cybersecurity Crossword Puzzles
Cybersecurity 2024-05-07
Across
- A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- Unauthorized access to a network, information systems, or application.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying dat
Down
- The process of converting information or data into a code, especially to prevent unauthorized access.
- The process of recognizing a user's identity to ensure that individuals are who they claim to be.
- A type of surveillance software that has the capability to record every keystroke made on a computer.
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
- A service that allows you to connect to the internet via a server run by a provider, creating a secure connection.
10 Clues: Unauthorized access to a network, information systems, or application. • The process of recognizing a user's identity to ensure that individuals are who they claim to be. • The process of converting information or data into a code, especially to prevent unauthorized access. • ...
Cybersecurity 2025-02-16
Across
- A cybersecurity measure that verifies identity using something you know and something you have.
- A cybersecurity practice that scrambles data to protect it.
- A fake website designed to steal login credentials.
- A type of cyberattack that floods a server with traffic to take it down.
- A type of virus that disguises itself as a legitimate program.
Down
- The process of confirming that a user is who they claim to be.
- A program that secretly records what a user types to steal passwords.
- A type of attack where hackers encrypt files and demand payment.
- A malicious software that spreads without user action.
- Tricking someone into revealing personal information through fake emails.
10 Clues: A fake website designed to steal login credentials. • A malicious software that spreads without user action. • A cybersecurity practice that scrambles data to protect it. • The process of confirming that a user is who they claim to be. • A type of virus that disguises itself as a legitimate program. • ...
Cybersecurity 2025-04-08
Across
- to decide the quality or importance of something
- a residence that uses internet-connected devices
- the chance that something will happen
- the activity of getting into someone else's computer system without permission
Down
- the quality of being vulnerable
- a detailed plan for achieving success in situations
- a member of a group of people who move from one place to another
- a suggestion that something unpleasant or violent will happen
- a set of ideas or a plan of what to do in particular situations
- the possibility of something bad happening
10 Clues: the quality of being vulnerable • the chance that something will happen • the possibility of something bad happening • to decide the quality or importance of something • a residence that uses internet-connected devices • a detailed plan for achieving success in situations • a suggestion that something unpleasant or violent will happen • ...
Cybersecurity 2024-09-16
Across
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
- Malware that locks or encrypts data, demanding payment for its release
- A person who gains unauthorized access to systems or networks
- Process of converting data into a code to prevent unauthorized access
Down
- A secret word or phrase used to authenticate access to data or systems
- Software that secretly monitors user activity and collects information
- Malicious software designed to harm, exploit, or disable computers
- A security system that monitors and controls incoming and outgoing network traffic
- Software used to detect, prevent, and remove malicious software
- A secure network connection that allows users to send and receive data as if they were on a private network
10 Clues: A person who gains unauthorized access to systems or networks • Software used to detect, prevent, and remove malicious software • Malicious software designed to harm, exploit, or disable computers • Process of converting data into a code to prevent unauthorized access • A secret word or phrase used to authenticate access to data or systems • ...
cybersecurity 2025-11-17
Across
- :malware that intervenes with the aim of harming the computer user
- : security method based on identity and access management which requires two forms of identification to access resources and data.
- : essential network devices that operate at the data link layer of the OSI model
- : a person who is looking for ways to bypass software and hardware protections
- : a kind of binder in which we store various files.
- : Set of remote servers offering services accessible via the Internet.
Down
- : a type of operating system commonly used on computers and laptops
- : method used in cryptanalysis to find a password or a key
- : an attack that takes advantage of a security vulnerability for which no patch has been implemented
- : Software capable of detecting and eliminating computer viruses.
10 Clues: : a kind of binder in which we store various files. • : method used in cryptanalysis to find a password or a key • : Software capable of detecting and eliminating computer viruses. • :malware that intervenes with the aim of harming the computer user • : a type of operating system commonly used on computers and laptops • ...
IT Cybersecurity 2023-03-29
Across
- Wireless network that requires no authentication.
- A method that allows the frequency of the wireless network to be fine-tuned. Each channel is approximately 20 MHz wide.
- Wireless communication technology that allows two devices to connect to each other over a short distance.
- Combines multiple channels—or lanes—to increase the amount of traffic that a modem's highway can comfortably support.
- A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
- Wireless authentication method that allows for automatic connection between a device and the wireless access point.
- The wireless access point provides access to a wireless network.
- An enhancement to MIMO that allows the antennae on the access point to divide streams between multiple devices.
- A communication method that allows two-way communication between two devices within a few centimeters of each other.
- Wireless authentication method that uses a passphrase to authenticate users.
- A method that combines channels into one to increase bandwidth.
Down
- Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest versions in use.
- Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
- An enhancement that allows multiple antennas to use the same radio frequency.
- The expected number of times an event will occur in a given time frame.
- Conceals the data's original meaning to prevent it from being known or used.
- An Ethernet cable provides the connection between a device connected to the network port and the switch.
- The interface between a computer's hardware and software.
18 Clues: Wireless network that requires no authentication. • The interface between a computer's hardware and software. • A method that combines channels into one to increase bandwidth. • The wireless access point provides access to a wireless network. • The expected number of times an event will occur in a given time frame. • ...
cybersecurity Crossword 2025-10-14
Across
- acts as a security camera which watches for any suspicious activity
- ensuring data is accurate, complete, and secure
- storing data on a device not connected to a network
- used to detect, prevent, and remove any malicious software
- transmits data as pulses of light
- the proccess of proving your identity and ensuring authorization
- a security system which acts as a barrier between private and external ones and monitors incoming and outgoing traffic
Down
- ensuring timely access to information
- two step process to verifying identity
- relies on physical connections, which makes it difficult to hack
- ensures that someone can't unsend anything or deny any action online
- to reduce the potential harm of a threat
- tool which monitora network traffic and blocks off any sort of malicious activity
- stands for confidentiality, integrity, and availability and also means keeping data secret and secure
- ways to verify a user's identity
- the possibility of an unfortunate event occuring
- keeping data private and accessible only to those who are authorized
17 Clues: ways to verify a user's identity • transmits data as pulses of light • ensuring timely access to information • two step process to verifying identity • to reduce the potential harm of a threat • ensuring data is accurate, complete, and secure • the possibility of an unfortunate event occuring • storing data on a device not connected to a network • ...
INF Crossword Puzzle 2024-01-24
Internal Audit Holiday Fun 2023-12-14
Lucas' Graduation-Day Crossword 2021-10-14
17 Clues: Pomp • Go... • Graduate • A builder • GCU Color • GCU Street • Black Beans • Lucas's Major • Hat Decoration • Type of Degree • Years in School • group of people • Type of Ceremony • Lucas's Employer • Best type of Tree • Name of GCU Mascot • Grand _ University
Risk Awareness Month 2024 2024-05-14
Across
- _________ can make a difference [Word found in EDM on CRO's message]
- _________ effort of every level [Word found in EDM on risk governance framework]
- Stay alert on possible _________ attempts [Word found in EDM on cybersecurity risks]
- We are not immune to _________ risks [Word found in EDM on cybersecurity risks]
- _________ form the 1st line of defence in our risk governance framework [Word found in EDM on risk governance framework]
- _________ into Critical Installations [Word found in EDM on operational risks]
Down
- Risk_________ Month [Word found in EDM on CRO's message]
- Flooding at expressways and major _________ [Word found in EDM on operational risks]
- Good _________ marksmanship [Word found in EDM on financial and strategic risk]
- Use water _________ appliances and fittings [Word found in EDM on financial and strategic risk]
10 Clues: Risk_________ Month [Word found in EDM on CRO's message] • _________ can make a difference [Word found in EDM on CRO's message] • _________ into Critical Installations [Word found in EDM on operational risks] • Good _________ marksmanship [Word found in EDM on financial and strategic risk] • ...
all about me 2025-04-24
23 Clues: dog 2 • dog 2 • cat 1 • dog 1 • dog -1 • 2nd period • 4th period • 1st period • 3rd period • 5th period • 7th period • 8th period • 6th period • ashers weight • venus' weight • avalons weight • favorite sport • favorite color • favorite number • favorite lizzo song • second favorite color • ashers favorite snack • favorite taylor swift song
Technology 2025-01-08
14 Clues: AI • to save • software • to erase • transmit • cellphone • text message • social media • cybersecurity • email address • to surf the web • computer science • digital digital era • the influences of technology
Procedure Name Crossword 2026-01-22
What is Cyber Security: Vocabulary Review 2024-09-04
Across
- the practice of isolating resources and controlling access to them through APIs or strict interfaces
- a design technique that separates the functionality of a program into independent, interchangeable components.
- the process of breaking down complex cybersecurity models into abstract components to simplify and clearly define their security roles.
- the practice of protecting data from unauthorized access, disclosure, or alteration
- the protection of data from unauthorized modification or deletion.
- a cybersecurity technique that protects processes from each other on an operating system.
- a design principle that emphasizes the importance of simplicity in cyber security systems and logics
- the practice of concealing information within other data, structures, or media to prevent unauthorized access.
- the principle of granting users only the minimum level of access or permissions necessary to perform their job functions
- the practice of collecting, processing, and storing only the minimum amount of data needed to complete a specific task.
Down
- creating secondary safety nets that bolster network security and mitigate single points of failure throughout the network.
- the ability to reliably access and use information in a timely manner.
- a cybersecurity strategy that uses multiple layers of security measures to protect an organization's assets.
- a process that separates data, processes, and administrative tasks into logical groupings, or domains.
- the practice of reducing unnecessary complexity and focusing on what's essential
- a way of looking at the world from the perspective of a hacker
16 Clues: a way of looking at the world from the perspective of a hacker • the protection of data from unauthorized modification or deletion. • the ability to reliably access and use information in a timely manner. • the practice of reducing unnecessary complexity and focusing on what's essential • ...
IEM July SM Crossword 2022-07-26
Across
- Each year, over 500,000 ____ are affected by house fires.
- ________ is creating a common baseline for cybersecurity performance goals in critical infrastructure.
- National Oceanic & Atmospheric Administration released a _______ Community Guide Tool for community planners and decision makers.
- On July 17th is also known as what?
Down
- People who regularly have ____ interactions with others tend to live longer, boost their mood, and have a sense of purpose.
- The US Postal Service processes and delivers 425.3 ______ pieces of mail each day.
