cybersecurity Crossword Puzzles

Cybersecurity 2024-03-13

Cybersecurity crossword puzzle
Across
  1. Online service that allows users to connect remotely to another network.
  2. Servers that are accessed over the Internet, and databases that run on those servers.
  3. The process of proving the claimed identity of an individual user.
  4. Software or application that displays advertisements on your computer
Down
  1. Various of malicious software that damages your computer.
  2. Software used by hackers to spy on you and your computer activities.
  3. A network of computers used to carry out cyberattacks on other systems.

7 Clues: Various of malicious software that damages your computer.The process of proving the claimed identity of an individual user.Software used by hackers to spy on you and your computer activities.Software or application that displays advertisements on your computerA network of computers used to carry out cyberattacks on other systems....

Cybersecurity Crossword Puzzle 2023-01-24

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. malware that makes you pay
  2. software to detect and destroy malware
  3. malware pretending to be useful
  4. software that tracks you
  5. tricking users to click links/images
  6. manipulated media
  7. criminals explpoiting network vulnerabilities
  8. scrambling data into unreadable text
Down
  1. software that checks for malware
  2. harmful software
  3. a shield for data
  4. malware that displays adverts
  5. attacks exploiting a vulnerability
  6. service that encrypts data while on WiFi
  7. multiple attackers preventing legitimate users
  8. attacks seeking out personal info
  9. a unique label for devices connected to the internet
  10. internet access at coffee shop
  11. network pro learning hacking techniques

19 Clues: harmful softwarea shield for datamanipulated mediasoftware that tracks youmalware that makes you paymalware that displays advertsinternet access at coffee shopmalware pretending to be usefulsoftware that checks for malwareattacks seeking out personal infoattacks exploiting a vulnerabilitytricking users to click links/images...

Cybersecurity Crossword Puzzle 2024-09-25

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Fraudulent attempts to steal sensitive information
  2. A tool that uses large language models to create authentic-looking text, pictures, or video. Can be used to create deepfakes
  3. What you should do with any suspicious communication!
  4. Online harassment or bullying
  5. Malware disguised as legitimate software
  6. Multi-Factor Authentication
  7. Virtual Private Network for secure connections
  8. Using AI to create a likeness of someone in video, voice, or picture
  9. Software update to fix security vulnerabilities
Down
  1. Investment scam involving fake accounts
  2. A phish sent by text
  3. Software that collects data secretly
  4. Self-replicating malware that spreads across networks
  5. Investment currency usually preferred in pig butchering scams
  6. Malware that encrypts files demanding ransom
  7. Factor showing how likely an associate will report versus click a phishing email
  8. Securing data by converting it into code
  9. A group very concerned with cyberbullying

18 Clues: A phish sent by textMulti-Factor AuthenticationOnline harassment or bullyingSoftware that collects data secretlyInvestment scam involving fake accountsMalware disguised as legitimate softwareSecuring data by converting it into codeA group very concerned with cyberbullyingMalware that encrypts files demanding ransom...

Cybersecurity 2022-11-24

Cybersecurity crossword puzzle
Across
  1. is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle
  2. software to defend the computer
  3. is a method of exchanging messages ("mail") between people using electronic devices.
  4. protection of computer systems and networks
Down
  1. data .....
  2. any software intentionally designed to cause disruption to a computer, server, client, or computer network
  3. synonym for nasty

7 Clues: data .....synonym for nastysoftware to defend the computerprotection of computer systems and networksis a method of exchanging messages ("mail") between people using electronic devices.any software intentionally designed to cause disruption to a computer, server, client, or computer network...

CyberSecurity 2023-02-05

CyberSecurity crossword puzzle
Across
  1. Spread through a network and use system resources for example to slow the network speed down.
  2. Malicious form of self-replicating software that can spread quickly on a computer network.
  3. Infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
  4. Unwanted software that monitors and gathers information on a person and how they use their computer.
  5. A piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions. Name derives from the story of the Horse.
Down
  1. Locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
  2. Malicious software is software that is designed to gain access to your computer with malicious intent.

