cybersecurity Crossword Puzzles
CIS178 Jake Stevenson 2023-01-25
Across
- virtual private network
- posing as authorized user
- type of malware
- protects you from virus
- protecting online data
- explicitly allowed
- security system
- malicious software
- explicitly not allowed
- not human
- gaining unauthorized access
Down
- network of networks
- type of scam
- protects you from malware
- harassment on the internet
- unsolicited advertisements
- two-factor authentication
- another word for information
- securing data
- human verification test
20 Clues: not human • type of scam • securing data • type of malware • security system • explicitly allowed • malicious software • network of networks • protecting online data • explicitly not allowed • virtual private network • protects you from virus • human verification test • posing as authorized user • protects you from malware • two-factor authentication • harassment on the internet • ...
Cybersecurity & Web Exploitation Crossword 2022-11-16
Across
- CSRF attacks use the ___ of other users without their knowledge.
- "Access control" is ensuring users cannot act outside of intended ___.
- You access web applications with this.
- As the ___ of web apps increase, the possibility of vulnerabilities also increase.
- When a malicious actor hijacks clicks meant for a visible top-level site.
- For security reasons, by default, web apps should not ___ data from the browser.
- The OSI model has ___ layers.
Down
- Denial-of-Service attacks ___ a target site with fake requests to disrupt service.
- In cybersecurity, blue teams do this.
- Acronym for the organization set up to improve software security in 2001.
- SQL injection attacks can give ___ to data users typically can't retrieve.
- What does the "I" in OSI stand for?
- In cybersecurity, red teams do this.
- ___ hat hackers hack unethically, for personal gain.
- ___ sanitization is the modification of user data so that it can't run scripts.
15 Clues: The OSI model has ___ layers. • What does the "I" in OSI stand for? • In cybersecurity, red teams do this. • In cybersecurity, blue teams do this. • You access web applications with this. • ___ hat hackers hack unethically, for personal gain. • CSRF attacks use the ___ of other users without their knowledge. • ...
Data Privacy Crossword Puzzle 2025-01-14
Across
- Unauthorized access to data or systems
- What employees must change regularly to maintain cybersecurity
- Law requiring Canadian organizations to obtain consent before collecting data
- The legal term for data that can identify an individual
- A method of converting readable data into a coded format
- The principle of limiting data collection to only what is necessary
Down
- Cyberattacks often delivered through email, attempting to steal credentials
- Fraudulent practice of sending fake emails pretending to be from a legitimate source
- Software designed to detect and prevent malware
- The act of reporting suspicious activity or data breaches
- A secret word or phrase used to authenticate access to systems
- Cybersecurity framework used for protecting payment data
- Protection of sensitive information, also known as___
- A method to authenticate users beyond just a password
14 Clues: Unauthorized access to data or systems • Software designed to detect and prevent malware • Protection of sensitive information, also known as___ • A method to authenticate users beyond just a password • The legal term for data that can identify an individual • Cybersecurity framework used for protecting payment data • ...
Risk Awareness Month 2024-05-17
Across
- Use water ________(9 letters)appliances and fittings [Word found in EDM on financial and strategic risk]
- Flooding at expressways and major ________(13 letters) [Word found in EDM on operational risks]
- Ensure your computers and devices are updated with the latest security ________(7 letters) [Word found in EDM on cybersecurity risks]
- ________(11 letters) form the 1st line of defence in our risk governance framework [Word found in EDM on Risk Governance Framework]
Down
- Good ________(6 letters) marksmanship [Word found in EDM on financial and strategic risk]
- ________(10 letters) effort of every level [Word found in EDM on Risk Governance Framework]
- We are not immune to ________(13 letters) risks [Word found in EDM on cybersecurity risks]
- ________(3 letters) can make a difference [Word found in EDM on CRO's message]
- Risk ________(9 letters) Month [Word found in EDM on CRO's message]
- ________(9 letters) into Critical Installations [Word found in EDM on operational risks]
10 Clues: Risk ________(9 letters) Month [Word found in EDM on CRO's message] • ________(3 letters) can make a difference [Word found in EDM on CRO's message] • ________(9 letters) into Critical Installations [Word found in EDM on operational risks] • Good ________(6 letters) marksmanship [Word found in EDM on financial and strategic risk] • ...
Cybersecurity Crossword 2022-04-28
Across
- Filters traffic on a network
- Linux tool to encrypt and decrypt
- Encryption that only uses a public and private key
- A way of accessing a system remotely
- Linux command to search a file for a string
- I in CIA
- Tricks people into making themselves vulnerable
Down
- Stores files in itself
- Physical, Technical, Procedural and Legal controls that can be applied; second framework concept
- Ethical hacking
- Use of shifting characters to hide a message
- Keeping information offsite for easy recovery
- Malicious software
- File that contains information about previous interactions with a system or network
14 Clues: I in CIA • Ethical hacking • Malicious software • Stores files in itself • Filters traffic on a network • Linux tool to encrypt and decrypt • A way of accessing a system remotely • Linux command to search a file for a string • Use of shifting characters to hide a message • Keeping information offsite for easy recovery • Tricks people into making themselves vulnerable • ...
CyberSecurity Awareness 2016-09-30
Across
- Electronic messages NOT handled by the Post Office
- A copy of the data to be used if needed
- Abbreviation for Instant Messaging
- A mobile phone built on a mobile computing platform that is not dumb
- A computer program that can retrieve and display information from the Internet
- Software that is loaded onto a computer to identify and remove viruses
- Abbreviation for Protected Health Information
Down
- Unauthorized person who tries to break into your system or network
- A shortened name for malicious software
- A secret series of characters used to authenticate a person's identity
- A computer network, that an organization uses for its own internal sites like MyNews or PurplePages.
- A technique made to scramble data making it unreadable and unusable
- Method used by criminals to HOOK you into giving up sensitive information.
- Unsolicited email sent to you also a canned meat
14 Clues: Abbreviation for Instant Messaging • A shortened name for malicious software • A copy of the data to be used if needed • Abbreviation for Protected Health Information • Unsolicited email sent to you also a canned meat • Electronic messages NOT handled by the Post Office • Unauthorized person who tries to break into your system or network • ...
Cybersecurity Awareness 2024-11-12
Across
- Settings that users can control to limit what an app can access on their device.
- A technique used to steal sensitive information by tricking users through fake apps or emails.
- A sum of money demanded by attackers in exchange for unlocking encrypted files.
- The type of port that a Rubber Ducky uses to connect to a target machine.
- malicious software that decrypt all user files after receiving money.
- The best way to prevent Bluetooth attacks when not in use is to _______ your Bluetooth.
Down
- Clicking ___ will lead you to download unwanted software to your device or visiting a phishing website
- A software that protects your device from viruses.
- A harmful software that can be delivered through a Rubber Ducky attack, download from unknown sources, and by clicking advertisements.
- A ___ secretly monitors user activity.
- Report to ___ if received a suspicious email from an unknown sender.
- ___ is manipulating their victims in giving away sensitive information using phone calls.
- A software that delivers advertising content randomly inside user device.
- Keeping software and apps current to fix vulnerabilities that can be exploited
14 Clues: A ___ secretly monitors user activity. • A software that protects your device from viruses. • Report to ___ if received a suspicious email from an unknown sender. • malicious software that decrypt all user files after receiving money. • A software that delivers advertising content randomly inside user device. • ...
Enterprise Risk Management Puzzle Activity 2025-01-20
Across
- The act that aims to safeguard individuals in various settings.
- The abbreviation for the act that mandates corporate governance and accountability.
- The division that reviews financial regulations in Jamaica.
- The ministry that has implemented training and development programs.
- The kind of financial losses that can result from misuse of public funds.
- A common cybersecurity threat that uses fake emails.
- A type of data that must be handled with care.
Down
- The practice of protecting digital systems from attacks.
- Type of bond providing rapid financial support after a disaster.
- A type of risk that can result in cessation of business activity.
- A risk that may be caused by natural disasters.
- A plan for maintaining operations during disruptions.
- A type of hazard that can cause musculoskeletal injuries.
- A risk that can be caused by inadequate policies.
- The type of hazard that includes bacteria and viruses.
- A way to secure important documents.
- The abbreviation of the office that ensures transparent government procurement.
- A potential source of harm or adverse effects.
- Public sector program focused on workforce development.
19 Clues: A way to secure important documents. • A potential source of harm or adverse effects. • A type of data that must be handled with care. • A risk that may be caused by natural disasters. • A risk that can be caused by inadequate policies. • A common cybersecurity threat that uses fake emails. • A plan for maintaining operations during disruptions. • ...
Probably Cybersecurity 2025-04-29
14 Clues: deluge • logging in • H@rd2Guess • am i legit? • pay 2 decrypt • network filter • no party can deny • you won! click here! • a list of instructions • something even Macs need • "i'm breaking into the _" • Try Again Try Again Try Again • fingerprints, and perhaps, the retina • "i always feel like somebody is watching me."
Cybersecurity Crossword 2026-01-09
Across
- When data is accessed or stolen without permission.
- A dishonest scheme to steal money or information.
- Connected computers or devices that share information.
- Gaining unauthorized access to a computer or network.
- Ethics Responsible and fair behavior when using technology.
- Illegal activities involving computers or the internet.
- Hacker A hacker who tests security legally to help fix weaknesses.
- Harmful software designed to damage or steal information.
Down
- Malware that spreads by attaching to files or programs.
- Information stored or transmitted digitally (photos, passwords, messages).
- Protecting computers, networks, and data from digital attacks.
- A computer or group of devices working together.
- Fake emails or messages tricking people into giving personal info.
- Malware that locks files and demands payment to unlock them.
14 Clues: A computer or group of devices working together. • A dishonest scheme to steal money or information. • When data is accessed or stolen without permission. • Gaining unauthorized access to a computer or network. • Connected computers or devices that share information. • Malware that spreads by attaching to files or programs. • ...
Vocabulary Test LKE Media A 2022-03-14
11 Clues: durchsetzen • unbeschränkt • Suchmaschine • technikaffin • offline gehen • Verkaufszahlen • Berichterstattung • Sicherheit im Netz • eine Webseite schließen • jemanden oder etwas misstrauen • die aktuellsten Nachrichten über
All About Isabella Crossword 2024-06-15
Across
- focus study of my major
- favorite color
- cultural background
- passion outside of school
- why I transferred schools
- college
- zodiac sign
Down
- favorite sport to play
- first language
- beloved and childhood favorite coast
- my kitty's name
- elementary school
- favorite subject in school
- earned networking certification
- favorite food
- favorite movie (disney)
16 Clues: college • zodiac sign • favorite food • first language • favorite color • my kitty's name • elementary school • cultural background • favorite sport to play • focus study of my major • favorite movie (disney) • passion outside of school • why I transferred schools • favorite subject in school • earned networking certification • beloved and childhood favorite coast
Cybersecurity trainning 2018-03-12
Across
- a hostile message that may contain obscene language.
- techniques used by people who want to sexually harm children and young people get close to them and gain their trust.
