cybersecurity Crossword Puzzles
Year 12 Cybersecurity 2023-08-16
Across
- A hacker who operates between ethical and unethical boundaries, often exposing vulnerabilities without permission.
- An individual who simulates cyberattacks to evaluate the security of a system.
- A hacker who uses their skills to help organizations identify and fix security vulnerabilities.
- Measures taken to protect physical assets and facilities from unauthorized access or harm.
- The accuracy and reliability of data, protected from unauthorized alteration.
- A hacker who engages in malicious activities for personal gain or to cause harm.
- Mistakes made by individuals that can lead to security breaches.
- Creating multiple security layers to prevent unauthorized access at different levels.
- Covert agents who gather information on behalf of a government or organization.
- An individual or group that uses cyberattacks to create fear and chaos for political or ideological reasons.
Down
- Ensuring that sensitive information is accessible only to authorized individuals.
- The ability to identify and recognize cybersecurity threats and incidents.
- Making sure that data is accessible when needed, without unauthorized disruptions.
- Individuals with advanced computer skills who manipulate software or systems for various purposes.
- Covert activities aimed at gathering confidential information from competitors or enemies.
- Individuals who engage in illegal activities on the internet for financial gain.
- People within an organization who have access to sensitive information and can pose security risks.
- Implementing measures to discourage potential attackers from targeting a system or organization.
- Introducing obstacles and barriers to slow down attackers' progress.
- The process of restoring systems and data after a cybersecurity breach or incident.
- Taking swift actions to address and mitigate cybersecurity incidents.
21 Clues: Mistakes made by individuals that can lead to security breaches. • Introducing obstacles and barriers to slow down attackers' progress. • Taking swift actions to address and mitigate cybersecurity incidents. • The ability to identify and recognize cybersecurity threats and incidents. • ...
dasd 2021-04-30
25 Clues: If • Tap • List • Loop • Else • Print • Array • Cyber • Sprite • Python • Commit • If else • Settings • Function • Variable • Autonomous • cybersecurity • activo, Uptime • flotante, Float • entero, Integer • el lazo, For loop • while, While loop • binarios Binary numbers • neuronales, nueral networks • automático, Machine learning
dasd 2021-04-30
25 Clues: If • Tap • List • Loop • Else • Print • Array • Cyber • Sprite • Python • Commit • If else • Settings • Function • Variable • Autonomous • cybersecurity • activo, Uptime • flotante, Float • entero, Integer • el lazo, For loop • while, While loop • binarios Binary numbers • neuronales nueral networks • automático Machine learning
hour puzzle 2025-11-18
18 Clues: lab • vroom • spinny • debate • CyBear • daily task • our mascot • best group • spirit bowl • stupid machine • the worst class • favorite period • phantom program • hard to install • the good old days • senator ___ Kennedy • put the desks together • bruno mars song about cybersecurity THREATS
The trends and buzzwords associated with disruptive technology 2025-08-07
14 Clues: Mesh • cloud • (XaaS) • Screening • Computing • Automation • technology • Reality (XR) • Intelligence (BI) • Intelligence (AI) • Liability Insurance • Immune System (DIS) • Authentication (MFA) • Detection and Response (EDR)
Cybersecurity 2022-11-28
Across
- manipulation of people into performing actions or give up confidential information.
- causes your computer to download or display malicious adverts or pop-ups
- a group of Internet-connected devices, each of which runs one or more bots. can be used to perform Distributed Denial-of-Service (DDoS)
- Designed to gain access to your computer with malicious intent.
- a type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information to the attacker
Down
- When infected, they locks/encrypted your computer or files, and demand money or else they will delete or publish it.
- replicate itself by maliciously modifying other computer programs and inserting code.
- Any malware that misleads users of its true intent. The term is derived from the Ancient Greek story.
- replicate itself in order to create traffic and slowing down the system.
- describes a social engineering act of obtaining someone else's personal information without their consent.
10 Clues: Designed to gain access to your computer with malicious intent. • causes your computer to download or display malicious adverts or pop-ups • replicate itself in order to create traffic and slowing down the system. • manipulation of people into performing actions or give up confidential information. • ...
Cybersecurity 2022-11-18
Across
- the protection of internet-connected systems such as hardware, software and data from cyberthreats
- engineering the term used for a broad range of malicious activities accomplished through human interactions.
- testing an authorized simulated attack performed on a computer system to evaluate its security
- category of malicious cyber-attacks that hackers or cybercriminals employ
- information such as facts and numbers used to analyze something or make decisions
- network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
- the measurement and statistical analysis of people's unique physical and behavioral characteristics
- when attackers send malicious emails designed to trick people into falling for a scam
- allow users to keep their software programs updated without having to check for and install available updates manually
- software designed to interfere with a computer's normal functioning
10 Clues: software designed to interfere with a computer's normal functioning • category of malicious cyber-attacks that hackers or cybercriminals employ • information such as facts and numbers used to analyze something or make decisions • when attackers send malicious emails designed to trick people into falling for a scam • ...
CyberSecurity 2023-01-05
Across
- Should be constructed of upper and lower case letters, numbers, and special characters
- A flawed or weakness in computer system that could be exploited to violate the system's security.
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- Hardware or software designed to prevent unauthorized access to or from a private network.
- Unauthorized access to a network, information systems, or application.
Down
- Verifying identity
- Fraudulent email purportedly from a reputable company attempting to get a personal information.
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- The address of a webpage. Check the validity of it before clicking on it.
- A sequence of words or text used to control access to a computer; similar to a password.
10 Clues: Verifying identity • Unauthorized access to a network, information systems, or application. • The address of a webpage. Check the validity of it before clicking on it. • Should be constructed of upper and lower case letters, numbers, and special characters • A sequence of words or text used to control access to a computer; similar to a password. • ...
Cybersecurity 2021-03-08
Across
- making a copy of original data
- software that causes harm to a computer
- a malicious computer program that is hidden in an application
- software that tracks the key strokes on the keyboard
- defrauding an online account holder of financial information by posing as a legitimate company
Down
- software that lets a user obtain covert information on your computer activities
- someone who exploits weaknesses in a computer system
- Software designed to detect and destroy a virus
- a standalone malicious computer program that replicates and spreads on a computer system
- software that encodes data and requires a key to decode
10 Clues: making a copy of original data • software that causes harm to a computer • Software designed to detect and destroy a virus • someone who exploits weaknesses in a computer system • software that tracks the key strokes on the keyboard • software that encodes data and requires a key to decode • a malicious computer program that is hidden in an application • ...
Cybersecurity 2021-02-12
Across
- data dater that has personal information such as your maiden name or your date of birth
- a person who uses computers to gain unauthorized access to data.
- you use it to login to websites and files
- Need to be attached to a file
- not known or seen or not meant to be known or seen by others.
Down
- what you do without getting permission to do it first
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- Opens a back door which allows more malware to be loaded
- Uses vulnerabilities to move into your machine.
- when somebody sends an email giving you false information to make you give them something
10 Clues: Need to be attached to a file • you use it to login to websites and files • Uses vulnerabilities to move into your machine. • what you do without getting permission to do it first • Opens a back door which allows more malware to be loaded • not known or seen or not meant to be known or seen by others. • ...
Cybersecurity 2021-02-12
Across
- data dater that has personal information such as your maiden name or your date of birth
- a person who uses computers to gain unauthorized access to data.
- you use it to login to websites and files
- Need to be attached to a file
- not known or seen or not meant to be known or seen by others.
Down
- what you do without getting permission to do it first
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- Opens a back door which allows more malware to be loaded
- Uses vulnerabilities to move into your machine.
- when somebody sends an email giving you false information to make you give them something
10 Clues: Need to be attached to a file • you use it to login to websites and files • Uses vulnerabilities to move into your machine. • what you do without getting permission to do it first • Opens a back door which allows more malware to be loaded • not known or seen or not meant to be known or seen by others. • ...
CYBERSECURITY 2021-10-18
Across
- The short form of malicious software - Malware
- A software that covertly monitors your online behavior
- A software or hardware device designed to protect your private data
- A tool that helps mask to location of the user to guarantee anonymity
- The practice of sending fraudulent communications that appear to come from a reputable source
Down
- HORSE A piece of malware that often allows a hacker to gain remote access to a computer through a back door
- A piece of malicious code that can replicate itself in order to spread the infection to other connected computers
- A technology that enables us to access our files through the internet remotely
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
- An incident where a hacker gains unauthorized access to a computer or device
10 Clues: The short form of malicious software - Malware • A software that covertly monitors your online behavior • A software or hardware device designed to protect your private data • A tool that helps mask to location of the user to guarantee anonymity • An incident where a hacker gains unauthorized access to a computer or device • ...
cybersecurity 2023-04-02
Across
- worm A type of malware that spreads itself by copying itself to other computers on the same network (9 letters): _________ worm
- Malicious software that is designed to gain access to a computer system without the user's consent (7 letters): ________
- A technique used to trick users into revealing sensitive information, such as passwords or credit card numbers (9 letters): _________ing
- A type of attack that involves intercepting and altering communication between two parties (10 letters): _________-in-the-middle attack
- of Service A type of attack that attempts to make a computer or network resource unavailable to its intended users (8 letters): _________ of Service
Down
- exploit A type of attack that targets vulnerabilities in software or hardware to gain unauthorized access (8 letters): _________ exploit
- force A type of attack that involves guessing a password by trying many different combinations (9 letters): _________ force attack
- The process of converting data into an unreadable format to prevent unauthorized access (8 letters): _________tion
- A security protocol used to encrypt internet traffic (4 letters): ______
- A type of authentication that uses physical characteristics, such as fingerprints or facial
10 Clues: A security protocol used to encrypt internet traffic (4 letters): ______ • A type of authentication that uses physical characteristics, such as fingerprints or facial • The process of converting data into an unreadable format to prevent unauthorized access (8 letters): _________tion • ...
Cybersecurity 2023-08-23
Across
- A string of characters that allows access to a computer system or service.
- Before an application goes live, it needs to go through a security ___.
- Process of updating to address security vulnerabilities.
- If a cyber attack is suspected, it should be reported to the ___ response team.
- SIEM tool from IBM.
Down
- A type of social engineering attack involving communication that pretends to be legitimate.
- We are all cyber ___.