7 Clues: Malicious form of self-replicating software that can spread quickly on a computer network.Spread through a network and use system resources for example to slow the network speed down.Unwanted software that monitors and gathers information on a person and how they use their computer....

Cybersecurity 2024-03-09

Cybersecurity crossword puzzle
Across
  1. Weakness that can be exploited
  2. Verifies user or system identity.
  3. Scrambles data securely.
Down
  1. Network security system that controls traffic.
  2. Protects systems from attacks.
  3. Fraudulent emails to steal information.
  4. Malicious software that disrupts.

7 Clues: Scrambles data securely.Protects systems from attacks.Weakness that can be exploitedVerifies user or system identity.Malicious software that disrupts.Fraudulent emails to steal information.Network security system that controls traffic.

Cybersecurity 2024-07-05

Cybersecurity crossword puzzle
Across
  1. Threatens to publish or blocks access to data or a computer system
  2. Short for malicious software
  3. The practice of tricking Internet users through the use of deceptive email messages or websites
Down
  1. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
  2. A malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
  3. A type of malicious software, or malware, that spreads between computers and causes damage to data and software.
  4. A way of scrambling data so that only authorized parties can understand the information.

7 Clues: Short for malicious softwareThreatens to publish or blocks access to data or a computer systemA way of scrambling data so that only authorized parties can understand the information.The practice of tricking Internet users through the use of deceptive email messages or websites...

tzrtzrt 2023-07-11

tzrtzrt crossword puzzle
Across
  1. dkjdfköj
  2. marsupial
  3. ccccc
Down
  1. Has a trunk
  2. Likes to chase mice
  3. sdas
  4. an immersive and persistent three-dimensional virtual realm
  5. Flying mammal

8 Clues: sdascccccdkjdfköjmarsupialHas a trunkFlying mammalLikes to chase micean immersive and persistent three-dimensional virtual realm

Herts Experience 2023-11-07

Herts Experience crossword puzzle
Across
  1. Work in rehabilitation centres
  2. UH-GAF's latest programme additions in LMS
  3. Work in ethical hacking
  4. Globally accredited degree
Down
  1. medicine innovator
  2. Tagline
  3. How many schools?
  4. storytellers
  5. UH-UK campus location

9 Clues: TaglinestorytellersHow many schools?medicine innovatorUH-UK campus locationWork in ethical hackingGlobally accredited degreeWork in rehabilitation centresUH-GAF's latest programme additions in LMS

CYBERSECURITY 2015-03-25

CYBERSECURITY crossword puzzle
Across
  1. ... device forensics roots began when mobile devices started to become popular, about 2000.
  2. Digital ... is used to capture volatile information from random access memory (RAM) and other running processes, including networks.
  3. ...are fast moving and increasing in number and severity.
Down
  1. ISACA publication Transforming ...
  2. Digital forensics scientific process: ...of custody.
  3. ...reasoning uses a series of specific pieces of information to extrapolate a broad conclusion.
  4. Implementing the NIST Cybersecurity Framework guide implements the CSF using ISACA’s ... 5 processes.

7 Clues: ISACA publication Transforming ...Digital forensics scientific process: ...of custody....are fast moving and increasing in number and severity.... device forensics roots began when mobile devices started to become popular, about 2000....reasoning uses a series of specific pieces of information to extrapolate a broad conclusion....

Cybersecurity 2021-12-30

Cybersecurity crossword puzzle
Across
  1. Portable Computer
  2. Type of Code
  3. Intrusion
Down
  1. Hand Held Device
  2. Private Communications Device
  3. Security Access Code
  4. Loss of

7 Clues: Loss ofIntrusionType of CodeHand Held DevicePortable ComputerSecurity Access CodePrivate Communications Device

CyberSecurity 2023-02-05

CyberSecurity crossword puzzle
Across
  1. Spread through a network and use system resources for example to slow the network speed down.
  2. Malicious form of self-replicating software that can spread quickly on a computer network.
  3. Infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
  4. Unwanted software that monitors and gathers information on a person and how they use their computer.
  5. A piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions. Name derives from the story of the Horse.
Down
  1. Locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
  2. Malicious software is software that is designed to gain access to your computer with malicious intent.