- NIST is updating its _____ Framework (CSF) to keep pace with the evolving cybersecurity landscape.
- The ___ app provides access to weather alerts, disaster resources and preparedness tips.
- ______ bring the risk of fires, injuries, and death.
- July 25th is National Hire a _____ day.
10 Clues: On July 17th is also known as what? • July 25th is National Hire a _____ day. • ______ bring the risk of fires, injuries, and death. • Each year, over 500,000 ____ are affected by house fires. • The US Postal Service processes and delivers 425.3 ______ pieces of mail each day. • ...
IEM's December Social Media Crossword Puzzle 2021-12-20
Across
- United States Space Force
- State Association of Counties Annual Meeting
- IEMer who moderated a discussion on wildfire resilience & prevention at #NDRC21 (last name)
- Follow Cybersecurity and Infrastructure Security Agency’s ______ best practices
- IEM’s innovative GIS ______
- IEMer who moderated the panel, Best Practice Programs at the State Level (last name)
- FEMA’s interactive Program Planning Toolkit
- FEMA’s 2022-2026 ____ ____
- Our thoughts are with the communities in Kentucky and the Midwest impacted by
Down
- AshBritt-IEM Health had the pleasure of meeting First Lady _____
- The IEM family would like to wish you and yours
- New FEMA Deputy Administrator (last name)
- Have you gotten you flu _____?
- It’s time to get into the holiday spirit by breaking out your…
- New COVID-19 variant
15 Clues: New COVID-19 variant • United States Space Force • FEMA’s 2022-2026 ____ ____ • IEM’s innovative GIS ______ • Have you gotten you flu _____? • New FEMA Deputy Administrator (last name) • FEMA’s interactive Program Planning Toolkit • State Association of Counties Annual Meeting • The IEM family would like to wish you and yours • ...
Cybersecurity Vocabulary 2023-01-25
Across
- A bug where user input is passed as the format argument to printf
- This is when an application reveals sensitive data
- determines strength and validity of passwords.
- A secret entry point into a program.
- can undermine the controls that secure the data of millions
- The result of a mismatch between arithmetic and mathematical arithmetic
- The web server account is incorrectly given access to the system files
- Is the manipulation of people to divulge information or performing actions.
Down
- Somebody who gains illegal access to a phones system.
- An attempt to crack a password by using every combination of letters and digits until a password is cracked.
- bypassing standard authentication or encryption in a computer.
- Mother Nature's actions
- A trapdoor in software that allows easy maintenance
- A subset of the Trojan horse malware.
- A system used to gain authentications by cracking a password hash.
- when a hacker exploits the vulnerability before its fixed.
16 Clues: Mother Nature's actions • A secret entry point into a program. • A subset of the Trojan horse malware. • determines strength and validity of passwords. • This is when an application reveals sensitive data • A trapdoor in software that allows easy maintenance • Somebody who gains illegal access to a phones system. • ...
CyberSecurity Crossword 2023-08-07
Across
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction
- Should be constructed of upper and lower case letters, numbers, and special characters
- verifying identity
- a type of software that is designed to display advertisements on a user's computer or device.
- a type of software or hardware device that is designed to capture and record keystrokes made on a computer or other device
- The “I” in the C-I-A Triad; protection from unauthorized changes
- The “A” in the C-I-A Triad. It ensures authorized users have access
- A fraudulent email purportedly from a reputable company attempting to get personal information
Down
- Threatening behavior facilitated through electronic means such as texting
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- weakness in a computer system that could be exploited to violate the system’s security
- Software that scans a device or a network to detect security threats, alert the user, and neutralize malicious code
- Facebook, Twitter, Instagram, etc. (Two words)
- The process of taking plain text and scrambling it into an unreadable format
- the act of secretly listening to or monitoring the conversations or communications of others without their knowledge or consent
- enables a user to connect securely from outside to their business network, even though they are not located on their office premises
16 Clues: verifying identity • Facebook, Twitter, Instagram, etc. (Two words) • The “I” in the C-I-A Triad; protection from unauthorized changes • The “A” in the C-I-A Triad. It ensures authorized users have access • Threatening behavior facilitated through electronic means such as texting • The process of taking plain text and scrambling it into an unreadable format • ...
Crossword 2025-05-13
Cybersecurity Vocab 2021-09-28
Across
- Secret unknown access point into a system
- Flaw or potential for harm
- Virus that infects a computer before the operating system loads
- Following the rules or standards that have been established
- Software that is embedded in hardware
- Computer code intentially written to cause some form of harm
- Using a lie or scam to obtain private information
- Physical token inserted into a computer's usb port
Down
- Measurement and analysis of a biological feature
- Condition of being pricate or secret
- Something that takes a vulnerability to a level where it can be exploited
- Encrypts data do user connot access it intil a fee is paid to hacker only
- Acions of ,alicous code
- Proccess by which something becomes harder it is made harder to hack
- State of being complete or uncorrupted
- Technology that thracks a users' keystokes on the keyboard
16 Clues: Acions of ,alicous code • Flaw or potential for harm • Condition of being pricate or secret • Software that is embedded in hardware • State of being complete or uncorrupted • Secret unknown access point into a system • Measurement and analysis of a biological feature • Using a lie or scam to obtain private information • Physical token inserted into a computer's usb port • ...
cybersecurity awareness 2017-09-28
Across
- is a string of characters used for authenticating a user on acomputer system
- A small, portable flash memory card that plugs into a computer s USB port and functions as a portable hard drive.
- is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
- A criminal act that involves malicious threats intended to cause injury to an individual to compel him or her to do an act against his or her will.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- an electronic device for storing and processing data
- is a type of malware that is often disguised as legitimate software
Down
- is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner's private information
- is a standalone malware computerprogram that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the targetcomputer to access it.
- is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.Feb
- is a form of malware in which rogue software code effectively holds a user's computer hostage until a "ransom" fee is paid.
- The translation of data into a secret code.The most effective way to achieve data security.
- The global communication network that allows almost allcomputers worldwide to connect and exchange information.
- the quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.
- software that is intended to damage or disable computers and computer systems.
16 Clues: an electronic device for storing and processing data • is a type of malware that is often disguised as legitimate software • is a string of characters used for authenticating a user on acomputer system • software that is intended to damage or disable computers and computer systems. • ...
Cybersecurity Crossword 2022-09-07
Across
- umbrella term for malicious software
- a software tool used to take advantage of a software or hardware vulnerabilities
- self replicating malware that does not require human interaction
- software that lets you browse the internet
- small files that track browser usage and preferences
- email based scamming
- software that scans a device to detect threats
Down
- day of the week most vendors release patches
- malware that encrypts files and demands payment
- software that secretly captures info as it is typed
- text message based scamming
- another word for a software update
- copy of computer data for data loss prevention
- phone based scamming
- any kind of unwanted, unsolicited digital communication
- filters unwanted traffic on a network
16 Clues: phone based scamming • email based scamming • text message based scamming • another word for a software update • umbrella term for malicious software • filters unwanted traffic on a network • software that lets you browse the internet • day of the week most vendors release patches • copy of computer data for data loss prevention • ...
Cybersecurity Puzzle 2025-09-26
Across
- Incidents where confidential information is stolen, leaked, or disclosed are known as what?
- A strong culture equals strong _____.
- This security feature requires at least two forms of authentication.
- The concept of human firewalls is built on this critical aspect of security.
- Attackers using manipulative techniques to scam people is known as what?
- Organizational ____ are designed to keep people, data, and devices safe.
- What is one of the leading causes of security incidents?
Down
- This type of fraud occurs when a scammer uses stolen information to open credit cards in the victim’s name.
- What is the top attack method for cybercriminals?
- This type of malware encrypts data to prevent access to valuable resources.
- The umbrella term covering any form of malicious code that alters the functionality of computers and smart devices.
- In recent years, attackers have embraced the convenience of these.
- While online threats get the most attention in the world of security, these threats pose just as much risk.
- People are the last line of ____.
- It is imperative to ensure accounts are protected with these.
- If you encounter a phishing attack, what should you do immediately?
16 Clues: People are the last line of ____. • A strong culture equals strong _____. • What is the top attack method for cybercriminals? • What is one of the leading causes of security incidents? • It is imperative to ensure accounts are protected with these. • In recent years, attackers have embraced the convenience of these. • ...
Cybersecurity Month 2023-07-24
Across
- (Hint: Make a copy of your important files for safety)
- (Hint: Your data is well-protected and out of harm's way)
- (Hint: Being informed and cautious about online risks)
- (Hint: Keep your personal information confidential)
- (Hint: A secret code you create to protect your accounts)
- (Hint: Ensure your online accounts and devices are protected)
- (Hint: Converting data into secret code to keep it safe)
Down
- (Hint: Relating to computers and the internet)
- (Hint: Regularly install software improvements for better security)
- (Hint: A protective barrier that keeps hackers out)
- (Hint: Secure your device with a digital key)
- (Hint: Harmful software that can damage your computer)
- (Hint: Tricky schemes to deceive you online)
- (Hint: A harmful computer program that can spread)
- (Hint: Only rely on reputable sources and websites)
- (Hint: Deceptive emails or messages trying to steal your info)
16 Clues: (Hint: Tricky schemes to deceive you online) • (Hint: Secure your device with a digital key) • (Hint: Relating to computers and the internet) • (Hint: A harmful computer program that can spread) • (Hint: A protective barrier that keeps hackers out) • (Hint: Keep your personal information confidential) • (Hint: Only rely on reputable sources and websites) • ...
The Need for a Stronger Indian Cyber Law: Lessons from Global Cybersecurity Frameworks 2025-04-07
Across
- China mandates data ___ for sectors like finance and telecom
- China's national priority in its 2017 Cybersecurity Law
- CCPA's core feature: consumers can ___ of data sales
- IT Act clause on compensation for negligent data handling
- India's primary cybersecurity law (enacted in 2000)
- GDPR fines can hit 4% of global ___ (hint: revenue)
- Indian ID system hit by major 2018 data breach
- Urgent need for India's outdated IT Act
Down
- GDPR's "___ by Design" mandates proactive data protection
- Attack type that crippled AIIMS in 2023
- GDPR right allowing users to delete personal data
- California law allowing consumers to sue over data breaches
- Landmark EU regulation with "Right to be Forgotten"
- GDPR-required role: Data Protection ___
14 Clues: Attack type that crippled AIIMS in 2023 • GDPR-required role: Data Protection ___ • Urgent need for India's outdated IT Act • Indian ID system hit by major 2018 data breach • GDPR right allowing users to delete personal data • Landmark EU regulation with "Right to be Forgotten" • India's primary cybersecurity law (enacted in 2000) • ...
