or script that can be used to take advantage of a computer’s vulnerability
  6. An acronym that stands for distributed denial of service
  7. An extra copy of data from a computer
  8. A piece of malware that often allows a hacker to gain remote access to a computer

15 Clues: A weakness in computer softwareAn extra copy of data from a computerAn acronym that stands for distributed denial of serviceA defensive technology focused on keeping the bad guys outA piece of malware that often allows a hacker to gain remote access to a computer...

Cybersecurity Crossword 2022-05-16

Cybersecurity Crossword crossword puzzle
Across
  1. To figure out or break a code or cipher.
  2. The science of analyzing or breaking secret codes or ciphers to reveal hidden messages.
  3. Central Intelligence Agency
  4. a message written in code or cipher; the encrypted message that must be decoded.
  5. a message written out in “plain” English that anyone can read; it has not been encoded.
  6. The science of writing hidden or concealed messages using secret codes or ciphers.
  7. To put words into code or cipher form.
Down
  1. A system where symbols, groups of letters or numbers, pictures or words, are substituted to represent other words or phrases.
  2. a person who secretly collects and reports information on the activities, movements, and plans of an enemy or competitor.
  3. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  4. Central Security Service
  5. National Security Agency
  6. A system where one letter or symbol is methodically substituted for another letter or symbol.
  7. The science of studying codes and ciphers.
  8. A systematic, minute, and thorough attempt to learn the facts about something complex or hidden

15 Clues: Central Security ServiceNational Security AgencyCentral Intelligence AgencyTo put words into code or cipher form.To figure out or break a code or cipher.The science of studying codes and ciphers.a message written in code or cipher; the encrypted message that must be decoded....

Cybersecurity Vocabulary 2025-05-01

Cybersecurity Vocabulary crossword puzzle
Across
  1. Attack involving the lack of or reduction of a computer resource
  2. Information about a person that can be used to leverage access
  3. Side of CIA Triad that involves Trust
  4. Software installed on a person's computer to record that person's keystrokes and mouse clicks
  5. Social Engineering attack involving scam messages sent via text message
  6. Side of CIA Triad involving redundancy and reliability
  7. Passively gathers information about a potential victim for future use in an attack
Down
  1. Attack performed using phone calls to coerce victims to reveal personal information
  2. Side of CIA Triad that involves Passwords
  3. Social engineering tactic where a hacker pretends to be a member of senior management who is authorized to gain access to a system
  4. Social Engineering example that involves fake e-mails attempting to steal PII
  5. Attack that takes advantage of people who use short, common words or combinations of these words as their passwords
  6. Eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
  7. Where an attacker tries to use every possible combination of letters and numbers until the find a password.
  8. Network attack involving a "botnet" that aims to reduce resources or access

15 Clues: Side of CIA Triad that involves TrustSide of CIA Triad that involves PasswordsSide of CIA Triad involving redundancy and reliabilityInformation about a person that can be used to leverage accessAttack involving the lack of or reduction of a computer resourceSocial Engineering attack involving scam messages sent via text message...

Cybersecurity Crossword 2023-05-15

Cybersecurity Crossword crossword puzzle
Across
  1. writing statements in order to create a program
  2. the programs that perform actions on a device like operating systems
  3. devices that are connected together for the purpose of sharing information
  4. accessing a device or network without permission or authorization
  5. a global open network that allows information dispersal and instantaneous communication
  6. identifies specific devices on a network
  7. an instruction set to a computer in order to perform an action
  8. a specific set of multiple instructions used to perform actions on a device
  9. information that is returned or transmitted by a device
  10. using codes to secure information
Down
  1. the physical electronic objects like a computer
  2. the unauthorized collection of secure or private information
  3. precautions taken to guard against crime that involves the internet
  4. accomplished when data is sent to a device
  5. an electronic device used to create and access information

15 Clues: using codes to secure informationidentifies specific devices on a networkaccomplished when data is sent to a devicethe physical electronic objects like a computerwriting statements in order to create a programinformation that is returned or transmitted by a devicean electronic device used to create and access information...

