cybersecurity Crossword Puzzles

Cybersecurity Awareness 2024-09-06

Cybersecurity Awareness crossword puzzle
Across
  1. measures that reduce the likelihood of an unwanted occurrence or lessen its consequences
  2. software that compromises the operation of a system by performing an unauthorized function or process
  3. a computer program that can replicate itself, infect a computer without permission or knowledge of the user, and spread further
  4. an attack method that uses trial and error to crack passwords
  5. abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages
  6. a type of malware that conceals its true content to fool a user into thinking it's a harmless file
  7. the fraudulent practice of sending test messages purporting to be form reputable companies in order to convince individuals to reveal personal information
Down
  1. the ability to adapt to changing conditions and prepare for, withstand, and rapidly recover from disruption
  2. a digital form of social engineering to deceive individuals into providing sensitive information or exposing their system to malware
  3. limits network traffic between networks or systems
  4. an unauthorized user who attempts to or gains access to an information system
  5. the process of verifying one's identity
  6. a technology that allows a program to interact with the internals of another program running on a different machine
  7. An attempt to gain unauthorized access to system services, resources, or information
  8. a string of characters used to authenticate an identity or to verify authorizes access

15 Clues: the process of verifying one's identitylimits network traffic between networks or systemsan attack method that uses trial and error to crack passwordsan unauthorized user who attempts to or gains access to an information systemAn attempt to gain unauthorized access to system services, resources, or information...

Cybersecurity Definitions 2023-01-25

Cybersecurity Definitions crossword puzzle
Across
  1. hack into telecommunications systems, especially to obtain free calls.
  2. a type of network attack used to gain unauthorized access to systems within a security perimeter
  3. a person who uses computers to gain unauthorized access to data
  4. If users are unable to achieve the defined goal.
  5. are useful in passwordless and multi-factor authentication. Hidden form field is used to store session information of a client
  6. the condition of an electronics, software, or other system where the system's substantive behavior is dependent on the sequence or timing of oth
  7. Where the attacker intercepts and relays messages between two parties who believe they are communicating with each other
  8. someone who broke into computer systems, bypassed passwords or licenses in computer programs, or in other ways intentionally breached computer security.
  9. Is a more advanced technique to get user’s credentials by making effort to enter users into the website
Down
  1. Used by hijacking to gain access to a targets computer or online accounts
  2. The act of entering false information into a DNS cache
  3. a systematic approach to managing all changes made to a product or system
  4. Espionage or trespass occurs when an unauthorized individual attempts to gain illegal access to organizational information
  5. a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution
  6. A technique whereby packet data flowing across the network is detected and observed

15 Clues: If users are unable to achieve the defined goal.The act of entering false information into a DNS cachea person who uses computers to gain unauthorized access to datahack into telecommunications systems, especially to obtain free calls.Used by hijacking to gain access to a targets computer or online accounts...

Cybersecurity Terms 2022-04-28

Cybersecurity Terms crossword puzzle
Across
  1. "pretty good privacy"
  2. private modification
  3. corrective measures
  4. private readability
  5. pick out at risk information
  6. react
  7. awareness of intrusions
  8. data restoration
Down
  1. converting plain text for confidentiality
  2. ability to access
  3. multi-use accounts
  4. illegal activity in cyberspace
  5. verifying logins (acronym)
  6. copyright protection
  7. putting in controls

15 Clues: reactdata restorationability to accessmulti-use accountscorrective measuresprivate readabilityputting in controlsprivate modificationcopyright protection"pretty good privacy"awareness of intrusionsverifying logins (acronym)pick out at risk informationillegal activity in cyberspaceconverting plain text for confidentiality

Cybersecurity terms 2024-09-22

Cybersecurity terms crossword puzzle
Across
  1. the process of converting plaintext data into a coded format to prevent unauthorized access
  2. a type of malicious software that automatically downloads advertisements on a device
  3. process of converting data into a fixed-size string of characters for unique identificaton
  4. a type of malicious software that disguises itself as legitimate or useful software
  5. the process of monitoring network or system activities for malicious activities
  6. technique that isolates applications or processes in a controlled environment
Down
  1. a type of malicious software or hardware that records keystrokes made by a user
  2. a security approach that allows only pre-approved users to access a network
  3. an incident of unauthorized access to sensitive, protected or confidential data
  4. the practice of securing information by transforming it into an unreadable format
  5. a network of compromised computers that are controlled remotely by a hacker to perform automated tasks
  6. a malicious software designed to gain unauthorized access to a network while hiding its presence
  7. a software update designed to fix vulnerabilities, bugs, or improve functionality
  8. any device that connects to a network and serves as a point of entry for data
  9. a simulated cyber attack on a system conducted to identify and vulnerabilities

15 Clues: a security approach that allows only pre-approved users to access a networkany device that connects to a network and serves as a point of entry for datatechnique that isolates applications or processes in a controlled environmenta simulated cyber attack on a system conducted to identify and vulnerabilities...

Cybersecurity Terms 2025-04-09

Cybersecurity Terms crossword puzzle
Across
  1. A software update to fix security flaws. (5 letters)
  2. Manipulating people to divulge confidential information. (15 letters)
  3. Granting permissions to access resources. (13 letters)
  4. System that monitors networks for suspicious activity. (3 letters)
  5. Malware that encrypts files and demands payment. (11 letters)
  6. A network security system that blocks unauthorized access. (8 letters)
  7. Weakness in a system that can be exploited. (12 letters)
  8. Securely connects a user to a network over the internet. (3 letters)
  9. Exploit targeting a previously unknown vulnerability. (8 letters)
  10. Attack that overwhelms a system with traffic to crash it. (4 letters)
Down
  1. Security method requiring two types of verification. (10 letters, hyphenated)
  2. Scrambling data to make it unreadable without a key. (10 letters)
  3. Malicious software designed to harm or exploit systems. (7 letters)
  4. Process of verifying a user’s identity. (14 letters)
  5. Deceptive emails or messages to steal sensitive data. (8 letters)

15 Clues: A software update to fix security flaws. (5 letters)Process of verifying a user’s identity. (14 letters)Granting permissions to access resources. (13 letters)Weakness in a system that can be exploited. (12 letters)Malware that encrypts files and demands payment. (11 letters)Scrambling data to make it unreadable without a key. (10 letters)...

Trey cybersecurity 2026-04-01

Trey cybersecurity crossword puzzle
Across
  1. When sensitive information is exposed or stolen
  2. The process of converting data into a secure code
  3. A type of malware that spreads by attaching to files
  4. Malware that locks your data and demands money to unlock it
  5. Malware that spreads on its own without needing a file
  6. Software that secretly collects your personal information
  7. A scam where attackers trick you into giving personal info through fake messages
  8. Protection of a computer network from threats
  9. A security method that requires two ways to confirm identity
Down
  1. Software designed to harm or damage a computer
  2. A secret set of characters used to access an account
  3. The trail of data you leave online
  4. A system that blocks unauthorized access to a network
  5. The process of verifying a user’s identity
  6. A person who gains unauthorized access to systems

15 Clues: The trail of data you leave onlineThe process of verifying a user’s identityProtection of a computer network from threatsSoftware designed to harm or damage a computerWhen sensitive information is exposed or stolenThe process of converting data into a secure codeA person who gains unauthorized access to systems...

EZOREF Weekly Bulletin Crossword 2021-07-05

EZOREF Weekly Bulletin Crossword crossword puzzle
Across
  1. much like standard AV, having an effective ------ solution is vital
  2. While Secpod provides an array of solutions to your corporate pain points, it was primarily introduced as a ----- management tool
  3. Quick Heal's Enterprise Grade cybersecurity brand
  4. Konnect Insights is identified as a next-gen social -------
  5. Global leader, ethos being 'The truth in information'
Down
  1. Forescout is positioned as a Modern ---
  2. founded in 1987, providing unparalleled cybersecurity solution now known as the device to cloud cybersecurity company
  3. IOB is an acronym for the Internet of ---------
  4. A ------- consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.
  5. This technology works by securing data flowing to and from in-house IT architectures and cloud vendor environments using an organization's security policies.

10 Clues: Forescout is positioned as a Modern ---IOB is an acronym for the Internet of ---------Quick Heal's Enterprise Grade cybersecurity brandGlobal leader, ethos being 'The truth in information'Konnect Insights is identified as a next-gen social -------much like standard AV, having an effective ------ solution is vital...

revision 2022-09-14

revision crossword puzzle
Across
  1. захист
  2. злиття_акцій
  3. комплексні_рішення
  4. штаб-квартира
  5. власники_акцій
Down
  1. проривні_технології
  2. під_керівництвом
  3. кібербезпека
  4. розсувати кордони
  5. виявляти_загрози

10 Clues: захисткібербезпеказлиття_акційштаб-квартиравласники_акційпід_керівництвомвиявляти_загрозирозсувати кордоникомплексні_рішенняпроривні_технології

Cybersecurity 2024-02-06

Cybersecurity crossword puzzle
Across
  1. A piece of software designed to fix security vulnerabilities or improve functionality.
  2. The process of converting information into a code to prevent unauthorized access.
  3. Software designed to harm or exploit computer systems and data.
  4. Authentication based on physical or behavioral characteristics, such as fingerprints or voice patterns.
Down
  1. Network security device that monitors and controls incoming and outgoing network traffic.
  2. Process of verifying the identity of a user, system, or application.
  3. The practice of protecting systems, networks, and programs from digital attacks.
  4. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
  5. Malicious software that can replicate itself and spread to other computers.

9 Clues: Software designed to harm or exploit computer systems and data.Process of verifying the identity of a user, system, or application.Malicious software that can replicate itself and spread to other computers.The practice of protecting systems, networks, and programs from digital attacks....

Cybersecurity 2022-03-29

Cybersecurity crossword puzzle
Across
  1. DNS ____ is when a hacker pretends to be a DNS server and feeds your computer the wrong IP Address for a given website, sending you to a false website.
  2. Multi-factor _____ is an authentication method that requires the user to provide two or more verification factors to gain access.
  3. A ____ attack is spamming a web server with so many requests so close together that it crashes.
  4. A type of spyware that records every keystroke (and sometimes also mouse movements) made by a computer user in order to gain access to passwords and other confidential info
  5. ____ is any program code that explicitly attempts to bypass appropriate authorization safeguards and/or perform unauthorized functions.
Down
  1. A ___ is information stored on your computer by a website you visit. They often store your settings for a website, such as your login status and preferred language or location.
  2. ____ is an attempt by cybercriminals posing as legitimate institutions, usually via email, to obtain sensitive information from targeted individuals.
  3. ____ guessing is an attempt to gain access to a computer system by methodically trying to determine a user’s password
  4. The digital ____is a gap between those who have access to new technology and those who do not.

9 Clues: The digital ____is a gap between those who have access to new technology and those who do not.A ____ attack is spamming a web server with so many requests so close together that it crashes.____ guessing is an attempt to gain access to a computer system by methodically trying to determine a user’s password...

Cybersecurity 2025-06-27

Cybersecurity crossword puzzle
Across
  1. Malware hidden inside another program.
  2. A ransomware that attacks networks using a protocol that helps computers communicate with printers and other devices
  3. Mechanism to run program
  4. Vulnerability of a system or program that manages to cede control to unauthorized persons.
Down
  1. Technology that allows the extension of the local area network a public network such as the Internet.
  2. software that allows anonymous access to the Internet through a series of virtual tunnels or sub-layers that prevent direct connection to the network.
  3. Exposure of private information.
  4. Tool that captures data packets on a network.
  5. Malware that copies itself and spreads across networks

9 Clues: Mechanism to run programExposure of private information.Malware hidden inside another program.Tool that captures data packets on a network.Malware that copies itself and spreads across networksVulnerability of a system or program that manages to cede control to unauthorized persons....

Cybersecurity 2024-10-23

Cybersecurity crossword puzzle
Across
  1. This method scrambles data so that only authorized people can read it
  2. the practice of keeping computer systems safe
  3. a hacker sneaks in between two people who are communicating
  4. acts like a barrier between your computer and the internet
Down
  1. harmful software that can damage your computer
  2. Software detect and remove harmful software
  3. attackers send fake emails
  4. uses malware to lock your files so you can’t access them
  5. Injection when attackers take advantage of weaknesses in websites

9 Clues: attackers send fake emailsSoftware detect and remove harmful softwarethe practice of keeping computer systems safeharmful software that can damage your computeruses malware to lock your files so you can’t access themacts like a barrier between your computer and the interneta hacker sneaks in between two people who are communicating...