- willful, repeated harm through electronic text.
- a trail of the user’s activity in cyberspace.
- information about your visit recorded automatically on your computer
- sending, receiving, or forwarding sexually explicit messages, photographs or images
- malicious software or code designed to damage computer or collect information.
Down
- unsolicited e-mail, or junk mail.
- engine an Internet service that helps you search for information on the web.
- Internet gamers who intentionally cause problems and/or cyberbully other gamers.
- Rules for interacting courteously with others online
- allows you to block certain types of content from being displayed.
- type of online fraud, where someone tries to trick the victim into revealing sensitive details.
- a program that lets you find, see, and hear material on web pages
14 Clues: unsolicited e-mail, or junk mail. • a trail of the user’s activity in cyberspace. • willful, repeated harm through electronic text. • a hostile message that may contain obscene language. • Rules for interacting courteously with others online • a program that lets you find, see, and hear material on web pages • ...
Cybersecurity terms 2023-09-29
Across
- Barrier between a trusted network and an untrustworthy network.
- A collection of programs or software tools that allow hackers to remotely access and control a computer or network.
- A form of fraud that involves contacting victims through email, telephone, or text to trick them into sharing personal information.
- It refers to protecting information from unauthorized user
- A form of malware used by hackers to spy on you and your computer activities.
Down
- Visit the global policy database and find the title of MFC-STA-023
- Also referred to as two-factor authentication
- Short for malicious software
- The process of converting information into a code to prevent unauthorized access.
- It means data are trustworthy and have not been accidentally altered or modified by an unauthorized access
- It is the process of converting coded or encrypted data to its original form.
- It means data are accessible when you need them
- It relates to rights to control the sharing and use of one’s personal information
- A network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.
14 Clues: Short for malicious software • Also referred to as two-factor authentication • It means data are accessible when you need them • It refers to protecting information from unauthorized user • Barrier between a trusted network and an untrustworthy network. • Visit the global policy database and find the title of MFC-STA-023 • ...
Criss-Cross Compliance 2022-07-21
15 Clues: peeps • web armor • vocal hack • I did that! • doorway hacker • call me anytime • harmless watchmen • don't get hooked! • my lips are sealed • law abiding citizen • this goes both ways • make yourself useful • think outside the box • obedient water elephant • do it right the first time
School of Information Crossword 2025-12-18
Across
- First-ever Dean of the School of Information
- The symbols found on the outside of South Hall
- Name of movie that was briefly filmed on the UC Berkeley campus in the past few years?
- Oski turned this age in 2025
- Another name for UC Berkeley
- The number of Executive Fellows in Applied Technology Policy
- What the School of Information aims to be
Down
- Name of Fellowship that supports LGBTQ+ research interests/studies
- Acronym of the White House department that I School Professor Deirdre Mulligan was a part of
- Cybersecurity ____, a class providing students with real-world cyber experience
- The number of chimneys on the roof of South Hall
- Peak offering panoramic views of the Bay Area
- The Center for Long-Term Cybersecurity turned this age in 2025
- The other "eye" school
- Committee report that proposed a broader vision of information science
15 Clues: The other "eye" school • Oski turned this age in 2025 • Another name for UC Berkeley • What the School of Information aims to be • First-ever Dean of the School of Information • Peak offering panoramic views of the Bay Area • The symbols found on the outside of South Hall • The number of chimneys on the roof of South Hall • ...
Enterprise Risk Management Puzzle Activity 2025-01-02
Across
- The type of hazard that includes bacteria and viruses
- A risk that can be caused by inadequate policies
- A common cybersecurity threat that uses fake emails
- The act that aims to safeguard individuals in various settings
- The office that ensures transparent government procurement
- The kind of financial losses that can result from misuse of public funds
- A type of hazard that can cause musculoskeletal injuries
- The practice of protecting digital systems from attacks
- The division that reviews financial regulations in Jamaica
- The act that mandates corporate governance and accountability
Down
- Public sector program focused on workforce development
- A way to secure important documents
- A plan for maintaining operations during disruptions
- A type of data that must be handled with care
- The ministry that has implemented training and development programs
- Type of bond providing rapid financial support after a disaster
- A type of risk that can result in cessation of business activity
- A potential source of harm or adverse effects
- A risk that may be caused by natural disasters
19 Clues: A way to secure important documents • A type of data that must be handled with care • A potential source of harm or adverse effects • A risk that may be caused by natural disasters • A risk that can be caused by inadequate policies • A common cybersecurity threat that uses fake emails • A plan for maintaining operations during disruptions • ...
CrowdStrike 2025-05-14
11 Clues: Beau's Team • Stock Symbol • Ahmed's Team • Company Logo • Jeong's Team • Agatha's Team • Our Department • Our Team Manager • CEO's First Name • Crowdstrike motto • What Crowdstrike does
Cybersecurity Crossword Puzzle 2021-08-14
Across
- Fake organisations will send SMSes that usually contain spelling or --- errors
- Although strictly not under cybersecurity, --- activities via digital devices are becoming common.
- Scams involve emotions such as fear and ---
- A good way is to use password --- apps
- Seniors should use uppercase and --- letters, numbers or symbols to make passwords harder to crack
- The third topic that we discussed is Handling ---
- Fear messages are meant to force the seniors into --- action without stopping to think
- DAs are encouraged to use real-life --- in sharing cybersecurity information with seniors
Down
- Share with seniors how to --- between legitimate and fake organisations
- Legitimate organisations will never ask for personal --- information such as passwords, bank account and OTPs
- A common scam these days : –-- jobs with high salaries
- Seniors can use 2 notebooks as a way to remember passwords and personal information but they must keep the 2 notebooks ---
- Seniors are encouraged to use a strong ---
- Use --- bells as imagery
- Seniors should be wary of providing --- information
- Not sure, --- back
- Online --- apps will most likely make seniors lose money
- Seniors should never click on unknown links or ---
18 Clues: Not sure, --- back • Use --- bells as imagery • A good way is to use password --- apps • Seniors are encouraged to use a strong --- • Scams involve emotions such as fear and --- • The third topic that we discussed is Handling --- • Seniors should never click on unknown links or --- • Seniors should be wary of providing --- information • ...
AATT Cybersecurity 2024-10-21
Across
- Using more than one criteria for authentication
- Internal communications network only accessibly by employees
- Word used to gain access
- The process of verifying the identity of a user, device, or system
- A type of malware that demands payment in exchange for restoring access to data
- A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
- Type of attack that tricks users into revealing sensitive info
Down
- Network device that filters incoming and outgoing network traffic based on defined rules
- Using social interactions to gain information from a target
- A type of software that is designed to damage or exploit a computer system
- Type of attack where the attacker impersonates persons or companies in order to gain information
- Type of malware that allows an attacker to remotely control a system or network
- Malware removal software
- Unwanted emails
14 Clues: Unwanted emails • Word used to gain access • Malware removal software • Using more than one criteria for authentication • Using social interactions to gain information from a target • Internal communications network only accessibly by employees • Type of attack that tricks users into revealing sensitive info • ...
Cybersecurity Threats 2025-08-27
Across
- programs or program code that replicate (copies themselves) with the intention of deleting or corrupting files, or causing a computer to malfunction.
- occurs when a cybercriminal sends out legitimate-looking emails to users. The emails may contain links or attachments that, when initiated, take the user to a fake website; or they may trick the user into responding with personal data
- a program which is often disguised as legitimate software but with malicious instructions embedded within it.
- is malicious code installed on a user’s computer or on an infected website. The code redirects the user’s browser to a fake website without the user’s knowledge
- the act of gaining illegal access to a computer system without the user’s permission.
- spam traffic originates from many different computers, which makes it hard to block the attack.
Down
- a malware which will attempt to flood an end-user with unwanted advertising.
- when a cybercriminal creates a social situation that can lead to a potential victim dropping their protection. It involves the manipulation of people into breaking their normal security procedures and not following best practice.
- is software that gathers information by monitoring a user’s activities carried out on their computer. The gathered information is sent back to the cybercriminal who originally sent this malware.
- a type of stand-alone malware that can self-replicate. Their intention is to spread to other computers and corrupt whole networks
- are programs that encrypt data on a user’s computer and ‘hold the data hostage’. The cybercriminal waits until the ransom money is paid and, sometimes, the decryption key is then sent to the user.
- an attack that attempts at preventing users from accessing part of a network, notably an internet server.
- form of stealing data by tapping into a wired or wireless communication link. The intent is to compromise privacy or to obtain confidential information.
- an attack to 'crack’ password by systematically trying all thedifferent combinations of letters, numbers and other symbols until eventuallythe password is found.
14 Clues: a malware which will attempt to flood an end-user with unwanted advertising. • the act of gaining illegal access to a computer system without the user’s permission. • spam traffic originates from many different computers, which makes it hard to block the attack. • ...
cybersecurity Crossword 2025-08-26
Across
- Type of hacker who violates securities for personal gain
- Any information that can be acccessed through a combination of information
- Revealing of personal details online with intention of harassment, intimidation, or threats
- Special piece of software that stores data and can be easily acccessed
- Information stored digitally
- Field dedicated to the protection of individuals and corporations from the misuse of technology
Down
- Using the internet with intentions of with intention of harassment, intimidation, or threats
- System that connects multiple devices to enable communication and sharing internet, files, etc.
- A weakness or flaw in a digital system or software
- Type of hacker who uses their skills to test and assess the security of networks and systems
- Someone who wrongly uses a software or database than intended
- A term meaning that a system was acccessed by someone unauthorized
- Person in charge of maintaining a network
- Type of hacker who may violates laws without ill intent
14 Clues: Information stored digitally • Person in charge of maintaining a network • A weakness or flaw in a digital system or software • Type of hacker who may violates laws without ill intent • Type of hacker who violates securities for personal gain • Someone who wrongly uses a software or database than intended • ...
book day 2023-05-17
Across
- asas pendawaian
- engineering ethics fourth edition
- networking basics 2 edition
- sistem bekalan elektrik dan pengagihan
- instrumentasi
- design for hackers
- perak good food guide
- key concepts in information & communication technology
- design for software
- embedded system
- cybersecurity
Down
- website optimization
- compliance
- koleksi menu orang bujang
- computer network security
- wireless communication principles & practise
- intelectuals creativity & intolerance
- teknologi biotenaga
- writing for impact
- android phones for dummies
20 Clues: compliance • instrumentasi • cybersecurity • asas pendawaian • embedded system • design for hackers • writing for impact • teknologi biotenaga • design for software • website optimization • perak good food guide • koleksi menu orang bujang • computer network security • android phones for dummies • networking basics 2 edition • engineering ethics fourth edition • ...