Cybersecurity Crossword 2023-01-17

Cybersecurity Crossword crossword puzzle
Across
  1. Software that monitors user activities and reports them to a third party
  2. A test that outlines the steps to restoring data after a severe setback
  3. A successful hack to gain control of a network and leak its data
  4. A scan hackers use to detect areas of weakness via sending messages to identify activity
  5. a type of computer network device that interconnects with other networks using the same protocol
  6. An intermediary server between a user and the internet that protects the enterprise from outside intrusion
  7. The practice of adhering to standards and regulatory requirements
Down
  1. An AI-manipulated video in someone’s likeness to spread misleading information
  2. Malicious software often in the form of spam emails
  3. A misleading computer program with a name deriving from Greek history
  4. A scam perpetrated by a hacker posing as a legitimate
  5. A small update to fix bugs in existing programs
  6. A special code to protect your digital information
  7. An internal computer network closed to outsiders
  8. A network that disguises users’ IP addresses with its own to deter hackers

15 Clues: A small update to fix bugs in existing programsAn internal computer network closed to outsidersA special code to protect your digital informationMalicious software often in the form of spam emailsA scam perpetrated by a hacker posing as a legitimateA successful hack to gain control of a network and leak its data...

I made this using crosswordlabs and google 2025-09-21

I made this using crosswordlabs and google crossword puzzle
Across
  1. the repeated use of electronic communication technology—like cell phones, computers, tablets, and social media—to harass, threaten, humiliate, or target another person
  2. a cybersecurity professional who uses their hacking skills to identify and exploit security vulnerabilities in computer systems without the permission of the system owner and with malicious intent
  3. any data that can be used to distinguish, trace, or identify a specific individual
  4. any data that can be used to distinguish, trace, or identify a specific individual
  5. a cybersecurity professional who uses their hacking skills to identify and exploit security vulnerabilities in computer systems with the permission of the system owner
  6. an IT professional who installs, maintains, monitors, and troubleshoots computer networks to ensure they operate efficiently, reliably, and securely
  7. facts and statistics collected together for reference or analysis.
Down
  1. the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally.
  2. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  3. a structured set of data held in a computer, especially one that is accessible in various ways.
  4. search for and publish private or identifying information about (a particular individual) on the internet, typically with malicious intent.
  5. a cybersecurity professional who uses their hacking skills to identify and exploit security vulnerabilities in computer systems without the permission of the system owner and without malicious intent

12 Clues: facts and statistics collected together for reference or analysis.any data that can be used to distinguish, trace, or identify a specific individualany data that can be used to distinguish, trace, or identify a specific individuala structured set of data held in a computer, especially one that is accessible in various ways....

Chris's Crossword 2023-11-29

Chris's Crossword crossword puzzle
Across
  1. Coat closet
  2. Number of senators
  3. Yearly certification
  4. NATO Drafter?
  5. @_
  6. Kentucky Derby Lover?
  7. Chuckles, say
  8. Reporter's tool
  9. Legislative roundup
Down
  1. Green Thing
  2. Motion for _
  3. Type of fruit and fearless leader
  4. Ending, say
  5. A General and employer

14 Clues: @_Coat closetGreen ThingEnding, sayMotion for _NATO Drafter?Chuckles, sayReporter's toolNumber of senatorsLegislative roundupYearly certificationKentucky Derby Lover?A General and employerType of fruit and fearless leader

revision 2022-09-14

revision crossword puzzle
Across
  1. захист
  2. злиття_акцій
  3. комплексні_рішення
  4. штаб-квартира
  5. власники_акцій
Down
  1. проривні_технології
  2. під_керівництвом
  3. кібербезпека
  4. розсувати кордони
  5. виявляти_загрози

10 Clues: захисткібербезпеказлиття_акційштаб-квартиравласники_акційпід_керівництвомвиявляти_загрозирозсувати кордоникомплексні_рішенняпроривні_технології

Women in Tech 2023-02-22

Women in Tech crossword puzzle
Across
  1. - Computers
  2. - Remodeling
  3. - Vendor
  4. - Technology
  5. - Telecommunication
  6. - Security
Down
  1. - Processor
  2. - Robotization
  3. - Machinery
  4. - Vendor

10 Clues: - Vendor- Vendor- Security- Processor- Computers- Machinery- Remodeling- Technology- Robotization- Telecommunication