- Used in cryptography to prove authenticity of a device, server, or user.
- FIM checks OS, database, and application software files to uncover tampering. What is the I in FIM?
- Linux distro used for ethical hacking.
10 Clues: SIEM tool from IBM. • We are all cyber ___. • Linux distro used for ethical hacking. • Process of updating to address security vulnerabilities. • Before an application goes live, it needs to go through a security ___. • Used in cryptography to prove authenticity of a device, server, or user. • ...
Cybersecurity 2023-11-24
Across
- when your data is confidential, available and keeps it's integrity
- a special way of decrypting a cipher such as pigpen, morse code, or caesar
- internet of things
- hacker that does bad
- words or text that needs a key to decode
- hacker that does good but without permission
Down
- hiding a file or text in a picture
- hacking people without code
- authentication that is something you are, know or have
- hacker that does good
10 Clues: internet of things • hacker that does bad • hacker that does good • hacking people without code • hiding a file or text in a picture • words or text that needs a key to decode • hacker that does good but without permission • authentication that is something you are, know or have • when your data is confidential, available and keeps it's integrity • ...
Cybersecurity 2024-03-20
Across
- A scam where a hacker poses as a legitimate business or organization in order to fool the victim into giving them sensitive personal information
- shield users against viruses, spyware, trojans, and worms that can damage computer hardware through email or web browsing.
- a network security device that monitors traffic to or from your network.
- Coding used to protect your information from hackers.
Down
- A hacker who is invited to test out computer systems and servers, looking for vulnerabilities "hacker ____ __ "
- The process of identifying a user’s identity
- malicious attempt to disrupt normal traffic to a web property.
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
- a method of connecting a series of computers and devices in a private encrypted network,
- A piece of audio or video that has been altered and changed to make it seem authentic or credible.
10 Clues: The process of identifying a user’s identity • Coding used to protect your information from hackers. • malicious attempt to disrupt normal traffic to a web property. • a network security device that monitors traffic to or from your network. • a method of connecting a series of computers and devices in a private encrypted network, • ...
Cybersecurity 2024-05-07
Across
- A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- Unauthorized access to a network, information systems, or application.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying dat
Down
- The process of converting information or data into a code, especially to prevent unauthorized access.
- The process of recognizing a user's identity to ensure that individuals are who they claim to be.
- A type of surveillance software that has the capability to record every keystroke made on a computer.
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
- A service that allows you to connect to the internet via a server run by a provider, creating a secure connection.
10 Clues: Unauthorized access to a network, information systems, or application. • The process of recognizing a user's identity to ensure that individuals are who they claim to be. • The process of converting information or data into a code, especially to prevent unauthorized access. • ...
Cybersecurity 2025-02-16
Across
- A cybersecurity measure that verifies identity using something you know and something you have.
- A cybersecurity practice that scrambles data to protect it.
- A fake website designed to steal login credentials.
- A type of cyberattack that floods a server with traffic to take it down.
- A type of virus that disguises itself as a legitimate program.
Down
- The process of confirming that a user is who they claim to be.
- A program that secretly records what a user types to steal passwords.
- A type of attack where hackers encrypt files and demand payment.
- A malicious software that spreads without user action.
- Tricking someone into revealing personal information through fake emails.
10 Clues: A fake website designed to steal login credentials. • A malicious software that spreads without user action. • A cybersecurity practice that scrambles data to protect it. • The process of confirming that a user is who they claim to be. • A type of virus that disguises itself as a legitimate program. • ...
Cybersecurity 2025-04-08
Across
- to decide the quality or importance of something
- a residence that uses internet-connected devices
- the chance that something will happen
- the activity of getting into someone else's computer system without permission
Down
- the quality of being vulnerable
- a detailed plan for achieving success in situations
- a member of a group of people who move from one place to another
- a suggestion that something unpleasant or violent will happen
- a set of ideas or a plan of what to do in particular situations
- the possibility of something bad happening
10 Clues: the quality of being vulnerable • the chance that something will happen • the possibility of something bad happening • to decide the quality or importance of something • a residence that uses internet-connected devices • a detailed plan for achieving success in situations • a suggestion that something unpleasant or violent will happen • ...
Cybersecurity 2024-09-16
Across
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
- Malware that locks or encrypts data, demanding payment for its release
- A person who gains unauthorized access to systems or networks
- Process of converting data into a code to prevent unauthorized access
Down
- A secret word or phrase used to authenticate access to data or systems
- Software that secretly monitors user activity and collects information
- Malicious software designed to harm, exploit, or disable computers
- A security system that monitors and controls incoming and outgoing network traffic
- Software used to detect, prevent, and remove malicious software
- A secure network connection that allows users to send and receive data as if they were on a private network
10 Clues: A person who gains unauthorized access to systems or networks • Software used to detect, prevent, and remove malicious software • Malicious software designed to harm, exploit, or disable computers • Process of converting data into a code to prevent unauthorized access • A secret word or phrase used to authenticate access to data or systems • ...
cybersecurity 2025-11-17
Across
- :malware that intervenes with the aim of harming the computer user
- : security method based on identity and access management which requires two forms of identification to access resources and data.
- : essential network devices that operate at the data link layer of the OSI model
- : a person who is looking for ways to bypass software and hardware protections
- : a kind of binder in which we store various files.
- : Set of remote servers offering services accessible via the Internet.
Down
- : a type of operating system commonly used on computers and laptops
- : method used in cryptanalysis to find a password or a key
- : an attack that takes advantage of a security vulnerability for which no patch has been implemented
- : Software capable of detecting and eliminating computer viruses.
10 Clues: : a kind of binder in which we store various files. • : method used in cryptanalysis to find a password or a key • : Software capable of detecting and eliminating computer viruses. • :malware that intervenes with the aim of harming the computer user • : a type of operating system commonly used on computers and laptops • ...
Internal Audit Holiday Fun 2023-12-14
IT Cybersecurity 2023-03-29
Across
- Wireless network that requires no authentication.
- A method that allows the frequency of the wireless network to be fine-tuned. Each channel is approximately 20 MHz wide.
- Wireless communication technology that allows two devices to connect to each other over a short distance.
- Combines multiple channels—or lanes—to increase the amount of traffic that a modem's highway can comfortably support.
- A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
- Wireless authentication method that allows for automatic connection between a device and the wireless access point.
- The wireless access point provides access to a wireless network.
- An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices.
- A communication method that allows two-way communication between two devices within a few centimeters of each other.
- Wireless authentication method that uses a passphrase to authenticate users.
- A method that combines channels into one to increase bandwidth.
Down
- Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest versions in use.
- Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
- An enhancement that allows multiple antennas to use the same radio frequency.
- The expected number of times an event will occur in a given time frame.
- Conceals the data's original meaning to prevent it from being known or used.
- An Ethernet cable provides the connection between a device connected to the network port and the switch.
- The interface between a computer's hardware and software.
18 Clues: Wireless network that requires no authentication. • The interface between a computer's hardware and software. • A method that combines channels into one to increase bandwidth. • The wireless access point provides access to a wireless network. • The expected number of times an event will occur in a given time frame. • ...
cybersecurity Crossword 2025-10-14
Across
- acts as a security camera which watches for any suspicious activity
- ensuring data is accurate, complete, and secure
- storing data on a device not connected to a network
- used to detect, prevent, and remove any malicious software
- transmits data as pulses of light
- the proccess of proving your identity and ensuring authorization
- a security system which acts as a barrier between private and external ones and monitors incoming and outgoing traffic
Down
- ensuring timely access to information
- two step process to verifying identity
- relies on physical connections, which makes it difficult to hack
- ensures that someone can't unsend anything or deny any action online
- to reduce the potential harm of a threat
- tool which monitora network traffic and blocks off any sort of malicious activity
- stands for confidentiality, integrity, and availability and also means keeping data secret and secure
- ways to verify a user's identity
- the possibility of an unfortunate event occuring
- keeping data private and accessible only to those who are authorized
17 Clues: ways to verify a user's identity • transmits data as pulses of light • ensuring timely access to information • two step process to verifying identity • to reduce the potential harm of a threat • ensuring data is accurate, complete, and secure • the possibility of an unfortunate event occuring • storing data on a device not connected to a network • ...
INF Crossword Puzzle 2024-01-24
Lucas' Graduation-Day Crossword 2021-10-14
17 Clues: Pomp • Go... • Graduate • A builder • GCU Color • GCU Street • Black Beans • Lucas's Major • Hat Decoration • Type of Degree • Years in School • group of people • Type of Ceremony • Lucas's Employer • Best type of Tree • Name of GCU Mascot • Grand _ University
Risk Awareness Month 2024 2024-05-14
Across
- _________ can make a difference [Word found in EDM on CRO's message]
- _________ effort of every level [Word found in EDM on risk governance framework]
- Stay alert on possible _________ attempts [Word found in EDM on cybersecurity risks]
- We are not immune to _________ risks [Word found in EDM on cybersecurity risks]
- _________ form the 1st line of defence in our risk governance framework [Word found in EDM on risk governance framework]
- _________ into Critical Installations [Word found in EDM on operational risks]
Down
- Risk_________ Month [Word found in EDM on CRO's message]
- Flooding at expressways and major _________ [Word found in EDM on operational risks]
- Good _________ marksmanship [Word found in EDM on financial and strategic risk]
- Use water _________ appliances and fittings [Word found in EDM on financial and strategic risk]
10 Clues: Risk_________ Month [Word found in EDM on CRO's message] • _________ can make a difference [Word found in EDM on CRO's message] • _________ into Critical Installations [Word found in EDM on operational risks] • Good _________ marksmanship [Word found in EDM on financial and strategic risk] • ...
all about me 2025-04-24
23 Clues: dog 2 • dog 2 • cat 1 • dog 1 • dog -1 • 2nd period • 4th period • 1st period • 3rd period • 5th period • 7th period • 8th period • 6th period • ashers weight • venus' weight • avalons weight • favorite sport • favorite color • favorite number • favorite lizzo song • second favorite color • ashers favorite snack • favorite taylor swift song
Technology 2025-01-08
14 Clues: AI • to save • software • to erase • transmit • cellphone • text message • social media • cybersecurity • email address • to surf the web • computer science • digital digital era • the influences of technology
Procedure Name Crossword 2026-01-22
What is Cyber Security: Vocabulary Review 2024-09-04
Across
- the practice of isolating resources and controlling access to them through APIs or strict interfaces
- a design technique that separates the functionality of a program into independent, interchangeable components.