Women in Tech 2023-02-22

Women in Tech crossword puzzle
Across
  1. - Computers
  2. - Remodeling
  3. - Vendor
  4. - Technology
  5. - Telecommunication
  6. - Security
Down
  1. - Processor
  2. - Robotization
  3. - Machinery
  4. - Vendor

10 Clues: - Vendor- Vendor- Security- Processor- Computers- Machinery- Remodeling- Technology- Robotization- Telecommunication

Cybersecurity Challenge 2019-10-11

Cybersecurity Challenge crossword puzzle
Across
  1. Northern Bank's Core Values
  2. Location of the Bank's Disaster Recovery Site
  3. A way to access the Bank’s resources remotely
  4. Programs installed on your phone
  5. Password should always be?
  6. Key word used to send secure email
  7. Think before you -- ?
  8. Type of an Operating system
  9. A device you should not plug in
Down
  1. A type of malware that encrypts your file
  2. A type of an email scam
  3. Department to call for computer issues
  4. Most likely NFL team to win the superbowl in 2020
  5. Last name of the VP of IT
  6. Location of the Bank's Head Quarter

15 Clues: Think before you -- ?A type of an email scamLast name of the VP of ITPassword should always be?Northern Bank's Core ValuesType of an Operating systemA device you should not plug inPrograms installed on your phoneKey word used to send secure emailLocation of the Bank's Head QuarterDepartment to call for computer issues...

Cybersecurity Risk 2021-09-03

Cybersecurity Risk crossword puzzle
Across
  1. Convert an item, such as data, into a code or cipher.
  2. Short for malicious software
  3. Software that encrypts data on someone's device until that person agrees to pay to regain access.
  4. Similar to a password but uses multiple words together.
  5. Legitimate of innocent-looking emails asking you to respond with personal data or to click on a link.
  6. Disguising an email address or phone number to convince you that you are interacting with a trusted friend or source.
  7. False or inaccurate information.
  8. Acronym for Pause, Ask, Think.
  9. Range of activities that guide how we manage digital data.
Down
  1. Measures taken to protect computer systems.
  2. Type of identity that is established by an internet user.
  3. Software written to damage a computer's performance, steal, or alter data.
  4. The practice of phishing using text messages
  5. Type of data that can be found as part of public record.
  6. Type of data that should be protected from public view.

15 Clues: Short for malicious softwareAcronym for Pause, Ask, Think.False or inaccurate information.Measures taken to protect computer systems.The practice of phishing using text messagesConvert an item, such as data, into a code or cipher.Similar to a password but uses multiple words together.Type of data that should be protected from public view....

Cybersecurity Month 2025-10-03

Cybersecurity Month crossword puzzle
Across
  1. Unauthorized access to data
  2. Network security barrier
  3. Software update to fix vulnerabilities
  4. Fraudulent attempt to get personal information
  5. Malicious software that demands payment
  6. Local tribal community hosting IT services
  7. Measures to protect information and systems
Down
  1. Name of the tribal nation
  2. IT support for users
  3. Extra layer of login security
  4. Software designed to damage or gain unauthorized access
  5. Secret code to access accounts
  6. Secure remote network connection
  7. Process of converting data to unreadable format
  8. Copy of data for recovery

15 Clues: IT support for usersNetwork security barrierName of the tribal nationCopy of data for recoveryUnauthorized access to dataExtra layer of login securitySecret code to access accountsSecure remote network connectionSoftware update to fix vulnerabilitiesMalicious software that demands paymentLocal tribal community hosting IT services...

Cybersecurity crossword 2026-04-02

Cybersecurity crossword crossword puzzle
Across
  1. bad software
  2. person who breaks into systems
  3. secret code to log in
  4. stored information
  5. scrambles data
  6. proves identity
Down
  1. blocks unwanted access
  2. locks files for money
  3. saved copy of files
  4. spreads and harms computers
  5. tracks your activity
  6. data leak incident
  7. software that stops threats
  8. fake message scam
  9. connected computers

15 Clues: bad softwarescrambles dataproves identityfake message scamdata leak incidentstored informationsaved copy of filesconnected computerstracks your activitylocks files for moneysecret code to log inblocks unwanted accessspreads and harms computerssoftware that stops threatsperson who breaks into systems

Cyber Awareness Crossword 2024-10-01

Cyber Awareness Crossword crossword puzzle
Across
  1. The act of ensuring data is kept safe from unauthorized access.
  2. A visual verification tool used to distinguish humans from bots.
  3. Stronger than a basic password, this adds an extra layer of security.
  4. The process of confirming a user’s identity.
  5. Software designed to track user activity without consent.
Down
  1. The main goal of Cybersecurity Awareness Month.
  2. The practice of safeguarding digital information.
  3. A common method to protect data by encoding it.
  4. The term for unauthorized access to a network.
  5. A program that appears legitimate but performs harmful actions.
  6. A type of software update that protects against vulnerabilities.
  7. A common cyber threat involving deceptive emails.

12 Clues: The process of confirming a user’s identity.The term for unauthorized access to a network.The main goal of Cybersecurity Awareness Month.A common method to protect data by encoding it.The practice of safeguarding digital information.A common cyber threat involving deceptive emails.Software designed to track user activity without consent....

Angol 2025-09-09

Angol crossword puzzle
Across
  1. Network
  2. intelligencia Artificial Intelligence (AI)
  3. Algorithm
  4. Cloud
  5. Cybersecurity
Down
  1. Coding
  2. Data
  3. valóság Virtual Reality
  4. Hardware
  5. Software

10 Clues: DataCloudCodingNetworkHardwareSoftwareAlgorithmCybersecurityvalóság Virtual Realityintelligencia Artificial Intelligence (AI)

021-1 2024-07-12

021-1 crossword puzzle
Across
  1. Term for when security is breached
  2. Malicious code used in the attack
  3. Joint groups formed to improve cybersecurity
  4. Efforts to reduce the impact of the attack
  5. Tech giant also affected by the attack
  6. Public and private sectors working together
  7. Russian state-sponsored group behind the attack
  8. U.S. Department of Homeland Security's response
  9. Type of actor behind the attack
  10. Another name for the attackers
  11. Key focus in the aftermath of the attack
  12. Type of analysis conducted to investigate the attack
  13. Weaknesses exploited by the attackers
Down
  1. Techniques used by attackers to avoid detection
  2. Another term for the security incident
  3. Process of uncovering the details of the attack
  4. U.S. response to the attack
  5. IT company at the center of the attack
  6. The effect of the attack on organizations
  7. Cybersecurity firm that discovered the breach
  8. Software updates released by SolarWinds
  9. Actions pursued against the attackers
  10. U.S. department that was compromised
  11. U.S. body that held hearings on the attack
  12. SolarWinds product that was compromised

25 Clues: U.S. response to the attackAnother name for the attackersType of actor behind the attackMalicious code used in the attackTerm for when security is breachedU.S. department that was compromisedActions pursued against the attackersWeaknesses exploited by the attackersAnother term for the security incidentIT company at the center of the attack...

CIS178 Jake Stevenson 2023-01-25

CIS178 Jake Stevenson crossword puzzle
Across
  1. virtual private network
  2. posing as authorized user
  3. type of malware
  4. protects you from virus
  5. protecting online data
  6. explicitly allowed
  7. security system
  8. malicious software
  9. explicitly not allowed
  10. not human
  11. gaining unauthorized access
Down
  1. network of networks
  2. type of scam
  3. protects you from malware
  4. harassment on the internet
  5. unsolicited advertisements
  6. two-factor authentication
  7. another word for information
  8. securing data
  9. human verification test

20 Clues: not humantype of scamsecuring datatype of malwaresecurity systemexplicitly allowedmalicious softwarenetwork of networksprotecting online dataexplicitly not allowedvirtual private networkprotects you from virushuman verification testposing as authorized userprotects you from malwaretwo-factor authenticationharassment on the internet...

Cybersecurity & Web Exploitation Crossword 2022-11-16

Cybersecurity & Web Exploitation Crossword crossword puzzle
Across
  1. CSRF attacks use the ___ of other users without their knowledge.
  2. "Access control" is ensuring users cannot act outside of intended ___.
  3. You access web applications with this.
  4. As the ___ of web apps increase, the possibility of vulnerabilities also increase.
  5. When a malicious actor hijacks clicks meant for a visible top-level site.
  6. For security reasons, by default, web apps should not ___ data from the browser.
  7. The OSI model has ___ layers.
Down
  1. Denial-of-Service attacks ___ a target site with fake requests to disrupt service.
  2. In cybersecurity, blue teams do this.
  3. Acronym for the organization set up to improve software security in 2001.
  4. SQL injection attacks can give ___ to data users typically can't retrieve.
  5. What does the "I" in OSI stand for?
  6. In cybersecurity, red teams do this.
  7. ___ hat hackers hack unethically, for personal gain.
  8. ___ sanitization is the modification of user data so that it can't run scripts.

15 Clues: The OSI model has ___ layers.What does the "I" in OSI stand for?In cybersecurity, red teams do this.In cybersecurity, blue teams do this.You access web applications with this.___ hat hackers hack unethically, for personal gain.CSRF attacks use the ___ of other users without their knowledge....

Data Privacy Crossword Puzzle 2025-01-14

Data Privacy Crossword Puzzle crossword puzzle
Across
  1. Unauthorized access to data or systems
  2. What employees must change regularly to maintain cybersecurity
  3. Law requiring Canadian organizations to obtain consent before collecting data
  4. The legal term for data that can identify an individual
  5. A method of converting readable data into a coded format
  6. The principle of limiting data collection to only what is necessary
Down
  1. Cyberattacks often delivered through email, attempting to steal credentials
  2. Fraudulent practice of sending fake emails pretending to be from a legitimate source
  3. Software designed to detect and prevent malware
  4. The act of reporting suspicious activity or data breaches
  5. A secret word or phrase used to authenticate access to systems
  6. Cybersecurity framework used for protecting payment data
  7. Protection of sensitive information, also known as___
  8. A method to authenticate users beyond just a password

14 Clues: Unauthorized access to data or systemsSoftware designed to detect and prevent malwareProtection of sensitive information, also known as___A method to authenticate users beyond just a passwordThe legal term for data that can identify an individualCybersecurity framework used for protecting payment data...

Risk Awareness Month 2024-05-17

Risk Awareness Month crossword puzzle
Across
  1. Use water ________(9 letters)appliances and fittings [Word found in EDM on financial and strategic risk]
  2. Flooding at expressways and major ________(13 letters) [Word found in EDM on operational risks]
  3. Ensure your computers and devices are updated with the latest security ________(7 letters) [Word found in EDM on cybersecurity risks]
  4. ________(11 letters) form the 1st line of defence in our risk governance framework [Word found in EDM on Risk Governance Framework]
Down
  1. Good ________(6 letters) marksmanship [Word found in EDM on financial and strategic risk]
  2. ________(10 letters) effort of every level [Word found in EDM on Risk Governance Framework]
  3. We are not immune to ________(13 letters) risks [Word found in EDM on cybersecurity risks]
  4. ________(3 letters) can make a difference [Word found in EDM on CRO's message]
  5. Risk ________(9 letters) Month [Word found in EDM on CRO's message]
  6. ________(9 letters) into Critical Installations [Word found in EDM on operational risks]

10 Clues: Risk ________(9 letters) Month [Word found in EDM on CRO's message]________(3 letters) can make a difference [Word found in EDM on CRO's message]________(9 letters) into Critical Installations [Word found in EDM on operational risks]Good ________(6 letters) marksmanship [Word found in EDM on financial and strategic risk]...