Disruptive Technology 2025-07-23
12 Clues: Mesh • cloud • Reality • Detection • Automation • technology • Intelligence • Intelligence • Immune System • Authentication • Liability Insurance • Screening, Quantum Computing
Digital Literacy 2025-07-03
Across
- ที่เก็บข้อมูลออนไลน์
- ประมวลผลข้อมูลใกล้แหล่งใช้งาน
- เครือข่ายไร้สายรุ่นที่ห้า
- การวิเคราะห์ข้อมูลเพื่อค้นหา insight
- อุปกรณ์อัจฉริยะที่เชื่อมต่ออินเทอร์เน็ต
Down
- ป้องกันภัยคุกคามทางไซเบอร์
- เครื่องจักรกลอัตโนมัติทุกชนิดที่ออกแบบให้สามารถทำงานแทนมนุษย์
- ข้อมูลจำนวนมหาศาล
- สมองกลที่เลียนแบบความคิดมนุษย์
- เครือข่ายที่ควบคุมตัวเองได้
10 Clues: ข้อมูลจำนวนมหาศาล • ที่เก็บข้อมูลออนไลน์ • เครือข่ายไร้สายรุ่นที่ห้า • ป้องกันภัยคุกคามทางไซเบอร์ • เครือข่ายที่ควบคุมตัวเองได้ • ประมวลผลข้อมูลใกล้แหล่งใช้งาน • สมองกลที่เลียนแบบความคิดมนุษย์ • การวิเคราะห์ข้อมูลเพื่อค้นหา insight • อุปกรณ์อัจฉริยะที่เชื่อมต่ออินเทอร์เน็ต • เครื่องจักรกลอัตโนมัติทุกชนิดที่ออกแบบให้สามารถทำงานแทนมนุษย์
test 2022-10-25
Management Modules 2025-04-03
Across
- Widely referenced cybersecurity management model originally published as British Standard BS7799.
- Management Model that provides advice about the implementation of controls and objectives for cybersecurity
- Organization that created COBIT
Down
- Cybersecurity framework series
- Collection of methods and practices for managing the development and operation of IT infrastructures.
- Framework for improving critical infrastructure security support for cybersecurity event recovery
6 Clues: Cybersecurity framework series • Organization that created COBIT • Widely referenced cybersecurity management model originally published as British Standard BS7799. • Framework for improving critical infrastructure security support for cybersecurity event recovery • ...
Cybersecurity Awareness 2025-01-16
Across
- The opposite of risky.
- A secret used to unlock your account.
- When sensitive info gets exposed.
- Software that fights against malware.
- A common way hackers send fake messages.
- A virtual barrier that blocks bad stuff online.
- What you shouldn't do without checking the link first.
- To scramble data so only the right person can read it.
Down
- The prefix for security in the digital world.
- What keeps your software secure and current.
- A fake email trying to steal your information.
- Unwanted emails clogging your inbox.
- What you use to protect your phone or laptop screen.
- A copy of your files in case something goes wrong.
- Something you shouldn't give to suspicious websites.
- A second step to prove it'd really you.
16 Clues: The opposite of risky. • When sensitive info gets exposed. • Unwanted emails clogging your inbox. • A secret used to unlock your account. • Software that fights against malware. • A second step to prove it'd really you. • A common way hackers send fake messages. • What keeps your software secure and current. • The prefix for security in the digital world. • ...
NVH September Trivia 2022-08-24
Across
- Ext. 7060
- Policy keeper
- NVH Lab blood supplier
- Personal ______ Equipment
- Cybersecurity Training
- Code Call for Combative Person
- Coffee Shop
- Extended Care "Family"
- John Caitlynn & Liz Therapy
Down
- TFMC ARNP
- Zzz Service
- payroll software
- BOC Meeting Day
- Purchaser
- Resuscitation Quality Improvement
- Drs. Dhillon & Jex Service
- The next EHR
- New mammo system
18 Clues: TFMC ARNP • Ext. 7060 • Purchaser • Zzz Service • Coffee Shop • The next EHR • Policy keeper • BOC Meeting Day • payroll software • New mammo system • NVH Lab blood supplier • Cybersecurity Training • Extended Care "Family" • Personal ______ Equipment • Drs. Dhillon & Jex Service • John Caitlynn & Liz Therapy • Code Call for Combative Person • Resuscitation Quality Improvement
Panther Cross Word 2022-04-29
Across
- The largest End Point Detection vendor on the market
- The fastest growing area to store company data
- A computer or system that mimics a target that a hacker would go after. It is used as a way to collect data on different attack patterns
- The word used to describe the adding of additional contextual data to alerts in order to cut down on noise. Greynoise helped us with this.
- The acronym used to describe a fully outsourced solution for threat detection
- A 3rd party vendor who acts as a middleman to distribute software
- Refers to data exiting a network
- Refers to data entering into a network
- A receipt of any action performed within a system
- A compliance-driven evaluation that reveals where you're susceptible to an attack
- The acronym used to describe a solution type that detections user behavior for anything malicious
Down
- This compliance is imposed on companies that do business in within the EMEA
- The most utilized cybersecurity framework in the world
- A phrase coined by Panther to describe one of our biggest differentiators
- This compliance is imposed on companies that collect health care data
- The practice of protecting systems, networks, and programs from cyber attacks
- The largest SIEM vendor in the world
- This compliance is imposed on companies that collect credit card data
- A solution that aggregates logs
- Acronym that describes Endpoint detection combined with Threat Detection
- This compliance is imposed on companies that collect other companies information
- Refers to different events being interconnected that paint a conclusion
- A 3rd party vendor who you can outsource your cybersecurity to
- This is typically the gatekeeper for your network and the first line of cyber defense
24 Clues: A solution that aggregates logs • Refers to data exiting a network • The largest SIEM vendor in the world • Refers to data entering into a network • The fastest growing area to store company data • A receipt of any action performed within a system • The largest End Point Detection vendor on the market • The most utilized cybersecurity framework in the world • ...
청당 빠바 구문독해 6-22 2023-01-18
16 Clues: 절도 • 자동차 • 대리점 • 공동의 • 자동차의 • 입증하다 • 흔히, 보통 • 사이버 보안 • 취약한, 연약한 • 실직한, 실업자인 • 임차하다, 빌리다 • 혜택, 이득; 득을 보다 • (범죄, 사고 등) 사건 • 조정[조절]하다; 적응하다 • (연료, 에너지, 시간을)소모하다 • (자동차 앞창에 있는)유리 닦개(와이퍼)
TECHNOLOGY 2024-02-14
hahahha 2024-08-24
Legislation 2025-08-12
Across
- This Act covers personal data being used criminally
- This covers development and deployment of AI
- The rules that cover sharing information
- Regulatory framework to protect financial institutions
- Regulates the network security
Down
- A regulation aimed at strengthening cybersecurity
- What is the acronym for this that protects personal data
- To improve cybersecurity of products and services
- This law about transmitting automated marketing
9 Clues: Regulates the network security • The rules that cover sharing information • This covers development and deployment of AI • This law about transmitting automated marketing • A regulation aimed at strengthening cybersecurity • To improve cybersecurity of products and services • This Act covers personal data being used criminally • ...
CS240-1 Students 2024-09-01
Across
- Ran a sub 20minute 5k
- Lived in both Brazil & Spain.
- CIS Sandbox Tutor
- Wants to be a forensic accountant
- I desire to help people professionally and personally
- I'm definitely putting Boston in my rear view mirror someday
- I'm good at analyzing markets and equities on a technical level.
- In high school, my graduating class only had 100 kids.
- Really good at First Person Shooter games
- My ideal job would be in gaming
- I love all things cybersecurity related
- My brain absorbs information like a sponge
- I can improvise to solve problems creatively and efficiently
Down
- I created a board game
- I don't procrastinate
- I like my role as a tutor.
- Pursuing CPA after graduation
- I will someday have my own Cybersecurity firm
- Loves a challenge and does not settle for things that are easy.
- I'm from Georgia (not the one in the US)
- I am a really fast learner.
- Grew up on Cape Cod, MA
- Really good at time management
- I used to be a procrastinator
- Lacrosse Team Member
- I'm trying to improve my golf game.
26 Clues: CIS Sandbox Tutor • Lacrosse Team Member • I don't procrastinate • Ran a sub 20minute 5k • I created a board game • Grew up on Cape Cod, MA • I like my role as a tutor. • I am a really fast learner. • Lived in both Brazil & Spain. • Pursuing CPA after graduation • I used to be a procrastinator • Really good at time management • My ideal job would be in gaming • ...
Cybersecurity 2021-08-03
Across
- provides the validation of a message's origin.
- Ensures that data is not modified or tampered with.
- The degree of protection against danger, damage, loss, and criminal activity.
- Ensures that a system is up so that data is available when needed.
- Anything that has the potential to cause the loss of an asset.
Down
- An act, procedure, or piece of software that takes advantage of a vulnerability to carry out an attack.
- Ensures that data is not disclosed to unintended persons.
- An opening or weakness in the system.
- agent The person or entity that attempt or carries out a threat.
- Something that has value to an individual or an organization.
10 Clues: An opening or weakness in the system. • provides the validation of a message's origin. • Ensures that data is not modified or tampered with. • Ensures that data is not disclosed to unintended persons. • Something that has value to an individual or an organization. • Anything that has the potential to cause the loss of an asset. • ...
Cybersecurity 2024-04-22
Across
- A good practice for authorised users is to use unique ________ passwords
- ____________ type of cyber attack aims to steal data from the computers
- cybersecurity aims to secure _______ components from attackers
- __________ is a person who attempts to get unauthorised access to the computer system
- __________ is a virtual wall between the protected computer and the internet
Down
- __________ are dummy computers that attract hackers to keep the remaining computers safe
- _________ softwares must be used to protect computers against cyberattacks
- Man in the __________ is a type of cyberattack where the communication line is intercepted
- common type of attack which includes trojans and adwares
9 Clues: common type of attack which includes trojans and adwares • cybersecurity aims to secure _______ components from attackers • ____________ type of cyber attack aims to steal data from the computers • A good practice for authorised users is to use unique ________ passwords • _________ softwares must be used to protect computers against cyberattacks • ...