- the process of breaking down complex cybersecurity models into abstract components to simplify and clearly define their security roles.
- the practice of protecting data from unauthorized access, disclosure, or alteration
- the protection of data from unauthorized modification or deletion.
- a cybersecurity technique that protects processes from each other on an operating system.
- a design principle that emphasizes the importance of simplicity in cyber security systems and logics
- the practice of concealing information within other data, structures, or media to prevent unauthorized access.
- the principle of granting users only the minimum level of access or permissions necessary to perform their job functions
- the practice of collecting, processing, and storing only the minimum amount of data needed to complete a specific task.
Down
- creating secondary safety nets that bolster network security and mitigate single points of failure throughout the network.
- the ability to reliably access and use information in a timely manner.
- a cybersecurity strategy that uses multiple layers of security measures to protect an organization's assets.
- a process that separates data, processes, and administrative tasks into logical groupings, or domains.
- the practice of reducing unnecessary complexity and focusing on what's essential
- a way of looking at the world from the perspective of a hacker
16 Clues: a way of looking at the world from the perspective of a hacker • the protection of data from unauthorized modification or deletion. • the ability to reliably access and use information in a timely manner. • the practice of reducing unnecessary complexity and focusing on what's essential • ...
IEM July SM Crossword 2022-07-26
Across
- Each year, over 500,000 ____ are affected by house fires.
- ________ is creating a common baseline for cybersecurity performance goals in critical infrastructure.
- National Oceanic & Atmospheric Administration released a _______ Community Guide Tool for community planners and decision makers.
- On July 17th is also known as what?
Down
- People who regularly have ____ interactions with others tend to live longer, boost their mood, and have a sense of purpose.
- The US Postal Service processes and delivers 425.3 ______ pieces of mail each day.
- NIST is updating its _____ Framework (CSF) to keep pace with the evolving cybersecurity landscape.
- The ___ app provides access to weather alerts, disaster resources and preparedness tips.
- ______ bring the risk of fires, injuries, and death.
- July 25th is National Hire a _____ day.
10 Clues: On July 17th is also known as what? • July 25th is National Hire a _____ day. • ______ bring the risk of fires, injuries, and death. • Each year, over 500,000 ____ are affected by house fires. • The US Postal Service processes and delivers 425.3 ______ pieces of mail each day. • ...
IEM's December Social Media Crossword Puzzle 2021-12-20
Across
- United States Space Force
- State Association of Counties Annual Meeting
- IEMer who moderated a discussion on wildfire resilience & prevention at #NDRC21 (last name)
- Follow Cybersecurity and Infrastructure Security Agency’s ______ best practices
- IEM’s innovative GIS ______
- IEMer who moderated the panel, Best Practice Programs at the State Level (last name)
- FEMA’s interactive Program Planning Toolkit
- FEMA’s 2022-2026 ____ ____
- Our thoughts are with the communities in Kentucky and the Midwest impacted by
Down
- AshBritt-IEM Health had the pleasure of meeting First Lady _____
- The IEM family would like to wish you and yours
- New FEMA Deputy Administrator (last name)
- Have you gotten you flu _____?
- It’s time to get into the holiday spirit by breaking out your…
- New COVID-19 variant
15 Clues: New COVID-19 variant • United States Space Force • FEMA’s 2022-2026 ____ ____ • IEM’s innovative GIS ______ • Have you gotten you flu _____? • New FEMA Deputy Administrator (last name) • FEMA’s interactive Program Planning Toolkit • State Association of Counties Annual Meeting • The IEM family would like to wish you and yours • ...
Crossword 2025-05-13
Cybersecurity Vocabulary 2023-01-25
Across
- A bug where user input is passed as the format argument to printf
- This is when an application reveals sensitive data
- determines strength and validity of passwords.
- A secret entry point into a program.
- can undermine the controls that secure the data of millions
- The result of a mismatch between arithmetic and mathematical arithmetic
- The web server account is incorrectly given access to the system files
- Is the manipulation of people to divulge information or performing actions.
Down
- Somebody who gains illegal access to a phones system.
- An attempt to crack a password by using every combination of letters and digits until a password is cracked.
- bypassing standard authentication or encryption in a computer.
- Mother Nature's actions
- A trapdoor in software that allows easy maintenance
- A subset of the Trojan horse malware.
- A system used to gain authentications by cracking a password hash.
- when a hacker exploits the vulnerability before its fixed.
16 Clues: Mother Nature's actions • A secret entry point into a program. • A subset of the Trojan horse malware. • determines strength and validity of passwords. • This is when an application reveals sensitive data • A trapdoor in software that allows easy maintenance • Somebody who gains illegal access to a phones system. • ...
CyberSecurity Crossword 2023-08-07
Across
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction
- Should be constructed of upper and lower case letters, numbers, and special characters
- verifying identity
- a type of software that is designed to display advertisements on a user's computer or device.
- a type of software or hardware device that is designed to capture and record keystrokes made on a computer or other device
- The “I” in the C-I-A Triad; protection from unauthorized changes
- The “A” in the C-I-A Triad. It ensures authorized users have access
- A fraudulent email purportedly from a reputable company attempting to get personal information
Down
- Threatening behavior facilitated through electronic means such as texting
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- weakness in a computer system that could be exploited to violate the system’s security
- Software that scans a device or a network to detect security threats, alert the user, and neutralize malicious code
- Facebook, Twitter, Instagram, etc. (Two words)
- The process of taking plain text and scrambling it into an unreadable format
- the act of secretly listening to or monitoring the conversations or communications of others without their knowledge or consent
- enables a user to connect securely from outside to their business network, even though they are not located on their office premises
16 Clues: verifying identity • Facebook, Twitter, Instagram, etc. (Two words) • The “I” in the C-I-A Triad; protection from unauthorized changes • The “A” in the C-I-A Triad. It ensures authorized users have access • Threatening behavior facilitated through electronic means such as texting • The process of taking plain text and scrambling it into an unreadable format • ...
Cybersecurity Month 2023-07-24
Across
- (Hint: Make a copy of your important files for safety)
- (Hint: Your data is well-protected and out of harm's way)
- (Hint: Being informed and cautious about online risks)
- (Hint: Keep your personal information confidential)
- (Hint: A secret code you create to protect your accounts)
- (Hint: Ensure your online accounts and devices are protected)
- (Hint: Converting data into secret code to keep it safe)
Down
- (Hint: Relating to computers and the internet)
- (Hint: Regularly install software improvements for better security)
- (Hint: A protective barrier that keeps hackers out)
- (Hint: Secure your device with a digital key)
- (Hint: Harmful software that can damage your computer)
- (Hint: Tricky schemes to deceive you online)
- (Hint: A harmful computer program that can spread)
- (Hint: Only rely on reputable sources and websites)
- (Hint: Deceptive emails or messages trying to steal your info)
16 Clues: (Hint: Tricky schemes to deceive you online) • (Hint: Secure your device with a digital key) • (Hint: Relating to computers and the internet) • (Hint: A harmful computer program that can spread) • (Hint: A protective barrier that keeps hackers out) • (Hint: Keep your personal information confidential) • (Hint: Only rely on reputable sources and websites) • ...
The Need for a Stronger Indian Cyber Law: Lessons from Global Cybersecurity Frameworks 2025-04-07
Across
- China mandates data ___ for sectors like finance and telecom
- China's national priority in its 2017 Cybersecurity Law
- CCPA's core feature: consumers can ___ of data sales
- IT Act clause on compensation for negligent data handling
- India's primary cybersecurity law (enacted in 2000)
- GDPR fines can hit 4% of global ___ (hint: revenue)
- Indian ID system hit by major 2018 data breach
- Urgent need for India's outdated IT Act
Down
- GDPR's "___ by Design" mandates proactive data protection
- Attack type that crippled AIIMS in 2023
- GDPR right allowing users to delete personal data
- California law allowing consumers to sue over data breaches
- Landmark EU regulation with "Right to be Forgotten"
- GDPR-required role: Data Protection ___
14 Clues: Attack type that crippled AIIMS in 2023 • GDPR-required role: Data Protection ___ • Urgent need for India's outdated IT Act • Indian ID system hit by major 2018 data breach • GDPR right allowing users to delete personal data • Landmark EU regulation with "Right to be Forgotten" • India's primary cybersecurity law (enacted in 2000) • ...
Cybersecurity Vocab 2021-09-28
Across
- Secret unknown access point into a system
- Flaw or potential for harm
- Virus that infects a computer before the operating system loads
- Following the rules or standards that have been established
- Software that is embedded in hardware
- Computer code intentially written to cause some form of harm
- Using a lie or scam to obtain private information
- Physical token inserted into a computer's usb port
Down
- Measurement and analysis of a biological feature
- Condition of being pricate or secret
- Something that takes a vulnerability to a level where it can be exploited
- Encrypts data do user connot access it intil a fee is paid to hacker only
- Acions of ,alicous code
- Proccess by which something becomes harder it is made harder to hack
- State of being complete or uncorrupted
- Technology that thracks a users' keystokes on the keyboard
16 Clues: Acions of ,alicous code • Flaw or potential for harm • Condition of being pricate or secret • Software that is embedded in hardware • State of being complete or uncorrupted • Secret unknown access point into a system • Measurement and analysis of a biological feature • Using a lie or scam to obtain private information • Physical token inserted into a computer's usb port • ...
cybersecurity awareness 2017-09-28
Across
- is a string of characters used for authenticating a user on acomputer system
- A small, portable flash memory card that plugs into a computer s USB port and functions as a portable hard drive.
- is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
- A criminal act that involves malicious threats intended to cause injury to an individual to compel him or her to do an act against his or her will.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- an electronic device for storing and processing data
- is a type of malware that is often disguised as legitimate software
Down
- is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner's private information
- is a standalone malware computerprogram that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the targetcomputer to access it.
- is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.Feb
- is a form of malware in which rogue software code effectively holds a user's computer hostage until a "ransom" fee is paid.
- The translation of data into a secret code.The most effective way to achieve data security.
- The global communication network that allows almost allcomputers worldwide to connect and exchange information.
- the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.
- software that is intended to damage or disable computers and computer systems.