Enterprise Risk Management Puzzle Activity 2025-01-20

Enterprise Risk Management Puzzle Activity crossword puzzle
Across
  1. The act that aims to safeguard individuals in various settings.
  2. The abbreviation for the act that mandates corporate governance and accountability.
  3. The division that reviews financial regulations in Jamaica.
  4. The ministry that has implemented training and development programs.
  5. The kind of financial losses that can result from misuse of public funds.
  6. A common cybersecurity threat that uses fake emails.
  7. A type of data that must be handled with care.
Down
  1. The practice of protecting digital systems from attacks.
  2. Type of bond providing rapid financial support after a disaster.
  3. A type of risk that can result in cessation of business activity.
  4. A risk that may be caused by natural disasters.
  5. A plan for maintaining operations during disruptions.
  6. A type of hazard that can cause musculoskeletal injuries.
  7. A risk that can be caused by inadequate policies.
  8. The type of hazard that includes bacteria and viruses.
  9. A way to secure important documents.
  10. The abbreviation of the office that ensures transparent government procurement.
  11. A potential source of harm or adverse effects.
  12. Public sector program focused on workforce development.

19 Clues: A way to secure important documents.A potential source of harm or adverse effects.A type of data that must be handled with care.A risk that may be caused by natural disasters.A risk that can be caused by inadequate policies.A common cybersecurity threat that uses fake emails.A plan for maintaining operations during disruptions....

CIS101 2026-03-13

CIS101 crossword puzzle
Across
  1. Leaked private information
  2. Security deny list
  3. Harmful software program
  4. Breaks into computer systems
  5. Connected computer system
  6. Secret login code
  7. Fake email scam
  8. Extra login verification
Down
  1. Blocked access list
  2. Protecting digital systems
  3. Secret tracking software
  4. Multiple login verification
  5. Scrambles data securely
  6. Blocks unwanted traffic
  7. Locks files for money
  8. Extra saved copy
  9. Private internet connection
  10. Self spreading malware
  11. Malware disguised safe
  12. Software security fix

20 Clues: Fake email scamExtra saved copySecret login codeSecurity deny listBlocked access listLocks files for moneySoftware security fixSelf spreading malwareMalware disguised safeScrambles data securelyBlocks unwanted trafficSecret tracking softwareHarmful software programExtra login verificationConnected computer systemLeaked private information...

Cybersecurity Crossword 2022-04-28

Cybersecurity Crossword crossword puzzle
Across
  1. Filters traffic on a network
  2. Linux tool to encrypt and decrypt
  3. Encryption that only uses a public and private key
  4. A way of accessing a system remotely
  5. Linux command to search a file for a string
  6. I in CIA
  7. Tricks people into making themselves vulnerable
Down
  1. Stores files in itself
  2. Physical, Technical, Procedural and Legal controls that can be applied; second framework concept
  3. Ethical hacking
  4. Use of shifting characters to hide a message
  5. Keeping information offsite for easy recovery
  6. Malicious software
  7. File that contains information about previous interactions with a system or network

14 Clues: I in CIAEthical hackingMalicious softwareStores files in itselfFilters traffic on a networkLinux tool to encrypt and decryptA way of accessing a system remotelyLinux command to search a file for a stringUse of shifting characters to hide a messageKeeping information offsite for easy recoveryTricks people into making themselves vulnerable...

Probably Cybersecurity 2025-04-29

Probably Cybersecurity crossword puzzle
Across
  1. something even Macs need
  2. fingerprints, and perhaps, the retina
  3. "i always feel like somebody is watching me."
  4. no party can deny
  5. deluge
  6. a list of instructions
Down
  1. logging in
  2. "i'm breaking into the _"
  3. Try Again Try Again Try Again
  4. H@rd2Guess
  5. network filter
  6. am i legit?
  7. you won! click here!
  8. pay 2 decrypt

14 Clues: delugelogging inH@rd2Guessam i legit?pay 2 decryptnetwork filterno party can denyyou won! click here!a list of instructionssomething even Macs need"i'm breaking into the _"Try Again Try Again Try Againfingerprints, and perhaps, the retina"i always feel like somebody is watching me."

Cybersecurity Crossword 2026-01-09

Cybersecurity Crossword crossword puzzle
Across
  1. When data is accessed or stolen without permission.
  2. A dishonest scheme to steal money or information.
  3. Connected computers or devices that share information.
  4. Gaining unauthorized access to a computer or network.
  5. Ethics Responsible and fair behavior when using technology.
  6. Illegal activities involving computers or the internet.
  7. Hacker A hacker who tests security legally to help fix weaknesses.
  8. Harmful software designed to damage or steal information.
Down
  1. Malware that spreads by attaching to files or programs.
  2. Information stored or transmitted digitally (photos, passwords, messages).
  3. Protecting computers, networks, and data from digital attacks.
  4. A computer or group of devices working together.
  5. Fake emails or messages tricking people into giving personal info.
  6. Malware that locks files and demands payment to unlock them.

14 Clues: A computer or group of devices working together.A dishonest scheme to steal money or information.When data is accessed or stolen without permission.Gaining unauthorized access to a computer or network.Connected computers or devices that share information.Malware that spreads by attaching to files or programs....

Vocabulary Test LKE Media A 2022-03-14

Vocabulary Test LKE Media A crossword puzzle
Across
  1. durchsetzen
  2. eine Webseite schließen
  3. Suchmaschine
  4. technikaffin
  5. Sicherheit im Netz
  6. die aktuellsten Nachrichten über
Down
  1. unbeschränkt
  2. offline gehen
  3. Verkaufszahlen
  4. jemanden oder etwas misstrauen
  5. Berichterstattung

11 Clues: durchsetzenunbeschränktSuchmaschinetechnikaffinoffline gehenVerkaufszahlenBerichterstattungSicherheit im Netzeine Webseite schließenjemanden oder etwas misstrauendie aktuellsten Nachrichten über

All About Isabella Crossword 2024-06-15

All About Isabella Crossword crossword puzzle
Across
  1. focus study of my major
  2. favorite color
  3. cultural background
  4. passion outside of school
  5. why I transferred schools
  6. college
  7. zodiac sign
Down
  1. favorite sport to play
  2. first language
  3. beloved and childhood favorite coast
  4. my kitty's name
  5. elementary school
  6. favorite subject in school
  7. earned networking certification
  8. favorite food
  9. favorite movie (disney)

16 Clues: collegezodiac signfavorite foodfirst languagefavorite colormy kitty's nameelementary schoolcultural backgroundfavorite sport to playfocus study of my majorfavorite movie (disney)passion outside of schoolwhy I transferred schoolsfavorite subject in schoolearned networking certificationbeloved and childhood favorite coast

Cybersecurity trainning 2018-03-12

Cybersecurity trainning crossword puzzle
Across
  1. a hostile message that may contain obscene language.
  2. techniques used by people who want to sexually harm children and young people get close to them and gain their trust.
  3. willful, repeated harm through electronic text.
  4. a trail of the user’s activity in cyberspace.
  5. information about your visit recorded automatically on your computer
  6. sending, receiving, or forwarding sexually explicit messages, photographs or images
  7. malicious software or code designed to damage computer or collect information.
Down
  1. unsolicited e-mail, or junk mail.
  2. engine an Internet service that helps you search for information on the web.
  3. Internet gamers who intentionally cause problems and/or cyberbully other gamers.
  4. Rules for interacting courteously with others online
  5. allows you to block certain types of content from being displayed.
  6. type of online fraud, where someone tries to trick the victim into revealing sensitive details.
  7. a program that lets you find, see, and hear material on web pages

14 Clues: unsolicited e-mail, or junk mail.a trail of the user’s activity in cyberspace.willful, repeated harm through electronic text.a hostile message that may contain obscene language.Rules for interacting courteously with others onlinea program that lets you find, see, and hear material on web pages...

Cybersecurity terms 2023-09-29

Cybersecurity terms crossword puzzle
Across
  1. Barrier between a trusted network and an untrustworthy network.
  2. A collection of programs or software tools that allow hackers to remotely access and control a computer or network.
  3. A form of fraud that involves contacting victims through email, telephone, or text to trick them into sharing personal information.
  4. It refers to protecting information from unauthorized user
  5. A form of malware used by hackers to spy on you and your computer activities.
Down
  1. Visit the global policy database and find the title of MFC-STA-023
  2. Also referred to as two-factor authentication
  3. Short for malicious software
  4. The process of converting information into a code to prevent unauthorized access.
  5. It means data are trustworthy and have not been accidentally altered or modified by an unauthorized access
  6. It is the process of converting coded or encrypted data to its original form.
  7. It means data are accessible when you need them
  8. It relates to rights to control the sharing and use of one’s personal information
  9. A network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.

14 Clues: Short for malicious softwareAlso referred to as two-factor authenticationIt means data are accessible when you need themIt refers to protecting information from unauthorized userBarrier between a trusted network and an untrustworthy network.Visit the global policy database and find the title of MFC-STA-023...

CyberSecurity Awareness 2016-09-30

CyberSecurity Awareness crossword puzzle
Across
  1. Electronic messages NOT handled by the Post Office
  2. A copy of the data to be used if needed
  3. Abbreviation for Instant Messaging
  4. A mobile phone built on a mobile computing platform that is not dumb
  5. A computer program that can retrieve and display information from the Internet
  6. Software that is loaded onto a computer to identify and remove viruses
  7. Abbreviation for Protected Health Information
Down
  1. Unauthorized person who tries to break into your system or network
  2. A shortened name for malicious software
  3. A secret series of characters used to authenticate a person's identity
  4. A computer network, that an organization uses for its own internal sites like MyNews or PurplePages.
  5. A technique made to scramble data making it unreadable and unusable
  6. Method used by criminals to HOOK you into giving up sensitive information.
  7. Unsolicited email sent to you also a canned meat

14 Clues: Abbreviation for Instant MessagingA shortened name for malicious softwareA copy of the data to be used if neededAbbreviation for Protected Health InformationUnsolicited email sent to you also a canned meatElectronic messages NOT handled by the Post OfficeUnauthorized person who tries to break into your system or network...

Cybersecurity Awareness 2024-11-12

Cybersecurity Awareness crossword puzzle
Across
  1. Settings that users can control to limit what an app can access on their device.
  2. A technique used to steal sensitive information by tricking users through fake apps or emails.
  3. A sum of money demanded by attackers in exchange for unlocking encrypted files.
  4. The type of port that a Rubber Ducky uses to connect to a target machine.
  5. malicious software that decrypt all user files after receiving money.
  6. The best way to prevent Bluetooth attacks when not in use is to _______ your Bluetooth.
Down
  1. Clicking ___ will lead you to download unwanted software to your device or visiting a phishing website
  2. A software that protects your device from viruses.
  3. A harmful software that can be delivered through a Rubber Ducky attack, download from unknown sources, and by clicking advertisements.
  4. A ___ secretly monitors user activity.
  5. Report to ___ if received a suspicious email from an unknown sender.
  6. ___ is manipulating their victims in giving away sensitive information using phone calls.
  7. A software that delivers advertising content randomly inside user device.
  8. Keeping software and apps current to fix vulnerabilities that can be exploited

14 Clues: A ___ secretly monitors user activity.A software that protects your device from viruses.Report to ___ if received a suspicious email from an unknown sender.malicious software that decrypt all user files after receiving money.A software that delivers advertising content randomly inside user device....

Cybersecurity Terms 2026-02-25

Cybersecurity Terms crossword puzzle
Across
  1. Flooding a service so it can’t respond normally.
  2. A fix released to close a security hole.
  3. Login info (like usernames, passwords, tokens).
  4. A second step to confirm a login (code/app prompt).
  5. Many infected devices controlled together by an attacker.
Down
  1. A weakness in software/system that can be exploited.
  2. Scrambling data so only the right key can read it.
  3. Threat coming from someone within the organisation.
  4. Installing the latest version to improve/secure software.
  5. Malware that locks files until money is demanded.
  6. Trick messages designed to steal info or make you click.
  7. When data is accessed/stolen without permission.
  8. A secret used to access an account.
  9. Multiple methods to prove identity (similar to 2FA).

14 Clues: A secret used to access an account.A fix released to close a security hole.Login info (like usernames, passwords, tokens).When data is accessed/stolen without permission.Flooding a service so it can’t respond normally.Malware that locks files until money is demanded.Scrambling data so only the right key can read it....