EZOREF Weekly Bulletin Crossword 2021-07-05

EZOREF Weekly Bulletin Crossword crossword puzzle
Across
  1. much like standard AV, having an effective ------ solution is vital
  2. While Secpod provides an array of solutions to your corporate pain points, it was primarily introduced as a ----- management tool
  3. Quick Heal's Enterprise Grade cybersecurity brand
  4. Konnect Insights is identified as a next-gen social -------
  5. Global leader, ethos being 'The truth in information'
Down
  1. Forescout is positioned as a Modern ---
  2. founded in 1987, providing unparalleled cybersecurity solution now known as the device to cloud cybersecurity company
  3. IOB is an acronym for the Internet of ---------
  4. A ------- consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.
  5. This technology works by securing data flowing to and from in-house IT architectures and cloud vendor environments using an organization's security policies.

10 Clues: Forescout is positioned as a Modern ---IOB is an acronym for the Internet of ---------Quick Heal's Enterprise Grade cybersecurity brandGlobal leader, ethos being 'The truth in information'Konnect Insights is identified as a next-gen social -------much like standard AV, having an effective ------ solution is vital...

Cyber Awareness Crossword 2024-10-01

Cyber Awareness Crossword crossword puzzle
Across
  1. The act of ensuring data is kept safe from unauthorized access.
  2. A visual verification tool used to distinguish humans from bots.
  3. Stronger than a basic password, this adds an extra layer of security.
  4. The process of confirming a user’s identity.
  5. Software designed to track user activity without consent.
Down
  1. The main goal of Cybersecurity Awareness Month.
  2. The practice of safeguarding digital information.
  3. A common method to protect data by encoding it.
  4. The term for unauthorized access to a network.
  5. A program that appears legitimate but performs harmful actions.
  6. A type of software update that protects against vulnerabilities.
  7. A common cyber threat involving deceptive emails.

12 Clues: The process of confirming a user’s identity.The term for unauthorized access to a network.The main goal of Cybersecurity Awareness Month.A common method to protect data by encoding it.The practice of safeguarding digital information.A common cyber threat involving deceptive emails.Software designed to track user activity without consent....

Cybersecurity 2024-02-06

Cybersecurity crossword puzzle
Across
  1. A piece of software designed to fix security vulnerabilities or improve functionality.
  2. The process of converting information into a code to prevent unauthorized access.
  3. Software designed to harm or exploit computer systems and data.
  4. Authentication based on physical or behavioral characteristics, such as fingerprints or voice patterns.
Down
  1. Network security device that monitors and controls incoming and outgoing network traffic.
  2. Process of verifying the identity of a user, system, or application.
  3. The practice of protecting systems, networks, and programs from digital attacks.
  4. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
  5. Malicious software that can replicate itself and spread to other computers.

9 Clues: Software designed to harm or exploit computer systems and data.Process of verifying the identity of a user, system, or application.Malicious software that can replicate itself and spread to other computers.The practice of protecting systems, networks, and programs from digital attacks....

Cybersecurity 2022-03-29

Cybersecurity crossword puzzle
Across
  1. DNS ____ is when a hacker pretends to be a DNS server and feeds your computer the wrong IP Address for a given website, sending you to a false website.
  2. Multi-factor _____ is an authentication method that requires the user to provide two or more verification factors to gain access.
  3. A ____ attack is spamming a web server with so many requests so close together that it crashes.
  4. A type of spyware that records every keystroke (and sometimes also mouse movements) made by a computer user in order to gain access to passwords and other confidential info
  5. ____ is any program code that explicitly attempts to bypass appropriate authorization safeguards and/or perform unauthorized functions.
Down
  1. A ___ is information stored on your computer by a website you visit. They often store your settings for a website, such as your login status and preferred language or location.
  2. ____ is an attempt by cybercriminals posing as legitimate institutions, usually via email, to obtain sensitive information from targeted individuals.
  3. ____ guessing is an attempt to gain access to a computer system by methodically trying to determine a user’s password
  4. The digital ____is a gap between those who have access to new technology and those who do not.

9 Clues: The digital ____is a gap between those who have access to new technology and those who do not.A ____ attack is spamming a web server with so many requests so close together that it crashes.____ guessing is an attempt to gain access to a computer system by methodically trying to determine a user’s password...