Cybersecurity 2024-10-10
Across
- Protecting data by scrambling it mathematically
- Data which requires special limited access that can cause harm if disclosed
- Sending fraudulent communications to take data or trick others into performing certain actions, usually by text or email
- A piece of code that adversely affects computers; typically to corrupt the system, steal data, or gain access
Down
- Network security device that monitors and filters incoming and outgoing network traffic
- Software designed to detect and destroy computer viruses
- Data that pertains directly to the company and has restricted access
- A person who uses computers to gain unauthorized access to data
- Data that is freely accessible to all
9 Clues: Data that is freely accessible to all • Protecting data by scrambling it mathematically • Software designed to detect and destroy computer viruses • A person who uses computers to gain unauthorized access to data • Data that pertains directly to the company and has restricted access • Data which requires special limited access that can cause harm if disclosed • ...
Cybersecurity 2023-05-30
Across
- kübervahendite turvalisus ja turvalisus kübervahendite talitluse kaudu tekkivate/tekitatavate ohtude suhtes
- teadmised küberturvalisuse kohta ning kuidas ennast kaitsta
- on riiklikult oluliste kübervahendite julgeolek ja julgeolek kübervahendite talitluse kaudu tekkivate/tekitatavate ohtude suhtes
- isiku v. mingi toimingu identsuse automaatne kontroll
Down
- tarkvara ja andmeid hävitav v. andmetöötlust häiriv väike programm, mis end arvutisüsteemides ise paljundab
- kui ohver tegutseb petturliku e-kirja alusel, mis nõuab kiiret tegutsemist.
- on kübervahendite turve ja on turve kübervahendite talitluse kaudu tekkivate/tekitatavate ohtude suhtes
- usalduslik, salajane
- pahatahtlik inimene või grupp kes murravafd sisse inimeste või ettevõtete privatsetesse keskkondadesse
9 Clues: usalduslik, salajane • isiku v. mingi toimingu identsuse automaatne kontroll • teadmised küberturvalisuse kohta ning kuidas ennast kaitsta • kui ohver tegutseb petturliku e-kirja alusel, mis nõuab kiiret tegutsemist. • pahatahtlik inimene või grupp kes murravafd sisse inimeste või ettevõtete privatsetesse keskkondadesse • ...
Cybersecurity 2022-04-26
9 Clues: chief officer • an actual attack • self replicating infection • potential issue in security • program that causes problems • email that mimics other people • program that uses vulnerability • program that hides inside another • program that infects other programs
CyberSecurity 2022-08-25
Across
- The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs; freedom to be let alone
- Detailed report, usually about a person
- rules for interacting politely online
- files stored on your computer (cell phone) that tell browsers how to remember your favorites and your previous searches
- the practice of protecting systems, networks, and programs from digital attacks
- Someone who intentionally targets people for harm using online chat rooms or social media.
Down
- The ability to act in a safe and responsible way on the Internet and other connected environments.
- A site or online community where people with like experiences or interests communicate with each other and share information, resources, etc.
- Information about you and what you do online
9 Clues: rules for interacting politely online • Detailed report, usually about a person • Information about you and what you do online • the practice of protecting systems, networks, and programs from digital attacks • Someone who intentionally targets people for harm using online chat rooms or social media. • ...
Cybersecurity 2022-09-08
Across
- Any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems
- A popular programming language used in security scripts
- A collection of software specifically designed to permit malicious program that gathers sensitive information, into your system
- A type of malicious software designed to block access to a computer system until a sum of money is paid
Down
- Software that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
- A barrier between a trusted network and untrusted network that controls/monitors incoming and outgoing network traffic
- A type of social engineering, online scam where criminals send alluring emails to the organization, user, and more to collect sensitive information
- Computer programming that is used to track internet activity and gather sensitive information
- A that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
9 Clues: A popular programming language used in security scripts • Computer programming that is used to track internet activity and gather sensitive information • A type of malicious software designed to block access to a computer system until a sum of money is paid • ...
Cybersecurity 2023-09-04
Across
- Make sure you set a strong one by using upper, lowercase, numbers and characters
- Organized and unauthorized use of an app to send thousands of messages to its users, either by fake or hacked profiles
- Common messaging platform for attackers to use for cyberattacks
- An attempt to obtain sensitive information such as usernames, passwords etc. often for malicious reasons by disguising as a trustworthy entity in an electronic communication
- Type of cyberattack that uses malware disguised as a legitimate file to infect a system or device. Named by a famous wooden horse
Down
- Malicious software that encrypts files or locks your computer, and retains control until you pay a certain amount of money
- Cyber-attackers use creative ways to trick you to enable them to steal it
- Type of cyber-attack that uses multiple computers or devices to send overwhelming traffic to a targeted website or network. The attack aims to cause the target to slow down or completely stop functioning
- Form of malware that poses a security program. If clicked, it pretends to scan for threats and malware on your PC and then lures you into paying real money in exchange for resolving the imaginary threat
9 Clues: Common messaging platform for attackers to use for cyberattacks • Cyber-attackers use creative ways to trick you to enable them to steal it • Make sure you set a strong one by using upper, lowercase, numbers and characters • Organized and unauthorized use of an app to send thousands of messages to its users, either by fake or hacked profiles • ...
Cybersecurity 2022-05-11
Across
- computer program that hides and replicates
- most common type of social engineering
- inspects network traffic
- octets network address
Down
- appears to be a legitimate file or program
- user of programs to overcome technical obstacles
- database that contains the login account information
- hexadecimal address
- system that detects incoming threats
9 Clues: hexadecimal address • octets network address • inspects network traffic • system that detects incoming threats • most common type of social engineering • appears to be a legitimate file or program • computer program that hides and replicates • user of programs to overcome technical obstacles • database that contains the login account information
Cybersecurity 2022-05-11
Across
- computer program that hides and replicates
- most common type of social engineering
- inspects network traffic
- octets network address
Down
- appears to be a legitimate file or program
- user of programs to overcome technical obstacles
- database that contains the login account information
- hexadecimal address
- system that detects incoming threats
9 Clues: hexadecimal address • octets network address • inspects network traffic • system that detects incoming threats • most common type of social engineering • appears to be a legitimate file or program • computer program that hides and replicates • user of programs to overcome technical obstacles • database that contains the login account information
cybersecurity 2023-05-25
Across
- A software designed to detect and remove viruses, malware, spyware, and other malicious programs from a computer system or network.
- The process of converting information into a code or cipher to prevent unauthorized access. Encryption is commonly used to secure sensitive information such as passwords, financial data, and personal information.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized intrusions and cyber attacks.
- Unsolicited and unwanted emails or messages sent out in bulk. Spam can be used to deliver malware, phishing attempts, or other types of unwanted content.
- A weakness or security flaw in a computer system or network that can be exploited by attackers. Vulnerabilities can be caused by outdated software, misconfigured systems, or human error.
Down
- A type of cyber attack where attackers create fake websites or emails to trick individuals into revealing personal or sensitive information. Phishing attacks often attempt to mimic legitimate websites or companies.
- A secret code or word that allows you to access certain devices or services. It is important to create a strong password to protect yourself from cyber threats.
- The process of verifying the identity of a user or device trying to access a system or network. Authentication is often done through the use of usernames and passwords, biometrics, or security tokens.
- A software that is designed to harm or damage computer systems and networks. Malware can include viruses, trojans, ransomware, and other malicious programs.
9 Clues: A software designed to detect and remove viruses, malware, spyware, and other malicious programs from a computer system or network. • Unsolicited and unwanted emails or messages sent out in bulk. Spam can be used to deliver malware, phishing attempts, or other types of unwanted content. • ...
Cybersecurity 2024-09-05
Across
- Malicious act that seeks to damage data, steal data, or disrupt digital life in general
- Scam by text
- Helps you protect your accounts
- A software designed to prevent, detect, and remove viruses and malware from computers, networks, and devices.
Down
- Someone that tries to gain unauthorized access to data
- Scam by email
- Intrusive software developed by hackers to steal data and damage or destroy computers and computer systems
- Scam by phone
- Cybercrime activity that takes place over the internet or on email
9 Clues: Scam by text • Scam by email • Scam by phone • Helps you protect your accounts • Someone that tries to gain unauthorized access to data • Cybercrime activity that takes place over the internet or on email • Malicious act that seeks to damage data, steal data, or disrupt digital life in general • ...
Cybersecurity 2023-03-08
Across
- the use of a computer to gain unauthorized access to data in a system.
- The state of being protected against the criminal or unauthorized use of electronic data.
- a person who uses computers to gain unauthorized access to data.
- Tells a computer what actions to take
- what movie character was on the signs?
Down
- Where did this story take place?
- A broad range of information, or an opinion, that could identify an individual.
- breach results in information being accessed without authorization.
- What was hacked in this story?
- A part of a computer system or network which is designed to block unauthorized access
10 Clues: What was hacked in this story? • Where did this story take place? • Tells a computer what actions to take • what movie character was on the signs? • a person who uses computers to gain unauthorized access to data. • breach results in information being accessed without authorization. • the use of a computer to gain unauthorized access to data in a system. • ...
Cybersecurity 2022-05-16
Across
- the location a hacker typically want to get access to
- An activity which is carried out over or through the Internet.
- a method to get sensitive data
- when you create something according to a plan
- target of an SQL-Injection
- the most famous programming language for web applications
Down
- a famous whistleblower
- the good kind of hacker
- an activity which is carried out over or through the Internet.
- a word which describes a relative geographic location
10 Clues: a famous whistleblower • the good kind of hacker • target of an SQL-Injection • a method to get sensitive data • when you create something according to a plan • the location a hacker typically want to get access to • a word which describes a relative geographic location • the most famous programming language for web applications • ...
Cybersecurity 2025-03-09
Across
- A type of link or file that could be dangerous and may infect your device
- A process to help ensure your online activity is safe and private
- What you should create for each online account to make it harder to guess
- This type of attack often involves tricking users into revealing sensitive info by pretending to be a trustworthy entity
Down
- This term refers to the act of protecting your data by limiting access to authorized users
- The action of regularly installing updates to fix security vulnerabilities
- The type of software that protects your devices from harmful programs
- The authentication method of verifying your identity with a second factor like a code sent to your phone
- A term for unsolicited or harmful emails that try to trick you into giving personal info
9 Clues: A process to help ensure your online activity is safe and private • The type of software that protects your devices from harmful programs • A type of link or file that could be dangerous and may infect your device • What you should create for each online account to make it harder to guess • ...