School of Information Crossword 2025-12-18

School of Information Crossword crossword puzzle
Across
  1. First-ever Dean of the School of Information
  2. The symbols found on the outside of South Hall
  3. Name of movie that was briefly filmed on the UC Berkeley campus in the past few years?
  4. Oski turned this age in 2025
  5. Another name for UC Berkeley
  6. The number of Executive Fellows in Applied Technology Policy
  7. What the School of Information aims to be
Down
  1. Name of Fellowship that supports LGBTQ+ research interests/studies
  2. Acronym of the White House department that I School Professor Deirdre Mulligan was a part of
  3. Cybersecurity ____, a class providing students with real-world cyber experience
  4. The number of chimneys on the roof of South Hall
  5. Peak offering panoramic views of the Bay Area
  6. The Center for Long-Term Cybersecurity turned this age in 2025
  7. The other "eye" school
  8. Committee report that proposed a broader vision of information science

15 Clues: The other "eye" schoolOski turned this age in 2025Another name for UC BerkeleyWhat the School of Information aims to beFirst-ever Dean of the School of InformationPeak offering panoramic views of the Bay AreaThe symbols found on the outside of South HallThe number of chimneys on the roof of South Hall...

Criss-Cross Compliance 2022-07-21

Criss-Cross Compliance crossword puzzle
Across
  1. web armor
  2. don't get hooked!
  3. call me anytime
  4. law abiding citizen
  5. I did that!
  6. this goes both ways
Down
  1. make yourself useful
  2. think outside the box
  3. do it right the first time
  4. harmless watchmen
  5. vocal hack
  6. peeps
  7. my lips are sealed
  8. doorway hacker
  9. obedient water elephant

15 Clues: peepsweb armorvocal hackI did that!doorway hackercall me anytimeharmless watchmendon't get hooked!my lips are sealedlaw abiding citizenthis goes both waysmake yourself usefulthink outside the boxobedient water elephantdo it right the first time

Enterprise Risk Management Puzzle Activity 2025-01-02

Enterprise Risk Management Puzzle Activity crossword puzzle
Across
  1. The type of hazard that includes bacteria and viruses
  2. A risk that can be caused by inadequate policies
  3. A common cybersecurity threat that uses fake emails
  4. The act that aims to safeguard individuals in various settings
  5. The office that ensures transparent government procurement
  6. The kind of financial losses that can result from misuse of public funds
  7. A type of hazard that can cause musculoskeletal injuries
  8. The practice of protecting digital systems from attacks
  9. The division that reviews financial regulations in Jamaica
  10. The act that mandates corporate governance and accountability
Down
  1. Public sector program focused on workforce development
  2. A way to secure important documents
  3. A plan for maintaining operations during disruptions
  4. A type of data that must be handled with care
  5. The ministry that has implemented training and development programs
  6. Type of bond providing rapid financial support after a disaster
  7. A type of risk that can result in cessation of business activity
  8. A potential source of harm or adverse effects
  9. A risk that may be caused by natural disasters

19 Clues: A way to secure important documentsA type of data that must be handled with careA potential source of harm or adverse effectsA risk that may be caused by natural disastersA risk that can be caused by inadequate policiesA common cybersecurity threat that uses fake emailsA plan for maintaining operations during disruptions...

CrowdStrike 2025-05-14

CrowdStrike crossword puzzle
Across
  1. Stock Symbol
  2. Our Team Manager
  3. CEO's First Name
  4. Jeong's Team
  5. Our Department
Down
  1. What Crowdstrike does
  2. Crowdstrike motto
  3. Ahmed's Team
  4. Agatha's Team
  5. Beau's Team
  6. Company Logo

11 Clues: Beau's TeamStock SymbolAhmed's TeamCompany LogoJeong's TeamAgatha's TeamOur DepartmentOur Team ManagerCEO's First NameCrowdstrike mottoWhat Crowdstrike does

Cybersecurity Crossword Puzzle 2021-08-14

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Fake organisations will send SMSes that usually contain spelling or --- errors
  2. Although strictly not under cybersecurity, --- activities via digital devices are becoming common.
  3. Scams involve emotions such as fear and ---
  4. A good way is to use password --- apps
  5. Seniors should use uppercase and --- letters, numbers or symbols to make passwords harder to crack
  6. The third topic that we discussed is Handling ---
  7. Fear messages are meant to force the seniors into --- action without stopping to think
  8. DAs are encouraged to use real-life --- in sharing cybersecurity information with seniors
Down
  1. Share with seniors how to --- between legitimate and fake organisations
  2. Legitimate organisations will never ask for personal --- information such as passwords, bank account and OTPs
  3. A common scam these days : –-- jobs with high salaries
  4. Seniors can use 2 notebooks as a way to remember passwords and personal information but they must keep the 2 notebooks ---
  5. Seniors are encouraged to use a strong ---
  6. Use --- bells as imagery
  7. Seniors should be wary of providing --- information
  8. Not sure, --- back
  9. Online --- apps will most likely make seniors lose money
  10. Seniors should never click on unknown links or ---

18 Clues: Not sure, --- backUse --- bells as imageryA good way is to use password --- appsSeniors are encouraged to use a strong ---Scams involve emotions such as fear and ---The third topic that we discussed is Handling ---Seniors should never click on unknown links or ---Seniors should be wary of providing --- information...

cybersecurity Crossword 2025-08-26

cybersecurity Crossword crossword puzzle
Across
  1. Type of hacker who violates securities for personal gain
  2. Any information that can be acccessed through a combination of information
  3. Revealing of personal details online with intention of harassment, intimidation, or threats
  4. Special piece of software that stores data and can be easily acccessed
  5. Information stored digitally
  6. Field dedicated to the protection of individuals and corporations from the misuse of technology
Down
  1. Using the internet with intentions of with intention of harassment, intimidation, or threats
  2. System that connects multiple devices to enable communication and sharing internet, files, etc.
  3. A weakness or flaw in a digital system or software
  4. Type of hacker who uses their skills to test and assess the security of networks and systems
  5. Someone who wrongly uses a software or database than intended
  6. A term meaning that a system was acccessed by someone unauthorized
  7. Person in charge of maintaining a network
  8. Type of hacker who may violates laws without ill intent

14 Clues: Information stored digitallyPerson in charge of maintaining a networkA weakness or flaw in a digital system or softwareType of hacker who may violates laws without ill intentType of hacker who violates securities for personal gainSomeone who wrongly uses a software or database than intended...

AATT Cybersecurity 2024-10-21

AATT Cybersecurity crossword puzzle
Across
  1. Using more than one criteria for authentication
  2. Internal communications network only accessibly by employees
  3. Word used to gain access
  4. The process of verifying the identity of a user, device, or system
  5. A type of malware that demands payment in exchange for restoring access to data
  6. A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
  7. Type of attack that tricks users into revealing sensitive info
Down
  1. Network device that filters incoming and outgoing network traffic based on defined rules
  2. Using social interactions to gain information from a target
  3. A type of software that is designed to damage or exploit a computer system
  4. Type of attack where the attacker impersonates persons or companies in order to gain information
  5. Type of malware that allows an attacker to remotely control a system or network
  6. Malware removal software
  7. Unwanted emails

14 Clues: Unwanted emailsWord used to gain accessMalware removal softwareUsing more than one criteria for authenticationUsing social interactions to gain information from a targetInternal communications network only accessibly by employeesType of attack that tricks users into revealing sensitive info...

Cybersecurity Threats 2025-08-27

Cybersecurity Threats crossword puzzle
Across
  1. programs or program code that replicate (copies themselves) with the intention of deleting or corrupting files, or causing a computer to malfunction.
  2. occurs when a cybercriminal sends out legitimate-looking emails to users. The emails may contain links or attachments that, when initiated, take the user to a fake website; or they may trick the user into responding with personal data
  3. a program which is often disguised as legitimate software but with malicious instructions embedded within it.
  4. is malicious code installed on a user’s computer or on an infected website. The code redirects the user’s browser to a fake website without the user’s knowledge
  5. the act of gaining illegal access to a computer system without the user’s permission.
  6. spam traffic originates from many different computers, which makes it hard to block the attack.
Down
  1. a malware which will attempt to flood an end-user with unwanted advertising.
  2. when a cybercriminal creates a social situation that can lead to a potential victim dropping their protection. It involves the manipulation of people into breaking their normal security procedures and not following best practice.
  3. is software that gathers information by monitoring a user’s activities carried out on their computer. The gathered information is sent back to the cybercriminal who originally sent this malware.
  4. a type of stand-alone malware that can self-replicate. Their intention is to spread to other computers and corrupt whole networks
  5. are programs that encrypt data on a user’s computer and ‘hold the data hostage’. The cybercriminal waits until the ransom money is paid and, sometimes, the decryption key is then sent to the user.
  6. an attack that attempts at preventing users from accessing part of a network, notably an internet server.
  7. form of stealing data by tapping into a wired or wireless communication link. The intent is to compromise privacy or to obtain confidential information.
  8. an attack to 'crack’ password by systematically trying all thedifferent combinations of letters, numbers and other symbols until eventuallythe password is found.

14 Clues: a malware which will attempt to flood an end-user with unwanted advertising.the act of gaining illegal access to a computer system without the user’s permission.spam traffic originates from many different computers, which makes it hard to block the attack....

book day 2023-05-17

book day crossword puzzle
Across
  1. asas pendawaian
  2. engineering ethics fourth edition
  3. networking basics 2 edition
  4. sistem bekalan elektrik dan pengagihan
  5. instrumentasi
  6. design for hackers
  7. perak good food guide
  8. key concepts in information & communication technology
  9. design for software
  10. embedded system
  11. cybersecurity
Down
  1. website optimization
  2. compliance
  3. koleksi menu orang bujang
  4. computer network security
  5. wireless communication principles & practise
  6. intelectuals creativity & intolerance
  7. teknologi biotenaga
  8. writing for impact
  9. android phones for dummies

20 Clues: complianceinstrumentasicybersecurityasas pendawaianembedded systemdesign for hackerswriting for impactteknologi biotenagadesign for softwarewebsite optimizationperak good food guidekoleksi menu orang bujangcomputer network securityandroid phones for dummiesnetworking basics 2 editionengineering ethics fourth edition...

FIND THE WORDS 2023-05-17

FIND THE WORDS crossword puzzle
Across
  1. Asas Pendawaian
  2. Engineering Ethics Fourth Edition
  3. Networking Basics 2 Edition
  4. Sistem Bekalan Elektrik&Pengagihan
  5. Instrumentasi
  6. Design for Hackers
  7. Perak Good Food Guide
  8. Key Concepts in Information&Communication Technology
  9. Design for Software
  10. Embedded System
  11. Cybersecurity
Down
  1. Website Optimization
  2. Compliance
  3. Koleksi Menu Orang Bujang
  4. Computer Network Security
  5. Wireless Communication Principles&Practise
  6. Intelectuals Creativity&Intolerance
  7. Teknologi Biotenaga
  8. Writing for Impact
  9. Android Phones for Dummies

20 Clues: ComplianceInstrumentasiCybersecurityAsas PendawaianEmbedded SystemDesign for HackersWriting for ImpactTeknologi BiotenagaDesign for SoftwareWebsite OptimizationPerak Good Food GuideKoleksi Menu Orang BujangComputer Network SecurityAndroid Phones for DummiesNetworking Basics 2 EditionEngineering Ethics Fourth Edition...

Merry Christmas 2025 2025-12-25

Merry Christmas 2025 crossword puzzle
Across
  1. cribbage queen
  2. number of chickie babes
  3. quilter
  4. sisters
  5. 8/29/2002
  6. 1/5/46
  7. favorite cold treat
  8. Historian
  9. homebase in Lincoln
  10. 10/16/1971
  11. nickname given by Vance grandkids
Down
  1. Bellevue Public Schools
  2. 3/22/2005
  3. Bellevue University
  4. traditional christmas food
  5. 8/29/2002
  6. cybersecurity and CIS
  7. 1928 car
  8. Infosys
  9. orange tic tacs
  10. 05/05/1972
  11. 8/29/2002
  12. pink shoes
  13. vance grandkids
  14. Clarinet professional

25 Clues: 1/5/46Infosysquiltersisters1928 car3/22/20058/29/20028/29/20028/29/2002Historian05/05/1972pink shoes10/16/1971cribbage queenorange tic tacsvance grandkidsBellevue Universityfavorite cold treathomebase in Lincolncybersecurity and CISClarinet professionalBellevue Public Schoolsnumber of chickie babestraditional christmas food...

crossword 2024-10-21

crossword crossword puzzle
Across
  1. ICT-related field of study
  2. Cloud computing platform
  3. ICT-related job role
  4. Internet protocol
  5. ICT professional
  6. Computer virus type
  7. ICT acronym for "Information and Communication Technology" ()
  8. Computer input device
  9. Website design principle
  10. Digital image format
Down
  1. Network security threat
  2. Cybersecurity measure
  3. Database management system
  4. Programming language
  5. Mobile operating system
  6. Network topology
  7. Data transmission speed
  8. Computer hardware component
  9. Software development method
  10. Data storage unit

20 Clues: ICT professionalNetwork topologyInternet protocolData storage unitComputer virus typeICT-related job roleProgramming languageDigital image formatCybersecurity measureComputer input deviceNetwork security threatMobile operating systemData transmission speedCloud computing platformWebsite design principleICT-related field of study...