7 Clues: Malicious form of self-replicating software that can spread quickly on a computer network.Spread through a network and use system resources for example to slow the network speed down.Unwanted software that monitors and gathers information on a person and how they use their computer....

Clue #3 2024-11-03

Clue #3 crossword puzzle
Across
  1. A digital object used in security processes, such as authentication tokens for user verification.
  2. The science of securing information by transforming it into unreadable formats.
Down
  1. Ensuring data is accurate and untampered, a core principle of cybersecurity.
  2. A software update to fix vulnerabilities or bugs.
  3. A U.S. agency that develops cybersecurity standards and guidelines.
  4. The process of encoding data to prevent unauthorized access.
  5. Unwanted or unsolicited messages, often containing malicious content

7 Clues: A software update to fix vulnerabilities or bugs.The process of encoding data to prevent unauthorized access.A U.S. agency that develops cybersecurity standards and guidelines.Unwanted or unsolicited messages, often containing malicious contentThe science of securing information by transforming it into unreadable formats....

CYBER AND DIGITAL LITERALLY 2024-04-30

CYBER AND DIGITAL LITERALLY crossword puzzle
Across
  1. Principles and guidelines governing the ethical use and behavior in the digital realm, including respect for privacy, intellectual property, and online communities.
  2. Measures and precautions taken to protect digital devices, networks, and data from unauthorized access, use, or exploitation.
  3. Knowledge and understanding of information security risks, policies, and best practices among individuals and organizations.
  4. Deceptive schemes or frauds conducted through the internet, often aimed at tricking individuals into providing money or sensitive information.
  5. The unauthorized access, disclosure, or acquisition of sensitive or confidential information, often resulting in potential harm or exploitation.
  6. Practices and measures taken to protect sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction.
  7. The process of converting data into a code to prevent unauthorized access, ensuring confidentiality and privacy.
  8. Best practices and habits for maintaining good cybersecurity posture, including updating software, using strong passwords, and being cautious online.
  9. The rights and freedoms individuals have in the digital world, including privacy, freedom of expression, and access to information.
  10. The protection of personal information and data from unauthorized access, use, or disclosure, ensuring individuals' control over their own information.
  11. The protection of personal information and data shared on the internet from unauthorized access, use, or exploitation.
  12. Forms of media content that are created, distributed, and consumed digitally, including text, images, audio, and video.
  13. Malicious software that replicates itself and infects computer systems, causing harm to files, programs, and overall system performance.
  14. Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks.
  15. Deceptive attempts to obtain sensitive information, such as usernames, passwords, or financial details, by posing as a trustworthy entity in electronic communication.
  16. A type of cyber attack where fraudulent emails, messages, or websites are used to trick individuals into providing sensitive information such as passwords or financial details.
  17. The ability to effectively navigate, evaluate, and use digital technologies and information sources for communication, learning, and productivity.
  18. The representation of an individual's identity in an online or digital context, including personal information, preferences, and interactions.
  19. The responsible and ethical use of technology, including understanding one's rights and responsibilities in the digital world.
  20. Psychological manipulation techniques used by attackers to deceive individuals or employees into divulging confidential information or performing actions that compromise security.
  21. Strategies, technologies, and practices employed to protect computer systems, networks, and data from cyber threats and attacks.
  22. Habits, behaviors, and routines aimed at maintaining good cybersecurity posture and minimizing risks, such as updating software, using strong passwords, and being cautious online.
  23. Practices and tools used to protect against threats and maintain privacy while accessing websites and online content.
  24. Proficiencies and abilities required to effectively navigate, evaluate, and utilize digital technologies, tools, and information.
Down
  1. Programs, courses, and initiatives aimed at raising awareness and educating individuals and communities about cybersecurity risks, best practices, and skills.
  2. Practices and precautions taken to protect oneself from potential risks and dangers encountered on the internet.
  3. The global network of interconnected computers that allows for the exchange of data and communication.
  4. Online platforms and websites that enable users to create, share, and interact with content and connect with others.
  5. The ability of individuals, organizations, and systems to withstand, adapt to, and recover from cyber threats, attacks, and disruptions.
  6. Deceptive or dishonest activities conducted over the internet with the intention of gaining financial or personal benefit at the expense of others.
  7. Legal frameworks and regulations governing activities, behavior, and transactions conducted in cyberspace, including privacy, intellectual property, and cybersecurity laws.
  8. The ability to identify, evaluate, and effectively use information from various sources, including digital and online resources.
  9. The fraudulent acquisition and use of someone else's personal information for financial gain or other malicious purposes.
  10. Criminal activities carried out using computers, networks, or digital devices, such as hacking, fraud, or identity theft.
  11. Valuable resources and properties stored or represented in digital form, including data, documents, media files, and virtual currencies.
  12. Authentication A security process that requires users to provide two different forms of identification to verify their identity, typically a password and a temporary code sent to a mobile device.
  13. Potential dangers and risks posed by malicious actors, vulnerabilities, and security weaknesses in computer systems and networks.
  14. The perception and impression that individuals or entities have based on their activities, behavior, and interactions conducted online.
  15. The exchange of information, ideas, and messages using digital technologies and platforms, such as email, social media, and instant messaging.
  16. Measures and practices implemented to protect computer systems, networks, and data from cyber threats, attacks, and vulnerabilities.
  17. Information and analysis about potential and emerging cyber threats, vulnerabilities, and actors, used to inform cybersecurity decision-making and defenses.
  18. Unsolicited or unwanted electronic messages, typically sent in bulk, often for commercial or fraudulent purposes.
  19. Secret codes or phrases used to authenticate a user's identity and grant access to a computer system, network, or online account.
  20. Measures and safeguards implemented to secure sensitive or confidential data from unauthorized access, use, or disclosure.
  21. The trail of data left behind by interactions in a digital environment, including online activities, communications, and transactions.
  22. Bullying behavior that occurs online or through digital devices, such as harassment, threats, or spreading rumors.
  23. Malicious actions or operations launched against computer systems, networks, or digital infrastructure with the intent of causing harm, disruption, or damage.
  24. Knowledge and understanding of cybersecurity risks, threats, and best practices among individuals and organizations.
  25. Competencies and abilities required to effectively navigate, utilize, and create digital technologies and resources for various purposes.
  26. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, protecting against unauthorized access and threats.