FIND THE WORDS 2023-05-17
Across
- Asas Pendawaian
- Engineering Ethics Fourth Edition
- Networking Basics 2 Edition
- Sistem Bekalan Elektrik&Pengagihan
- Instrumentasi
- Design for Hackers
- Perak Good Food Guide
- Key Concepts in Information&Communication Technology
- Design for Software
- Embedded System
- Cybersecurity
Down
- Website Optimization
- Compliance
- Koleksi Menu Orang Bujang
- Computer Network Security
- Wireless Communication Principles&Practise
- Intelectuals Creativity&Intolerance
- Teknologi Biotenaga
- Writing for Impact
- Android Phones for Dummies
20 Clues: Compliance • Instrumentasi • Cybersecurity • Asas Pendawaian • Embedded System • Design for Hackers • Writing for Impact • Teknologi Biotenaga • Design for Software • Website Optimization • Perak Good Food Guide • Koleksi Menu Orang Bujang • Computer Network Security • Android Phones for Dummies • Networking Basics 2 Edition • Engineering Ethics Fourth Edition • ...
Merry Christmas 2025 2025-12-25
Across
- cribbage queen
- number of chickie babes
- quilter
- sisters
- 8/29/2002
- 1/5/46
- favorite cold treat
- Historian
- homebase in Lincoln
- 10/16/1971
- nickname given by Vance grandkids
Down
- Bellevue Public Schools
- 3/22/2005
- Bellevue University
- traditional christmas food
- 8/29/2002
- cybersecurity and CIS
- 1928 car
- Infosys
- orange tic tacs
- 05/05/1972
- 8/29/2002
- pink shoes
- vance grandkids
- Clarinet professional
25 Clues: 1/5/46 • Infosys • quilter • sisters • 1928 car • 3/22/2005 • 8/29/2002 • 8/29/2002 • 8/29/2002 • Historian • 05/05/1972 • pink shoes • 10/16/1971 • cribbage queen • orange tic tacs • vance grandkids • Bellevue University • favorite cold treat • homebase in Lincoln • cybersecurity and CIS • Clarinet professional • Bellevue Public Schools • number of chickie babes • traditional christmas food • ...
crossword 2024-10-21
Across
- ICT-related field of study
- Cloud computing platform
- ICT-related job role
- Internet protocol
- ICT professional
- Computer virus type
- ICT acronym for "Information and Communication Technology" ()
- Computer input device
- Website design principle
- Digital image format
Down
- Network security threat
- Cybersecurity measure
- Database management system
- Programming language
- Mobile operating system
- Network topology
- Data transmission speed
- Computer hardware component
- Software development method
- Data storage unit
20 Clues: ICT professional • Network topology • Internet protocol • Data storage unit • Computer virus type • ICT-related job role • Programming language • Digital image format • Cybersecurity measure • Computer input device • Network security threat • Mobile operating system • Data transmission speed • Cloud computing platform • Website design principle • ICT-related field of study • ...
Cybersecurity and Healthcare 2021-05-31
Across
- Limiting the risks or impacts of a cyber threat.
- Generic term for computer viruses, trojans, etc. designed for malicious purposes.
- A type of cyberattack that holds your systems or information hostage until a ransom is paid.
- You should never share this.
- The policies and measures taken to ensure the authenticity, availability, and integrity of electronic information.
Down
- When should you report an IT breach or potential breach?
- A cyberattack attempting to discover your personal information.
- Federal law protecting patient privacy.
- The US Food and Drug Administration.
- Whose responsibility is cybersecurity?
10 Clues: You should never share this. • The US Food and Drug Administration. • Whose responsibility is cybersecurity? • Federal law protecting patient privacy. • Limiting the risks or impacts of a cyber threat. • When should you report an IT breach or potential breach? • A cyberattack attempting to discover your personal information. • ...
Technology 2025-06-26
Across
- people connect online
- picture of your screen
- small useful device
- finds info online
- wireless internet point
- tech you wear
- stores and sends data
- virtual reality game
Down
- protects computers
- gives internet access
- tech with internet and apps
- small programs
- free software
- share and post online
- opens websites
- smart computer thinking
16 Clues: free software • tech you wear • small programs • opens websites • finds info online • protects computers • small useful device • virtual reality game • people connect online • gives internet access • share and post online • stores and sends data • picture of your screen • wireless internet point • smart computer thinking • tech with internet and apps
Technology 2025-06-26
Across
- picture of your screen
- tech with internet and apps
- smart computer thinking
- tech you wear
- share and post online
- protects computers
- opens websites
Down
- finds info online
- free software
- gives internet access
- wireless internet point
- small useful device
- virtual reality game
- stores and sends data
- small programs
- people connect online
16 Clues: free software • tech you wear • small programs • opens websites • finds info online • protects computers • small useful device • virtual reality game • gives internet access • stores and sends data • people connect online • share and post online • picture of your screen • wireless internet point • smart computer thinking • tech with internet and apps
Mobil tijorat (m-commerce) 2025-11-26
Across
- Raqamli xavfsizlik sohasi
- Onlayn savdo faoliyati
- Raqamli ma’lumotlar jamlanmasi
- Hisoblash qoidalari majmui
- Yangi raqamli yechimlar yaratish
- Zanjirsimon ma’lumotlar bazasi
- Innovatsion biznes loyihasi
Down
- Raqamli xizmatlar ekotizimi
- Raqamli moliya texnologiyasi
- Jarayonlarni raqamga o‘tkazish
- Bulutli hisoblash tizimi
- Internet orqali ulangan qurilmalar
- Sun’iy intellekt tizimi
- Katta hajmdagi ma’lumotlar
- Raqamli aktiv birligi
15 Clues: Raqamli aktiv birligi • Onlayn savdo faoliyati • Sun’iy intellekt tizimi • Bulutli hisoblash tizimi • Raqamli xavfsizlik sohasi • Hisoblash qoidalari majmui • Katta hajmdagi ma’lumotlar • Raqamli xizmatlar ekotizimi • Innovatsion biznes loyihasi • Raqamli moliya texnologiyasi • Jarayonlarni raqamga o‘tkazish • Raqamli ma’lumotlar jamlanmasi • Zanjirsimon ma’lumotlar bazasi • ...
Puzzle voor engels 2025-02-13
Across
- Software_met_vrij_toegankelijke_broncode
- Visuele_weergave_van_softwarebediening
- Flexibele_en_iteratieve_softwareontwikkeling
- Originele_programmeercode_van_een_applicatie
- Systeem_voor_het_beheren_van_codeversies
- Software_voor_het_beheren_van_databases
- Serverkant_van_een_applicatie
- Proces_om_software_op_fouten_te_testen
- Externe_opslag_en_verwerking_van_data
- Omzetting_van_gegevens_in_een_onleesbare_vorm
- Scherm_waarmee_gebruikers_software_bedienen
- Ontwikkelt_applicaties_en_systemen
- Software_die_de_hardware_van_een_computer_beheert
- Professionele_softwareontwikkelaar
- Klantkant_van_een_applicatie
- Beheer_van_softwarekwaliteit_en_betrouwbaarheid
Down
- Regelmatige_integratie_van_codewijzigingen
- Koppeling_tussen_verschillende_softwaretoepassingen
- Programma_dat_code_omzet_naar_uitvoerbare_bestanden
- Computer_of_systeem_dat_diensten_levert_aan_andere_computers
- Taal_waarin_software_wordt_geschreven
- Automatische_uitrol_van_software-updates
- Stap-voor-stap_procedure_om_een_probleem_op_te_lossen
- Publicatie_van_software_naar_een_live_omgeving
- Ontwikkeling_van_websites_en_webapplicaties
- Gesimuleerde_computer_binnen_een_ander_systeem
- Technologie_die_menselijke_intelligentie_nabootst
- Opsporen_en_verhelpen_van_fouten_in_code
- Vernieuwing_of_verbetering_van_software
- Ontwikkeling_van_apps_voor_mobiele_apparaten
- Controle_van_programmeercode_door_anderen
- Ontwikkelomgeving_met_hulpmiddelen_voor_codering
- Computers_die_leren_zonder_expliciete_programmering
- Organisatie_en_opslag_van_gegevens
- Opslagplaats_voor_programmeercode
- Netwerk_van_verbonden_slimme_apparaten
- Bescherming_tegen_digitale_bedreigingen
- Gestructureerde_opslag_van_gegevens
- Basisstructuur_voor_softwareontwikkeling
39 Clues: Klantkant_van_een_applicatie • Serverkant_van_een_applicatie • Opslagplaats_voor_programmeercode • Organisatie_en_opslag_van_gegevens • Ontwikkelt_applicaties_en_systemen • Professionele_softwareontwikkelaar • Gestructureerde_opslag_van_gegevens • Taal_waarin_software_wordt_geschreven • Externe_opslag_en_verwerking_van_data • Visuele_weergave_van_softwarebediening • ...
Digital Partner 2024-11-10
12 Clues: New ideas • Efficiency • Online storage • working together • Digital protection • Return on Investment • Breast cancer treatment • Key Performance Indicator • Pfizer's COVID-19 vaccine • Employee engagement survey • Enterprise Resource Planning • General Data Protection Regulation
Hive's Crossword Puzzle 2024-06-19
Across
- The right to keep one's personal matters and information confidential or secret.
- Ensuring this is maintained involves protecting sensitive data from unauthorised access or disclosure in cybersecurity.
- Information that can be used to identify a specific individual.
- Protected from online harm and dangers.
- Safeguarding and protecting personal data
- Protection of internet-connected systems, including hardware, software, and data, from cyberattacks.
Down
- Officially recognised as meeting certain standards or requirements.
- Changing information into a code to prevent unauthorised access.
- Formal instruction designed to improve skills in a particular area.
- Recognition granted to individuals who have met certain standards in a particular fieId
- Traces left by a person's online activity or presence.
- The organisation offering the crossword puzzle and training/certification in data protection and security.
12 Clues: Protected from online harm and dangers. • Safeguarding and protecting personal data • Traces left by a person's online activity or presence. • Information that can be used to identify a specific individual. • Changing information into a code to prevent unauthorised access. • Formal instruction designed to improve skills in a particular area. • ...
Technologies 2024-01-30
Across
- interconnected
- Customer
- Talk online
- Programme
- device used to select items
- enter data into a computer for processing
- secret word
- set of keys
- state of being safe from electronic crime
- Unit of data
Down
- Problem-solving steps
- computer part
- Computer memory
- organised data retrieved by a computer
- collection of related data
- primary display screen
- transfer
- single worldwide computer network
- the capacity of a computer
- to remove defects
20 Clues: Customer • transfer • Programme • Talk online • secret word • set of keys • Unit of data • computer part • interconnected • Computer memory • to remove defects • Problem-solving steps • primary display screen • collection of related data • the capacity of a computer • device used to select items • single worldwide computer network • organised data retrieved by a computer • ...
Hapebeast career advice gang 2021-12-28
Across
- IT manager for an FMCG company in Singapore
- The Career advice channel podcast host
- The guy with 6,000 lines in this discord
- Hapelinked founder
- The healthcare investor
- Founder of a creative agency (and 15 other companies...) in Portland
- Our dropshipping entrepreneur
- Hey, can you help us pin this?