16 Clues: an electronic device for storing and processing data • is a type of malware that is often disguised as legitimate software • is a string of characters used for authenticating a user on acomputer system • software that is intended to damage or disable computers and computer systems. • ...
Cybersecurity Crossword 2022-09-07
Across
- umbrella term for malicious software
- a software tool used to take advantage of a software or hardware vulnerabilities
- self replicating malware that does not require human interaction
- software that lets you browse the internet
- small files that track browser usage and preferences
- email based scamming
- software that scans a device to detect threats
Down
- day of the week most vendors release patches
- malware that encrypts files and demands payment
- software that secretly captures info as it is typed
- text message based scamming
- another word for a software update
- copy of computer data for data loss prevention
- phone based scamming
- any kind of unwanted, unsolicited digital communication
- filters unwanted traffic on a network
16 Clues: phone based scamming • email based scamming • text message based scamming • another word for a software update • umbrella term for malicious software • filters unwanted traffic on a network • software that lets you browse the internet • day of the week most vendors release patches • copy of computer data for data loss prevention • ...
Cybersecurity Puzzle 2025-09-26
Across
- Incidents where confidential information is stolen, leaked, or disclosed are known as what?
- A strong culture equals strong _____.
- This security feature requires at least two forms of authentication.
- The concept of human firewalls is built on this critical aspect of security.
- Attackers using manipulative techniques to scam people is known as what?
- Organizational ____ are designed to keep people, data, and devices safe.
- What is one of the leading causes of security incidents?
Down
- This type of fraud occurs when a scammer uses stolen information to open credit cards in the victim’s name.
- What is the top attack method for cybercriminals?
- This type of malware encrypts data to prevent access to valuable resources.
- The umbrella term covering any form of malicious code that alters the functionality of computers and smart devices.
- In recent years, attackers have embraced the convenience of these.
- While online threats get the most attention in the world of security, these threats pose just as much risk.
- People are the last line of ____.
- It is imperative to ensure accounts are protected with these.
- If you encounter a phishing attack, what should you do immediately?
16 Clues: People are the last line of ____. • A strong culture equals strong _____. • What is the top attack method for cybercriminals? • What is one of the leading causes of security incidents? • It is imperative to ensure accounts are protected with these. • In recent years, attackers have embraced the convenience of these. • ...
Disruptive Technology 2025-07-23
12 Clues: Mesh • cloud • Reality • Detection • Automation • technology • Intelligence • Intelligence • Immune System • Authentication • Liability Insurance • Screening, Quantum Computing
test 2022-10-25
Digital Literacy 2025-07-03
Across
- ที่เก็บข้อมูลออนไลน์
- ประมวลผลข้อมูลใกล้แหล่งใช้งาน
- เครือข่ายไร้สายรุ่นที่ห้า
- การวิเคราะห์ข้อมูลเพื่อค้นหา insight
- อุปกรณ์อัจฉริยะที่เชื่อมต่ออินเทอร์เน็ต
Down
- ป้องกันภัยคุกคามทางไซเบอร์
- เครื่องจักรกลอัตโนมัติทุกชนิดที่ออกแบบให้สามารถทำงานแทนมนุษย์
- ข้อมูลจำนวนมหาศาล
- สมองกลที่เลียนแบบความคิดมนุษย์
- เครือข่ายที่ควบคุมตัวเองได้
10 Clues: ข้อมูลจำนวนมหาศาล • ที่เก็บข้อมูลออนไลน์ • เครือข่ายไร้สายรุ่นที่ห้า • ป้องกันภัยคุกคามทางไซเบอร์ • เครือข่ายที่ควบคุมตัวเองได้ • ประมวลผลข้อมูลใกล้แหล่งใช้งาน • สมองกลที่เลียนแบบความคิดมนุษย์ • การวิเคราะห์ข้อมูลเพื่อค้นหา insight • อุปกรณ์อัจฉริยะที่เชื่อมต่ออินเทอร์เน็ต • เครื่องจักรกลอัตโนมัติทุกชนิดที่ออกแบบให้สามารถทำงานแทนมนุษย์
Management Modules 2025-04-03
Across
- Widely referenced cybersecurity management model originally published as British Standard BS7799.
- Management Model that provides advice about the implementation of controls and objectives for cybersecurity
- Organization that created COBIT
Down
- Cybersecurity framework series
- Collection of methods and practices for managing the development and operation of IT infrastructures.
- Framework for improving critical infrastructure security support for cybersecurity event recovery
6 Clues: Cybersecurity framework series • Organization that created COBIT • Widely referenced cybersecurity management model originally published as British Standard BS7799. • Framework for improving critical infrastructure security support for cybersecurity event recovery • ...
Panther Cross Word 2022-04-29
Across
- The largest End Point Detection vendor on the market
- The fastest growing area to store company data
- A computer or system that mimics a target that a hacker would go after. It is used as a way to collect data on different attack patterns
- The word used to describe the adding of additional contextual data to alerts in order to cut down on noise. Greynoise helped us with this.
- The acronym used to describe a fully outsourced solution for threat detection
- A 3rd party vendor who acts as a middleman to distribute software
- Refers to data exiting a network
- Refers to data entering into a network
- A receipt of any action performed within a system
- A compliance-driven evaluation that reveals where you're susceptible to an attack
- The acronym used to describe a solution type that detections user behavior for anything malicious
Down
- This compliance is imposed on companies that do business in within the EMEA
- The most utilized cybersecurity framework in the world
- A phrase coined by Panther to describe one of our biggest differentiators
- This compliance is imposed on companies that collect health care data
- The practice of protecting systems, networks, and programs from cyber attacks
- The largest SIEM vendor in the world
- This compliance is imposed on companies that collect credit card data
- A solution that aggregates logs
- Acronym that describes Endpoint detection combined with Threat Detection
- This compliance is imposed on companies that collect other companies information
- Refers to different events being interconnected that paint a conclusion
- A 3rd party vendor who you can outsource your cybersecurity to
- This is typically the gatekeeper for your network and the first line of cyber defense
24 Clues: A solution that aggregates logs • Refers to data exiting a network • The largest SIEM vendor in the world • Refers to data entering into a network • The fastest growing area to store company data • A receipt of any action performed within a system • The largest End Point Detection vendor on the market • The most utilized cybersecurity framework in the world • ...
NVH September Trivia 2022-08-24
Across
- Ext. 7060
- Policy keeper
- NVH Lab blood supplier
- Personal ______ Equipment
- Cybersecurity Training
- Code Call for Combative Person
- Coffee Shop
- Extended Care "Family"
- John Caitlynn & Liz Therapy
Down
- TFMC ARNP
- Zzz Service
- payroll software
- BOC Meeting Day
- Purchaser
- Resuscitation Quality Improvement
- Drs. Dhillon & Jex Service
- The next EHR
- New mammo system
18 Clues: TFMC ARNP • Ext. 7060 • Purchaser • Zzz Service • Coffee Shop • The next EHR • Policy keeper • BOC Meeting Day • payroll software • New mammo system • NVH Lab blood supplier • Cybersecurity Training • Extended Care "Family" • Personal ______ Equipment • Drs. Dhillon & Jex Service • John Caitlynn & Liz Therapy • Code Call for Combative Person • Resuscitation Quality Improvement
Cybersecurity Awareness 2025-01-16
Across
- The opposite of risky.
- A secret used to unlock your account.
- When sensitive info gets exposed.
- Software that fights against malware.
- A common way hackers send fake messages.
- A virtual barrier that blocks bad stuff online.
- What you shouldn't do without checking the link first.
- To scramble data so only the right person can read it.
Down
- The prefix for security in the digital world.
- What keeps your software secure and current.
- A fake email trying to steal your information.
- Unwanted emails clogging your inbox.
- What you use to protect your phone or laptop screen.
- A copy of your files in case something goes wrong.
- Something you shouldn't give to suspicious websites.
- A second step to prove it'd really you.
16 Clues: The opposite of risky. • When sensitive info gets exposed. • Unwanted emails clogging your inbox. • A secret used to unlock your account. • Software that fights against malware. • A second step to prove it'd really you. • A common way hackers send fake messages. • What keeps your software secure and current. • The prefix for security in the digital world. • ...
청당 빠바 구문독해 6-22 2023-01-18
16 Clues: 절도 • 자동차 • 대리점 • 공동의 • 자동차의 • 입증하다 • 흔히, 보통 • 사이버 보안 • 취약한, 연약한 • 실직한, 실업자인 • 임차하다, 빌리다 • 혜택, 이득; 득을 보다 • (범죄, 사고 등) 사건 • 조정[조절]하다; 적응하다 • (연료, 에너지, 시간을)소모하다 • (자동차 앞창에 있는)유리 닦개(와이퍼)
TECHNOLOGY 2024-02-14
hahahha 2024-08-24
Legislation 2025-08-12
Across
- This Act covers personal data being used criminally
- This covers development and deployment of AI
- The rules that cover sharing information
- Regulatory framework to protect financial institutions
- Regulates the network security
Down
- A regulation aimed at strengthening cybersecurity
- What is the acronym for this that protects personal data
- To improve cybersecurity of products and services
- This law about transmitting automated marketing
9 Clues: Regulates the network security • The rules that cover sharing information • This covers development and deployment of AI • This law about transmitting automated marketing • A regulation aimed at strengthening cybersecurity • To improve cybersecurity of products and services • This Act covers personal data being used criminally • ...
CS240-1 Students 2024-09-01
Across
- Ran a sub 20minute 5k
- Lived in both Brazil & Spain.
- CIS Sandbox Tutor
- Wants to be a forensic accountant
- I desire to help people professionally and personally
- I'm definitely putting Boston in my rear view mirror someday
- I'm good at analyzing markets and equities on a technical level.
- In high school, my graduating class only had 100 kids.
- Really good at First Person Shooter games
- My ideal job would be in gaming
- I love all things cybersecurity related
- My brain absorbs information like a sponge
- I can improvise to solve problems creatively and efficiently
Down
- I created a board game
- I don't procrastinate
- I like my role as a tutor.
- Pursuing CPA after graduation
- I will someday have my own Cybersecurity firm
- Loves a challenge and does not settle for things that are easy.
- I'm from Georgia (not the one in the US)
- I am a really fast learner.