50 Clues: The global network of interconnected computers that allows for the exchange of data and communication.Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks.Practices and precautions taken to protect oneself from potential risks and dangers encountered on the internet....

Cybersecurity 2020-08-21

Cybersecurity crossword puzzle
Across
  1. It protects systems, networks, and programs from digital attacks.
  2. They are small files that some websites save on your computer. They store information about you, but they don't spy.
  3. A fraud that obtains users' private data from the Internet, especially to access their bank accounts.
  4. Someone who, with their technical knowledge, uses cyber attacks to break into computer systems.
Down
  1. They infect other files on the system with the intention of altering the functioning of your computer, without you noticing.
  2. An electronic device to store and process data; we use it a lot in quarantine.
  3. Unwanted email that you recieve, they are usually advertisements.

7 Clues: It protects systems, networks, and programs from digital attacks.Unwanted email that you recieve, they are usually advertisements.An electronic device to store and process data; we use it a lot in quarantine.Someone who, with their technical knowledge, uses cyber attacks to break into computer systems....

CYBERSECURITY 2022-03-01

CYBERSECURITY crossword puzzle
Across
  1. transforming plaintext or cleartext into ciphertext.
  2. planning and maintaining organization safe in cyberspace.
  3. used to prove one's identity, or authorize access to a resource.
  4. malicious or ethical person who has knowledge and skill in analyzing program code or a computer system.
Down
  1. practice of sending fraudulent messages that appear to come from a reputable source.
  2. attaches itself with host file and replicates.
  3. unwanted or unsolicited communications typically received via e-mail.

7 Clues: attaches itself with host file and replicates.transforming plaintext or cleartext into ciphertext.planning and maintaining organization safe in cyberspace.used to prove one's identity, or authorize access to a resource.unwanted or unsolicited communications typically received via e-mail....