- Ecommerce B2B specialist
- IT specialist in healthcare and insurance
- Cybersecurity in banking
- Our Canadian social media influencer with 3 million followers
- Car mechanic in Switzerland
- Land investor across the US
- Aspiring architect from New Jersey
- Investor and artist in LA
Down
- The investor who works in Republic Realm
- A financial manager for the US Military
- The investment banker
- A student / sneakerhead based in Singapore
- A real estate agent who was also a D3 basketball player
- Hapelinked co-founder
- Social media manager who was a professional chef
- The one and only
- Corporate finance advisor in one of the "Big 4"
- Investment consultant in Chicago
- Electrical Engineer with experience in renewable sector
- Cybersecurity specialist in Pennsylvania
- Our LA law firm partner
- Ecommerce, international freight entrepreneur.
30 Clues: The one and only • Hapelinked founder • The investment banker • Hapelinked co-founder • The healthcare investor • Our LA law firm partner • Ecommerce B2B specialist • Cybersecurity in banking • Investor and artist in LA • Car mechanic in Switzerland • Land investor across the US • Our dropshipping entrepreneur • Hey, can you help us pin this? • Investment consultant in Chicago • ...
RU ITEC411CH2 2025-04-20
Across
- When information is used for another reason than initially intended
- When space is invaded by an unwanted party
- The term for when websites store data on someones computer
- Right for officers to seize information within view on a device
- Acronym for device which knows exactly where someone is
- Act of comparing records from seperate databases
- Malicious actor trying to release company data
- Using data to figure out what characteristics engage with what
- Protection for business implementing cybersecurity
- Type of ad that uses user data to advertise
Down
- Act of observing with intent of maintaining order
- Searching for patterns in data to make something new
- When users are notified and made aware of how their data is being used
- Hiding important information through cryptography
- Information that is available to the public for access
- Acronym of Government org responsible for the United States' cybersecurity
- Acronym for device which identifies people with radio waves
- Abbreviation of law that requires all telephones to be vulnerable to US government hacks
- Action of giving the data collector data only if users says yes
- Acronym of the government office that watches its privacy policies
20 Clues: When space is invaded by an unwanted party • Type of ad that uses user data to advertise • Malicious actor trying to release company data • Act of comparing records from seperate databases • Act of observing with intent of maintaining order • Hiding important information through cryptography • Protection for business implementing cybersecurity • ...
Farah thee Sattar 2023-11-20
14 Clues: one r • thing 2 • da who? • thing 1 • flip the pan • signature look • he will be found • the other f word • be careful online • the spice of life • 40th birthday gift • farah's first friend • where was farah born • the best yogurt variety
INFORMATION TECHNOLOGY 2021-06-27
cybersecurity 2023-04-21
Across
- facts provided or learned about something or someone
- A human error is an action or decision which was not intended. A violation is a deliberate deviation from a rule or procedure
- he use of centralized planning in an attempt to manage social change and regulate the future development and behaviour of a society.
- the action of obtaining something by using persuasion or guile.
Down
- facts and statistics collected together for reference or analysis
- put (something heavy) over one's shoulder or shoulders to carry.
- any information that relates to an identified or identifiable living individual.
- a person who uses computers to gain unauthorized access to data
8 Clues: facts provided or learned about something or someone • a person who uses computers to gain unauthorized access to data • the action of obtaining something by using persuasion or guile. • put (something heavy) over one's shoulder or shoulders to carry. • facts and statistics collected together for reference or analysis • ...
Cybersecurity 2023-04-21
Across
- type of malicious software, or malware, that spreads between computers and causes damage to data and software.
- replicates itself in order to spread to other computers.
- raw facts and figures
- information about a particular person
Down
- facts provided or learned about something or someone
- a network of computers infected by malware
- malicious software designed to harm or exploit any programmable device, service or network.
- a network security device
8 Clues: raw facts and figures • a network security device • information about a particular person • a network of computers infected by malware • facts provided or learned about something or someone • replicates itself in order to spread to other computers. • malicious software designed to harm or exploit any programmable device, service or network. • ...
cybersecurity 2021-02-12
Across
- make sure you password doesn't contain ________ information
- it is malware which Uses vulnerabilities to move into your machine.
- it should be 8 or more letters
- never tell your _______ passwords
Down
- what is the shortened word for malicious software
- cyber = _______
- you password needs to be hard to _____
- it is scams which are mostly found in emails or fake log in pages
8 Clues: cyber = _______ • it should be 8 or more letters • never tell your _______ passwords • you password needs to be hard to _____ • what is the shortened word for malicious software • make sure you password doesn't contain ________ information • it is scams which are mostly found in emails or fake log in pages • ...
Cybersecurity 2024-03-22
Across
- Downloaded software that holds data hostage
- ____ sensitive data sent outside of the company
- Can expose sensitive data to identity theft
- Cybersecurity Framework
- Fake emails that appear to be from a verified internal source
Down
- Requires Additional Steps beyond legging in with a password
- When to disconnect devices infected by ransomware
- Type of email containing links, usually appears to be from someone you know
8 Clues: Cybersecurity Framework • Downloaded software that holds data hostage • Can expose sensitive data to identity theft • ____ sensitive data sent outside of the company • When to disconnect devices infected by ransomware • Requires Additional Steps beyond legging in with a password • Fake emails that appear to be from a verified internal source • ...
Cybersecurity 2024-04-03
Across
- A piece of audio or video that has been altered and changed to make it seem authentic or credible.
- Software designed to detect, prevent, and remove malicious software from computers.
- A malware that spreads through networks without human interaction.
Down
- A cybersecurity specialist who uses their skills to find and fix vulnerabilities in computer systems.
- A cyber-attack that floods a network or website with excessive traffic to disrupt service.
- A barrier that monitors and controls network traffic based on security rules.
- An online scam involving the impersonation of reputable entities to obtain sensitive personal information.
- A technology that secures connections over the internet, providing secure access to private networks.
8 Clues: A malware that spreads through networks without human interaction. • A barrier that monitors and controls network traffic based on security rules. • Software designed to detect, prevent, and remove malicious software from computers. • A cyber-attack that floods a network or website with excessive traffic to disrupt service. • ...
Cybersecurity 2025-11-03
Across
- A method of verifying a user's identity using two different factors.
- A small file stored on a user’s device that tracks online activity.
Down
- A general term for malicious software.
- A scam that tricks users into revealing personal information, often by email.
- A person who gains unauthorized access to computer systems.
- A secret string used to gain access to a system.
- A system that blocks unauthorized access to or from a network.
- A self-replicating program that spreads from one computer to another.
8 Clues: A general term for malicious software. • A secret string used to gain access to a system. • A person who gains unauthorized access to computer systems. • A system that blocks unauthorized access to or from a network. • A small file stored on a user’s device that tracks online activity. • A method of verifying a user's identity using two different factors. • ...
Clément_34_Cyberattack,nuclear weapon, destruction 2020-02-27
10 Clues: injuries • oil train • Gain access • online fight • non civilian • virtual attack • refineries science • most powerful bomb • impossible situation • science of online security
Cybersecurity 2021-09-25
Across
- a person who tries to access your computer without your knowledge
- a sequence of characters you use to access your accounts
- a type of malware that pretends to be a program you want
- a type of malware that copies itself into other files on your computer
- a nasty program that can harm your device or computer
Down
- an email that tries to trick you into visiting a scam website or to get your personal details
- a program you use to access the internet
- a location on the internet you can save your data
8 Clues: a program you use to access the internet • a location on the internet you can save your data • a nasty program that can harm your device or computer • a sequence of characters you use to access your accounts • a type of malware that pretends to be a program you want • a person who tries to access your computer without your knowledge • ...
Cybersecurity 2021-09-25
Across
- a program you use to access the internet
- a nasty program that can harm your device or computer
- an email that tries to trick you into visiting a scam website or to get your personal details
- a type of malware that pretends to be a program you want
- a location on the internet you can save your data
Down
- a type of malware that copies itself into other files on your computer
- a sequence of characters you use to access your accounts
- a person who tries to access your computer without your knowledge
8 Clues: a program you use to access the internet • a location on the internet you can save your data • a nasty program that can harm your device or computer • a sequence of characters you use to access your accounts • a type of malware that pretends to be a program you want • a person who tries to access your computer without your knowledge • ...
CyberSecurity 2024-10-10
8 Clues: malware lockouts • Dual Authentication • Router Security Protocol • Social engineering by text • security of non-public data • social engineering by phone • Action for infected computer • One part of user's credentials
cybersecurity 2024-10-10
Across
- Another protocol for securing internet communications
- A piece of software designed to fix a vulnerability or bug.
- Malicious software designed to disrupt computer operations, steal data, or gain unauthorized access to a computer system.
- The process of converting information into a secret code to prevent unauthorized access.
Down
- someone who seeks to break into unauthorized computer systems.
- A type of malware that restricts access to a computer system or data until a ransom is paid.
- A cyberattack where a hacker poses as a trusted entity to trick a user into providing sensitive information.
- A network security system that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic.
8 Clues: Another protocol for securing internet communications • A piece of software designed to fix a vulnerability or bug. • someone who seeks to break into unauthorized computer systems. • The process of converting information into a secret code to prevent unauthorized access. • ...
Cybersecurity 2025-01-21
Across
- Software designed to protect systems from malware and cyber threats
- The act of stealing personal information for fraudulent use
- Unauthorized access to a computer system or network.
- A method hackers use to deceive users into sharing sensitive information
Down
- The process of converting data into a secure format
- A weakness in software that can be exploited by attackers.
- The process of identifying and fixing software bugs or vulnerabilities
- A type of malicious software that demands payment to restore access
8 Clues: The process of converting data into a secure format • Unauthorized access to a computer system or network. • A weakness in software that can be exploited by attackers. • The act of stealing personal information for fraudulent use • Software designed to protect systems from malware and cyber threats • ...
Cybersecurity 2025-09-16
Across
- Malware that misleads users as its true intent by disguising itself as a normal program.
- Software that automatically displays or downloads advertisements based on user activity, often slowing down devices.
- Any malware that aims to gather information about a person and send it to another entity in a way that harms the user by violating their privacy, endangering their device's security, or other means.
- A malicious program that infects computers without user knowledge or permission.
- A common type of scam where a fraudster tries to gain your trust by convincing you they are someone they are not.
Down
- A form of fraud that involves contacting victims through email, telephone, or text to trick them into sharing personal information.
- The process of identifying someone's or something's identity, making sure that something is true, genuine, or valid.
- The practice of protecting your personal information and devices from malicious intent.
8 Clues: A malicious program that infects computers without user knowledge or permission. • The practice of protecting your personal information and devices from malicious intent. • Malware that misleads users as its true intent by disguising itself as a normal program. • ...
Cybersecurity 2024-06-05
Across
- a person who uses computers to gain unauthorized access to data.
- malicious act that seeks to damage data, steal data, or disrupt digital life
- the fraudulent use of a person's private identifying information.
Down
- prove or show (something) to be true, genuine, or valid.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information
- a secure, apparently private network is achieved using encryption over a public network.