Cybersecurity 2024-11-04
Across
- Security system blocking unauthorized access.
- Protection against online threats and attacks.
- A copy or imitation intended to deceive.
- Scam to trick people into sharing private info.
- To erase or remove completely.
- Wireless system connecting devices to the internet
Down
- Harmful software that damages or disrupts.
- Unique number identifying a device on the internet.
- Someone who breaks into computer systems.
9 Clues: To erase or remove completely. • A copy or imitation intended to deceive. • Someone who breaks into computer systems. • Harmful software that damages or disrupts. • Security system blocking unauthorized access. • Protection against online threats and attacks. • Scam to trick people into sharing private info. • Wireless system connecting devices to the internet • ...
Cybersecurity 2024-03-13
Across
- A computer attack aimed at making a service unavailable.
- A brand that makes cybersecurity devices especially for companies.
- A program/device that protects a network.
- A technique for protecting data by transforming it irreversibly.
- A technique used by fraudsters to obtain personal information with the aim of committing identity theft.
- A network of computers infected by malware that are under the control of a single attacking party.
Down
- A technique of symmetric encryption.
- A hashing algorithm which is the most used in secret-keys transfert.
- A known certfication authority who offers free certificates.
9 Clues: A technique of symmetric encryption. • A program/device that protects a network. • A computer attack aimed at making a service unavailable. • A known certfication authority who offers free certificates. • A technique for protecting data by transforming it irreversibly. • A brand that makes cybersecurity devices especially for companies. • ...
Cybersecurity 2024-02-21
Across
- Find hidden messages or attacks within innocent-looking files.
- Malware that collects information about you
- A wall or partition designed to inhibit or prevent the spread of fire.
- Manifestation signifying hostile intention, the plan to cause harm.
- The practice of sending emails to reveal personal information, such as passwords and credit card numbers.
Down
- Malware that blocks access and demands ransom
- A cyber security professional who deal with testing vulnerabilities to help owners of application or website
- A type of malware that is often masked as genuine software
- Improve or correct by inserting a patch. It's a synonym of update
9 Clues: Malware that collects information about you • Malware that blocks access and demands ransom • A type of malware that is often masked as genuine software • Find hidden messages or attacks within innocent-looking files. • Improve or correct by inserting a patch. It's a synonym of update • Manifestation signifying hostile intention, the plan to cause harm. • ...
TECHNOLOGY 2025-12-22
Across
- Set of rules
- Physical equipment
- Digital information
- Gap in tech access
- Online protection
- AI learning from data
- Electronic equipment
- Machines performing human tasks
- Program error
Down
- Copy from internet
- Send to internet
- Tasks done by machines
- Organised data
- Moral worries
- Connected computers
- New software version
- Computer programs
- Secret code
- Protection of information
- Saving data online
20 Clues: Secret code • Set of rules • Moral worries • Program error • Organised data • Send to internet • Computer programs • Online protection • Copy from internet • Physical equipment • Gap in tech access • Saving data online • Digital information • Connected computers • New software version • Electronic equipment • AI learning from data • Tasks done by machines • Protection of information • ...
CYBERSECURITY DECEMBER 2, 2023 2023-12-03
Across
- A deceptive practice where a person or program successfully masquerades as another.
- A field within cybersecurity that uses investigative techniques to identify and store evidence from a computer device (2 words).
- Describes data that requires power to maintain its contents.
- a fundamental unit of data in computer networking and data communication.
- An authentication method that requires the user to provide two or more verification factors to gain access to a resource. MFA
- an advanced security technology that builds upon the functionality of an IDS. It not only detects suspicious or malicious activities but also takes proactive measures to block or mitigate them in real-time.
- A documented, structured approach for handling security breaches, and cyber threats. (3 words)
- A technology that allows you to create a secure connection over a less secure network, such as the internet. It can also mask your connection origin, making it appear that you are connecting via a different location than where you physically are located.
- _______ Modeling, Risk Modeling, or Risk Analysis is a systematic way of thinking where a system may be vulnerable in order to best defend against possible attacks.
- A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system.
- A phishing attack transmitted by SMS (text) message.
- The world's most famous hacker.
- From Day 1, cybersecurity is built upon a foundation of three principles – private data is kept private.
- Model that describes how data is transmitted through a network.
- a decoy system or resource set up to monitor and analyze the behavior of attackers.
- This cipher was the first documented form of encryption and involves shifting each letter of a message by 3.
- A public-key cryptography algorithm
Down
- Relies on human interaction and often involves tricking people into breaking normal security procedures.
- This color team is made up of offensive security experts who try to (ethically) attack an organization’s cybersecurity defenses.
- An attack in which an attacker injects malicious executable scripts into the code of a trusted application or website.
- In this kind of cipher, both the encryption and decryption process use the same key,
- From Day 1,cybersecurity is built upon a foundation of three principles. This is one of them which means that data can be used by any authorized parties.
- This term (2 words) refers to limiting who (subjects) can read or write which resources (objects: e.g. files)
- A SQL_______ vulnerability arises when the original SQL query can be altered to form an altogether different query.
- From Day 1, cybersecurity is built upon a foundation of three principles. This is one of them which means that data is modified only by authorized parties.
- Software tool that allows users to capture and inspect data packets on a computer network.
- This software examines requests to access the network and determines if it should pass through.
- A number used to identify specific services or processes running on a computer or network device.
28 Clues: The world's most famous hacker. • A public-key cryptography algorithm • A phishing attack transmitted by SMS (text) message. • Describes data that requires power to maintain its contents. • Model that describes how data is transmitted through a network. • a fundamental unit of data in computer networking and data communication. • ...
Dbl AA November 16! 2022-11-16
Across
- Favorite TV
- Favorite outdoor hobby
- Older vehicle
- Zoom zoom
- Grodhaus Family game
- Cute youngster
- Sisters of mom
- Grandma appreciated Aaron’s
- Walking with cat in
- Fun with Lizzy’s hair
Down
- Love spark established
- Kit for picking
- Impressive talent
- special older woman
- Cute girl
- Favorite indoor hobby
- Work interest
- Teal Team
- Quail Hollow
- Your mama
20 Clues: Zoom zoom • Cute girl • Teal Team • Your mama • Favorite TV • Quail Hollow • Older vehicle • Work interest • Cute youngster • Sisters of mom • Kit for picking • Impressive talent • special older woman • Walking with cat in • Grodhaus Family game • Favorite indoor hobby • Fun with Lizzy’s hair • Love spark established • Favorite outdoor hobby • Grandma appreciated Aaron’s
Cyber Security 2023-09-08
Across
- data encryption ransom
- compromised computer network
- psychological manipulation
- system manager
- identifying threats
- unwanted advertisements
- multiple verification layers
- secret access keys
- protecting digital systems.
- interconnected devices
Down
- stolen identity
- data encrypt
- secure network connection
- wireless technology
- unauthorized access point
- internet address
- malicious digital actions
- digital information
- malicious software
- computer programs
20 Clues: data encrypt • system manager • stolen identity • internet address • computer programs • malicious software • secret access keys • wireless technology • identifying threats • digital information • data encryption ransom • interconnected devices • unwanted advertisements • secure network connection • unauthorized access point • malicious digital actions • psychological manipulation • ...
Cybersecurity Risk 2021-08-04
Across
- Malware aimed to corrupt or modify data on one computer before spreading to others.
- a sequence of letters, characters, and numbers used for authentication
- a technique used in order to manipulate and deceive people into handing over sensitive information.
- A network device that determines what information is able to enter a system based on the rules in place.
- a technique to obtain sensitive information typically through text messaging
- the process of encoding data so that it can only be accessed by its intended recipient.
- the state of being exposed to the possibility of being attacked
- the act of appearing to be someone or thing that you are not
Down
- measures taken in order to protect systems and their data.
- A network that uses encryption in order to in order to maintain privacy.
- a technique to obtain sensitive information typically through email.
- Software that locks your device and hold the data hostage and demands a price.
- intrusive software developed to wreak havoc on systems; also known as malicious software
- a sequence of words used for authentication.
- is the act of confirmation through evidence of somethings validity.
15 Clues: a sequence of words used for authentication. • measures taken in order to protect systems and their data. • the act of appearing to be someone or thing that you are not • the state of being exposed to the possibility of being attacked • is the act of confirmation through evidence of somethings validity. • ...
Cybersecurity fun 2022-04-28
Across
- legal constraints that govern how data can be used or stored. Permission is often required from individual as to these elements
- possibility of undesired outcome occurring
- information classification
- Electronic or digital method to control how devices operate or control how they can or can not be used
- any security incident where sensitive, protected, or confidential data is accessed or stolen by an unauthorized party
- the original form of a message
- protect before an event happens
Down
- all the information on a website
- a conventional type of encryption
- the process of adding our signature to the document to show integrity
- someone who is responsible for developing algorithms and ciphers to encrypt sensitive data and may work together with a security software developer in developing security systems
- a process of encoding a message so that its meaning is not obvious
- the a in CIA triad
- ways to protect vulnerabilities
- copies of data
15 Clues: copies of data • the a in CIA triad • information classification • the original form of a message • ways to protect vulnerabilities • protect before an event happens • all the information on a website • a conventional type of encryption • possibility of undesired outcome occurring • a process of encoding a message so that its meaning is not obvious • ...
Cybersecurity 2022-04-05
Across
- A type of malware disguised as bona fide software, applications, or files to deceive users into downloading it and, unknowingly, granting control of their devices.
- A type of malware that infiltrates devices without the owner’s knowledge. This is often for the purpose of spying on internet activity, tracking log in and password information, or collecting sensitive information that can be used for fraudulent purposes.
- A type of malware that comes from ads on legitimate websites. You can fall victim to malvertising by clicking on an infected ad — cybercriminals may even pay to place these on websites — or by visiting a website that is home to a corrupted ad.
Down
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks a program that crawls the internet looking for holes in security infrastructures to exploit, and the hacking is done automatically — or robotically if you will.
- A standalone malware computer program that replicates itself in order to spread to other computers.
- A type of malware that comes with a ransom. It locks and encrypts a victim’s device or data and demands a ransom to restore access.