Cybersecurity 2024-10-23

Cybersecurity crossword puzzle
Across
  1. This method scrambles data so that only authorized people can read it
  2. the practice of keeping computer systems safe
  3. a hacker sneaks in between two people who are communicating
  4. acts like a barrier between your computer and the internet
Down
  1. harmful software that can damage your computer
  2. Software detect and remove harmful software
  3. attackers send fake emails
  4. uses malware to lock your files so you can’t access them
  5. Injection when attackers take advantage of weaknesses in websites

9 Clues: attackers send fake emailsSoftware detect and remove harmful softwarethe practice of keeping computer systems safeharmful software that can damage your computeruses malware to lock your files so you can’t access themacts like a barrier between your computer and the interneta hacker sneaks in between two people who are communicating...

Cybersecurity 2025-06-27

Cybersecurity crossword puzzle
Across
  1. Malware hidden inside another program.
  2. A ransomware that attacks networks using a protocol that helps computers communicate with printers and other devices
  3. Mechanism to run program
  4. Vulnerability of a system or program that manages to cede control to unauthorized persons.
Down
  1. Technology that allows the extension of the local area network a public network such as the Internet.
  2. software that allows anonymous access to the Internet through a series of virtual tunnels or sub-layers that prevent direct connection to the network.
  3. Exposure of private information.
  4. Tool that captures data packets on a network.
  5. Malware that copies itself and spreads across networks

9 Clues: Mechanism to run programExposure of private information.Malware hidden inside another program.Tool that captures data packets on a network.Malware that copies itself and spreads across networksVulnerability of a system or program that manages to cede control to unauthorized persons....

Cybersecurity Challenge 2019-10-11

Cybersecurity Challenge crossword puzzle
Across
  1. Northern Bank's Core Values
  2. Location of the Bank's Disaster Recovery Site
  3. A way to access the Bank’s resources remotely
  4. Programs installed on your phone
  5. Password should always be?
  6. Key word used to send secure email
  7. Think before you -- ?
  8. Type of an Operating system
  9. A device you should not plug in
Down
  1. A type of malware that encrypts your file
  2. A type of an email scam
  3. Department to call for computer issues
  4. Most likely NFL team to win the superbowl in 2020
  5. Last name of the VP of IT
  6. Location of the Bank's Head Quarter

15 Clues: Think before you -- ?A type of an email scamLast name of the VP of ITPassword should always be?Northern Bank's Core ValuesType of an Operating systemA device you should not plug inPrograms installed on your phoneKey word used to send secure emailLocation of the Bank's Head QuarterDepartment to call for computer issues...

Cybersecurity Risk 2021-09-03

Cybersecurity Risk crossword puzzle
Across
  1. Convert an item, such as data, into a code or cipher.
  2. Short for malicious software
  3. Software that encrypts data on someone's device until that person agrees to pay to regain access.
  4. Similar to a password but uses multiple words together.
  5. Legitimate of innocent-looking emails asking you to respond with personal data or to click on a link.
  6. Disguising an email address or phone number to convince you that you are interacting with a trusted friend or source.
  7. False or inaccurate information.
  8. Acronym for Pause, Ask, Think.
  9. Range of activities that guide how we manage digital data.
Down
  1. Measures taken to protect computer systems.
  2. Type of identity that is established by an internet user.
  3. Software written to damage a computer's performance, steal, or alter data.
  4. The practice of phishing using text messages
  5. Type of data that can be found as part of public record.
  6. Type of data that should be protected from public view.

15 Clues: Short for malicious softwareAcronym for Pause, Ask, Think.False or inaccurate information.Measures taken to protect computer systems.The practice of phishing using text messagesConvert an item, such as data, into a code or cipher.Similar to a password but uses multiple words together.Type of data that should be protected from public view....

Cybersecurity Month 2025-10-03

Cybersecurity Month crossword puzzle
Across
  1. Unauthorized access to data
  2. Network security barrier
  3. Software update to fix vulnerabilities
  4. Fraudulent attempt to get personal information
  5. Malicious software that demands payment
  6. Local tribal community hosting IT services
  7. Measures to protect information and systems
Down
  1. Name of the tribal nation
  2. IT support for users
  3. Extra layer of login security
  4. Software designed to damage or gain unauthorized access
  5. Secret code to access accounts
  6. Secure remote network connection
  7. Process of converting data to unreadable format
  8. Copy of data for recovery

15 Clues: IT support for usersNetwork security barrierName of the tribal nationCopy of data for recoveryUnauthorized access to dataExtra layer of login securitySecret code to access accountsSecure remote network connectionSoftware update to fix vulnerabilitiesMalicious software that demands paymentLocal tribal community hosting IT services...