8 Clues: prove or show (something) to be true, genuine, or valid. • a person who uses computers to gain unauthorized access to data. • the fraudulent use of a person's private identifying information. • malicious act that seeks to damage data, steal data, or disrupt digital life • a secure, apparently private network is achieved using encryption over a public network. • ...
Cybersecurity 2023-09-20
Across
- A security protocol that ensures data integrity
- A type of attack that floods a network with traffic
- Method of verifying a user's identity
- A system's first line of defense
Down
- A piece of information used to access an account
- A common social engineering tactic
- A set of rules that filters network traffic
- A program that appears legitimate but is malicious
8 Clues: A system's first line of defense • A common social engineering tactic • Method of verifying a user's identity • A set of rules that filters network traffic • A security protocol that ensures data integrity • A piece of information used to access an account • A program that appears legitimate but is malicious • A type of attack that floods a network with traffic
Cybersecurity 2024-02-21
Across
- Technique of asymmetric encryption
- Malicious program capable of replicating and spreading
- Another protocol for securing internet communications
- Authentication system based on something the user possesses
Down
- Protocol for securing internet communications
- Technique for protecting data by transforming it irreversibly
- Type of attack that involves making a service unavailable
- International organization establishing information security standards
8 Clues: Technique of asymmetric encryption • Protocol for securing internet communications • Another protocol for securing internet communications • Malicious program capable of replicating and spreading • Type of attack that involves making a service unavailable • Authentication system based on something the user possesses • ...
Cybersecurity 2024-08-09
Across
- A type of malware that replicates itself by infecting other programs or files.
- A method used to circumvent security measures.
- An attempt to gain unauthorized access or cause harm to a system.
- Weaknesses in a system that can be exploited by attackers.
- A technique where attackers use fraudulent emails to steal sensitive information.
Down
- Malicious software designed to disrupt, damage, or gain unauthorized access to a system.
- The act of disguising communication to appear as if it comes from a trusted source.
- An incident where data is accessed without authorization.
8 Clues: A method used to circumvent security measures. • An incident where data is accessed without authorization. • Weaknesses in a system that can be exploited by attackers. • An attempt to gain unauthorized access or cause harm to a system. • A type of malware that replicates itself by infecting other programs or files. • ...
Cybersecurity 2023-05-10
Across
- Defensive computer technology, software or hardware-based, created and installed to keep hackers and malware out. The firewall filters interactions with a computer, allowing or denying entry, to keep systems secure.
- Algorithmic technique utilized to change the contents of a file into something unreadable by anyone outside a specific chain of communication.
- A type of hacker. Whitehat hackers use their skills for good, helping organizations test their cybersecurity measures and find vulnerabilities.
Down
- A type of hacker. A blackhat hacker is an individual that uses their skills to cause damage like breaking into a computer system and stealing confidential information.
- Type of malware that prevents access to computer files. When a computer is infected with ransomware, the malicious software will encrypt files and request a ransom for decryption.
- Computer systems that have been infected by malware. The malware then allows the hacker to connect infected computers creating a network. This network, instructed by the hacker, can be used to carry out malicious attacks.
- Malware used to cause damage on personal computers, aimed at changing, erasing, or modifying data.
- To protect digital data, a consistently updated copy of files should be stored safely offline, in case a system is hacked and data is encrypted or lost.
8 Clues: Malware used to cause damage on personal computers, aimed at changing, erasing, or modifying data. • Algorithmic technique utilized to change the contents of a file into something unreadable by anyone outside a specific chain of communication. • ...
Information Security 2023-12-12
Across
- 57% of organizations see at least weekly phishing attempts
- The most common target of phishing attacks are ____
- The US holds ____ place in the tanks of countries targeted for cybersecurity tasks
- 94% of malware is delivered by ____
- You should ____ over a link in an email to preview the actual address before clicking
Down
- Lock your ____ when you step away
- German American's Information Security Officer is
- ____ is one of the most common and dangerous forms of cyber crime
- Phishing is an attempt to obtain sensitive ____ with malicious intent
- Display names and email domains can be ____ hiding the true identity and appearing trustworthy
- Report spam/suspicious emails through the ____ button on the Outlook toolbar
- Our first line of defense against cybersecurity attacks and fraud is ___
- At German American, _____ is responsible for information security
13 Clues: Lock your ____ when you step away • 94% of malware is delivered by ____ • German American's Information Security Officer is • The most common target of phishing attacks are ____ • 57% of organizations see at least weekly phishing attempts • ____ is one of the most common and dangerous forms of cyber crime • ...
The Top 10 Emerging Technologies 2025-05-08
Across
- A type of computing that uses qubits to solve complex problems faster.
- A type of scam mentioned as a cybersecurity threat.
- Technology that creates immersive virtual worlds.
- Self-driving cars and drones that navigate without human drivers.
- The basic units used in quantum computing.
- Technology that adds digital information to the real world.
- Innovations like solar panels and electric cars that help the environment.
- A method to secure data, especially important with quantum computing.
Down
- A secure digital ledger used for transparent transactions.
- The latest generation of mobile network technology.
- A company mentioned in the example of autonomous vehicles.
- The field involving machines that can perform tasks automatically.
- A gas reduced by a food supplement in sustainable technology.
- The process of making tasks run without human intervention.
- Abbreviation for the network of everyday objects connected to the internet.
- The future mobile network technology being developed for 2030.
- The practice of protecting devices and data from digital threats.
- Abbreviation for the technology that can act on its own to complete tasks.
18 Clues: The basic units used in quantum computing. • Technology that creates immersive virtual worlds. • The latest generation of mobile network technology. • A type of scam mentioned as a cybersecurity threat. • A secure digital ledger used for transparent transactions. • A company mentioned in the example of autonomous vehicles. • ...
Cybersecurity 2024-02-21
Across
- a set of instructions, data or programs
- traceroute protocol
- malware demanding a ransom
- a person doing hack legally
Down
- encrypt information to ensure confidentiality
- malware masked by genuine software
- known to its sole owner and used by him alone to decipher a message of which he is the recipient
- Computer spying device that records the sequences of keys typed on a keyboard.
8 Clues: traceroute protocol • malware demanding a ransom • a person doing hack legally • malware masked by genuine software • a set of instructions, data or programs • encrypt information to ensure confidentiality • Computer spying device that records the sequences of keys typed on a keyboard. • ...
Cybersecurity 2023-05-18
Across
- Menghantar semula email yang bukan-bukan kepada semua orang yang mengenali anda boleh dikenali sebagai
- Apakah tindakan yang perlu dilakukan jika anda menerima pautan atau perkara yang mencurigakan di dalam telefon bimbit?
- Link yang ________ sering didapati di media sosial dan SMS merupakan salah satu Phishing Scams
- Jenayah _______ adalah salah satu jenayah yang dilakukan melalui computer dalam internet. Perbuatan ini menyebabkan mangsa menderita dan mengalami kerugian.
Down
- Mengelakkan perkongsian maklumat ________ di laman social dan internet dapat melindungi diri dari menjadi mangsa siber.
- Sentiasa kemas kini kata ________ sekurang-kurangnya 6 bulan sekali agar tidak mudah digodam oleh pihak yang tidak bertanggungjawab.
- Jangan ________ kata laluan anda
- Dengan berkongsi tarikh _________ ia berpotensi mengancam keselamatan diri.
8 Clues: Jangan ________ kata laluan anda • Dengan berkongsi tarikh _________ ia berpotensi mengancam keselamatan diri. • Link yang ________ sering didapati di media sosial dan SMS merupakan salah satu Phishing Scams • Menghantar semula email yang bukan-bukan kepada semua orang yang mengenali anda boleh dikenali sebagai • ...
Cybersecurity 2024-10-21
Across
- Tricking people to reveal information (6 letters)
- Tricking people into giving up confidential information (16 letters)
Down
- A safe practice for creating unique keys for accounts (8 letters)
- Malicious software demanding payment
- Phone-based scam to trick people (7 letters)
- Fake identity in an email (8 letters)
- Online trick to steal information via fake websites (8 letters)
- Cautiously sharing personal details (6 letters)
8 Clues: Malicious software demanding payment • Fake identity in an email (8 letters) • Phone-based scam to trick people (7 letters) • Cautiously sharing personal details (6 letters) • Tricking people to reveal information (6 letters) • Online trick to steal information via fake websites (8 letters) • A safe practice for creating unique keys for accounts (8 letters) • ...
cybersecurity 2026-01-04
Across
- A person who uses computers to gain unauthorized access to data
- A network security device that monitors traffic and blocks unauthorized access
- A software error or flaw that can be exploited by hackers
- A temporary code or object used to verify your identity
Down
- A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in an email.
- Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system
- A type of malware that locks your files and demands payment to release them
- The process of scrambling data so it becomes unreadable without a specific key
8 Clues: A temporary code or object used to verify your identity • A software error or flaw that can be exploited by hackers • A person who uses computers to gain unauthorized access to data • A type of malware that locks your files and demands payment to release them • A network security device that monitors traffic and blocks unauthorized access • ...
FSRW - MS Digital Tools 2021-10-05
14 Clues: Training • Lisa Golia • Eco friendly • quick 1-800 tool • Secured Approval • credit protection • consolidated accounts • great for happy hours • Self-Service Platform • secure document sharing • generates recommendations • substitute for pen and paper • Protecting digital information • client can do it instead of FA
Cybersecurity Crossword 2021-12-07
Across
- the process of converting information or data into a code, especially to prevent unauthorized access.
- an individual, group, or application that receives data in the form of a collection. The data is used for query, analysis, and reporting.
- a random string of bits generated specifically to scramble and unscramble data. Is created with algorithms designed to ensure that each key is unique and unpredictable.
- assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the information.
- a process in which organizations assess the data that they hold and the level of protection it should be given.
- a senior stakeholder within your organisation who is accountable for the quality of one or more data sets.
- a computer network that is optimized to process a very high volume of data messages with minimal delay
Down
- a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
- a central or distributed university unit or computer system administrator responsible for the operation and management of systems and servers which collect, manage and provide access to institutional data.
- a person responsible for the organization's Privacy Program including but not limited to daily operations of the program, development, implementation, and maintenance of policies and procedures.
- a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
- a user interface, service or device that collects data that is relevant to a business. In many cases, multiple systems and processes may produce data for the same data entity.
- a form of encryption where a pair of keys are responsible for encrypting and decrypting data.
13 Clues: a form of encryption where a pair of keys are responsible for encrypting and decrypting data. • the process of converting information or data into a code, especially to prevent unauthorized access. • a computer network that is optimized to process a very high volume of data messages with minimal delay • ...
Cybersecurity Crossword 2024-08-19
Across
- A malicious software program designed to replicate itself and spread to other system.
- Malicious software designed to secretly monitor and collect user information
- A security system designed to monitor, filter, and control network traffic to protect a computer or network
- The process of verifying the identity of a user
- A method for gaining unauthorized access or control
- A secret string of characters used to authenticate a user's identity and grant access to secured systems
- The use of digital platforms, such as social media or messaging services, to harass, threaten, or intimidate individuals
Down
- An individual or entity that engages in harmful, malicious, or unethical behavior.