- A type of malware that grants cybercriminals remote control of victims’ devices, oftentimes without the victims’ knowledge.
- Malware that involves advertising.
- A type of malware that uses software, applications, and protocols already built-in or native to device operating systems to install and execute malicious activities. In other words, no files are needed to download this type of malware.
9 Clues: Malware that involves advertising. • A standalone malware computer program that replicates itself in order to spread to other computers. • A type of malware that grants cybercriminals remote control of victims’ devices, oftentimes without the victims’ knowledge. • ...
cybersecurity 2021-02-12
9 Clues: send ransom money • used by the romans • scam emails or calls • allows the hacker to spy on you • a piece of coding copying itself • your computer will have many pop ups • the other use for the word of a animal • what makes your computer harder to hack • a person who takes or uses your computer information
Cybersecurity 2020-04-07
9 Clues: dominio • ipermediale • regole comuni • ragnatela grande • elettrodomestici evoluti • linguaggio delle pagine web • gestire il proprio conto corrente • dimostra chi è veramente il mittente • inserirlo nella barra degli indirizzi
cybersecurity 2024-11-20
Across
- protocol for securing internet communications
- malware that watch your online activities without you knowing
- type of attack that involves trying all possibilities to find a password or codes
- design flaw in a computer program
- encrypt messages with keys
Down
- weakness in a computer system allowing an attacker to harm the integrity of that system
- check the data flows and what types of communications are allowed on a computer network.
- computer attack that aims to obtain personal data by relying on identity theft
- block access to the computer or files and demand payment
9 Clues: encrypt messages with keys • design flaw in a computer program • protocol for securing internet communications • block access to the computer or files and demand payment • malware that watch your online activities without you knowing • computer attack that aims to obtain personal data by relying on identity theft • ...
Cybersecurity 2025-11-03
Across
- Software designed to harm or exploit devices
- Process of converting data into a coded form
- Security system that blocks unauthorized access
- Person who tries to gain unauthorized access to systems
- Program that protects your computer from viruses
Down
- Incident where sensitive information is exposed
- Software That secretly monitors your activity
- Scam where attackers trick you into giving personal info
- Secret word or phrase used for access
9 Clues: Secret word or phrase used for access • Software designed to harm or exploit devices • Process of converting data into a coded form • Software That secretly monitors your activity • Incident where sensitive information is exposed • Security system that blocks unauthorized access • Program that protects your computer from viruses • ...
Cybersecurity Crossword 2021-02-03
Across
- A technology that allows us to access our files through the internet from anywhere in the world
- A piece of malware that can replicate itself in order to spread the infection to other connected computers
- An internet version of a home address for your computer, which identifies it when it’s connected to the internet
- An umbrella term that describes all forms of malicious software designed to cause havoc on a computer
- A technique hackers use to hide their identity to pretend to be someone else or simply try to fool you over the internet
- A person who uses programming skills to cause damage to a computer system, steal data and in general conduct illegal cyber activities
- A weakness in computer software
Down
- A computer system that has been infected by malware and is now part of a hacker’s botnet
- A group of computers, printers and devices that are interconnected and governed as a whole
- A defensive technology focused on keeping the bad guys out
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
- A malicious application or script that can be used to take advantage of a computer’s vulnerability
- An acronym that stands for Distributed Denial of Service
- An extra copy of data from a computer
- A piece of malware that often allows a hacker to gain remote access to a computer
15 Clues: A weakness in computer software • An extra copy of data from a computer • An acronym that stands for Distributed Denial of Service • A defensive technology focused on keeping the bad guys out • A piece of malware that often allows a hacker to gain remote access to a computer • ...
Cybersecurity Terms 2023-10-27
15 Clues: GRC • Purple • Razeen • Toddlers • Checkmarx • Teel Tech • Picus Security • Philip Cherian • Video Forensics • Incident Response • Mobile Acquisition • #NotTraditionalPAM • Data Classification • Mobile Device Management • External Threat Landscape
Cybersecurity Awareness 2024-09-06
Across
- measures that reduce the likelihood of an unwanted occurrence or lessen its consequences
- software that compromises the operation of a system by performing an unauthorized function or process
- a computer program that can replicate itself, infect a computer without permission or knowledge of the user, and spread further
- an attack method that uses trial and error to crack passwords
- abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages
- a type of malware that conceals its true content to fool a user into thinking it's a harmless file
- the fraudulent practice of sending test messages purporting to be form reputable companies in order to convince individuals to reveal personal information
Down
- the ability to adapt to changing conditions and prepare for, withstand, and rapidly recover from disruption
- a digital form of social engineering to deceive individuals into providing sensitive information or exposing their system to malware
- limits network traffic between networks or systems
- an unauthorized user who attempts to or gains access to an information system
- the process of verifying one's identity
- a technology that allows a program to interact with the internals of another program running on a different machine
- An attempt to gain unauthorized access to system services, resources, or information
- a string of characters used to authenticate an identity or to verify authorizes access
15 Clues: the process of verifying one's identity • limits network traffic between networks or systems • an attack method that uses trial and error to crack passwords • an unauthorized user who attempts to or gains access to an information system • An attempt to gain unauthorized access to system services, resources, or information • ...
Cybersecurity Definitions 2023-01-25
Across
- hack into telecommunications systems, especially to obtain free calls.
- a type of network attack used to gain unauthorized access to systems within a security perimeter
- a person who uses computers to gain unauthorized access to data
- If users are unable to achieve the defined goal.
- are useful in passwordless and multi-factor authentication. Hidden form field is used to store session information of a client
- the condition of an electronics, software, or other system where the system's substantive behavior is dependent on the sequence or timing of oth
- Where the attacker intercepts and relays messages between two parties who believe they are communicating with each other
- someone who broke into computer systems, bypassed passwords or licenses in computer programs, or in other ways intentionally breached computer security.
- Is a more advanced technique to get user’s credentials by making effort to enter users into the website
Down
- Used by hijacking to gain access to a targets computer or online accounts
- The act of entering false information into a DNS cache
- a systematic approach to managing all changes made to a product or system
- Espionage or trespass occurs when an unauthorized individual attempts to gain illegal access to organizational information
- a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution
- A technique whereby packet data flowing across the network is detected and observed
15 Clues: If users are unable to achieve the defined goal. • The act of entering false information into a DNS cache • a person who uses computers to gain unauthorized access to data • hack into telecommunications systems, especially to obtain free calls. • Used by hijacking to gain access to a targets computer or online accounts • ...
Cybersecurity Terms 2022-04-28
Across
- "pretty good privacy"
- private modification
- corrective measures
- private readability
- pick out at risk information
- react
- awareness of intrusions
- data restoration
Down
- converting plain text for confidentiality
- ability to access
- multi-use accounts
- illegal activity in cyberspace
- verifying logins (acronym)
- copyright protection
- putting in controls
15 Clues: react • data restoration • ability to access • multi-use accounts • corrective measures • private readability • putting in controls • private modification • copyright protection • "pretty good privacy" • awareness of intrusions • verifying logins (acronym) • pick out at risk information • illegal activity in cyberspace • converting plain text for confidentiality
Cybersecurity terms 2024-09-22
Across
- the process of converting plaintext data into a coded format to prevent unauthorized access
- a type of malicious software that automatically downloads advertisements on a device
- process of converting data into a fixed-size string of characters for unique identificaton
- a type of malicious software that disguises itself as legitimate or useful software
- the process of monitoring network or system activities for malicious activities
- technique that isolates applications or processes in a controlled environment
Down
- a type of malicious software or hardware that records keystrokes made by a user
- a security approach that allows only pre-approved users to access a network
- an incident of unauthorized access to sensitive, protected or confidential data
- the practice of securing information by transforming it into an unreadable format
- a network of compromised computers that are controlled remotely by a hacker to perform automated tasks
- a malicious software designed to gain unauthorized access to a network while hiding its presence
- a software update designed to fix vulnerabilities, bugs, or improve functionality
- any device that connects to a network and serves as a point of entry for data
- a simulated cyber attack on a system conducted to identify and vulnerabilities
15 Clues: a security approach that allows only pre-approved users to access a network • any device that connects to a network and serves as a point of entry for data • technique that isolates applications or processes in a controlled environment • a simulated cyber attack on a system conducted to identify and vulnerabilities • ...
Cybersecurity Terms 2025-04-09
Across
- A software update to fix security flaws. (5 letters)
- Manipulating people to divulge confidential information. (15 letters)
- Granting permissions to access resources. (13 letters)
- System that monitors networks for suspicious activity. (3 letters)
- Malware that encrypts files and demands payment. (11 letters)
- A network security system that blocks unauthorized access. (8 letters)
- Weakness in a system that can be exploited. (12 letters)
- Securely connects a user to a network over the internet. (3 letters)
- Exploit targeting a previously unknown vulnerability. (8 letters)
- Attack that overwhelms a system with traffic to crash it. (4 letters)
Down
- Security method requiring two types of verification. (10 letters, hyphenated)
- Scrambling data to make it unreadable without a key. (10 letters)
- Malicious software designed to harm or exploit systems. (7 letters)
- Process of verifying a user’s identity. (14 letters)
- Deceptive emails or messages to steal sensitive data. (8 letters)
15 Clues: A software update to fix security flaws. (5 letters) • Process of verifying a user’s identity. (14 letters) • Granting permissions to access resources. (13 letters) • Weakness in a system that can be exploited. (12 letters) • Malware that encrypts files and demands payment. (11 letters) • Scrambling data to make it unreadable without a key. (10 letters) • ...
Cybersecurity Crossword 2021-08-05
Across
- is a malware aimed to corrupt or modify data on one computer before spreading to others.
- a sequence of letters, characters, and numbers used for authentication
- is a technique used in order to manipulate and deceive people into handing over sensitive information.
- is a network device that determines what information is able to enter a system based on the rules in place.
- a technique to obtain sensitive information typically through text messaging
- is the process of encoding data so that it can only be accessed by its intended recipient.
- the state of being exposed to the possibility of being attacked
- is a method of attacking a computer by alternating a program while making it appear to function normally
Down
- are the measures taken in order to protect systems and their data.
- is a network that uses encryption in order to in order to maintain privacy.
- a technique to obtain sensitive information typically through email.
- a form of malware that takes control of data and holds it hostage until a ransom is paid.