- Grew up on Cape Cod, MA
- Really good at time management
- I used to be a procrastinator
- Lacrosse Team Member
- I'm trying to improve my golf game.
26 Clues: CIS Sandbox Tutor • Lacrosse Team Member • I don't procrastinate • Ran a sub 20minute 5k • I created a board game • Grew up on Cape Cod, MA • I like my role as a tutor. • I am a really fast learner. • Lived in both Brazil & Spain. • Pursuing CPA after graduation • I used to be a procrastinator • Really good at time management • My ideal job would be in gaming • ...
Dbl AA November 16! 2022-11-16
Across
- Favorite TV
- Favorite outdoor hobby
- Older vehicle
- Zoom zoom
- Grodhaus Family game
- Cute youngster
- Sisters of mom
- Grandma appreciated Aaron’s
- Walking with cat in
- Fun with Lizzy’s hair
Down
- Love spark established
- Kit for picking
- Impressive talent
- special older woman
- Cute girl
- Favorite indoor hobby
- Work interest
- Teal Team
- Quail Hollow
- Your mama
20 Clues: Zoom zoom • Cute girl • Teal Team • Your mama • Favorite TV • Quail Hollow • Older vehicle • Work interest • Cute youngster • Sisters of mom • Kit for picking • Impressive talent • special older woman • Walking with cat in • Grodhaus Family game • Favorite indoor hobby • Fun with Lizzy’s hair • Love spark established • Favorite outdoor hobby • Grandma appreciated Aaron’s
Cyber Security 2023-09-08
Across
- data encryption ransom
- compromised computer network
- psychological manipulation
- system manager
- identifying threats
- unwanted advertisements
- multiple verification layers
- secret access keys
- protecting digital systems.
- interconnected devices
Down
- stolen identity
- data encrypt
- secure network connection
- wireless technology
- unauthorized access point
- internet address
- malicious digital actions
- digital information
- malicious software
- computer programs
20 Clues: data encrypt • system manager • stolen identity • internet address • computer programs • malicious software • secret access keys • wireless technology • identifying threats • digital information • data encryption ransom • interconnected devices • unwanted advertisements • secure network connection • unauthorized access point • malicious digital actions • psychological manipulation • ...
CYBERSECURITY DECEMBER 2, 2023 2023-12-03
Across
- A deceptive practice where a person or program successfully masquerades as another.
- A field within cybersecurity that uses investigative techniques to identify and store evidence from a computer device (2 words).
- Describes data that requires power to maintain its contents.
- a fundamental unit of data in computer networking and data communication.
- An authentication method that requires the user to provide two or more verification factors to gain access to a resource. MFA
- an advanced security technology that builds upon the functionality of an IDS. It not only detects suspicious or malicious activities but also takes proactive measures to block or mitigate them in real-time.
- A documented, structured approach for handling security breaches, and cyber threats. (3 words)
- A technology that allows you to create a secure connection over a less secure network, such as the internet. It can also mask your connection origin, making it appear that you are connecting via a different location than where you physically are located.
- _______ Modeling, Risk Modeling, or Risk Analysis is a systematic way of thinking where a system may be vulnerable in order to best defend against possible attacks.
- A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system.
- A phishing attack transmitted by SMS (text) message.
- The world's most famous hacker.
- From Day 1, cybersecurity is built upon a foundation of three principles – private data is kept private.
- Model that describes how data is transmitted through a network.
- a decoy system or resource set up to monitor and analyze the behavior of attackers.
- This cipher was the first documented form of encryption and involves shifting each letter of a message by 3.
- A public-key cryptography algorithm
Down
- Relies on human interaction and often involves tricking people into breaking normal security procedures.
- This color team is made up of offensive security experts who try to (ethically) attack an organization’s cybersecurity defenses.
- An attack in which an attacker injects malicious executable scripts into the code of a trusted application or website.
- In this kind of cipher, both the encryption and decryption process use the same key,
- From Day 1,cybersecurity is built upon a foundation of three principles. This is one of them which means that data can be used by any authorized parties.
- This term (2 words) refers to limiting who (subjects) can read or write which resources (objects: e.g. files)
- A SQL_______ vulnerability arises when the original SQL query can be altered to form an altogether different query.
- From Day 1, cybersecurity is built upon a foundation of three principles. This is one of them which means that data is modified only by authorized parties.
- Software tool that allows users to capture and inspect data packets on a computer network.
- This software examines requests to access the network and determines if it should pass through.
- A number used to identify specific services or processes running on a computer or network device.
28 Clues: The world's most famous hacker. • A public-key cryptography algorithm • A phishing attack transmitted by SMS (text) message. • Describes data that requires power to maintain its contents. • Model that describes how data is transmitted through a network. • a fundamental unit of data in computer networking and data communication. • ...
TECHNOLOGY 2025-12-22
Across
- Set of rules
- Physical equipment
- Digital information
- Gap in tech access
- Online protection
- AI learning from data
- Electronic equipment
- Machines performing human tasks
- Program error
Down
- Copy from internet
- Send to internet
- Tasks done by machines
- Organised data
- Moral worries
- Connected computers
- New software version
- Computer programs
- Secret code
- Protection of information
- Saving data online
20 Clues: Secret code • Set of rules • Moral worries • Program error • Organised data • Send to internet • Computer programs • Online protection • Copy from internet • Physical equipment • Gap in tech access • Saving data online • Digital information • Connected computers • New software version • Electronic equipment • AI learning from data • Tasks done by machines • Protection of information • ...
Cybersecurity 2021-08-03
Across
- provides the validation of a message's origin.
- Ensures that data is not modified or tampered with.
- The degree of protection against danger, damage, loss, and criminal activity.
- Ensures that a system is up so that data is available when needed.
- Anything that has the potential to cause the loss of an asset.
Down
- An act, procedure, or piece of software that takes advantage of a vulnerability to carry out an attack.
- Ensures that data is not disclosed to unintended persons.
- An opening or weakness in the system.
- agent The person or entity that attempt or carries out a threat.
- Something that has value to an individual or an organization.
10 Clues: An opening or weakness in the system. • provides the validation of a message's origin. • Ensures that data is not modified or tampered with. • Ensures that data is not disclosed to unintended persons. • Something that has value to an individual or an organization. • Anything that has the potential to cause the loss of an asset. • ...
Cybersecurity 2024-04-22
Across
- A good practice for authorised users is to use unique ________ passwords
- ____________ type of cyber attack aims to steal data from the computers
- cybersecurity aims to secure _______ components from attackers
- __________ is a person who attempts to get unauthorised access to the computer system
- __________ is a virtual wall between the protected computer and the internet
Down
- __________ are dummy computers that attract hackers to keep the remaining computers safe
- _________ softwares must be used to protect computers against cyberattacks
- Man in the __________ is a type of cyberattack where the communication line is intercepted
- common type of attack which includes trojans and adwares
9 Clues: common type of attack which includes trojans and adwares • cybersecurity aims to secure _______ components from attackers • ____________ type of cyber attack aims to steal data from the computers • A good practice for authorised users is to use unique ________ passwords • _________ softwares must be used to protect computers against cyberattacks • ...
Cybersecurity 2024-10-10
Across
- Protecting data by scrambling it mathematically
- Data which requires special limited access that can cause harm if disclosed
- Sending fraudulent communications to take data or trick others into performing certain actions, usually by text or email
- A piece of code that adversely affects computers; typically to corrupt the system, steal data, or gain access
Down
- Network security device that monitors and filters incoming and outgoing network traffic
- Software designed to detect and destroy computer viruses
- Data that pertains directly to the company and has restricted access
- A person who uses computers to gain unauthorized access to data
- Data that is freely accessible to all
9 Clues: Data that is freely accessible to all • Protecting data by scrambling it mathematically • Software designed to detect and destroy computer viruses • A person who uses computers to gain unauthorized access to data • Data that pertains directly to the company and has restricted access • Data which requires special limited access that can cause harm if disclosed • ...
Cybersecurity 2024-09-05
Across
- Malicious act that seeks to damage data, steal data, or disrupt digital life in general
- Scam by text
- Helps you protect your accounts
- A software designed to prevent, detect, and remove viruses and malware from computers, networks, and devices.
Down
- Someone that tries to gain unauthorized access to data
- Scam by email
- Intrusive software developed by hackers to steal data and damage or destroy computers and computer systems
- Scam by phone
- Cybercrime activity that takes place over the internet or on email
9 Clues: Scam by text • Scam by email • Scam by phone • Helps you protect your accounts • Someone that tries to gain unauthorized access to data • Cybercrime activity that takes place over the internet or on email • Malicious act that seeks to damage data, steal data, or disrupt digital life in general • ...
Cybersecurity 2023-03-08
Across
- the use of a computer to gain unauthorized access to data in a system.
- The state of being protected against the criminal or unauthorized use of electronic data.
- a person who uses computers to gain unauthorized access to data.
- Tells a computer what actions to take
- what movie character was on the signs?
Down
- Where did this story take place?
- A broad range of information, or an opinion, that could identify an individual.
- breach results in information being accessed without authorization.
- What was hacked in this story?
- A part of a computer system or network which is designed to block unauthorized access
10 Clues: What was hacked in this story? • Where did this story take place? • Tells a computer what actions to take • what movie character was on the signs? • a person who uses computers to gain unauthorized access to data. • breach results in information being accessed without authorization. • the use of a computer to gain unauthorized access to data in a system. • ...
Cybersecurity 2022-05-16
Across
- the location a hacker typically want to get access to
- An activity which is carried out over or through the Internet.
- a method to get sensitive data
- when you create something according to a plan
- target of an SQL-Injection
- the most famous programming language for web applications
Down
- a famous whistleblower
- the good kind of hacker
- an activity which is carried out over or through the Internet.
- a word which describes a relative geographic location
10 Clues: a famous whistleblower • the good kind of hacker • target of an SQL-Injection • a method to get sensitive data • when you create something according to a plan • the location a hacker typically want to get access to • a word which describes a relative geographic location • the most famous programming language for web applications • ...