- A manipulation technique used to deceive individuals into divulging confidential information or performing actions that compromise security
- A type of phishing attack that specifically targets high-level executives or senior officials
- A form of social engineering to deceive individuals
- A program designed to detect, prevent, and remove malicious software, such as viruses, worms
- The right or condition of being free from unauthorized observation or intrusion
13 Clues: The process of verifying the identity of a user • A form of social engineering to deceive individuals • A method for gaining unauthorized access or control • Malicious software designed to secretly monitor and collect user information • The right or condition of being free from unauthorized observation or intrusion • ...
Buckeye Hills Career Center 2024-11-15
Across
- police work & practice
- construction safety & crew leadership
- child & adolescent development
- patient centered care
- hand & foot treatment
- automotive steering & suspension
- telecommunications power
Down
- network management
- painting & refinishing
- heating, cooling & electrical
- catering & banquet services
- gas metal arc welding
12 Clues: network management • patient centered care • gas metal arc welding • hand & foot treatment • police work & practice • painting & refinishing • telecommunications power • catering & banquet services • heating, cooling & electrical • child & adolescent development • automotive steering & suspension • construction safety & crew leadership
Bridal Shower 2022-04-18
Across
- Bride's Maiden Name
- City Where Wedding will be Held
- College Where Couple Graduated From
- Groom
- Where Bride grew up
- Month Bride was Born
- Honeymoon
- Site of Gift Registry
- Month of Wedding
Down
- Bride's car
- Instrument Groom Plays
- Josh's Major in College
- Number of Attendants
- Bride's High School Sport
- Last Name of Groom
- Groom's car
- Groom's sport
- Month the Groom was born
18 Clues: Groom • Honeymoon • Bride's car • Groom's car • Groom's sport • Month of Wedding • Last Name of Groom • Bride's Maiden Name • Where Bride grew up • Number of Attendants • Month Bride was Born • Site of Gift Registry • Instrument Groom Plays • Josh's Major in College • Month the Groom was born • Bride's High School Sport • City Where Wedding will be Held • College Where Couple Graduated From
Cybersecurity - malware 2022-01-31
Across
- The Computer ____ Act makes it an offence to impair the operation of a computer
- Do this to movies or games from illegal websites to catch a become infected from a computer virus
- Gaining unauthorised access to a computer system
- Attacker demands that a ransom be paid before they decrypt files and unlock the computer
- A large collection of malware-infected devices
- Self-replicating software
Down
- May be disguised as a game which then gives an attacker access via a backdoor
- Malicious software
- Distributed Denial of Service attack
- Monitors and gathers information on a person and how they use their computer
- Replicates themselves and spread through the network and use the system's resources
- Displays malicious adverts or pop-ups
- Records every keystroke made by a user
13 Clues: Malicious software • Self-replicating software • Distributed Denial of Service attack • Displays malicious adverts or pop-ups • Records every keystroke made by a user • A large collection of malware-infected devices • Gaining unauthorised access to a computer system • Monitors and gathers information on a person and how they use their computer • ...
Cybersecurity Crossword 2024-10-10
Across
- for detecting and analyzing malicious activities within a network (3 letters)
- A attack where a hacker tricks someone into revealing confidential information (6 letters)
- Authentication factor using your fingerprint or face (7 letters)
- Security incident where sensitive data is exposed to unauthorized parties (9 letters)
- A hidden or disguised computer virus, 5 letters)
- A type of network that connects devices wirelessly over short distances, 4 letters)
Down
- Code injected by an attacker, usually for malicious purposes (5 letters)
- Software that is installed without the user's knowledge and collects data, 7 letters)
- The process of encoding data to keep it secure, 10 letters)
- An unauthorized individual gaining access to systems, 6 letters)
- A protection layer to prevent unauthorized access to a network (7 letters)
- An encryption method that uses the same key to encrypt and decrypt data (3 letters)
- A malicious software designed to disrupt or damage a system, 6 letters)
13 Clues: A hidden or disguised computer virus, 5 letters) • The process of encoding data to keep it secure, 10 letters) • An unauthorized individual gaining access to systems, 6 letters) • Authentication factor using your fingerprint or face (7 letters) • A malicious software designed to disrupt or damage a system, 6 letters) • ...
cybersecurity axel 2025-11-26
Across
- – A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy source.
- – The process of confirming that someone or something is genuine.
- – Software designed to harm or exploit any device, service, or network.
- - Protocol similar to arp , but for IPv6
- – A secret word or phrase used to verify a user’s identity.
Down
- - Type of malware that secretly gathers information from an infected computer.
- - Code that assigns a numerical value to basic English letters, characters, and symbols
- - Used to perform distributed denial-of-service (DDoS) attacks.
- - Secret method of bypassing normal authentication or security controls.
- - A standalone malware that replicates itself in order to spread to other computers.
- - A group of communicating computers and peripherals known as hosts
- – An attempt to damage, steal, or disrupt digital systems or networks.
- – The process of converting data into a code to prevent unauthorized access
13 Clues: - Protocol similar to arp , but for IPv6 • – A secret word or phrase used to verify a user’s identity. • - Used to perform distributed denial-of-service (DDoS) attacks. • – The process of confirming that someone or something is genuine. • - A group of communicating computers and peripherals known as hosts • ...
Cybersecurity Vocabulary 2025-10-15
Across
- (ANSWER IN HEX)Malware disguised as legitimate software
- Network security system that filters traffic
- Software update to fix vulnerabilities
- Deceptive emails or messages to steal information
- Verifying the identity of a user or device
- Malware that encrypts files and demands payment
Down
- (ANSWER IN HEX)Self-replicating malware that spreads without a host file
- Malware that records keystrokes
- Process of converting data into a secret code
- General term for malicious software
- Determines what a user is allowed to access
- One-way transformation of data into a fixed string
- Malware that attaches to other programs and spreads
13 Clues: Malware that records keystrokes • General term for malicious software • Software update to fix vulnerabilities • Verifying the identity of a user or device • Determines what a user is allowed to access • Network security system that filters traffic • Process of converting data into a secret code • Malware that encrypts files and demands payment • ...
Basic of Cyber Sercurity 2019-07-10
Across
- items or people of value online
- making sure every individual working with an information system has specific responsibilities for information assurance
- preventing unauthorized access to information and actively detecting, documenting, and counteracting such threats
- the virtual, online world
- provides a way for denial to be impossible
- a weakness or gap in our effort to protect ourselves
- assures online information is trustworthy and accurate
Down
- infrastructure government term describing assets that keep society and the economy functioning (including national and economic security, public health and safety, communication, transportation, and electricity generation)
- guarantee of reliable access to information
- three-pronged system of cybersecurity
- the practice of protecting digital and non-digital information
- a set of rules limiting access to certain information, much like privacy
- the state of being protected against criminal or unauthorized online activity
- guarantee that the message, transaction, or other exchange of information has shown its proof of identity
14 Clues: the virtual, online world • items or people of value online • three-pronged system of cybersecurity • provides a way for denial to be impossible • guarantee of reliable access to information • a weakness or gap in our effort to protect ourselves • assures online information is trustworthy and accurate • the practice of protecting digital and non-digital information • ...
Cybersecurity 2022-11-17
Across
- a malicious form of self-replicating software that does not attach itself to a file
- infects a computer so that it displays malicious adverts or pop-ups when the victim is online.
- a useful bot that monitors the prices of items to find the best deal
- a useful bot that provides customer service online
Down
- software that gains access to your computer with malicious intent.
- a malicious form of self-replicating software.
- a large collection of malware-infected devices
- software that appears as useful but actually performs malicious actions
8 Clues: a malicious form of self-replicating software. • a large collection of malware-infected devices • a useful bot that provides customer service online • software that gains access to your computer with malicious intent. • a useful bot that monitors the prices of items to find the best deal • software that appears as useful but actually performs malicious actions • ...
cybersecurity 2020-08-25
Across
- little files that webs save in your computer, like user, password etc.
- word used to refer to any type of malicious software
- it recopiles your information and sends it to an extern person without your consent
- programs that have as an objective to alter your computer's funcionment
Down
- security system against evil internet hackers or viruses.
- unsolicited mail.
- it is designed to combat viruses before they enter your system
- it's objective is to appear good to then trick you and hack you.
8 Clues: unsolicited mail. • word used to refer to any type of malicious software • security system against evil internet hackers or viruses. • it is designed to combat viruses before they enter your system • it's objective is to appear good to then trick you and hack you. • little files that webs save in your computer, like user, password etc. • ...
CYBERSECURITY 2023-03-22
Across
- A PROGRAM YOU USE FOR SEARCHING SOMETHING ON THE INTERNET; IT'S A PROGRAM WHICH STORES COOKIES
- FORM OF CRYPTOGRAPHY THAT ENCODES YOUR DATA
- A LANGUAGE WHICH ALLOWS YOU TO CODE A WEBSITE
Down
- PROGRAM WHICH GETS YOUR DATA
- DATA THAT DESCRIBES THE FILE
- SEGMENT OF LARGER MESSAGE SENT OVER NETWORKS; YOU CAN SEE ITS CONTENT USING A PROGRAM LIKE WIRESHARK OR Burp Suite ;)
- A PROGRAMMING LANGUAGE IN WHICH A PROGRAM (MALICOUS ONE; USED FOR DoS ATTACK) CALLED slowloris WAS WRITTEN
- THE NAME OF HACKING COMPETITION TO FIND SOME FLAG LOOKING FOR EXAMPLE LIKE THAT: flag{easyCrossword}
8 Clues: PROGRAM WHICH GETS YOUR DATA • DATA THAT DESCRIBES THE FILE • FORM OF CRYPTOGRAPHY THAT ENCODES YOUR DATA • A LANGUAGE WHICH ALLOWS YOU TO CODE A WEBSITE • A PROGRAM YOU USE FOR SEARCHING SOMETHING ON THE INTERNET; IT'S A PROGRAM WHICH STORES COOKIES • THE NAME OF HACKING COMPETITION TO FIND SOME FLAG LOOKING FOR EXAMPLE LIKE THAT: flag{easyCrossword} • ...
Cybersecurity 2024-03-20
Across
- a technology that creates a secure, encrypted connection over a less secure network, such as the internet. It allows users to securely access a private network from a remote location.
- It's a security software or device that monitors network or system activities for malicious activities or policy violations and produces reports to a management console. It's designed to detect and respond to potential security threats in real-time.
- It refers to a cyberattack where the attacker floods a network, server, or website with traffic or requests, causing it to become overwhelmed and unable to respond to legitimate requests from users, thus denying service to legitimate users.
- the process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can decrypt and access the original information.
- a malicious and deliberate attempt to disrupt, damage, or gain unauthorized access to computer systems, networks, or data, often carried out through the use of digital tools and techniques.
Down
- short for malicious software, refers to any software intentionally designed to cause damage to a computer, server, network, or device, or to gain unauthorized access to sensitive information.