- is short for malicious software, and is any intrusive software developed to wreak havoc on systems.
- a sequence of words used for authentication.
- is the act of confirmation through evidence of somethings validity.
15 Clues: a sequence of words used for authentication. • the state of being exposed to the possibility of being attacked • are the measures taken in order to protect systems and their data. • is the act of confirmation through evidence of somethings validity. • a technique to obtain sensitive information typically through email. • ...
Cybersecurity awareness 2023-06-13
Healthcare Cybersecurity 2024-04-10
Across
- Helps pay for your healthcare, often checked online
- Law that protects your private health information
- Blood or urine check ordered by a doctor
- Seeing a doctor using video or phone
- Message that tells you about an upcoming appointment
- Website where patients can see their health records
Down
- Booking a doctor’s appointment online
- Important health signs like heart rate and blood pressure
- Person who often uses computers to track patient care
- Uses technology to review test results and notes
- Protecting health information from hackers
- Place that fills prescriptions, often linked to your records
- Being able to see your own medical records
- Digital version of a patient’s medical chart
- Tool on your phone that helps manage health
15 Clues: Seeing a doctor using video or phone • Booking a doctor’s appointment online • Blood or urine check ordered by a doctor • Protecting health information from hackers • Being able to see your own medical records • Tool on your phone that helps manage health • Digital version of a patient’s medical chart • Uses technology to review test results and notes • ...
Cybersecurity Tools 2025-12-22
Across
- Tool for encoding, decoding, and data analysis
- Tool for crafting network packets
- Command to query DNS records
- Command showing network connections
- Search engine for internet-connected devices
- Tool for extracting passwords
- Tool for capturing network traffic
Down
- Using search queries to find exposed data
- Tool for testing system vulnerabilities
- Tool for scanning networks and open ports
- Service that shows domain ownership info
- Secure remote login protocol
- Windows exploit for remote access
- Tool for sending data over networks
- Publicly available information used for analysis
15 Clues: Secure remote login protocol • Command to query DNS records • Tool for extracting passwords • Tool for crafting network packets • Windows exploit for remote access • Tool for capturing network traffic • Command showing network connections • Tool for sending data over networks • Tool for testing system vulnerabilities • Service that shows domain ownership info • ...
Cybersecurity Crossword 2021-02-02
Across
- A technology that allows us to access our files through the internet from anywhere in the world
- A piece of malware that can replicate itself in order to spread the infection to other connected computers
- An internet version of a home address for your computer, which identifies it when it’s connected to the internet
- An umbrella term that describes all forms of malicious software designed to cause havoc on a computer
- A technique hackers use to hide their identity pretend to be someone else or simply try to fool you over the internet
- A person who uses programming skills to cause damage to a computer system, steal data and in general conduct illegal cyber activities
- A weakness in computer software
Down
- A computer system that has been infected by malware and is now part of a hacker’s botnet
- A group of computers, printers and devices that are interconnected and governed as a whole
- A defensive technology focused on keeping the bad guys out
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
- A malicious application or script that can be used to take advantage of a computer’s vulnerability
- An acronym that stands for distributed denial of service
- An extra copy of data from a computer
- A piece of malware that often allows a hacker to gain remote access to a computer
15 Clues: A weakness in computer software • An extra copy of data from a computer • An acronym that stands for distributed denial of service • A defensive technology focused on keeping the bad guys out • A piece of malware that often allows a hacker to gain remote access to a computer • ...
Cybersecurity Crossword 2022-05-16
Across
- To figure out or break a code or cipher.
- The science of analyzing or breaking secret codes or ciphers to reveal hidden messages.
- Central Intelligence Agency
- a message written in code or cipher; the encrypted message that must be decoded.
- a message written out in “plain” English that anyone can read; it has not been encoded.
- The science of writing hidden or concealed messages using secret codes or ciphers.
- To put words into code or cipher form.
Down
- A system where symbols, groups of letters or numbers, pictures or words, are substituted to represent other words or phrases.
- a person who secretly collects and reports information on the activities, movements, and plans of an enemy or competitor.
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- Central Security Service
- National Security Agency
- A system where one letter or symbol is methodically substituted for another letter or symbol.
- The science of studying codes and ciphers.
- A systematic, minute, and thorough attempt to learn the facts about something complex or hidden
15 Clues: Central Security Service • National Security Agency • Central Intelligence Agency • To put words into code or cipher form. • To figure out or break a code or cipher. • The science of studying codes and ciphers. • a message written in code or cipher; the encrypted message that must be decoded. • ...
Cybersecurity Vocabulary 2025-05-01
Across
- Attack involving the lack of or reduction of a computer resource
- Information about a person that can be used to leverage access
- Side of CIA Triad that involves Trust
- Software installed on a person's computer to record that person's keystrokes and mouse clicks
- Social Engineering attack involving scam messages sent via text message
- Side of CIA Triad involving redundancy and reliability
- Passively gathers information about a potential victim for future use in an attack
Down
- Attack performed using phone calls to coerce victims to reveal personal information
- Side of CIA Triad that involves Passwords
- Social engineering tactic where a hacker pretends to be a member of senior management who is authorized to gain access to a system
- Social Engineering example that involves fake e-mails attempting to steal PII
- Attack that takes advantage of people who use short, common words or combinations of these words as their passwords
- Eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
- Where an attacker tries to use every possible combination of letters and numbers until the find a password.
- Network attack involving a "botnet" that aims to reduce resources or access
15 Clues: Side of CIA Triad that involves Trust • Side of CIA Triad that involves Passwords • Side of CIA Triad involving redundancy and reliability • Information about a person that can be used to leverage access • Attack involving the lack of or reduction of a computer resource • Social Engineering attack involving scam messages sent via text message • ...
Cybersecurity Crossword 2023-05-15
Across
- writing statements in order to create a program
- the programs that perform actions on a device like operating systems
- devices that are connected together for the purpose of sharing information
- accessing a device or network without permission or authorization
- a global open network that allows information dispersal and instantaneous communication
- identifies specific devices on a network
- an instruction set to a computer in order to perform an action
- a specific set of multiple instructions used to perform actions on a device
- information that is returned or transmitted by a device
- using codes to secure information
Down
- the physical electronic objects like a computer
- the unauthorized collection of secure or private information
- precautions taken to guard against crime that involves the internet
- accomplished when data is sent to a device
- an electronic device used to create and access information
15 Clues: using codes to secure information • identifies specific devices on a network • accomplished when data is sent to a device • the physical electronic objects like a computer • writing statements in order to create a program • information that is returned or transmitted by a device • an electronic device used to create and access information • ...
Cybersecurity Crossword 2023-01-17
Across
- Software that monitors user activities and reports them to a third party
- A test that outlines the steps to restoring data after a severe setback
- A successful hack to gain control of a network and leak its data
- A scan hackers use to detect areas of weakness via sending messages to identify activity
- a type of computer network device that interconnects with other networks using the same protocol
- An intermediary server between a user and the internet that protects the enterprise from outside intrusion
- The practice of adhering to standards and regulatory requirements
Down
- An AI-manipulated video in someone’s likeness to spread misleading information
- Malicious software often in the form of spam emails
- A misleading computer program with a name deriving from Greek history
- A scam perpetrated by a hacker posing as a legitimate
- A small update to fix bugs in existing programs
- A special code to protect your digital information
- An internal computer network closed to outsiders
- A network that disguises users’ IP addresses with its own to deter hackers
15 Clues: A small update to fix bugs in existing programs • An internal computer network closed to outsiders • A special code to protect your digital information • Malicious software often in the form of spam emails • A scam perpetrated by a hacker posing as a legitimate • A successful hack to gain control of a network and leak its data • ...
Cybersecurity Recap 2026-01-22
Across
- Harmful software designed to damage, disrupt, or gain unauthorized access to a computer system
- The process of determining what an authenticated user is allowed to access or do
- A security system that monitors and controls incoming and outgoing network traffic
- The process of proving who you are, such as logging in with a password or fingerprint
- A type of malware that spreads by attaching itself to files and can damage or delete data
- Authentication a security method that requires two forms of verification to access an account
Down
- The process of converting data into a coded format so only authorized users can read it
- Ensuring systems and data are accessible when needed
- Malware that disguises itself as legitimate software to trick users into installing it
- Engineering manipulating people into giving up confidential information rather than hacking systems
- Triad a cybersecurity model that includes confidentiality, integrity, and availability
- A cyber attack where scammers send fake emails or messages to trick people into giving personal information
- Making sure data is accurate and has not been altered without permission
- Ensuring that information is only accessible to authorized users
- A secret word or phrase used to access an account or system
15 Clues: Ensuring systems and data are accessible when needed • A secret word or phrase used to access an account or system • Ensuring that information is only accessible to authorized users • Making sure data is accurate and has not been altered without permission • The process of determining what an authenticated user is allowed to access or do • ...
Chapter 1 2025-02-04
Across
- Masquerades as legitimate communications Common via email, text, social media
- First line of defense
- Data protection in cloud storage
- The practice of protecting systems, networks, and programs from digital attacks
- Malicious software designed to harm systems
Down
- Encrypts victim's files Demands payment for decryption
- A cybersecurity best practice. Makes it difficult for hackers to crack the user's password
- ransomware attack on a critical US energy infrastructure. Threatened distribution of gas and jet fuel
- type of hacking method that involves hacker cracking user's password
- type of malware
10 Clues: type of malware • First line of defense • Data protection in cloud storage • Malicious software designed to harm systems • Encrypts victim's files Demands payment for decryption • type of hacking method that involves hacker cracking user's password • Masquerades as legitimate communications Common via email, text, social media • ...
I made this using crosswordlabs and google 2025-09-21
Across
- the repeated use of electronic communication technology—like cell phones, computers, tablets, and social media—to harass, threaten, humiliate, or target another person
- a cybersecurity professional who uses their hacking skills to identify and exploit security vulnerabilities in computer systems without the permission of the system owner and with malicious intent
- any data that can be used to distinguish, trace, or identify a specific individual
- any data that can be used to distinguish, trace, or identify a specific individual
- a cybersecurity professional who uses their hacking skills to identify and exploit security vulnerabilities in computer systems with the permission of the system owner
- an IT professional who installs, maintains, monitors, and troubleshoots computer networks to ensure they operate efficiently, reliably, and securely
- facts and statistics collected together for reference or analysis.
Down
- the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally.