Cybersecurity 2025-03-09
Across
- A type of link or file that could be dangerous and may infect your device
- A process to help ensure your online activity is safe and private
- What you should create for each online account to make it harder to guess
- This type of attack often involves tricking users into revealing sensitive info by pretending to be a trustworthy entity
Down
- This term refers to the act of protecting your data by limiting access to authorized users
- The action of regularly installing updates to fix security vulnerabilities
- The type of software that protects your devices from harmful programs
- The authentication method of verifying your identity with a second factor like a code sent to your phone
- A term for unsolicited or harmful emails that try to trick you into giving personal info
9 Clues: A process to help ensure your online activity is safe and private • The type of software that protects your devices from harmful programs • A type of link or file that could be dangerous and may infect your device • What you should create for each online account to make it harder to guess • ...
Cybersecurity 2024-11-04
Across
- Security system blocking unauthorized access.
- Protection against online threats and attacks.
- A copy or imitation intended to deceive.
- Scam to trick people into sharing private info.
- To erase or remove completely.
- Wireless system connecting devices to the internet
Down
- Harmful software that damages or disrupts.
- Unique number identifying a device on the internet.
- Someone who breaks into computer systems.
9 Clues: To erase or remove completely. • A copy or imitation intended to deceive. • Someone who breaks into computer systems. • Harmful software that damages or disrupts. • Security system blocking unauthorized access. • Protection against online threats and attacks. • Scam to trick people into sharing private info. • Wireless system connecting devices to the internet • ...
Cybersecurity 2024-03-13
Across
- A computer attack aimed at making a service unavailable.
- A brand that makes cybersecurity devices especially for companies.
- A program/device that protects a network.
- A technique for protecting data by transforming it irreversibly.
- A technique used by fraudsters to obtain personal information with the aim of committing identity theft.
- A network of computers infected by malware that are under the control of a single attacking party.
Down
- A technique of symmetric encryption.
- A hashing algorithm which is the most used in secret-keys transfert.
- A known certfication authority who offers free certificates.
9 Clues: A technique of symmetric encryption. • A program/device that protects a network. • A computer attack aimed at making a service unavailable. • A known certfication authority who offers free certificates. • A technique for protecting data by transforming it irreversibly. • A brand that makes cybersecurity devices especially for companies. • ...
Cybersecurity 2024-02-21
Across
- Find hidden messages or attacks within innocent-looking files.
- Malware that collects information about you
- A wall or partition designed to inhibit or prevent the spread of fire.
- Manifestation signifying hostile intention, the plan to cause harm.
- The practice of sending emails to reveal personal information, such as passwords and credit card numbers.
Down
- Malware that blocks access and demands ransom
- A cyber security professional who deal with testing vulnerabilities to help owners of application or website
- A type of malware that is often masked as genuine software
- Improve or correct by inserting a patch. It's a synonym of update
9 Clues: Malware that collects information about you • Malware that blocks access and demands ransom • A type of malware that is often masked as genuine software • Find hidden messages or attacks within innocent-looking files. • Improve or correct by inserting a patch. It's a synonym of update • Manifestation signifying hostile intention, the plan to cause harm. • ...
Cybersecurity Risk 2021-08-04
Across
- Malware aimed to corrupt or modify data on one computer before spreading to others.
- a sequence of letters, characters, and numbers used for authentication
- a technique used in order to manipulate and deceive people into handing over sensitive information.
- A network device that determines what information is able to enter a system based on the rules in place.
- a technique to obtain sensitive information typically through text messaging
- the process of encoding data so that it can only be accessed by its intended recipient.
- the state of being exposed to the possibility of being attacked
- the act of appearing to be someone or thing that you are not
Down
- measures taken in order to protect systems and their data.
- A network that uses encryption in order to in order to maintain privacy.
- a technique to obtain sensitive information typically through email.
- Software that locks your device and hold the data hostage and demands a price.
- intrusive software developed to wreak havoc on systems; also known as malicious software
- a sequence of words used for authentication.
- is the act of confirmation through evidence of somethings validity.
15 Clues: a sequence of words used for authentication. • measures taken in order to protect systems and their data. • the act of appearing to be someone or thing that you are not • the state of being exposed to the possibility of being attacked • is the act of confirmation through evidence of somethings validity. • ...
Cybersecurity fun 2022-04-28
Across
- legal constraints that govern how data can be used or stored. Permission is often required from individual as to these elements
- possibility of undesired outcome occurring
- information classification
- Electronic or digital method to control how devices operate or control how they can or can not be used
- any security incident where sensitive, protected, or confidential data is accessed or stolen by an unauthorized party
- the original form of a message
- protect before an event happens
Down
- all the information on a website
- a conventional type of encryption
- the process of adding our signature to the document to show integrity
- someone who is responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
- a process of encoding a message so that its meaning is not obvious
- the a in CIA triad
- ways to protect vulnerabilities
- copies of data
15 Clues: copies of data • the a in CIA triad • information classification • the original form of a message • ways to protect vulnerabilities • protect before an event happens • all the information on a website • a conventional type of encryption • possibility of undesired outcome occurring • a process of encoding a message so that its meaning is not obvious • ...
Cybersecurity 2023-05-30
Across
- kübervahendite turvalisus ja turvalisus kübervahendite talitluse kaudu tekkivate/tekitatavate ohtude suhtes
- teadmised küberturvalisuse kohta ning kuidas ennast kaitsta
- on riiklikult oluliste kübervahendite julgeolek ja julgeolek kübervahendite talitluse kaudu tekkivate/tekitatavate ohtude suhtes
- isiku v. mingi toimingu identsuse automaatne kontroll
Down
- tarkvara ja andmeid hävitav v. andmetöötlust häiriv väike programm, mis end arvutisüsteemides ise paljundab
- kui ohver tegutseb petturliku e-kirja alusel, mis nõuab kiiret tegutsemist.
- on kübervahendite turve ja on turve kübervahendite talitluse kaudu tekkivate/tekitatavate ohtude suhtes
- usalduslik, salajane
- pahatahtlik inimene või grupp kes murravafd sisse inimeste või ettevõtete privatsetesse keskkondadesse
9 Clues: usalduslik, salajane • isiku v. mingi toimingu identsuse automaatne kontroll • teadmised küberturvalisuse kohta ning kuidas ennast kaitsta • kui ohver tegutseb petturliku e-kirja alusel, mis nõuab kiiret tegutsemist. • pahatahtlik inimene või grupp kes murravafd sisse inimeste või ettevõtete privatsetesse keskkondadesse • ...
Cybersecurity 2022-04-26
9 Clues: chief officer • an actual attack • self replicating infection • potential issue in security • program that causes problems • email that mimics other people • program that uses vulnerability • program that hides inside another • program that infects other programs
CyberSecurity 2022-08-25
Across
- The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs; freedom to be let alone
- Detailed report, usually about a person
- rules for interacting politely online
- files stored on your computer (cell phone) that tell browsers how to remember your favorites and your previous searches
- the practice of protecting systems, networks, and programs from digital attacks
- Someone who intentionally targets people for harm using online chat rooms or social media.
Down
- The ability to act in a safe and responsible way on the Internet and other connected environments.
- A site or online community where people with like experiences or interests communicate with each other and share information, resources, etc.
- Information about you and what you do online
9 Clues: rules for interacting politely online • Detailed report, usually about a person • Information about you and what you do online • the practice of protecting systems, networks, and programs from digital attacks • Someone who intentionally targets people for harm using online chat rooms or social media. • ...
Cybersecurity 2022-09-08
Across
- Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems
- A popular programming language used in security scripts
- A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system
- A type of malicious software designed to block access to a computer system until a sum of money is paid
Down
- Software that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
- A barrier between a trusted network and untrusted network that controls/monitors incoming and outgoing network traffic
- A type of social engineering, online scam where criminals send alluring emails to the organization, user, and more to collect sensitive information
- Computer programming that is used to track internet activity and gather sensitive information
- A that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
9 Clues: A popular programming language used in security scripts • Computer programming that is used to track internet activity and gather sensitive information • A type of malicious software designed to block access to a computer system until a sum of money is paid • ...
Cybersecurity 2023-09-04
Across
- Make sure you set a strong one by using upper, lowercase, numbers and characters
- Organized and unauthorized use of an app to send thousands of messages to its users, either by fake or hacked profiles
- Common messaging platform for attackers to use for cyberattacks
- An attempt to obtain sensitive information such as usernames, passwords etc. often for malicious reasons by disguising as a trustworthy entity in an electronic communication
- Type of cyberattack that uses malware disguised as a legitimate file to infect a system or device. Named by a famous wooden horse
Down
- Malicious software that encrypts files or locks your computer, and retains control until you pay a certain amount of money
- Cyber-attackers use creative ways to trick you to enable them to steal it
- Type of cyber-attack that uses multiple computers or devices to send overwhelming traffic to a targeted website or network. The attack aims to cause the target to slow down or completely stop functioning
- Form of malware that poses a security program. If clicked, it pretends to scan for threats and malware on your PC and then lures you into paying real money in exchange for resolving the imaginary threat
9 Clues: Common messaging platform for attackers to use for cyberattacks • Cyber-attackers use creative ways to trick you to enable them to steal it • Make sure you set a strong one by using upper, lowercase, numbers and characters • Organized and unauthorized use of an app to send thousands of messages to its users, either by fake or hacked profiles • ...
Cybersecurity 2022-05-11
Across
- computer program that hides and replicates
- most common type of social engineering
- inspects network traffic
- octets network address
Down
- appears to be a legitimate file or program
- user of programs to overcome technical obstacles
- database that contains the login account information
- hexadecimal address
- system that detects incoming threats
9 Clues: hexadecimal address • octets network address • inspects network traffic • system that detects incoming threats • most common type of social engineering • appears to be a legitimate file or program • computer program that hides and replicates • user of programs to overcome technical obstacles • database that contains the login account information
Cybersecurity 2022-05-11
Across
- computer program that hides and replicates
- most common type of social engineering
- inspects network traffic
- octets network address
Down
- appears to be a legitimate file or program
- user of programs to overcome technical obstacles
- database that contains the login account information
- hexadecimal address
- system that detects incoming threats
9 Clues: hexadecimal address • octets network address • inspects network traffic • system that detects incoming threats • most common type of social engineering • appears to be a legitimate file or program • computer program that hides and replicates • user of programs to overcome technical obstacles • database that contains the login account information
cybersecurity 2023-05-25
Across
- A software designed to detect and remove viruses, malware, spyware, and other malicious programs from a computer system or network.