Angol 2025-09-09

Angol crossword puzzle
Across
  1. Network
  2. intelligencia Artificial Intelligence (AI)
  3. Algorithm
  4. Cloud
  5. Cybersecurity
Down
  1. Coding
  2. Data
  3. valóság Virtual Reality
  4. Hardware
  5. Software

10 Clues: DataCloudCodingNetworkHardwareSoftwareAlgorithmCybersecurityvalóság Virtual Realityintelligencia Artificial Intelligence (AI)

021-1 2024-07-12

021-1 crossword puzzle
Across
  1. Term for when security is breached
  2. Malicious code used in the attack
  3. Joint groups formed to improve cybersecurity
  4. Efforts to reduce the impact of the attack
  5. Tech giant also affected by the attack
  6. Public and private sectors working together
  7. Russian state-sponsored group behind the attack
  8. U.S. Department of Homeland Security's response
  9. Type of actor behind the attack
  10. Another name for the attackers
  11. Key focus in the aftermath of the attack
  12. Type of analysis conducted to investigate the attack
  13. Weaknesses exploited by the attackers
Down
  1. Techniques used by attackers to avoid detection
  2. Another term for the security incident
  3. Process of uncovering the details of the attack
  4. U.S. response to the attack
  5. IT company at the center of the attack
  6. The effect of the attack on organizations
  7. Cybersecurity firm that discovered the breach
  8. Software updates released by SolarWinds
  9. Actions pursued against the attackers
  10. U.S. department that was compromised
  11. U.S. body that held hearings on the attack
  12. SolarWinds product that was compromised

25 Clues: U.S. response to the attackAnother name for the attackersType of actor behind the attackMalicious code used in the attackTerm for when security is breachedU.S. department that was compromisedActions pursued against the attackersWeaknesses exploited by the attackersAnother term for the security incidentIT company at the center of the attack...

CIS178 Jake Stevenson 2023-01-25

CIS178 Jake Stevenson crossword puzzle
Across
  1. virtual private network
  2. posing as authorized user
  3. type of malware
  4. protects you from virus
  5. protecting online data
  6. explicitly allowed
  7. security system
  8. malicious software
  9. explicitly not allowed
  10. not human
  11. gaining unauthorized access
Down
  1. network of networks
  2. type of scam
  3. protects you from malware
  4. harassment on the internet
  5. unsolicited advertisements
  6. two-factor authentication
  7. another word for information
  8. securing data
  9. human verification test

20 Clues: not humantype of scamsecuring datatype of malwaresecurity systemexplicitly allowedmalicious softwarenetwork of networksprotecting online dataexplicitly not allowedvirtual private networkprotects you from virushuman verification testposing as authorized userprotects you from malwaretwo-factor authenticationharassment on the internet...

Data Privacy Crossword Puzzle 2025-01-14

Data Privacy Crossword Puzzle crossword puzzle
Across
  1. Unauthorized access to data or systems
  2. What employees must change regularly to maintain cybersecurity
  3. Law requiring Canadian organizations to obtain consent before collecting data
  4. The legal term for data that can identify an individual
  5. A method of converting readable data into a coded format
  6. The principle of limiting data collection to only what is necessary
Down
  1. Cyberattacks often delivered through email, attempting to steal credentials
  2. Fraudulent practice of sending fake emails pretending to be from a legitimate source
  3. Software designed to detect and prevent malware
  4. The act of reporting suspicious activity or data breaches
  5. A secret word or phrase used to authenticate access to systems
  6. Cybersecurity framework used for protecting payment data
  7. Protection of sensitive information, also known as___
  8. A method to authenticate users beyond just a password

14 Clues: Unauthorized access to data or systemsSoftware designed to detect and prevent malwareProtection of sensitive information, also known as___A method to authenticate users beyond just a passwordThe legal term for data that can identify an individualCybersecurity framework used for protecting payment data...