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- a structured set of data held in a computer, especially one that is accessible in various ways.
- search for and publish private or identifying information about (a particular individual) on the internet, typically with malicious intent.
- a cybersecurity professional who uses their hacking skills to identify and exploit security vulnerabilities in computer systems without the permission of the system owner and without malicious intent
12 Clues: facts and statistics collected together for reference or analysis. • any data that can be used to distinguish, trace, or identify a specific individual • any data that can be used to distinguish, trace, or identify a specific individual • a structured set of data held in a computer, especially one that is accessible in various ways. • ...
Chris's Crossword 2023-11-29
14 Clues: @_ • Coat closet • Green Thing • Ending, say • Motion for _ • NATO Drafter? • Chuckles, say • Reporter's tool • Number of senators • Legislative roundup • Yearly certification • Kentucky Derby Lover? • A General and employer • Type of fruit and fearless leader
EZOREF Weekly Bulletin Crossword 2021-07-05
Across
- much like standard AV, having an effective ------ solution is vital
- While Secpod provides an array of solutions to your corporate pain points, it was primarily introduced as a ----- management tool
- Quick Heal's Enterprise Grade cybersecurity brand
- Konnect Insights is identified as a next-gen social -------
- Global leader, ethos being 'The truth in information'
Down
- Forescout is positioned as a Modern ---
- founded in 1987, providing unparalleled cybersecurity solution now known as the device to cloud cybersecurity company
- IOB is an acronym for the Internet of ---------
- A ------- consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.
- This technology works by securing data flowing to and from in-house IT architectures and cloud vendor environments using an organization's security policies.
10 Clues: Forescout is positioned as a Modern --- • IOB is an acronym for the Internet of --------- • Quick Heal's Enterprise Grade cybersecurity brand • Global leader, ethos being 'The truth in information' • Konnect Insights is identified as a next-gen social ------- • much like standard AV, having an effective ------ solution is vital • ...
Cybersecurity 2024-02-06
Across
- A piece of software designed to fix security vulnerabilities or improve functionality.
- The process of converting information into a code to prevent unauthorized access.
- Software designed to harm or exploit computer systems and data.
- Authentication based on physical or behavioral characteristics, such as fingerprints or voice patterns.
Down
- Network security device that monitors and controls incoming and outgoing network traffic.
- Process of verifying the identity of a user, system, or application.
- The practice of protecting systems, networks, and programs from digital attacks.
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
- Malicious software that can replicate itself and spread to other computers.
9 Clues: Software designed to harm or exploit computer systems and data. • Process of verifying the identity of a user, system, or application. • Malicious software that can replicate itself and spread to other computers. • The practice of protecting systems, networks, and programs from digital attacks. • ...
Cybersecurity 2022-03-29
Across
- DNS ____ is when a hacker pretends to be a DNS server and feeds your computer the wrong IP Address for a given website, sending you to a false website.
- Multi-factor _____ is an authentication method that requires the user to provide two or more verification factors to gain access.
- A ____ attack is spamming a web server with so many requests so close together that it crashes.
- A type of spyware that records every keystroke (and sometimes also mouse movements) made by a computer user in order to gain access to passwords and other confidential info
- ____ is any program code that explicitly attempts to bypass appropriate authorization safeguards and/or perform unauthorized functions.
Down
- A ___ is information stored on your computer by a website you visit. They often store your settings for a website, such as your login status and preferred language or location.
- ____ is an attempt by cybercriminals posing as legitimate institutions, usually via email, to obtain sensitive information from targeted individuals.
- ____ guessing is an attempt to gain access to a computer system by methodically trying to determine a user’s password
- The digital ____is a gap between those who have access to new technology and those who do not.
9 Clues: The digital ____is a gap between those who have access to new technology and those who do not. • A ____ attack is spamming a web server with so many requests so close together that it crashes. • ____ guessing is an attempt to gain access to a computer system by methodically trying to determine a user’s password • ...
Cybersecurity 2024-10-23
Across
- This method scrambles data so that only authorized people can read it
- the practice of keeping computer systems safe
- a hacker sneaks in between two people who are communicating
- acts like a barrier between your computer and the internet
Down
- harmful software that can damage your computer
- Software detect and remove harmful software
- attackers send fake emails
- uses malware to lock your files so you can’t access them
- Injection when attackers take advantage of weaknesses in websites
9 Clues: attackers send fake emails • Software detect and remove harmful software • the practice of keeping computer systems safe • harmful software that can damage your computer • uses malware to lock your files so you can’t access them • acts like a barrier between your computer and the internet • a hacker sneaks in between two people who are communicating • ...
Cybersecurity 2025-06-27
Across
- Malware hidden inside another program.
- A ransomware that attacks networks using a protocol that helps computers communicate with printers and other devices
- Mechanism to run program
- Vulnerability of a system or program that manages to cede control to unauthorized persons.
Down
- Technology that allows the extension of the local area network a public network such as the Internet.
- software that allows anonymous access to the Internet through a series of virtual tunnels or sub-layers that prevent direct connection to the network.
- Exposure of private information.
- Tool that captures data packets on a network.
- Malware that copies itself and spreads across networks
9 Clues: Mechanism to run program • Exposure of private information. • Malware hidden inside another program. • Tool that captures data packets on a network. • Malware that copies itself and spreads across networks • Vulnerability of a system or program that manages to cede control to unauthorized persons. • ...
revision 2022-09-14
10 Clues: захист • кібербезпека • злиття_акцій • штаб-квартира • власники_акцій • під_керівництвом • виявляти_загрози • розсувати кордони • комплексні_рішення • проривні_технології
Cybersecurity Challenge 2019-10-11
Across
- Northern Bank's Core Values
- Location of the Bank's Disaster Recovery Site
- A way to access the Bank’s resources remotely
- Programs installed on your phone
- Password should always be?
- Key word used to send secure email
- Think before you -- ?
- Type of an Operating system
- A device you should not plug in
Down
- A type of malware that encrypts your file
- A type of an email scam
- Department to call for computer issues
- Most likely NFL team to win the superbowl in 2020
- Last name of the VP of IT
- Location of the Bank's Head Quarter
15 Clues: Think before you -- ? • A type of an email scam • Last name of the VP of IT • Password should always be? • Northern Bank's Core Values • Type of an Operating system • A device you should not plug in • Programs installed on your phone • Key word used to send secure email • Location of the Bank's Head Quarter • Department to call for computer issues • ...
Cybersecurity Risk 2021-09-03
Across
- Convert an item, such as data, into a code or cipher.
- Short for malicious software
- Software that encrypts data on someone's device until that person agrees to pay to regain access.
- Similar to a password but uses multiple words together.
- Legitimate of innocent-looking emails asking you to respond with personal data or to click on a link.
- Disguising an email address or phone number to convince you that you are interacting with a trusted friend or source.
- False or inaccurate information.
- Acronym for Pause, Ask, Think.
- Range of activities that guide how we manage digital data.
Down
- Measures taken to protect computer systems.
- Type of identity that is established by an internet user.
- Software written to damage a computer's performance, steal, or alter data.
- The practice of phishing using text messages
- Type of data that can be found as part of public record.
- Type of data that should be protected from public view.
15 Clues: Short for malicious software • Acronym for Pause, Ask, Think. • False or inaccurate information. • Measures taken to protect computer systems. • The practice of phishing using text messages • Convert an item, such as data, into a code or cipher. • Similar to a password but uses multiple words together. • Type of data that should be protected from public view. • ...
Cybersecurity Month 2025-10-03
Across
- Unauthorized access to data
- Network security barrier
- Software update to fix vulnerabilities
- Fraudulent attempt to get personal information
- Malicious software that demands payment
- Local tribal community hosting IT services
- Measures to protect information and systems
Down
- Name of the tribal nation
- IT support for users
- Extra layer of login security
- Software designed to damage or gain unauthorized access
- Secret code to access accounts
- Secure remote network connection
- Process of converting data to unreadable format
- Copy of data for recovery
15 Clues: IT support for users • Network security barrier • Name of the tribal nation • Copy of data for recovery • Unauthorized access to data • Extra layer of login security • Secret code to access accounts • Secure remote network connection • Software update to fix vulnerabilities • Malicious software that demands payment • Local tribal community hosting IT services • ...
Women in Tech 2023-02-22
Cyber Awareness Crossword 2024-10-01
Across
- The act of ensuring data is kept safe from unauthorized access.
- A visual verification tool used to distinguish humans from bots.
- Stronger than a basic password, this adds an extra layer of security.
- The process of confirming a user’s identity.
- Software designed to track user activity without consent.
Down
- The main goal of Cybersecurity Awareness Month.
- The practice of safeguarding digital information.
- A common method to protect data by encoding it.
- The term for unauthorized access to a network.
- A program that appears legitimate but performs harmful actions.
- A type of software update that protects against vulnerabilities.
- A common cyber threat involving deceptive emails.
12 Clues: The process of confirming a user’s identity. • The term for unauthorized access to a network. • The main goal of Cybersecurity Awareness Month. • A common method to protect data by encoding it. • The practice of safeguarding digital information. • A common cyber threat involving deceptive emails. • Software designed to track user activity without consent. • ...
Angol 2025-09-09
021-1 2024-07-12
Across
- Term for when security is breached
- Malicious code used in the attack
- Joint groups formed to improve cybersecurity
- Efforts to reduce the impact of the attack
- Tech giant also affected by the attack
- Public and private sectors working together
- Russian state-sponsored group behind the attack
- U.S. Department of Homeland Security's response
- Type of actor behind the attack
- Another name for the attackers
- Key focus in the aftermath of the attack
- Type of analysis conducted to investigate the attack
- Weaknesses exploited by the attackers
Down
- Techniques used by attackers to avoid detection
- Another term for the security incident
- Process of uncovering the details of the attack
- U.S. response to the attack
- IT company at the center of the attack
- The effect of the attack on organizations
- Cybersecurity firm that discovered the breach
- Software updates released by SolarWinds
- Actions pursued against the attackers
- U.S. department that was compromised
- U.S. body that held hearings on the attack
- SolarWinds product that was compromised
25 Clues: U.S. response to the attack • Another name for the attackers • Type of actor behind the attack • Malicious code used in the attack • Term for when security is breached • U.S. department that was compromised • Actions pursued against the attackers • Weaknesses exploited by the attackers • Another term for the security incident • IT company at the center of the attack • ...