- The process of converting information into a code or cipher to prevent unauthorized access. Encryption is commonly used to secure sensitive information such as passwords, financial data, and personal information.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized intrusions and cyber attacks.
- Unsolicited and unwanted emails or messages sent out in bulk. Spam can be used to deliver malware, phishing attempts, or other types of unwanted content.
- A weakness or security flaw in a computer system or network that can be exploited by attackers. Vulnerabilities can be caused by outdated software, misconfigured systems, or human error.
Down
- A type of cyber attack where attackers create fake websites or emails to trick individuals into revealing personal or sensitive information. Phishing attacks often attempt to mimic legitimate websites or companies.
- A secret code or word that allows you to access certain devices or services. It is important to create a strong password to protect yourself from cyber threats.
- The process of verifying the identity of a user or device trying to access a system or network. Authentication is often done through the use of usernames and passwords, biometrics, or security tokens.
- A software that is designed to harm or damage computer systems and networks. Malware can include viruses, trojans, ransomware, and other malicious programs.
9 Clues: A software designed to detect and remove viruses, malware, spyware, and other malicious programs from a computer system or network. • Unsolicited and unwanted emails or messages sent out in bulk. Spam can be used to deliver malware, phishing attempts, or other types of unwanted content. • ...
Cybersecurity Crossword 2021-08-05
Across
- is a malware aimed to corrupt or modify data on one computer before spreading to others.
- a sequence of letters, characters, and numbers used for authentication
- is a technique used in order to manipulate and deceive people into handing over sensitive information.
- is a network device that determines what information is able to enter a system based on the rules in place.
- a technique to obtain sensitive information typically through text messaging
- is the process of encoding data so that it can only be accessed by its intended recipient.
- the state of being exposed to the possibility of being attacked
- is a method of attacking a computer by alternating a program while making it appear to function normally
Down
- are the measures taken in order to protect systems and their data.
- is a network that uses encryption in order to in order to maintain privacy.
- a technique to obtain sensitive information typically through email.
- a form of malware that takes control of data and holds it hostage until a ransom is paid.
- is short for malicious software, and is any intrusive software developed to wreak havoc on systems.
- a sequence of words used for authentication.
- is the act of confirmation through evidence of somethings validity.
15 Clues: a sequence of words used for authentication. • the state of being exposed to the possibility of being attacked • are the measures taken in order to protect systems and their data. • is the act of confirmation through evidence of somethings validity. • a technique to obtain sensitive information typically through email. • ...
Cybersecurity awareness 2023-06-13
Healthcare Cybersecurity 2024-04-10
Across
- Helps pay for your healthcare, often checked online
- Law that protects your private health information
- Blood or urine check ordered by a doctor
- Seeing a doctor using video or phone
- Message that tells you about an upcoming appointment
- Website where patients can see their health records
Down
- Booking a doctor’s appointment online
- Important health signs like heart rate and blood pressure
- Person who often uses computers to track patient care
- Uses technology to review test results and notes
- Protecting health information from hackers
- Place that fills prescriptions, often linked to your records
- Being able to see your own medical records
- Digital version of a patient’s medical chart
- Tool on your phone that helps manage health
15 Clues: Seeing a doctor using video or phone • Booking a doctor’s appointment online • Blood or urine check ordered by a doctor • Protecting health information from hackers • Being able to see your own medical records • Tool on your phone that helps manage health • Digital version of a patient’s medical chart • Uses technology to review test results and notes • ...
Cybersecurity Tools 2025-12-22
Across
- Tool for encoding, decoding, and data analysis
- Tool for crafting network packets
- Command to query DNS records
- Command showing network connections
- Search engine for internet-connected devices
- Tool for extracting passwords
- Tool for capturing network traffic
Down
- Using search queries to find exposed data
- Tool for testing system vulnerabilities
- Tool for scanning networks and open ports
- Service that shows domain ownership info
- Secure remote login protocol
- Windows exploit for remote access
- Tool for sending data over networks
- Publicly available information used for analysis
15 Clues: Secure remote login protocol • Command to query DNS records • Tool for extracting passwords • Tool for crafting network packets • Windows exploit for remote access • Tool for capturing network traffic • Command showing network connections • Tool for sending data over networks • Tool for testing system vulnerabilities • Service that shows domain ownership info • ...
Cybersecurity 2022-04-05
Across
- A type of malware disguised as bona fide software, applications, or files to deceive users into downloading it and, unknowingly, granting control of their devices.
- A type of malware that infiltrates devices without the owner’s knowledge. This is often for the purpose of spying on internet activity, tracking log in and password information, or collecting sensitive information that can be used for fraudulent purposes.
- A type of malware that comes from ads on legitimate websites. You can fall victim to malvertising by clicking on an infected ad — cybercriminals may even pay to place these on websites — or by visiting a website that is home to a corrupted ad.
Down
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks a program that crawls the internet looking for holes in security infrastructures to exploit, and the hacking is done automatically — or robotically if you will.
- A standalone malware computer program that replicates itself in order to spread to other computers.
- A type of malware that comes with a ransom. It locks and encrypts a victim’s device or data and demands a ransom to restore access.
- A type of malware that grants cybercriminals remote control of victims’ devices, oftentimes without the victims’ knowledge.
- Malware that involves advertising.
- A type of malware that uses software, applications, and protocols already built-in or native to device operating systems to install and execute malicious activities. In other words, no files are needed to download this type of malware.
9 Clues: Malware that involves advertising. • A standalone malware computer program that replicates itself in order to spread to other computers. • A type of malware that grants cybercriminals remote control of victims’ devices, oftentimes without the victims’ knowledge. • ...
cybersecurity 2021-02-12
9 Clues: send ransom money • used by the romans • scam emails or calls • allows the hacker to spy on you • a piece of coding copying itself • your computer will have many pop ups • the other use for the word of a animal • what makes your computer harder to hack • a person who takes or uses your computer information
Cybersecurity 2020-04-07
9 Clues: dominio • ipermediale • regole comuni • ragnatela grande • elettrodomestici evoluti • linguaggio delle pagine web • gestire il proprio conto corrente • dimostra chi è veramente il mittente • inserirlo nella barra degli indirizzi
cybersecurity 2024-11-20
Across
- protocol for securing internet communications
- malware that watch your online activities without you knowing
- type of attack that involves trying all possibilities to find a password or codes
- design flaw in a computer program
- encrypt messages with keys
Down
- weakness in a computer system allowing an attacker to harm the integrity of that system
- check the data flows and what types of communications are allowed on a computer network.
- computer attack that aims to obtain personal data by relying on identity theft
- block access to the computer or files and demand payment
9 Clues: encrypt messages with keys • design flaw in a computer program • protocol for securing internet communications • block access to the computer or files and demand payment • malware that watch your online activities without you knowing • computer attack that aims to obtain personal data by relying on identity theft • ...
Cybersecurity 2025-11-03
Across
- Software designed to harm or exploit devices
- Process of converting data into a coded form
- Security system that blocks unauthorized access
- Person who tries to gain unauthorized access to systems
- Program that protects your computer from viruses
Down
- Incident where sensitive information is exposed
- Software That secretly monitors your activity
- Scam where attackers trick you into giving personal info
- Secret word or phrase used for access
9 Clues: Secret word or phrase used for access • Software designed to harm or exploit devices • Process of converting data into a coded form • Software That secretly monitors your activity • Incident where sensitive information is exposed • Security system that blocks unauthorized access • Program that protects your computer from viruses • ...
Chapter 1 2025-02-04
Across
- Masquerades as legitimate communications Common via email, text, social media
- First line of defense
- Data protection in cloud storage
- The practice of protecting systems, networks, and programs from digital attacks
- Malicious software designed to harm systems
Down
- Encrypts victim's files Demands payment for decryption
- A cybersecurity best practice. Makes it difficult for hackers to crack the user's password
- ransomware attack on a critical US energy infrastructure. Threatened distribution of gas and jet fuel
- type of hacking method that involves hacker cracking user's password
- type of malware
10 Clues: type of malware • First line of defense • Data protection in cloud storage • Malicious software designed to harm systems • Encrypts victim's files Demands payment for decryption • type of hacking method that involves hacker cracking user's password • Masquerades as legitimate communications Common via email, text, social media • ...
Cybersecurity Crossword 2021-02-03
Across
- A technology that allows us to access our files through the internet from anywhere in the world
- A piece of malware that can replicate itself in order to spread the infection to other connected computers
- An internet version of a home address for your computer, which identifies it when it’s connected to the internet
- An umbrella term that describes all forms of malicious software designed to cause havoc on a computer
- A technique hackers use to hide their identity to pretend to be someone else or simply try to fool you over the internet
- A person who uses programming skills to cause damage to a computer system, steal data and in general conduct illegal cyber activities
- A weakness in computer software
Down
- A computer system that has been infected by malware and is now part of a hacker’s botnet
- A group of computers, printers and devices that are interconnected and governed as a whole
- A defensive technology focused on keeping the bad guys out
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
- A malicious application or script that can be used to take advantage of a computer’s vulnerability
- An acronym that stands for Distributed Denial of Service
- An extra copy of data from a computer
- A piece of malware that often allows a hacker to gain remote access to a computer
15 Clues: A weakness in computer software • An extra copy of data from a computer • An acronym that stands for Distributed Denial of Service • A defensive technology focused on keeping the bad guys out • A piece of malware that often allows a hacker to gain remote access to a computer • ...
Cybersecurity Terms 2023-10-27
15 Clues: GRC • Purple • Razeen • Toddlers • Checkmarx • Teel Tech • Picus Security • Philip Cherian • Video Forensics • Incident Response • Mobile Acquisition • #NotTraditionalPAM • Data Classification • Mobile Device Management • External Threat Landscape
Cybersecurity Awareness 2024-09-06
Across
- measures that reduce the likelihood of an unwanted occurrence or lessen its consequences
- software that compromises the operation of a system by performing an unauthorized function or process
- a computer program that can replicate itself, infect a computer without permission or knowledge of the user, and spread further
- an attack method that uses trial and error to crack passwords
- abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages
- a type of malware that conceals its true content to fool a user into thinking it's a harmless file
- the fraudulent practice of sending test messages purporting to be form reputable companies in order to convince individuals to reveal personal information
Down
- the ability to adapt to changing conditions and prepare for, withstand, and rapidly recover from disruption
- a digital form of social engineering to deceive individuals into providing sensitive information or exposing their system to malware
- limits network traffic between networks or systems
- an unauthorized user who attempts to or gains access to an information system
- the process of verifying one's identity
- a technology that allows a program to interact with the internals of another program running on a different machine
- An attempt to gain unauthorized access to system services, resources, or information
- a string of characters used to authenticate an identity or to verify authorizes access
15 Clues: the process of verifying one's identity • limits network traffic between networks or systems • an attack method that uses trial and error to crack passwords • an unauthorized user who attempts to or gains access to an information system • An attempt to gain unauthorized access to system services, resources, or information • ...