- a cyberattack method where fraudulent emails, messages, or websites are used to deceive individuals into revealing sensitive information such as passwords, credit card numbers, or personal details.
- a security system that monitors and controls incoming and outgoing network traffic, protecting against unauthorized access and malicious activities.
8 Clues: a security system that monitors and controls incoming and outgoing network traffic, protecting against unauthorized access and malicious activities. • the process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can decrypt and access the original information. • ...
Cybersecurity 2024-05-07
Across
- A secret combination of characters used to authenticate users and protect accounts.
- A weakness or flaw in a system that can be exploited by attackers.
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
- A cyberattack method via email that involves tricking individuals into disclosing sensitive information.
Down
- A barrier that monitors and controls incoming and outgoing network traffic.
- A deliberate attempt to compromise the security, availability, or integrity of computer systems or networks.
- The process of verifying the identity of a user or system.
- The process of converting data into a code to prevent unauthorized access.
8 Clues: The process of verifying the identity of a user or system. • A weakness or flaw in a system that can be exploited by attackers. • The process of converting data into a code to prevent unauthorized access. • A barrier that monitors and controls incoming and outgoing network traffic. • ...
Cybersecurity 2025-10-21
Across
- malicious actor disguising their identity by faking a trusted source
- he state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- accessing data without authorisation
Down
- a computer program that damages or reveals data
- a protective system for computer systems
- unauthorised access to confidential, sensitive or protected data
- a malicious attack via email
- information stored on a computer or system
8 Clues: a malicious attack via email • accessing data without authorisation • a protective system for computer systems • information stored on a computer or system • a computer program that damages or reveals data • unauthorised access to confidential, sensitive or protected data • malicious actor disguising their identity by faking a trusted source • ...
Cybersecurity 2026-01-23
Across
- dishonest or illegal behavior, especially from someone with power
- having an acceptable explanation or reason
- to reveal the truth about something that is not acceptable
- a person who uses computers to gain unauthorized access to data
Down
- to risk losing or destroying something important
- spoken or written in secret, and meant to be kept secret
- to be more important or valuable than something else
- the state of being able to keep your life secret
8 Clues: having an acceptable explanation or reason • to risk losing or destroying something important • the state of being able to keep your life secret • to be more important or valuable than something else • spoken or written in secret, and meant to be kept secret • to reveal the truth about something that is not acceptable • ...
CyberAware&Prep 2023-04-14
Across
- You should always ____ your screen when stepping away from the computer
- a _____ should be difficult for attackers to guess, but easy for you to remember
- The people responsible for cybersecurity
Down
- if you receive a strange email, never open any ___
- You can flag suspicious emails asking for information using the 'report ____' option
- the abbreviation for multiple layers of access control/login protections
- Frequent software ___ can help keep systems secure
- ____ are the weakest link in cybersecurity
- always ___ out when you are done using a website
- Shoulder ____ is when someone tries to gain information from a device by peeking over your shoulder
10 Clues: The people responsible for cybersecurity • ____ are the weakest link in cybersecurity • always ___ out when you are done using a website • if you receive a strange email, never open any ___ • Frequent software ___ can help keep systems secure • You should always ____ your screen when stepping away from the computer • ...
June Crossword: How to Secure the Manufacturing Edge 2025-05-27
Across
- Feature of edge solutions that helps in maintaining data privacy
- Method to protect data both in transit and at rest
- Company providing edge computing solutions for manufacturing cybersecurity
- Type of computing that processes data locally to reduce network transmission
Down
- Advanced capability to identify and respond to security incidents
- Critical aspect of manufacturing cybersecurity involving GDPR and ISO standards
- Process to ensure the integrity of the system and prevent unauthorized access
- Unified security practices help in minimizing this
- Frequent actions to patch vulnerabilities and protect against new threats
- Regular checks to identify and address security vulnerabilities
10 Clues: Unified security practices help in minimizing this • Method to protect data both in transit and at rest • Regular checks to identify and address security vulnerabilities • Feature of edge solutions that helps in maintaining data privacy • Frequent actions to patch vulnerabilities and protect against new threats • ...
Computer language , Browsing safely 2025-06-12
Across
- protects computer
- fooling email
- Language used by computer
- prevent unauthorised entry in computer
- unethical hackers
- criminal activities in computer
- Illegal entry in computer
Down
- misleading email
- online befriending
- Prevents virus
- hacks computer
- Illegal method of getting money
- bullying someone using computer
13 Clues: fooling email • Prevents virus • hacks computer • misleading email • protects computer • unethical hackers • online befriending • Language used by computer • Illegal entry in computer • Illegal method of getting money • bullying someone using computer • criminal activities in computer • prevent unauthorised entry in computer
Cyber security LO1 & LO2 Crossword 2022-10-16
Across
- email claiming to be from an authority/bank and demand for personal information
- type of vulnerability that can be exploited by hackers attacking individuals.
- type of vulnerability caused by natural disasters
- Availability is when Information is ……………………when required
- cybersecurity security threat type which is planned set of actions designed to cause threat/damage
Down
- users directed to fake websites
- Accidentally disclosing personal information of customers in an organisation could lead to this
- Availability is when Information is only accessible to ………………… viewers
- pretending to be from bank/software company
- cybersecurity security threat type which is unintended consequence of an action
10 Clues: users directed to fake websites • pretending to be from bank/software company • type of vulnerability caused by natural disasters • Availability is when Information is ……………………when required • Availability is when Information is only accessible to ………………… viewers • type of vulnerability that can be exploited by hackers attacking individuals. • ...
Newsletter Issue 2 2023-11-02
Across
- A famous Russian cybercriminal group known for ransomware attacks.
- A network cybersecurity strategy that isolates potentially compromised systems.
- An organization that sets cybersecurity standards to combat ransomware.
- A famous 2017 ransomware attack.
Down
- Ransomware attack variant that disguises itself as a legitimate program.
- The first cryptocurrency used in ransomware payments.
- Ransomware attacks that demand payment in Monero, not Bitcoin.
- A practice of intentionally spreading fake ransomware to extort money.
8 Clues: A famous 2017 ransomware attack. • The first cryptocurrency used in ransomware payments. • Ransomware attacks that demand payment in Monero, not Bitcoin. • A famous Russian cybercriminal group known for ransomware attacks. • A practice of intentionally spreading fake ransomware to extort money. • ...
risky business 2017-07-18
Across
- riding in a car unrestrained (2,8)
- flint + stone=
- not having the appropriate materials
- jumping out of a plane
- sharp kitchen utensils
- inhalation of nicotine
- under the legal age
- marijuana, methamphetamine
Down
- a fermented drink
- people may _____ you to do things
- online safety (5,8)
- SMS
- trying to impress people (7,3)
- having too much
- may inflict wounds and physical damage
- people you don't know
- operating a vehicle
- lack of sleep
- going very fast
- cruel or violent treatment
20 Clues: SMS • lack of sleep • flint + stone= • having too much • going very fast • a fermented drink • online safety (5,8) • operating a vehicle • under the legal age • people you don't know • jumping out of a plane • sharp kitchen utensils • inhalation of nicotine • cruel or violent treatment • marijuana, methamphetamine • trying to impress people (7,3) • people may _____ you to do things • ...
Cyberland Magazine 2021-03-29
Across
- being literate in virtual world
- virtual
- virtual culture
- acts of virtual world
- virtual assault
- science fiction stories in virtual world
- virtual offense
Down
- misguide in virtual world
- virtual vacancy
- pirate of virtual world
- voyager in virtual world
- virtual tyranny
- science of virtual fields
- half human half robot
- safeness of virtual world
15 Clues: virtual • virtual vacancy • virtual tyranny • virtual culture • virtual assault • virtual offense • acts of virtual world • half human half robot • pirate of virtual world • voyager in virtual world • misguide in virtual world • science of virtual fields • safeness of virtual world • being literate in virtual world • science fiction stories in virtual world
VCRA July 2024 Puzzle 2024-07-12
Across
- Data recovery solution
- Target-specific phishing
- Unauthorized data exposure
- Secure code conversion process
- Malicious computer network
- Security for web connections
- Relating to computer security
- Monitors and controls network traffic
- Traffic disrupting attack
Down
- Following legal standards
- Fixes software vulnerabilities
- Unauthorized computer access
- Review of cybersecurity practices
- Potential negative impact
- Data-locking extortion malware
- Software meant to damage systems
- Sensitive info stealing method
- Potential for IT loss
18 Clues: Potential for IT loss • Data recovery solution • Target-specific phishing • Following legal standards • Potential negative impact • Traffic disrupting attack • Unauthorized data exposure • Malicious computer network • Unauthorized computer access • Security for web connections • Relating to computer security • Fixes software vulnerabilities • Data-locking extortion malware • ...
Cybersecurity Crossword 2025-01-17
Across
- Data visualization tool
- Data analysis technique
- Data science tool for data manipulation
- Type of data distribution
- Deep learning architecture
- Data mining technique
Down
- Data visualization library
- Data storage solution
- Data preprocessing step
- Type of machine learning algorithm
- Machine learning model evaluation metric
- Statistical measure of spread
- Programming language for data science
13 Clues: Data storage solution • Data mining technique • Data preprocessing step • Data visualization tool • Data analysis technique • Type of data distribution • Data visualization library • Deep learning architecture • Statistical measure of spread • Type of machine learning algorithm • Programming language for data science • Data science tool for data manipulation • ...
Cybersecurity Crossword 2026-02-13
Across
- Data visualization tool
- Data analysis technique
- Data science tool for data manipulation
- Type of data distribution
- Deep learning architecture
- Data mining technique
Down
- Data visualization library
- Data storage solution
- Data preprocessing step
- Type of machine learning algorithm
- Machine learning model evaluation metric
- Statistical measure of spread
- Programming language for data science
13 Clues: Data storage solution • Data mining technique • Data preprocessing step • Data visualization tool • Data analysis technique • Type of data distribution • Data visualization library • Deep learning architecture • Statistical measure of spread • Type of machine learning algorithm • Programming language for data science • Data science tool for data manipulation • ...