Cybersecurity and Healthcare 2021-05-31

Cybersecurity and Healthcare crossword puzzle
Across
  1. Limiting the risks or impacts of a cyber threat.
  2. Generic term for computer viruses, trojans, etc. designed for malicious purposes.
  3. A type of cyberattack that holds your systems or information hostage until a ransom is paid.
  4. You should never share this.
  5. The policies and measures taken to ensure the authenticity, availability, and integrity of electronic information.
Down
  1. When should you report an IT breach or potential breach?
  2. A cyberattack attempting to discover your personal information.
  3. Federal law protecting patient privacy.
  4. The US Food and Drug Administration.
  5. Whose responsibility is cybersecurity?

10 Clues: You should never share this.The US Food and Drug Administration.Whose responsibility is cybersecurity?Federal law protecting patient privacy.Limiting the risks or impacts of a cyber threat.When should you report an IT breach or potential breach?A cyberattack attempting to discover your personal information....

Technology 2025-06-26

Technology crossword puzzle
Across
  1. people connect online
  2. picture of your screen
  3. small useful device
  4. finds info online
  5. wireless internet point
  6. tech you wear
  7. stores and sends data
  8. virtual reality game
Down
  1. protects computers
  2. gives internet access
  3. tech with internet and apps
  4. small programs
  5. free software
  6. share and post online
  7. opens websites
  8. smart computer thinking

16 Clues: free softwaretech you wearsmall programsopens websitesfinds info onlineprotects computerssmall useful devicevirtual reality gamepeople connect onlinegives internet accessshare and post onlinestores and sends datapicture of your screenwireless internet pointsmart computer thinkingtech with internet and apps

Technology 2025-06-26

Technology crossword puzzle
Across
  1. picture of your screen
  2. tech with internet and apps
  3. smart computer thinking
  4. tech you wear
  5. share and post online
  6. protects computers
  7. opens websites
Down
  1. finds info online
  2. free software
  3. gives internet access
  4. wireless internet point
  5. small useful device
  6. virtual reality game
  7. stores and sends data
  8. small programs
  9. people connect online

16 Clues: free softwaretech you wearsmall programsopens websitesfinds info onlineprotects computerssmall useful devicevirtual reality gamegives internet accessstores and sends datapeople connect onlineshare and post onlinepicture of your screenwireless internet pointsmart computer thinkingtech with internet and apps

Mobil tijorat (m-commerce) 2025-11-26

Mobil tijorat (m-commerce) crossword puzzle
Across
  1. Raqamli xavfsizlik sohasi
  2. Onlayn savdo faoliyati
  3. Raqamli ma’lumotlar jamlanmasi
  4. Hisoblash qoidalari majmui
  5. Yangi raqamli yechimlar yaratish
  6. Zanjirsimon ma’lumotlar bazasi
  7. Innovatsion biznes loyihasi
Down
  1. Raqamli xizmatlar ekotizimi
  2. Raqamli moliya texnologiyasi
  3. Jarayonlarni raqamga o‘tkazish
  4. Bulutli hisoblash tizimi
  5. Internet orqali ulangan qurilmalar
  6. Sun’iy intellekt tizimi
  7. Katta hajmdagi ma’lumotlar
  8. Raqamli aktiv birligi

15 Clues: Raqamli aktiv birligiOnlayn savdo faoliyatiSun’iy intellekt tizimiBulutli hisoblash tizimiRaqamli xavfsizlik sohasiHisoblash qoidalari majmuiKatta hajmdagi ma’lumotlarRaqamli xizmatlar ekotizimiInnovatsion biznes loyihasiRaqamli moliya texnologiyasiJarayonlarni raqamga o‘tkazishRaqamli ma’lumotlar jamlanmasiZanjirsimon ma’lumotlar bazasi...

Puzzle voor engels 2025-02-13

Puzzle voor engels crossword puzzle
Across
  1. Software_met_vrij_toegankelijke_broncode
  2. Visuele_weergave_van_softwarebediening
  3. Flexibele_en_iteratieve_softwareontwikkeling
  4. Originele_programmeercode_van_een_applicatie
  5. Systeem_voor_het_beheren_van_codeversies
  6. Software_voor_het_beheren_van_databases
  7. Serverkant_van_een_applicatie
  8. Proces_om_software_op_fouten_te_testen
  9. Externe_opslag_en_verwerking_van_data
  10. Omzetting_van_gegevens_in_een_onleesbare_vorm
  11. Scherm_waarmee_gebruikers_software_bedienen
  12. Ontwikkelt_applicaties_en_systemen
  13. Software_die_de_hardware_van_een_computer_beheert
  14. Professionele_softwareontwikkelaar
  15. Klantkant_van_een_applicatie
  16. Beheer_van_softwarekwaliteit_en_betrouwbaarheid
Down
  1. Regelmatige_integratie_van_codewijzigingen
  2. Koppeling_tussen_verschillende_softwaretoepassingen
  3. Programma_dat_code_omzet_naar_uitvoerbare_bestanden
  4. Computer_of_systeem_dat_diensten_levert_aan_andere_computers
  5. Taal_waarin_software_wordt_geschreven
  6. Automatische_uitrol_van_software-updates
  7. Stap-voor-stap_procedure_om_een_probleem_op_te_lossen
  8. Publicatie_van_software_naar_een_live_omgeving
  9. Ontwikkeling_van_websites_en_webapplicaties
  10. Gesimuleerde_computer_binnen_een_ander_systeem
  11. Technologie_die_menselijke_intelligentie_nabootst
  12. Opsporen_en_verhelpen_van_fouten_in_code
  13. Vernieuwing_of_verbetering_van_software
  14. Ontwikkeling_van_apps_voor_mobiele_apparaten
  15. Controle_van_programmeercode_door_anderen
  16. Ontwikkelomgeving_met_hulpmiddelen_voor_codering
  17. Computers_die_leren_zonder_expliciete_programmering
  18. Organisatie_en_opslag_van_gegevens
  19. Opslagplaats_voor_programmeercode
  20. Netwerk_van_verbonden_slimme_apparaten
  21. Bescherming_tegen_digitale_bedreigingen
  22. Gestructureerde_opslag_van_gegevens
  23. Basisstructuur_voor_softwareontwikkeling

39 Clues: Klantkant_van_een_applicatieServerkant_van_een_applicatieOpslagplaats_voor_programmeercodeOrganisatie_en_opslag_van_gegevensOntwikkelt_applicaties_en_systemenProfessionele_softwareontwikkelaarGestructureerde_opslag_van_gegevensTaal_waarin_software_wordt_geschrevenExterne_opslag_en_verwerking_van_dataVisuele_weergave_van_softwarebediening...

Digital Partner 2024-11-10

Digital Partner crossword puzzle
Across
  1. Return on Investment
  2. New ideas
  3. Enterprise Resource Planning
  4. Employee engagement survey
  5. Online storage
  6. Pfizer's COVID-19 vaccine
  7. Efficiency
Down
  1. working together
  2. Breast cancer treatment
  3. Digital protection
  4. General Data Protection Regulation
  5. Key Performance Indicator

12 Clues: New ideasEfficiencyOnline storageworking togetherDigital protectionReturn on InvestmentBreast cancer treatmentKey Performance IndicatorPfizer's COVID-19 vaccineEmployee engagement surveyEnterprise Resource PlanningGeneral Data Protection Regulation

Hive's Crossword Puzzle 2024-06-19

Hive's Crossword Puzzle crossword puzzle
Across
  1. The right to keep one's personal matters and information confidential or secret.
  2. Ensuring this is maintained involves protecting sensitive data from unauthorised access or disclosure in cybersecurity.
  3. Information that can be used to identify a specific individual.
  4. Protected from online harm and dangers.
  5. Safeguarding and protecting personal data
  6. Protection of internet-connected systems, including hardware, software, and data, from cyberattacks.
Down
  1. Officially recognised as meeting certain standards or requirements.
  2. Changing information into a code to prevent unauthorised access.
  3. Formal instruction designed to improve skills in a particular area.
  4. Recognition granted to individuals who have met certain standards in a particular fieId
  5. Traces left by a person's online activity or presence.
  6. The organisation offering the crossword puzzle and training/certification in data protection and security.

12 Clues: Protected from online harm and dangers.Safeguarding and protecting personal dataTraces left by a person's online activity or presence.Information that can be used to identify a specific individual.Changing information into a code to prevent unauthorised access.Formal instruction designed to improve skills in a particular area....

Technologies 2024-01-30

Technologies crossword puzzle
Across
  1. interconnected
  2. Customer
  3. Talk online
  4. Programme
  5. device used to select items
  6. enter data into a computer for processing
  7. secret word
  8. set of keys
  9. state of being safe from electronic crime
  10. Unit of data
Down
  1. Problem-solving steps
  2. computer part
  3. Computer memory
  4. organised data retrieved by a computer
  5. collection of related data
  6. primary display screen
  7. transfer
  8. single worldwide computer network
  9. the capacity of a computer
  10. to remove defects

20 Clues: CustomertransferProgrammeTalk onlinesecret wordset of keysUnit of datacomputer partinterconnectedComputer memoryto remove defectsProblem-solving stepsprimary display screencollection of related datathe capacity of a computerdevice used to select itemssingle worldwide computer networkorganised data retrieved by a computer...

Hapebeast career advice gang 2021-12-28

Hapebeast career advice gang crossword puzzle
Across
  1. IT manager for an FMCG company in Singapore
  2. The Career advice channel podcast host
  3. The guy with 6,000 lines in this discord
  4. Hapelinked founder
  5. The healthcare investor
  6. Founder of a creative agency (and 15 other companies...) in Portland
  7. Our dropshipping entrepreneur
  8. Hey, can you help us pin this?
  9. Ecommerce B2B specialist
  10. IT specialist in healthcare and insurance
  11. Cybersecurity in banking
  12. Our Canadian social media influencer with 3 million followers
  13. Car mechanic in Switzerland
  14. Land investor across the US
  15. Aspiring architect from New Jersey
  16. Investor and artist in LA
Down
  1. The investor who works in Republic Realm
  2. A financial manager for the US Military
  3. The investment banker
  4. A student / sneakerhead based in Singapore
  5. A real estate agent who was also a D3 basketball player
  6. Hapelinked co-founder
  7. Social media manager who was a professional chef
  8. The one and only
  9. Corporate finance advisor in one of the "Big 4"
  10. Investment consultant in Chicago
  11. Electrical Engineer with experience in renewable sector
  12. Cybersecurity specialist in Pennsylvania
  13. Our LA law firm partner
  14. Ecommerce, international freight entrepreneur.

30 Clues: The one and onlyHapelinked founderThe investment bankerHapelinked co-founderThe healthcare investorOur LA law firm partnerEcommerce B2B specialistCybersecurity in bankingInvestor and artist in LACar mechanic in SwitzerlandLand investor across the USOur dropshipping entrepreneurHey, can you help us pin this?Investment consultant in Chicago...