CYBERSECURITY 2022-03-01

CYBERSECURITY crossword puzzle
Across
  1. transforming plaintext or cleartext into ciphertext
  2. Planning and maintaining organization safe in cyberspace
  3. used to prove one's identity, or authorize access to a resource
  4. malicious or ethical person who has knowledge and skill in analyzing program code or a computer system
Down
  1. practice of sending fraudulent messages that appear to come from a reputable source
  2. attaches itself with host file and replicates
  3. unwanted or unsolicited communications typically received via e-mail

7 Clues: attaches itself with host file and replicatestransforming plaintext or cleartext into ciphertextPlanning and maintaining organization safe in cyberspaceused to prove one's identity, or authorize access to a resourceunwanted or unsolicited communications typically received via e-mail...

Cybersecurity 2024-02-15

Cybersecurity crossword puzzle
Across
  1. A technique used to trick individuals into revealing sensitive information
  2. The process of protecting computer systems, networks, and data from theft or damage
  3. A type of attack that floods a system or network with excessive traffic, causing it to become unavailable
Down
  1. The practice of verifying the identity of a user or system before granting access
  2. A program or device used to detect and prevent unauthorized access to a computer or network
  3. A secret code used to gain access to a computer system, network, or account
  4. A malicious program that self-replicates and spreads to other computers

7 Clues: A malicious program that self-replicates and spreads to other computersA technique used to trick individuals into revealing sensitive informationA secret code used to gain access to a computer system, network, or accountThe practice of verifying the identity of a user or system before granting access...

Envision Crossword 3 2023-12-05

Envision Crossword 3 crossword puzzle
Across
  1. - Structured data collection.
  2. - Technology at molecular scale.
  3. - Translates code to machine language.
  4. - Network security barrier.
Down
  1. - Protecting digital systems.
  2. - Physical computer parts.
  3. - Open-source OS.
  4. - Securing data through algorithms.
  5. - Language for web page creation.
  6. - Function calling itself.

10 Clues: - Open-source OS.- Physical computer parts.- Function calling itself.- Network security barrier.- Protecting digital systems.- Structured data collection.- Technology at molecular scale.- Language for web page creation.- Securing data through algorithms.- Translates code to machine language.

Pink October 2019-10-16

Pink October crossword puzzle
Across
  1. color for october
  2. Health Examination
  3. Data leak
  4. Celebration of years a significant event occurred
  5. Tissue cells hyper-proliferation
  6. ISO-certified
  7. Security measure to protect your data
  8. Evidence of authentication
  9. No Bra Day
Down
  1. File or program used to harm computers
  2. An example of CyberCrime
  3. Files/ data safety
  4. Day to promote Breast cancer Awareness
  5. Principle for measure of quality
  6. Associated with malicious attacks
  7. Breast cancer awareness period
  8. Symbol for breast cancer support
  9. Responsible for standard accreditation
  10. Breast cancer Victims

19 Clues: Data leakNo Bra DayISO-certifiedcolor for octoberHealth ExaminationFiles/ data safetyBreast cancer VictimsAn example of CyberCrimeEvidence of authenticationBreast cancer awareness periodPrinciple for measure of qualityTissue cells hyper-proliferationSymbol for breast cancer supportAssociated with malicious attacks...

Save Our Systems!!! 2020-11-28

Save Our Systems!!! crossword puzzle
Across
  1. Yes, it’s you alright!
  2. Cyberworld vaccine
  3. Trust me, I’ll ruin you!
  4. Internet’s most wanted
  5. A web assault?
  6. Alphanumeric, symbols & 8 spaces long
  7. Help, Support, Copy
  8. Flaming barrier
Down
  1. You are the bait here!
  2. A scary lot of viruses, worms, trojan horses, wipers
  3. For my eyes only/What’s mine stays mine
  4. Data protection and privacy law
  5. Scrambled data
  6. Online Safety

14 Clues: Online SafetyScrambled dataA web assault?Flaming barrierCyberworld vaccineHelp, Support, CopyYou are the bait here!Yes, it’s you alright!Internet’s most wantedTrust me, I’ll ruin you!Data protection and privacy lawAlphanumeric, symbols & 8 spaces longFor my eyes only/What’s mine stays mineA scary lot of viruses, worms, trojan horses, wipers