Cybersecurity & Web Exploitation Crossword 2022-11-16

Cybersecurity & Web Exploitation Crossword crossword puzzle
Across
  1. CSRF attacks use the ___ of other users without their knowledge.
  2. "Access control" is ensuring users cannot act outside of intended ___.
  3. You access web applications with this.
  4. As the ___ of web apps increase, the possibility of vulnerabilities also increase.
  5. When a malicious actor hijacks clicks meant for a visible top-level site.
  6. For security reasons, by default, web apps should not ___ data from the browser.
  7. The OSI model has ___ layers.
Down
  1. Denial-of-Service attacks ___ a target site with fake requests to disrupt service.
  2. In cybersecurity, blue teams do this.
  3. Acronym for the organization set up to improve software security in 2001.
  4. SQL injection attacks can give ___ to data users typically can't retrieve.
  5. What does the "I" in OSI stand for?
  6. In cybersecurity, red teams do this.
  7. ___ hat hackers hack unethically, for personal gain.
  8. ___ sanitization is the modification of user data so that it can't run scripts.

15 Clues: The OSI model has ___ layers.What does the "I" in OSI stand for?In cybersecurity, red teams do this.In cybersecurity, blue teams do this.You access web applications with this.___ hat hackers hack unethically, for personal gain.CSRF attacks use the ___ of other users without their knowledge....

Risk Awareness Month 2024-05-17

Risk Awareness Month crossword puzzle
Across
  1. Use water ________(9 letters)appliances and fittings [Word found in EDM on financial and strategic risk]
  2. Flooding at expressways and major ________(13 letters) [Word found in EDM on operational risks]
  3. Ensure your computers and devices are updated with the latest security ________(7 letters) [Word found in EDM on cybersecurity risks]
  4. ________(11 letters) form the 1st line of defence in our risk governance framework [Word found in EDM on Risk Governance Framework]
Down
  1. Good ________(6 letters) marksmanship [Word found in EDM on financial and strategic risk]
  2. ________(10 letters) effort of every level [Word found in EDM on Risk Governance Framework]
  3. We are not immune to ________(13 letters) risks [Word found in EDM on cybersecurity risks]
  4. ________(3 letters) can make a difference [Word found in EDM on CRO's message]
  5. Risk ________(9 letters) Month [Word found in EDM on CRO's message]
  6. ________(9 letters) into Critical Installations [Word found in EDM on operational risks]

10 Clues: Risk ________(9 letters) Month [Word found in EDM on CRO's message]________(3 letters) can make a difference [Word found in EDM on CRO's message]________(9 letters) into Critical Installations [Word found in EDM on operational risks]Good ________(6 letters) marksmanship [Word found in EDM on financial and strategic risk]...

Enterprise Risk Management Puzzle Activity 2025-01-20

Enterprise Risk Management Puzzle Activity crossword puzzle
Across
  1. The act that aims to safeguard individuals in various settings.
  2. The abbreviation for the act that mandates corporate governance and accountability.
  3. The division that reviews financial regulations in Jamaica.
  4. The ministry that has implemented training and development programs.
  5. The kind of financial losses that can result from misuse of public funds.
  6. A common cybersecurity threat that uses fake emails.
  7. A type of data that must be handled with care.
Down
  1. The practice of protecting digital systems from attacks.
  2. Type of bond providing rapid financial support after a disaster.
  3. A type of risk that can result in cessation of business activity.
  4. A risk that may be caused by natural disasters.
  5. A plan for maintaining operations during disruptions.
  6. A type of hazard that can cause musculoskeletal injuries.
  7. A risk that can be caused by inadequate policies.
  8. The type of hazard that includes bacteria and viruses.
  9. A way to secure important documents.
  10. The abbreviation of the office that ensures transparent government procurement.
  11. A potential source of harm or adverse effects.
  12. Public sector program focused on workforce development.

19 Clues: A way to secure important documents.A potential source of harm or adverse effects.A type of data that must be handled with care.A risk that may be caused by natural disasters.A risk that can be caused by inadequate policies.A common cybersecurity threat that uses fake emails.A plan for maintaining operations during disruptions....