RU ITEC411CH2 2025-04-20

RU ITEC411CH2 crossword puzzle
Across
  1. When information is used for another reason than initially intended
  2. When space is invaded by an unwanted party
  3. The term for when websites store data on someones computer
  4. Right for officers to seize information within view on a device
  5. Acronym for device which knows exactly where someone is
  6. Act of comparing records from seperate databases
  7. Malicious actor trying to release company data
  8. Using data to figure out what characteristics engage with what
  9. Protection for business implementing cybersecurity
  10. Type of ad that uses user data to advertise
Down
  1. Act of observing with intent of maintaining order
  2. Searching for patterns in data to make something new
  3. When users are notified and made aware of how their data is being used
  4. Hiding important information through cryptography
  5. Information that is available to the public for access
  6. Acronym of Government org responsible for the United States' cybersecurity
  7. Acronym for device which identifies people with radio waves
  8. Abbreviation of law that requires all telephones to be vulnerable to US government hacks
  9. Action of giving the data collector data only if users says yes
  10. Acronym of the government office that watches its privacy policies

20 Clues: When space is invaded by an unwanted partyType of ad that uses user data to advertiseMalicious actor trying to release company dataAct of comparing records from seperate databasesAct of observing with intent of maintaining orderHiding important information through cryptographyProtection for business implementing cybersecurity...

Farah thee Sattar 2023-11-20

Farah thee Sattar crossword puzzle
Across
  1. farah's first friend
  2. he will be found
  3. be careful online
  4. thing 2
  5. 40th birthday gift
  6. the spice of life
  7. the other f word
  8. one r
Down
  1. signature look
  2. where was farah born
  3. flip the pan
  4. da who?
  5. the best yogurt variety
  6. thing 1

14 Clues: one rthing 2da who?thing 1flip the pansignature lookhe will be foundthe other f wordbe careful onlinethe spice of life40th birthday giftfarah's first friendwhere was farah bornthe best yogurt variety

INFORMATION TECHNOLOGY 2021-06-27

INFORMATION TECHNOLOGY crossword puzzle
Across
  1. A
  2. C
  3. F
  4. B
Down
  1. E
  2. D
  3. G
  4. H

8 Clues: EDGAHCFB

Clément_34_Cyberattack,nuclear weapon, destruction 2020-02-27

Clément_34_Cyberattack,nuclear weapon, destruction crossword puzzle
Across
  1. impossible situation
  2. non civilian
  3. science of online security
  4. virtual attack
  5. oil train
  6. most powerful bomb
Down
  1. online fight
  2. injuries
  3. refineries science
  4. Gain access

10 Clues: injuriesoil trainGain accessonline fightnon civilianvirtual attackrefineries sciencemost powerful bombimpossible situationscience of online security

Information Security 2023-12-12

Information Security crossword puzzle
Across
  1. 57% of organizations see at least weekly phishing attempts
  2. The most common target of phishing attacks are ____
  3. The US holds ____ place in the tanks of countries targeted for cybersecurity tasks
  4. 94% of malware is delivered by ____
  5. You should ____ over a link in an email to preview the actual address before clicking
Down
  1. Lock your ____ when you step away
  2. German American's Information Security Officer is
  3. ____ is one of the most common and dangerous forms of cyber crime
  4. Phishing is an attempt to obtain sensitive ____ with malicious intent
  5. Display names and email domains can be ____ hiding the true identity and appearing trustworthy
  6. Report spam/suspicious emails through the ____ button on the Outlook toolbar
  7. Our first line of defense against cybersecurity attacks and fraud is ___
  8. At German American, _____ is responsible for information security

13 Clues: Lock your ____ when you step away94% of malware is delivered by ____German American's Information Security Officer isThe most common target of phishing attacks are ____57% of organizations see at least weekly phishing attempts____ is one of the most common and dangerous forms of cyber crime...

cybersecurity 2023-04-21

cybersecurity crossword puzzle
Across
  1. facts provided or learned about something or someone
  2. A human error is an action or decision which was not intended. A violation is a deliberate deviation from a rule or procedure
  3. he use of centralized planning in an attempt to manage social change and regulate the future development and behaviour of a society.
  4. the action of obtaining something by using persuasion or guile.
Down
  1. facts and statistics collected together for reference or analysis
  2. put (something heavy) over one's shoulder or shoulders to carry.
  3. any information that relates to an identified or identifiable living individual.
  4. a person who uses computers to gain unauthorized access to data

8 Clues: facts provided or learned about something or someonea person who uses computers to gain unauthorized access to datathe action of obtaining something by using persuasion or guile.put (something heavy) over one's shoulder or shoulders to carry.facts and statistics collected together for reference or analysis...

Cybersecurity 2023-04-21

Cybersecurity crossword puzzle
Across
  1. type of malicious software, or malware, that spreads between computers and causes damage to data and software.
  2. replicates itself in order to spread to other computers.
  3. raw facts and figures
  4. information about a particular person
Down
  1. facts provided or learned about something or someone
  2. a network of computers infected by malware
  3. malicious software designed to harm or exploit any programmable device, service or network.
  4. a network security device

8 Clues: raw facts and figuresa network security deviceinformation about a particular persona network of computers infected by malwarefacts provided or learned about something or someonereplicates itself in order to spread to other computers.malicious software designed to harm or exploit any programmable device, service or network....

cybersecurity 2021-02-12

cybersecurity crossword puzzle
Across
  1. make sure you password doesn't contain ________ information
  2. it is malware which Uses vulnerabilities to move into your machine.
  3. it should be 8 or more letters
  4. never tell your _______ passwords
Down
  1. what is the shortened word for malicious software
  2. cyber = _______
  3. you password needs to be hard to _____
  4. it is scams which are mostly found in emails or fake log in pages

8 Clues: cyber = _______it should be 8 or more lettersnever tell your _______ passwordsyou password needs to be hard to _____what is the shortened word for malicious softwaremake sure you password doesn't contain ________ informationit is scams which are mostly found in emails or fake log in pages...

Cybersecurity 2024-03-22

Cybersecurity crossword puzzle
Across
  1. Downloaded software that holds data hostage
  2. ____ sensitive data sent outside of the company
  3. Can expose sensitive data to identity theft
  4. Cybersecurity Framework
  5. Fake emails that appear to be from a verified internal source
Down
  1. Requires Additional Steps beyond legging in with a password
  2. When to disconnect devices infected by ransomware
  3. Type of email containing links, usually appears to be from someone you know

8 Clues: Cybersecurity FrameworkDownloaded software that holds data hostageCan expose sensitive data to identity theft____ sensitive data sent outside of the companyWhen to disconnect devices infected by ransomwareRequires Additional Steps beyond legging in with a passwordFake emails that appear to be from a verified internal source...

Cybersecurity 2024-04-03

Cybersecurity crossword puzzle
Across
  1. A piece of audio or video that has been altered and changed to make it seem authentic or credible.
  2. Software designed to detect, prevent, and remove malicious software from computers.
  3. A malware that spreads through networks without human interaction.
Down
  1. A cybersecurity specialist who uses their skills to find and fix vulnerabilities in computer systems.
  2. A cyber-attack that floods a network or website with excessive traffic to disrupt service.
  3. A barrier that monitors and controls network traffic based on security rules.
  4. An online scam involving the impersonation of reputable entities to obtain sensitive personal information.
  5. A technology that secures connections over the internet, providing secure access to private networks.

8 Clues: A malware that spreads through networks without human interaction.A barrier that monitors and controls network traffic based on security rules.Software designed to detect, prevent, and remove malicious software from computers.A cyber-attack that floods a network or website with excessive traffic to disrupt service....

Cybersecurity 2025-11-03

Cybersecurity crossword puzzle
Across
  1. A method of verifying a user's identity using two different factors.
  2. A small file stored on a user’s device that tracks online activity.
Down
  1. A general term for malicious software.
  2. A scam that tricks users into revealing personal information, often by email.
  3. A person who gains unauthorized access to computer systems.
  4. A secret string used to gain access to a system.
  5. A system that blocks unauthorized access to or from a network.
  6. A self-replicating program that spreads from one computer to another.

8 Clues: A general term for malicious software.A secret string used to gain access to a system.A person who gains unauthorized access to computer systems.A system that blocks unauthorized access to or from a network.A small file stored on a user’s device that tracks online activity.A method of verifying a user's identity using two different factors....

The Top 10 Emerging Technologies 2025-05-08

The Top 10 Emerging Technologies crossword puzzle
Across
  1. A type of computing that uses qubits to solve complex problems faster.
  2. A type of scam mentioned as a cybersecurity threat.
  3. Technology that creates immersive virtual worlds.
  4. Self-driving cars and drones that navigate without human drivers.
  5. The basic units used in quantum computing.
  6. Technology that adds digital information to the real world.
  7. Innovations like solar panels and electric cars that help the environment.
  8. A method to secure data, especially important with quantum computing.
Down
  1. A secure digital ledger used for transparent transactions.
  2. The latest generation of mobile network technology.
  3. A company mentioned in the example of autonomous vehicles.
  4. The field involving machines that can perform tasks automatically.
  5. A gas reduced by a food supplement in sustainable technology.
  6. The process of making tasks run without human intervention.
  7. Abbreviation for the network of everyday objects connected to the internet.
  8. The future mobile network technology being developed for 2030.
  9. The practice of protecting devices and data from digital threats.
  10. Abbreviation for the technology that can act on its own to complete tasks.

18 Clues: The basic units used in quantum computing.Technology that creates immersive virtual worlds.The latest generation of mobile network technology.A type of scam mentioned as a cybersecurity threat.A secure digital ledger used for transparent transactions.A company mentioned in the example of autonomous vehicles....

Cybersecurity 2024-06-05

Cybersecurity crossword puzzle
Across
  1. a person who uses computers to gain unauthorized access to data.
  2. malicious act that seeks to damage data, steal data, or disrupt digital life
  3. the fraudulent use of a person's private identifying information.
Down
  1. prove or show (something) to be true, genuine, or valid.
  2. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  4. the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information
  5. a secure, apparently private network is achieved using encryption over a public network.

8 Clues: prove or show (something) to be true, genuine, or valid.a person who uses computers to gain unauthorized access to data.the fraudulent use of a person's private identifying information.malicious act that seeks to damage data, steal data, or disrupt digital lifea secure, apparently private network is achieved using encryption over a public network....

Cybersecurity 2023-09-20

Cybersecurity crossword puzzle
Across
  1. A security protocol that ensures data integrity
  2. A type of attack that floods a network with traffic
  3. Method of verifying a user's identity
  4. A system's first line of defense
Down
  1. A piece of information used to access an account
  2. A common social engineering tactic
  3. A set of rules that filters network traffic
  4. A program that appears legitimate but is malicious

8 Clues: A system's first line of defenseA common social engineering tacticMethod of verifying a user's identityA set of rules that filters network trafficA security protocol that ensures data integrityA piece of information used to access an accountA program that appears legitimate but is maliciousA type of attack that floods a network with traffic

Cybersecurity 2024-02-21

Cybersecurity crossword puzzle
Across
  1. Technique of asymmetric encryption
  2. Malicious program capable of replicating and spreading
  3. Another protocol for securing internet communications
  4. Authentication system based on something the user possesses
Down
  1. Protocol for securing internet communications
  2. Technique for protecting data by transforming it irreversibly
  3. Type of attack that involves making a service unavailable
  4. International organization establishing information security standards

8 Clues: Technique of asymmetric encryptionProtocol for securing internet communicationsAnother protocol for securing internet communicationsMalicious program capable of replicating and spreadingType of attack that involves making a service unavailableAuthentication system based on something the user possesses...

Cybersecurity 2024-08-09

Cybersecurity crossword puzzle
Across
  1. A type of malware that replicates itself by infecting other programs or files.
  2. A method used to circumvent security measures.
  3. An attempt to gain unauthorized access or cause harm to a system.
  4. Weaknesses in a system that can be exploited by attackers.
  5. A technique where attackers use fraudulent emails to steal sensitive information.
Down
  1. Malicious software designed to disrupt, damage, or gain unauthorized access to a system.
  2. The act of disguising communication to appear as if it comes from a trusted source.
  3. An incident where data is accessed without authorization.

8 Clues: A method used to circumvent security measures.An incident where data is accessed without authorization.Weaknesses in a system that can be exploited by attackers.An attempt to gain unauthorized access or cause harm to a system.A type of malware that replicates itself by infecting other programs or files....