Mobil tijorat (m-commerce) 2025-11-26
Across
- Raqamli xavfsizlik sohasi
- Onlayn savdo faoliyati
- Raqamli ma’lumotlar jamlanmasi
- Hisob-kitob qoidalari majmui
- Yangi raqamli yechimlar yaratish
- Zanjirsimon ma’lumotlar bazasi
- Innovatsion biznes loyihasi
Down
- Raqamli xizmatlar ekotizimi
- Raqamli moliya texnologiyasi
- Jarayonlarni raqamga o‘tkazish
- Bulutli hisoblash tizimi
- Internet orqali ulangan qurilmalar
- Sun’iy intellekt tizimi
- Katta hajmdagi ma’lumotlar
- Raqamli aktiv birligi
15 Clues: Raqamli aktiv birligi • Onlayn savdo faoliyati • Sun’iy intellekt tizimi • Bulutli hisoblash tizimi • Raqamli xavfsizlik sohasi • Katta hajmdagi ma’lumotlar • Raqamli xizmatlar ekotizimi • Innovatsion biznes loyihasi • Raqamli moliya texnologiyasi • Hisob-kitob qoidalari majmui • Jarayonlarni raqamga o‘tkazish • Raqamli ma’lumotlar jamlanmasi • Zanjirsimon ma’lumotlar bazasi • ...
cybersecurity 2024-02-27
Cybersecurity Crossword Puzzle 2023-04-22
Across
- Change IP on email to seem legitimate
- Attempts access with malicious intent
- When hacker successfully get information
- Fake made to seem real
- Coding to protect information
- Misleading computer program
- Spying on personal information
- Tricks them into selecting wrong thing
- Stops Viruses
Down
- Spams website with lots of requests
- prevents other users from hacking
- Two or more computers connected
- Malware which is made to damage
- Bad software that infects devices
- Technology to keep intruders out
- Holds your files until given money
- Hacker poses as a business
- Data not on computer goes here
- Internet Protocol
- Replaces your IP with another
20 Clues: Stops Viruses • Internet Protocol • Fake made to seem real • Hacker poses as a business • Misleading computer program • Coding to protect information • Replaces your IP with another • Spying on personal information • Data not on computer goes here • Two or more computers connected • Malware which is made to damage • Technology to keep intruders out • prevents other users from hacking • ...
Cybersecurity Crossword Puzzle 2023-07-26
Across
- Prevents unauthorized access.
- Unauthorized alteration of data.
- (Common Vulnerabilities and Exposures) Software vulnerability database.
- Flaws Software vulnerabilities.
- Breach Stealing sensitive data.
- Misleading email attacks.
- Malware with a harmful payload.
- Unauthorized access to data.
- Common entry point for attacks.
- Malware that hides within legitimate software.
- Engineering Attacks exploiting human behavior.
Down
- Encrypting communication data.
- Control Access rights limitation.
- Insecure code exploit.
- Scrambling data for security.
- Protects from viruses.
- Removing sensitive data.
- Malicious self-replicating code.
- Protects data from unauthorized changes.
- Malware that spreads via networks.
20 Clues: Insecure code exploit. • Protects from viruses. • Removing sensitive data. • Misleading email attacks. • Unauthorized access to data. • Prevents unauthorized access. • Scrambling data for security. • Encrypting communication data. • Flaws Software vulnerabilities. • Breach Stealing sensitive data. • Malware with a harmful payload. • Common entry point for attacks. • ...
Cybersecurity Participation Activity 2023-08-23
Across
- Designed to prevent unauthorized computer access
- Virus that spreads through a network
- ______ engineering (gaining trust)
- They break into a computer system
- Phishing using voicemail
- Username and password
- Scam that clones your phone
- Manipulated image used for propaganda
- Typically junk email
- Their malintent is financial gain
- Authentication that employs login barriers
- Malicious software
Down
- Webpages not indexed by search engine
- Important password feature
- Pretends to be legitimate; hides virus
- Records credit card information
- Professional hackers who help organizations
- Unique combination of words
- Technological use of biological characteristics
- Acronym for flooding, shutting down website
- Webpages used for illegal activity
21 Clues: Malicious software • Typically junk email • Username and password • Phishing using voicemail • Important password feature • Unique combination of words • Scam that clones your phone • Records credit card information • They break into a computer system • Their malintent is financial gain • ______ engineering (gaining trust) • Webpages used for illegal activity • ...
Cybersecurity terminology challenge 2023-09-12
Across
- A type of wireless security encryption.
- A network for wireless device connections.
- Regularly saving important files.
- Keeping applications and systems current.
- Securing sensitive information through encryption.
- Malicious software that locks your data and demands payment.
- Malicious software, often used in phishing.
- Deceptive emails with links or attachments to steal data.
- Fixing damaged equipment or systems.
- Mandating password usage for device access.
- A device managing internet connections.
- Using additional authentication steps.
Down
- Information that requires protection due to its importance.
- Informing relevant parties about a situation.
- Unauthorized entry by individuals who should not have access.
- A system of interconnected computers and devices.
- Small removable storage devices.
- The process of restoring normalcy after an incident.
- Suspicious requests for sensitive information.
- Isolate infected computers from the network.
20 Clues: Small removable storage devices. • Regularly saving important files. • Fixing damaged equipment or systems. • Using additional authentication steps. • A type of wireless security encryption. • A device managing internet connections. • Keeping applications and systems current. • A network for wireless device connections. • Malicious software, often used in phishing. • ...
Cybersecurity Crossword Puzzle 2024-06-07
Across
- Hint: Mends security holes.
- Hint: Blocks unauthorized access.
- Hint: Digital fingerprint.
- Hint: Protects data in transit.
- Hint: Dock for data transfer.
- Hint: Concealing information using codes.
- Hint: Echo request.
- Hint: Padlock for websites.
- Hint: Sounds like a sharp inhale.
- Hint: Base of a tree.
Down
- Hint: Neutral ground.
- Hint: Inbox clutter.
- Hint: Crawling through networks.
- Hint: Cyber mischief.
- Hint: Shields your identity.
- Hint: Infectious code.
- Hint: Minor glitch.
- Hint: Sounds like a fishing technique.
- Hint: Private internet highway.
- Hint: Automated program.
20 Clues: Hint: Minor glitch. • Hint: Echo request. • Hint: Inbox clutter. • Hint: Neutral ground. • Hint: Cyber mischief. • Hint: Base of a tree. • Hint: Infectious code. • Hint: Automated program. • Hint: Digital fingerprint. • Hint: Mends security holes. • Hint: Padlock for websites. • Hint: Shields your identity. • Hint: Dock for data transfer. • Hint: Protects data in transit. • ...
Cybersecurity Awareness Month 2024-09-16
Across
- Function that converts data into a fixed size
- Measures taken to protect data
- Impersonating someone or something to deceive
- Securing data by converting it into code
- Software that records keystrokes
- Software that shows unwanted ads
- Malware that encrypts files demanding ransom
- Attack using trial and error to guess passwords)
- Investment scam involving fake accounts
- Vulnerabilities exploited before being patched
- Fraudulent attempts to steal sensitive information)
Down
- Malicious software designed to damage systems
- Hidden way of bypassing security controls
- Virtual Private Network for secure connections
- Software that collects data secretly
- Online harassment or bullying
- Multi-Factor Authentication
- Self-replicating malware that spreads across networks)
- Image, video or audio generated by AI
- A system that protects networks
- Network of compromised computers under attacker control)
- Software update to fix security vulnerabilities
22 Clues: Multi-Factor Authentication • Online harassment or bullying • Measures taken to protect data • A system that protects networks • Software that records keystrokes • Software that shows unwanted ads • Software that collects data secretly • Image, video or audio generated by AI • Investment scam involving fake accounts • Securing data by converting it into code • ...
Cybersecurity Training Exercise 2024-10-02
Across
- *You can thank MIT for this term that once described quick and dirty code that was functional but not stable*
- A network of computers infected by malware that are under the control of a single attacking party
- *Occam says that a principle that states that the simplest explanation is usually the best*
- Taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
- A feature or defect of a computer system that allows surreptitious unauthorized access to data
- Computer security programs that simulate network resources that hackers are likely to look for to trap them
- *0b11111101000, but in words*
- Type of internet fraud that seeks to acquire a user’s credentials by deception
- A security system that forms a virtual perimeter around a network of workstations
- Code that has been written to take advantage of a vulnerability before the software vendor knows about it and can publish a patch for it
Down
- Weaknesses in software programs
- Every RazorPower Co. employee's favorite drink!
- Any type of intrusive computer software with malicious intent against the user
- Tricking someone into clicking on one object on a web page while they think they are clicking on another
- Malicious computer program that is often sent as an email attachment or a download
- protecting personal privacy and proprietary information
- The process of decoding cipher text to plain text
- Data is complete, trustworthy and has not been modified
- The property of being genuine and being able to be verified and trusted
- Everyday objects that are connected to the internet and are able to collect and transfer data automatically
- Malicious programs designed to extort money from victims by blocking access to the computer or encrypting stored data
21 Clues: *0b11111101000, but in words* • Weaknesses in software programs • Every RazorPower Co. employee's favorite drink! • The process of decoding cipher text to plain text • protecting personal privacy and proprietary information • Data is complete, trustworthy and has not been modified • The property of being genuine and being able to be verified and trusted • ...
Cybersecurity Crossword Puzzle 2025-03-10
Across
- Unwanted, unsolicited messages
- Computer network security system that restricts internet traffic
- Use of online platforms to bully/harass
- Receives and sends data on computer networks
- A person who breaks into computer system
- Software tool to take advantage of software
- Small update to fix bugs
- A technology that creates secure connection
- Storing and accessing data
- Software application to access/view websites
- Technique for attempting to acquire data
- Network of computers infected by malware
Down
- Malware that spreads causing damage to data
- Program that's intentionally harmful to computers
- Process of verifying someone's identity
- Application of intelligent algorithms
- Process of making a copy
- Network acting as entrance to another network
- Safe and responsible use of information/technology
- Way to scramble data
20 Clues: Way to scramble data • Process of making a copy • Small update to fix bugs • Storing and accessing data • Unwanted, unsolicited messages • Application of intelligent algorithms • Process of verifying someone's identity • Use of online platforms to bully/harass • A person who breaks into computer system • Technique for attempting to acquire data • ...
Edgescan Cybersecurity Crossword 2025-02-20
Across
- Attempt to breach security
- Verifying user identity
- Malware that encrypts files and demands payment
- Deceptive emails trying to steal information
- Relating to computers and networks
- Potential danger to a system
- Checking for vulnerabilities
- Self-replicating malicious code
- Person attempting unauthorized access
- Software update to fix vulnerabilities
- Taking advantage of a vulnerability
- Security event that may indicate a breach
- Review of security controls
- Information stored on a system
- Attack that disrupts service availability
- Restoring data after a loss
- Malware disguised as legitimate software
- Connected computers and devices
- Weakness that can be exploited
- Unsolicited bulk email
Down
- Copy of data for recovery
- Simulated attack to find weaknesses
- Ensuring systems are accessible
- Ensuring data accuracy
- Unauthorized access to data
- Software that hides malware on a system
- Scrambling data to make it unreadable
- Programs that run on a computer
- Software that secretly monitors user activity
- Keeping information secret
- Protecting systems and data
- Secret word for access
- Protecting personal information
- Measures to prevent attacks
- Network of infected computers
- Network security system controlling traffic
- Safeguard from harm
- Malicious software designed to harm systems
- Potential for loss or damage
39 Clues: Safeguard from harm • Ensuring data accuracy • Secret word for access • Unsolicited bulk email • Verifying user identity • Copy of data for recovery • Attempt to breach security • Keeping information secret • Unauthorized access to data • Protecting systems and data • Review of security controls • Measures to prevent attacks • Restoring data after a loss • Potential danger to a system • ...