Cybersecurity Definitions 2023-01-25
Across
- hack into telecommunications systems, especially to obtain free calls.
- a type of network attack used to gain unauthorized access to systems within a security perimeter
- a person who uses computers to gain unauthorized access to data
- If users are unable to achieve the defined goal.
- are useful in passwordless and multi-factor authentication. Hidden form field is used to store session information of a client
- the condition of an electronics, software, or other system where the system's substantive behavior is dependent on the sequence or timing of oth
- Where the attacker intercepts and relays messages between two parties who believe they are communicating with each other
- someone who broke into computer systems, bypassed passwords or licenses in computer programs, or in other ways intentionally breached computer security.
- Is a more advanced technique to get user’s credentials by making effort to enter users into the website
Down
- Used by hijacking to gain access to a targets computer or online accounts
- The act of entering false information into a DNS cache
- a systematic approach to managing all changes made to a product or system
- Espionage or trespass occurs when an unauthorized individual attempts to gain illegal access to organizational information
- a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution
- A technique whereby packet data flowing across the network is detected and observed
15 Clues: If users are unable to achieve the defined goal. • The act of entering false information into a DNS cache • a person who uses computers to gain unauthorized access to data • hack into telecommunications systems, especially to obtain free calls. • Used by hijacking to gain access to a targets computer or online accounts • ...
Cybersecurity Terms 2022-04-28
Across
- "pretty good privacy"
- private modification
- corrective measures
- private readability
- pick out at risk information
- react
- awareness of intrusions
- data restoration
Down
- converting plain text for confidentiality
- ability to access
- multi-use accounts
- illegal activity in cyberspace
- verifying logins (acronym)
- copyright protection
- putting in controls
15 Clues: react • data restoration • ability to access • multi-use accounts • corrective measures • private readability • putting in controls • private modification • copyright protection • "pretty good privacy" • awareness of intrusions • verifying logins (acronym) • pick out at risk information • illegal activity in cyberspace • converting plain text for confidentiality
Cybersecurity terms 2024-09-22
Across
- the process of converting plaintext data into a coded format to prevent unauthorized access
- a type of malicious software that automatically downloads advertisements on a device
- process of converting data into a fixed-size string of characters for unique identificaton
- a type of malicious software that disguises itself as legitimate or useful software
- the process of monitoring network or system activities for malicious activities
- technique that isolates applications or processes in a controlled environment
Down
- a type of malicious software or hardware that records keystrokes made by a user
- a security approach that allows only pre-approved users to access a network
- an incident of unauthorized access to sensitive, protected or confidential data
- the practice of securing information by transforming it into an unreadable format
- a network of compromised computers that are controlled remotely by a hacker to perform automated tasks
- a malicious software designed to gain unauthorized access to a network while hiding its presence
- a software update designed to fix vulnerabilities, bugs, or improve functionality
- any device that connects to a network and serves as a point of entry for data
- a simulated cyber attack on a system conducted to identify and vulnerabilities
15 Clues: a security approach that allows only pre-approved users to access a network • any device that connects to a network and serves as a point of entry for data • technique that isolates applications or processes in a controlled environment • a simulated cyber attack on a system conducted to identify and vulnerabilities • ...
Cybersecurity Terms 2025-04-09
Across
- A software update to fix security flaws. (5 letters)
- Manipulating people to divulge confidential information. (15 letters)
- Granting permissions to access resources. (13 letters)
- System that monitors networks for suspicious activity. (3 letters)
- Malware that encrypts files and demands payment. (11 letters)
- A network security system that blocks unauthorized access. (8 letters)
- Weakness in a system that can be exploited. (12 letters)
- Securely connects a user to a network over the internet. (3 letters)
- Exploit targeting a previously unknown vulnerability. (8 letters)
- Attack that overwhelms a system with traffic to crash it. (4 letters)
Down
- Security method requiring two types of verification. (10 letters, hyphenated)
- Scrambling data to make it unreadable without a key. (10 letters)
- Malicious software designed to harm or exploit systems. (7 letters)
- Process of verifying a user’s identity. (14 letters)
- Deceptive emails or messages to steal sensitive data. (8 letters)
15 Clues: A software update to fix security flaws. (5 letters) • Process of verifying a user’s identity. (14 letters) • Granting permissions to access resources. (13 letters) • Weakness in a system that can be exploited. (12 letters) • Malware that encrypts files and demands payment. (11 letters) • Scrambling data to make it unreadable without a key. (10 letters) • ...
Trey cybersecurity 2026-04-01
Across
- When sensitive information is exposed or stolen
- The process of converting data into a secure code
- A type of malware that spreads by attaching to files
- Malware that locks your data and demands money to unlock it
- Malware that spreads on its own without needing a file
- Software that secretly collects your personal information
- A scam where attackers trick you into giving personal info through fake messages
- Protection of a computer network from threats
- A security method that requires two ways to confirm identity
Down
- Software designed to harm or damage a computer
- A secret set of characters used to access an account
- The trail of data you leave online
- A system that blocks unauthorized access to a network
- The process of verifying a user’s identity
- A person who gains unauthorized access to systems
15 Clues: The trail of data you leave online • The process of verifying a user’s identity • Protection of a computer network from threats • Software designed to harm or damage a computer • When sensitive information is exposed or stolen • The process of converting data into a secure code • A person who gains unauthorized access to systems • ...
Cybersecurity Crossword 2021-02-02
Across
- A technology that allows us to access our files through the internet from anywhere in the world
- A piece of malware that can replicate itself in order to spread the infection to other connected computers
- An internet version of a home address for your computer, which identifies it when it’s connected to the internet
- An umbrella term that describes all forms of malicious software designed to cause havoc on a computer
- A technique hackers use to hide their identity pretend to be someone else or simply try to fool you over the internet
- A person who uses programming skills to cause damage to a computer system, steal data and in general conduct illegal cyber activities
- A weakness in computer software
Down
- A computer system that has been infected by malware and is now part of a hacker’s botnet
- A group of computers, printers and devices that are interconnected and governed as a whole
- A defensive technology focused on keeping the bad guys out
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
- A malicious application or script that can be used to take advantage of a computer’s vulnerability
- An acronym that stands for distributed denial of service
- An extra copy of data from a computer
- A piece of malware that often allows a hacker to gain remote access to a computer
15 Clues: A weakness in computer software • An extra copy of data from a computer • An acronym that stands for distributed denial of service • A defensive technology focused on keeping the bad guys out • A piece of malware that often allows a hacker to gain remote access to a computer • ...
Cybersecurity Crossword 2022-05-16
Across
- To figure out or break a code or cipher.
- The science of analyzing or breaking secret codes or ciphers to reveal hidden messages.
- Central Intelligence Agency
- a message written in code or cipher; the encrypted message that must be decoded.
- a message written out in “plain” English that anyone can read; it has not been encoded.
- The science of writing hidden or concealed messages using secret codes or ciphers.
- To put words into code or cipher form.
Down
- A system where symbols, groups of letters or numbers, pictures or words, are substituted to represent other words or phrases.
- a person who secretly collects and reports information on the activities, movements, and plans of an enemy or competitor.
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- Central Security Service
- National Security Agency
- A system where one letter or symbol is methodically substituted for another letter or symbol.
- The science of studying codes and ciphers.
- A systematic, minute, and thorough attempt to learn the facts about something complex or hidden
15 Clues: Central Security Service • National Security Agency • Central Intelligence Agency • To put words into code or cipher form. • To figure out or break a code or cipher. • The science of studying codes and ciphers. • a message written in code or cipher; the encrypted message that must be decoded. • ...
Cybersecurity Vocabulary 2025-05-01
Across
- Attack involving the lack of or reduction of a computer resource
- Information about a person that can be used to leverage access
- Side of CIA Triad that involves Trust
- Software installed on a person's computer to record that person's keystrokes and mouse clicks
- Social Engineering attack involving scam messages sent via text message
- Side of CIA Triad involving redundancy and reliability
- Passively gathers information about a potential victim for future use in an attack
Down
- Attack performed using phone calls to coerce victims to reveal personal information
- Side of CIA Triad that involves Passwords
- Social engineering tactic where a hacker pretends to be a member of senior management who is authorized to gain access to a system
- Social Engineering example that involves fake e-mails attempting to steal PII
- Attack that takes advantage of people who use short, common words or combinations of these words as their passwords
- Eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
- Where an attacker tries to use every possible combination of letters and numbers until the find a password.
- Network attack involving a "botnet" that aims to reduce resources or access
15 Clues: Side of CIA Triad that involves Trust • Side of CIA Triad that involves Passwords • Side of CIA Triad involving redundancy and reliability • Information about a person that can be used to leverage access • Attack involving the lack of or reduction of a computer resource • Social Engineering attack involving scam messages sent via text message • ...
Cybersecurity Crossword 2023-05-15
Across
- writing statements in order to create a program
- the programs that perform actions on a device like operating systems
- devices that are connected together for the purpose of sharing information
- accessing a device or network without permission or authorization
- a global open network that allows information dispersal and instantaneous communication
- identifies specific devices on a network
- an instruction set to a computer in order to perform an action
- a specific set of multiple instructions used to perform actions on a device
- information that is returned or transmitted by a device
- using codes to secure information
Down
- the physical electronic objects like a computer
- the unauthorized collection of secure or private information
- precautions taken to guard against crime that involves the internet
- accomplished when data is sent to a device
- an electronic device used to create and access information
15 Clues: using codes to secure information • identifies specific devices on a network • accomplished when data is sent to a device • the physical electronic objects like a computer • writing statements in order to create a program • information that is returned or transmitted by a device • an electronic device used to create and access information • ...