Cybersecurity 2023-05-10

Cybersecurity crossword puzzle
Across
  1. Defensive computer technology, software or hardware-based, created and installed to keep hackers and malware out. The firewall filters interactions with a computer, allowing or denying entry, to keep systems secure.
  2. Algorithmic technique utilized to change the contents of a file into something unreadable by anyone outside a specific chain of communication.
  3. A type of hacker. Whitehat hackers use their skills for good, helping organizations test their cybersecurity measures and find vulnerabilities.
Down
  1. A type of hacker. A blackhat hacker is an individual that uses their skills to cause damage like breaking into a computer system and stealing confidential information.
  2. Type of malware that prevents access to computer files. When a computer is infected with ransomware, the malicious software will encrypt files and request a ransom for decryption.
  3. Computer systems that have been infected by malware. The malware then allows the hacker to connect infected computers creating a network. This network, instructed by the hacker, can be used to carry out malicious attacks.
  4. Malware used to cause damage on personal computers, aimed at changing, erasing, or modifying data.
  5. To protect digital data, a consistently updated copy of files should be stored safely offline, in case a system is hacked and data is encrypted or lost.

8 Clues: Malware used to cause damage on personal computers, aimed at changing, erasing, or modifying data.Algorithmic technique utilized to change the contents of a file into something unreadable by anyone outside a specific chain of communication....

cybersecurity 2026-03-19

cybersecurity crossword puzzle
Across
  1. Facts and statistics collected together for reference or analysis
  2. 2 words. Electricity generated by power plants that derive their heat from fission in a nuclear reactor.
  3. An individual or collective enterprise whose objective is to gravely disrupt public order through intimidation and terror
  4. Area of expertise designed to keep human safe
Down
  1. Software used to extort money from an individual or organization by encrypting or otherwise blocking access to applications or files on a computer system until a sum of money is paid.
  2. The point of these is to notify people something is happening
  3. Energy coming from unstable atoms that undergo radioactive decay
  4. Area of expertise designed to keep non-human safe

8 Clues: Area of expertise designed to keep human safeArea of expertise designed to keep non-human safeThe point of these is to notify people something is happeningEnergy coming from unstable atoms that undergo radioactive decayFacts and statistics collected together for reference or analysis...

FSRW - MS Digital Tools 2021-10-05

FSRW - MS Digital Tools crossword puzzle
Across
  1. Lisa Golia
  2. credit protection
  3. secure document sharing
  4. Secured Approval
  5. Training
  6. client can do it instead of FA
Down
  1. Protecting digital information
  2. substitute for pen and paper
  3. Eco friendly
  4. consolidated accounts
  5. quick 1-800 tool
  6. great for happy hours
  7. Self-Service Platform
  8. generates recommendations

14 Clues: TrainingLisa GoliaEco friendlyquick 1-800 toolSecured Approvalcredit protectionconsolidated accountsgreat for happy hoursSelf-Service Platformsecure document sharinggenerates recommendationssubstitute for pen and paperProtecting digital informationclient can do it instead of FA

Cybersecurity 2024-02-21

Cybersecurity crossword puzzle
Across
  1. a set of instructions, data or programs
  2. traceroute protocol
  3. malware demanding a ransom
  4. a person doing hack legally
Down
  1. encrypt information to ensure confidentiality
  2. malware masked by genuine software
  3. known to its sole owner and used by him alone to decipher a message of which he is the recipient
  4. Computer spying device that records the sequences of keys typed on a keyboard.

8 Clues: traceroute protocolmalware demanding a ransoma person doing hack legallymalware masked by genuine softwarea set of instructions, data or programsencrypt information to ensure confidentialityComputer spying device that records the sequences of keys typed on a keyboard....

Cybersecurity 2023-05-18

Cybersecurity crossword puzzle
Across
  1. Menghantar semula email yang bukan-bukan kepada semua orang yang mengenali anda boleh dikenali sebagai
  2. Apakah tindakan yang perlu dilakukan jika anda menerima pautan atau perkara yang mencurigakan di dalam telefon bimbit?
  3. Link yang ________ sering didapati di media sosial dan SMS merupakan salah satu Phishing Scams
  4. Jenayah _______ adalah salah satu jenayah yang dilakukan melalui computer dalam internet. Perbuatan ini menyebabkan mangsa menderita dan mengalami kerugian.
Down
  1. Mengelakkan perkongsian maklumat ________ di laman social dan internet dapat melindungi diri dari menjadi mangsa siber.
  2. Sentiasa kemas kini kata ________ sekurang-kurangnya 6 bulan sekali agar tidak mudah digodam oleh pihak yang tidak bertanggungjawab.
  3. Jangan ________ kata laluan anda
  4. Dengan berkongsi tarikh _________ ia berpotensi mengancam keselamatan diri.

8 Clues: Jangan ________ kata laluan andaDengan berkongsi tarikh _________ ia berpotensi mengancam keselamatan diri.Link yang ________ sering didapati di media sosial dan SMS merupakan salah satu Phishing ScamsMenghantar semula email yang bukan-bukan kepada semua orang yang mengenali anda boleh dikenali sebagai...

Cybersecurity 2024-10-21

Cybersecurity crossword puzzle
Across
  1. Tricking people to reveal information (6 letters)
  2. Tricking people into giving up confidential information (16 letters)
Down
  1. A safe practice for creating unique keys for accounts (8 letters)
  2. Malicious software demanding payment
  3. Phone-based scam to trick people (7 letters)
  4. Fake identity in an email (8 letters)
  5. Online trick to steal information via fake websites (8 letters)
  6. Cautiously sharing personal details (6 letters)

8 Clues: Malicious software demanding paymentFake identity in an email (8 letters)Phone-based scam to trick people (7 letters)Cautiously sharing personal details (6 letters)Tricking people to reveal information (6 letters)Online trick to steal information via fake websites (8 letters)A safe practice for creating unique keys for accounts (8 letters)...

cybersecurity 2026-01-04

cybersecurity crossword puzzle
Across
  1. A person who uses computers to gain unauthorized access to data
  2. A network security device that monitors traffic and blocks unauthorized access
  3. A software error or flaw that can be exploited by hackers
  4. A temporary code or object used to verify your identity
Down
  1. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in an email.
  2. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system
  3. A type of malware that locks your files and demands payment to release them
  4. The process of scrambling data so it becomes unreadable without a specific key

8 Clues: A temporary code or object used to verify your identityA software error or flaw that can be exploited by hackersA person who uses computers to gain unauthorized access to dataA type of malware that locks your files and demands payment to release themA network security device that monitors traffic and blocks unauthorized access...

Buckeye Hills Career Center 2024-11-15

Buckeye Hills Career Center crossword puzzle
Across
  1. police work & practice
  2. construction safety & crew leadership
  3. child & adolescent development
  4. patient centered care
  5. hand & foot treatment
  6. automotive steering & suspension
  7. telecommunications power
Down
  1. network management
  2. painting & refinishing
  3. heating, cooling & electrical
  4. catering & banquet services
  5. gas metal arc welding

12 Clues: network managementpatient centered caregas metal arc weldinghand & foot treatmentpolice work & practicepainting & refinishingtelecommunications powercatering & banquet servicesheating, cooling & electricalchild & adolescent developmentautomotive steering & suspensionconstruction safety & crew leadership

Bridal Shower 2022-04-18

Bridal Shower crossword puzzle
Across
  1. Bride's Maiden Name
  2. City Where Wedding will be Held
  3. College Where Couple Graduated From
  4. Groom
  5. Where Bride grew up
  6. Month Bride was Born
  7. Honeymoon
  8. Site of Gift Registry
  9. Month of Wedding
Down
  1. Bride's car
  2. Instrument Groom Plays
  3. Josh's Major in College
  4. Number of Attendants
  5. Bride's High School Sport
  6. Last Name of Groom
  7. Groom's car
  8. Groom's sport
  9. Month the Groom was born

18 Clues: GroomHoneymoonBride's carGroom's carGroom's sportMonth of WeddingLast Name of GroomBride's Maiden NameWhere Bride grew upNumber of AttendantsMonth Bride was BornSite of Gift RegistryInstrument Groom PlaysJosh's Major in CollegeMonth the Groom was bornBride's High School SportCity Where Wedding will be HeldCollege Where Couple Graduated From

Cybersecurity Crossword 2021-12-07

Cybersecurity Crossword crossword puzzle
Across
  1. the process of converting information or data into a code, especially to prevent unauthorized access.
  2. an individual, group, or application that receives data in the form of a collection. The data is used for query, analysis, and reporting.
  3. a random string of bits generated specifically to scramble and unscramble data. Is created with algorithms designed to ensure that each key is unique and unpredictable.
  4. assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the information.
  5. a process in which organizations assess the data that they hold and the level of protection it should be given.
  6. a senior stakeholder within your organisation who is accountable for the quality of one or more data sets.
  7. a computer network that is optimized to process a very high volume of data messages with minimal delay
Down
  1. a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
  2. a central or distributed university unit or computer system administrator responsible for the operation and management of systems and servers which collect, manage and provide access to institutional data.
  3. a person responsible for the organization's Privacy Program including but not limited to daily operations of the program, development, implementation, and maintenance of policies and procedures.
  4. a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
  5. a user interface, service or device that collects data that is relevant to a business. In many cases, multiple systems and processes may produce data for the same data entity.
  6. a form of encryption where a pair of keys are responsible for encrypting and decrypting data.

13 Clues: a form of encryption where a pair of keys are responsible for encrypting and decrypting data.the process of converting information or data into a code, especially to prevent unauthorized access.a computer network that is optimized to process a very high volume of data messages with minimal delay...

Cybersecurity Crossword 2024-08-19

Cybersecurity Crossword crossword puzzle
Across
  1. A malicious software program designed to replicate itself and spread to other system.
  2. Malicious software designed to secretly monitor and collect user information
  3. A security system designed to monitor, filter, and control network traffic to protect a computer or network
  4. The process of verifying the identity of a user
  5. A method for gaining unauthorized access or control
  6. A secret string of characters used to authenticate a user's identity and grant access to secured systems
  7. The use of digital platforms, such as social media or messaging services, to harass, threaten, or intimidate individuals
Down
  1. An individual or entity that engages in harmful, malicious, or unethical behavior.
  2. A manipulation technique used to deceive individuals into divulging confidential information or performing actions that compromise security
  3. A type of phishing attack that specifically targets high-level executives or senior officials
  4. A form of social engineering to deceive individuals
  5. A program designed to detect, prevent, and remove malicious software, such as viruses, worms
  6. The right or condition of being free from unauthorized observation or intrusion

13 Clues: The process of verifying the identity of a userA form of social engineering to deceive individualsA method for gaining unauthorized access or controlMalicious software designed to secretly monitor and collect user informationThe right or condition of being free from unauthorized observation or intrusion...

Cybersecurity 2021-09-25

Cybersecurity crossword puzzle
Across
  1. a person who tries to access your computer without your knowledge
  2. a sequence of characters you use to access your accounts
  3. a type of malware that pretends to be a program you want
  4. a type of malware that copies itself into other files on your computer
  5. a nasty program that can harm your device or computer
Down
  1. an email that tries to trick you into visiting a scam website or to get your personal details
  2. a program you use to access the internet
  3. a location on the internet you can save your data

8 Clues: a program you use to access the interneta location on the internet you can save your dataa nasty program that can harm your device or computera sequence of characters you use to access your accountsa type of malware that pretends to be a program you wanta person who tries to access your computer without your knowledge...

Cybersecurity 2021-09-25

Cybersecurity crossword puzzle
Across
  1. a program you use to access the internet
  2. a nasty program that can harm your device or computer
  3. an email that tries to trick you into visiting a scam website or to get your personal details
  4. a type of malware that pretends to be a program you want
  5. a location on the internet you can save your data
Down
  1. a type of malware that copies itself into other files on your computer
  2. a sequence of characters you use to access your accounts
  3. a person who tries to access your computer without your knowledge

8 Clues: a program you use to access the interneta location on the internet you can save your dataa nasty program that can harm your device or computera sequence of characters you use to access your accountsa type of malware that pretends to be a program you wanta person who tries to access your computer without your knowledge...