Probably Cybersecurity 2025-04-29

Probably Cybersecurity crossword puzzle
Across
  1. something even Macs need
  2. fingerprints, and perhaps, the retina
  3. "i always feel like somebody is watching me."
  4. no party can deny
  5. deluge
  6. a list of instructions
Down
  1. logging in
  2. "i'm breaking into the _"
  3. Try Again Try Again Try Again
  4. H@rd2Guess
  5. network filter
  6. am i legit?
  7. you won! click here!
  8. pay 2 decrypt

14 Clues: delugelogging inH@rd2Guessam i legit?pay 2 decryptnetwork filterno party can denyyou won! click here!a list of instructionssomething even Macs need"i'm breaking into the _"Try Again Try Again Try Againfingerprints, and perhaps, the retina"i always feel like somebody is watching me."

Vocabulary Test LKE Media A 2022-03-14

Vocabulary Test LKE Media A crossword puzzle
Across
  1. durchsetzen
  2. eine Webseite schließen
  3. Suchmaschine
  4. technikaffin
  5. Sicherheit im Netz
  6. die aktuellsten Nachrichten über
Down
  1. unbeschränkt
  2. offline gehen
  3. Verkaufszahlen
  4. jemanden oder etwas misstrauen
  5. Berichterstattung

11 Clues: durchsetzenunbeschränktSuchmaschinetechnikaffinoffline gehenVerkaufszahlenBerichterstattungSicherheit im Netzeine Webseite schließenjemanden oder etwas misstrauendie aktuellsten Nachrichten über

Cybersecurity Crossword 2022-04-28

Cybersecurity Crossword crossword puzzle
Across
  1. Filters traffic on a network
  2. Linux tool to encrypt and decrypt
  3. Encryption that only uses a public and private key
  4. A way of accessing a system remotely
  5. Linux command to search a file for a string
  6. I in CIA
  7. Tricks people into making themselves vulnerable
Down
  1. Stores files in itself
  2. Physical, Technical, Procedural and Legal controls that can be applied; second framework concept
  3. Ethical hacking
  4. Use of shifting characters to hide a message
  5. Keeping information offsite for easy recovery
  6. Malicious software
  7. File that contains information about previous interactions with a system or network

14 Clues: I in CIAEthical hackingMalicious softwareStores files in itselfFilters traffic on a networkLinux tool to encrypt and decryptA way of accessing a system remotelyLinux command to search a file for a stringUse of shifting characters to hide a messageKeeping information offsite for easy recoveryTricks people into making themselves vulnerable...

All About Isabella Crossword 2024-06-15

All About Isabella Crossword crossword puzzle
Across
  1. focus study of my major
  2. favorite color
  3. cultural background
  4. passion outside of school
  5. why I transferred schools
  6. college
  7. zodiac sign
Down
  1. favorite sport to play
  2. first language
  3. beloved and childhood favorite coast
  4. my kitty's name
  5. elementary school
  6. favorite subject in school
  7. earned networking certification
  8. favorite food
  9. favorite movie (disney)

16 Clues: collegezodiac signfavorite foodfirst languagefavorite colormy kitty's nameelementary schoolcultural backgroundfavorite sport to playfocus study of my majorfavorite movie (disney)passion outside of schoolwhy I transferred schoolsfavorite subject in schoolearned networking certificationbeloved and childhood favorite coast

CyberSecurity Awareness 2016-09-30

CyberSecurity Awareness crossword puzzle
Across
  1. Electronic messages NOT handled by the Post Office
  2. A copy of the data to be used if needed
  3. Abbreviation for Instant Messaging
  4. A mobile phone built on a mobile computing platform that is not dumb
  5. A computer program that can retrieve and display information from the Internet
  6. Software that is loaded onto a computer to identify and remove viruses
  7. Abbreviation for Protected Health Information
Down
  1. Unauthorized person who tries to break into your system or network
  2. A shortened name for malicious software
  3. A secret series of characters used to authenticate a person's identity
  4. A computer network, that an organization uses for its own internal sites like MyNews or PurplePages.
  5. A technique made to scramble data making it unreadable and unusable
  6. Method used by criminals to HOOK you into giving up sensitive information.
  7. Unsolicited email sent to you also a canned meat

14 Clues: Abbreviation for Instant MessagingA shortened name for malicious softwareA copy of the data to be used if neededAbbreviation for Protected Health InformationUnsolicited email sent to you also a canned meatElectronic messages NOT handled by the Post OfficeUnauthorized person who tries to break into your system or network...