CyberSecurity 2024-10-10

CyberSecurity crossword puzzle
Across
  1. Router Security Protocol
  2. Action for infected computer
  3. One part of user's credentials
  4. social engineering by phone
Down
  1. malware lockouts
  2. Dual Authentication
  3. security of non-public data
  4. Social engineering by text

8 Clues: malware lockoutsDual AuthenticationRouter Security ProtocolSocial engineering by textsecurity of non-public datasocial engineering by phoneAction for infected computerOne part of user's credentials

cybersecurity 2024-10-10

cybersecurity crossword puzzle
Across
  1. Another protocol for securing internet communications
  2. A piece of software designed to fix a vulnerability or bug.
  3. Malicious software designed to disrupt computer operations, steal data, or gain unauthorized access to a computer system.
  4. The process of converting information into a secret code to prevent unauthorized access.
Down
  1. someone who seeks to break into unauthorized computer systems.
  2. A type of malware that restricts access to a computer system or data until a ransom is paid.
  3. A cyberattack where a hacker poses as a trusted entity to trick a user into providing sensitive information.
  4. A network security system that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic.

8 Clues: Another protocol for securing internet communicationsA piece of software designed to fix a vulnerability or bug.someone who seeks to break into unauthorized computer systems.The process of converting information into a secret code to prevent unauthorized access....

Cybersecurity 2025-01-21

Cybersecurity crossword puzzle
Across
  1. Software designed to protect systems from malware and cyber threats
  2. The act of stealing personal information for fraudulent use
  3. Unauthorized access to a computer system or network.
  4. A method hackers use to deceive users into sharing sensitive information
Down
  1. The process of converting data into a secure format
  2. A weakness in software that can be exploited by attackers.
  3. The process of identifying and fixing software bugs or vulnerabilities
  4. A type of malicious software that demands payment to restore access

8 Clues: The process of converting data into a secure formatUnauthorized access to a computer system or network.A weakness in software that can be exploited by attackers.The act of stealing personal information for fraudulent useSoftware designed to protect systems from malware and cyber threats...

Cybersecurity 2025-09-16

Cybersecurity crossword puzzle
Across
  1. Malware that misleads users as its true intent by disguising itself as a normal program.
  2. Software that automatically displays or downloads advertisements based on user activity, often slowing down devices.
  3. Any malware that aims to gather information about a person and send it to another entity in a way that harms the user by violating their privacy, endangering their device's security, or other means.
  4. A malicious program that infects computers without user knowledge or permission.
  5. A common type of scam where a fraudster tries to gain your trust by convincing you they are someone they are not.
Down
  1. A form of fraud that involves contacting victims through email, telephone, or text to trick them into sharing personal information.
  2. The process of identifying someone's or something's identity, making sure that something is true, genuine, or valid.
  3. The practice of protecting your personal information and devices from malicious intent.

8 Clues: A malicious program that infects computers without user knowledge or permission.The practice of protecting your personal information and devices from malicious intent.Malware that misleads users as its true intent by disguising itself as a normal program....

Cybersecurity Vocabulary 2025-10-15

Cybersecurity Vocabulary crossword puzzle
Across
  1. (ANSWER IN HEX)Malware disguised as legitimate software
  2. Network security system that filters traffic
  3. Software update to fix vulnerabilities
  4. Deceptive emails or messages to steal information
  5. Verifying the identity of a user or device
  6. Malware that encrypts files and demands payment
Down
  1. (ANSWER IN HEX)Self-replicating malware that spreads without a host file
  2. Malware that records keystrokes
  3. Process of converting data into a secret code
  4. General term for malicious software
  5. Determines what a user is allowed to access
  6. One-way transformation of data into a fixed string
  7. Malware that attaches to other programs and spreads

13 Clues: Malware that records keystrokesGeneral term for malicious softwareSoftware update to fix vulnerabilitiesVerifying the identity of a user or deviceDetermines what a user is allowed to accessNetwork security system that filters trafficProcess of converting data into a secret codeMalware that encrypts files and demands payment...

Basic of Cyber Sercurity 2019-07-10

Basic of Cyber Sercurity crossword puzzle
Across
  1. items or people of value online
  2. making sure every individual working with an information system has specific responsibilities for information assurance
  3. preventing unauthorized access to information and actively detecting, documenting, and counteracting such threats
  4. the virtual, online world
  5. provides a way for denial to be impossible
  6. a weakness or gap in our effort to protect ourselves
  7. assures online information is trustworthy and accurate
Down
  1. infrastructure government term describing assets that keep society and the economy functioning (including national and economic security, public health and safety, communication, transportation, and electricity generation)
  2. guarantee of reliable access to information
  3. three-pronged system of cybersecurity
  4. the practice of protecting digital and non-digital information
  5. a set of rules limiting access to certain information, much like privacy
  6. the state of being protected against criminal or unauthorized online activity
  7. guarantee that the message, transaction, or other exchange of information has shown its proof of identity

14 Clues: the virtual, online worlditems or people of value onlinethree-pronged system of cybersecurityprovides a way for denial to be impossibleguarantee of reliable access to informationa weakness or gap in our effort to protect ourselvesassures online information is trustworthy and accuratethe practice of protecting digital and non-digital information...

Cybersecurity 2022-11-17

Cybersecurity crossword puzzle
Across
  1. a malicious form of self-replicating software that does not attach itself to a file
  2. infects a computer so that it displays malicious adverts or pop-ups when the victim is online.
  3. a useful bot that monitors the prices of items to find the best deal
  4. a useful bot that provides customer service online
Down
  1. software that gains access to your computer with malicious intent.
  2. a malicious form of self-replicating software.
  3. a large collection of malware-infected devices
  4. software that appears as useful but actually performs malicious actions

8 Clues: a malicious form of self-replicating software.a large collection of malware-infected devicesa useful bot that provides customer service onlinesoftware that gains access to your computer with malicious intent.a useful bot that monitors the prices of items to find the best dealsoftware that appears as useful but actually performs malicious actions...

cybersecurity 2020-08-25

cybersecurity crossword puzzle
Across
  1. little files that webs save in your computer, like user, password etc.
  2. word used to refer to any type of malicious software
  3. it recopiles your information and sends it to an extern person without your consent
  4. programs that have as an objective to alter your computer's funcionment
Down
  1. security system against evil internet hackers or viruses.
  2. unsolicited mail.
  3. it is designed to combat viruses before they enter your system
  4. it's objective is to appear good to then trick you and hack you.

8 Clues: unsolicited mail.word used to refer to any type of malicious softwaresecurity system against evil internet hackers or viruses.it is designed to combat viruses before they enter your systemit's objective is to appear good to then trick you and hack you.little files that webs save in your computer, like user, password etc....

CYBERSECURITY 2023-03-22

CYBERSECURITY crossword puzzle
Across
  1. A PROGRAM YOU USE FOR SEARCHING SOMETHING ON THE INTERNET; IT'S A PROGRAM WHICH STORES COOKIES
  2. FORM OF CRYPTOGRAPHY THAT ENCODES YOUR DATA
  3. A LANGUAGE WHICH ALLOWS YOU TO CODE A WEBSITE
Down
  1. PROGRAM WHICH GETS YOUR DATA
  2. DATA THAT DESCRIBES THE FILE
  3. SEGMENT OF LARGER MESSAGE SENT OVER NETWORKS; YOU CAN SEE ITS CONTENT USING A PROGRAM LIKE WIRESHARK OR Burp Suite ;)
  4. A PROGRAMMING LANGUAGE IN WHICH A PROGRAM (MALICOUS ONE; USED FOR DoS ATTACK) CALLED slowloris WAS WRITTEN
  5. THE NAME OF HACKING COMPETITION TO FIND SOME FLAG LOOKING FOR EXAMPLE LIKE THAT: flag{easyCrossword}

8 Clues: PROGRAM WHICH GETS YOUR DATADATA THAT DESCRIBES THE FILEFORM OF CRYPTOGRAPHY THAT ENCODES YOUR DATAA LANGUAGE WHICH ALLOWS YOU TO CODE A WEBSITEA PROGRAM YOU USE FOR SEARCHING SOMETHING ON THE INTERNET; IT'S A PROGRAM WHICH STORES COOKIESTHE NAME OF HACKING COMPETITION TO FIND SOME FLAG LOOKING FOR EXAMPLE LIKE THAT: flag{easyCrossword}...

Cybersecurity 2024-03-20

Cybersecurity crossword puzzle
Across
  1. a technology that creates a secure, encrypted connection over a less secure network, such as the internet. It allows users to securely access a private network from a remote location.
  2. It's a security software or device that monitors network or system activities for malicious activities or policy violations and produces reports to a management console. It's designed to detect and respond to potential security threats in real-time.
  3. It refers to a cyberattack where the attacker floods a network, server, or website with traffic or requests, causing it to become overwhelmed and unable to respond to legitimate requests from users, thus denying service to legitimate users.
  4. the process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can decrypt and access the original information.
  5. a malicious and deliberate attempt to disrupt, damage, or gain unauthorized access to computer systems, networks, or data, often carried out through the use of digital tools and techniques.
Down
  1. short for malicious software, refers to any software intentionally designed to cause damage to a computer, server, network, or device, or to gain unauthorized access to sensitive information.
  2. a cyberattack method where fraudulent emails, messages, or websites are used to deceive individuals into revealing sensitive information such as passwords, credit card numbers, or personal details.
  3. a security system that monitors and controls incoming and outgoing network traffic, protecting against unauthorized access and malicious activities.

8 Clues: a security system that monitors and controls incoming and outgoing network traffic, protecting against unauthorized access and malicious activities.the process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can decrypt and access the original information....

Cybersecurity 2025-10-21

Cybersecurity crossword puzzle
Across
  1. malicious actor disguising their identity by faking a trusted source
  2. he state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
  3. accessing data without authorisation
Down
  1. a computer program that damages or reveals data
  2. a protective system for computer systems
  3. unauthorised access to confidential, sensitive or protected data
  4. a malicious attack via email
  5. information stored on a computer or system

8 Clues: a malicious attack via emailaccessing data without authorisationa protective system for computer systemsinformation stored on a computer or systema computer program that damages or reveals dataunauthorised access to confidential, sensitive or protected datamalicious actor disguising their identity by faking a trusted source...

Cybersecurity 2026-01-23

Cybersecurity crossword puzzle
Across
  1. dishonest or illegal behavior, especially from someone with power
  2. having an acceptable explanation or reason
  3. to reveal the truth about something that is not acceptable
  4. a person who uses computers to gain unauthorized access to data
Down
  1. to risk losing or destroying something important
  2. spoken or written in secret, and meant to be kept secret
  3. to be more important or valuable than something else
  4. the state of being able to keep your life secret

8 Clues: having an acceptable explanation or reasonto risk losing or destroying something importantthe state of being able to keep your life secretto be more important or valuable than something elsespoken or written in secret, and meant to be kept secretto reveal the truth about something that is not acceptable...

Cybersecurity 2024-05-07

Cybersecurity crossword puzzle
Across
  1. A secret combination of characters used to authenticate users and protect accounts.
  2. A weakness or flaw in a system that can be exploited by attackers.
  3. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
  4. A cyberattack method via email that involves tricking individuals into disclosing sensitive information.
Down
  1. A barrier that monitors and controls incoming and outgoing network traffic.
  2. A deliberate attempt to compromise the security, availability, or integrity of computer systems or networks.
  3. The process of verifying the identity of a user or system.
  4. The process of converting data into a code to prevent unauthorized access.

8 Clues: The process of verifying the identity of a user or system.A weakness or flaw in a system that can be exploited by attackers.The process of converting data into a code to prevent unauthorized access.A barrier that monitors and controls incoming and outgoing network traffic....

Cybersecurity - malware 2022-01-31

Cybersecurity - malware crossword puzzle
Across
  1. The Computer ____ Act makes it an offence to impair the operation of a computer
  2. Do this to movies or games from illegal websites to catch a become infected from a computer virus
  3. Gaining unauthorised access to a computer system
  4. Attacker demands that a ransom be paid before they decrypt files and unlock the computer
  5. A large collection of malware-infected devices
  6. Self-replicating software
Down
  1. May be disguised as a game which then gives an attacker access via a backdoor
  2. Malicious software
  3. Distributed Denial of Service attack
  4. Monitors and gathers information on a person and how they use their computer
  5. Replicates themselves and spread through the network and use the system's resources
  6. Displays malicious adverts or pop-ups
  7. Records every keystroke made by a user

13 Clues: Malicious softwareSelf-replicating softwareDistributed Denial of Service attackDisplays malicious adverts or pop-upsRecords every keystroke made by a userA large collection of malware-infected devicesGaining unauthorised access to a computer systemMonitors and gathers information on a person and how they use their computer...