Cybersecurity Awareness 2024-11-12

Cybersecurity Awareness crossword puzzle
Across
  1. Settings that users can control to limit what an app can access on their device.
  2. A technique used to steal sensitive information by tricking users through fake apps or emails.
  3. A sum of money demanded by attackers in exchange for unlocking encrypted files.
  4. The type of port that a Rubber Ducky uses to connect to a target machine.
  5. malicious software that decrypt all user files after receiving money.
  6. The best way to prevent Bluetooth attacks when not in use is to _______ your Bluetooth.
Down
  1. Clicking ___ will lead you to download unwanted software to your device or visiting a phishing website
  2. A software that protects your device from viruses.
  3. A harmful software that can be delivered through a Rubber Ducky attack, download from unknown sources, and by clicking advertisements.
  4. A ___ secretly monitors user activity.
  5. Report to ___ if received a suspicious email from an unknown sender.
  6. ___ is manipulating their victims in giving away sensitive information using phone calls.
  7. A software that delivers advertising content randomly inside user device.
  8. Keeping software and apps current to fix vulnerabilities that can be exploited

14 Clues: A ___ secretly monitors user activity.A software that protects your device from viruses.Report to ___ if received a suspicious email from an unknown sender.malicious software that decrypt all user files after receiving money.A software that delivers advertising content randomly inside user device....

Cybersecurity trainning 2018-03-12

Cybersecurity trainning crossword puzzle
Across
  1. a hostile message that may contain obscene language.
  2. techniques used by people who want to sexually harm children and young people get close to them and gain their trust.
  3. willful, repeated harm through electronic text.
  4. a trail of the user’s activity in cyberspace.
  5. information about your visit recorded automatically on your computer
  6. sending, receiving, or forwarding sexually explicit messages, photographs or images
  7. malicious software or code designed to damage computer or collect information.
Down
  1. unsolicited e-mail, or junk mail.
  2. engine an Internet service that helps you search for information on the web.
  3. Internet gamers who intentionally cause problems and/or cyberbully other gamers.
  4. Rules for interacting courteously with others online
  5. allows you to block certain types of content from being displayed.
  6. type of online fraud, where someone tries to trick the victim into revealing sensitive details.
  7. a program that lets you find, see, and hear material on web pages

14 Clues: unsolicited e-mail, or junk mail.a trail of the user’s activity in cyberspace.willful, repeated harm through electronic text.a hostile message that may contain obscene language.Rules for interacting courteously with others onlinea program that lets you find, see, and hear material on web pages...

Cybersecurity terms 2023-09-29

Cybersecurity terms crossword puzzle
Across
  1. Barrier between a trusted network and an untrustworthy network.
  2. A collection of programs or software tools that allow hackers to remotely access and control a computer or network.
  3. A form of fraud that involves contacting victims through email, telephone, or text to trick them into sharing personal information.
  4. It refers to protecting information from unauthorized user
  5. A form of malware used by hackers to spy on you and your computer activities.
Down
  1. Visit the global policy database and find the title of MFC-STA-023
  2. Also referred to as two-factor authentication
  3. Short for malicious software
  4. The process of converting information into a code to prevent unauthorized access.
  5. It means data are trustworthy and have not been accidentally altered or modified by an unauthorized access
  6. It is the process of converting coded or encrypted data to its original form.
  7. It means data are accessible when you need them
  8. It relates to rights to control the sharing and use of one’s personal information
  9. A network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.

14 Clues: Short for malicious softwareAlso referred to as two-factor authenticationIt means data are accessible when you need themIt refers to protecting information from unauthorized userBarrier between a trusted network and an untrustworthy network.Visit the global policy database and find the title of MFC-STA-023...

Criss-Cross Compliance 2022-07-21

Criss-Cross Compliance crossword puzzle
Across
  1. web armor
  2. don't get hooked!
  3. call me anytime
  4. law abiding citizen
  5. I did that!
  6. this goes both ways
Down
  1. make yourself useful
  2. think outside the box
  3. do it right the first time
  4. harmless watchmen
  5. vocal hack
  6. peeps
  7. my lips are sealed
  8. doorway hacker
  9. obedient water elephant

15 Clues: peepsweb armorvocal hackI did that!doorway hackercall me anytimeharmless watchmendon't get hooked!my lips are sealedlaw abiding citizenthis goes both waysmake yourself usefulthink outside the boxobedient water elephantdo it right the first time