Password Security 2024-09-26

Password Security crossword puzzle
Across
  1. What is recommended to use instead of a password for better security?
  2. What term describes nearly flawless simulations of people and voices created by scammers?
  3. What technology has enhanced hackers’ abilities to create realistic phishing, voice, and video scams?
Down
  1. What button in Outlook helps report suspicious emails?
  2. During which month is Cybersecurity Awareness Month celebrated?
  3. What is the name of the Cybersecurity Awareness Viva Engage community (3 words)?
  4. What type of authentication is abbreviated as MFA?
  5. What is the term for fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity?
  6. How many minutes can it take for hackers to discover a six-character password?
  7. What is the name of the company-approved, secure password manager mentioned?

10 Clues: What type of authentication is abbreviated as MFA?What button in Outlook helps report suspicious emails?During which month is Cybersecurity Awareness Month celebrated?What is recommended to use instead of a password for better security?What is the name of the company-approved, secure password manager mentioned?...

Cybersecurity Phishing 2023-06-14

Cybersecurity Phishing crossword puzzle
Across
  1. type of phishing targeting a group or individual
  2. links, BLANK, or other attachments
  3. type of phishing over text
  4. a false sense of
  5. this plus misspellings indicates phishing
  6. most common way to phish
Down
  1. check for these
  2. type of phishing over phone/voice call
  3. most common social engineering attack
  4. type of phishing targeting C-suite
  5. never give this or your password

11 Clues: check for thesea false sense ofmost common way to phishtype of phishing over textnever give this or your passwordlinks, BLANK, or other attachmentstype of phishing targeting C-suitemost common social engineering attacktype of phishing over phone/voice callthis plus misspellings indicates phishingtype of phishing targeting a group or individual

Cybersecurity Terms 2022-05-13

Cybersecurity Terms crossword puzzle
Across
  1. The practice of securing systems, networks, and technologies from attacks and unauthorized access
  2. A type of network security that filters incoming and outgoing traffic
  3. When a legitimate website’s traffic is redirected to a fake site for malicious purposes
  4. Disguising data so it’s impossible to decipher without authorization
Down
  1. Using a device to mine cryptocurrency, without the device owner’s knowledge or permission
  2. Sending emails with a forged sender address is called email...
  3. Malicious software designed to disrupt a computer, server, or network
  4. A chain of Internet-connected devices centrally controlled by a hacker
  5. Email that you’ve technically solicited but it may serve little to no purpose to you
  6. A tool that allows you to maintain online anonymity while using the Internet
  7. DKIM and DMARC are both examples of a standard email authentication...

11 Clues: Sending emails with a forged sender address is called email...Disguising data so it’s impossible to decipher without authorizationMalicious software designed to disrupt a computer, server, or networkA type of network security that filters incoming and outgoing trafficA chain of Internet-connected devices centrally controlled by a hacker...

Guilfordian Print Issue 18 2023-05-02

Guilfordian Print Issue 18 crossword puzzle
Across
  1. A popular short-form social media platform under scrutiny by the US government
  2. an acronym used to describe a wide range of queer and trans individuals
  3. The name of a firelord and main antagonist of Avatar: The Last Airbender
  4. A cybersecurity company that released data on cybersecurity insurance for colleges
  5. The namesake character of a TV show that has been running since 1999 and has around 280 episodes
  6. A youtuber who gained popularity through his FNAF playthroughs
  7. The month with a nickname of “madness” that is famous for basketball
  8. The person that Miles Kirkpatrick didn’t want to anger when talking about philosophy
Down
  1. The name of the most hated social media platform of Guilford College (by poll)
  2. Guilford College’s rival during the Soup Bowl
  3. A sport played by throwing a disc, usually plastic, to another person
  4. The country that Studio Ghibli is based in
  5. The name of the closest black hole to earth, also the name of the Primordial Greek Goddess of the Earth
  6. The sport played by Portia Star Jones, and in which Guilford College is part of the NCAA Emerging Pathway

14 Clues: The country that Studio Ghibli is based inGuilford College’s rival during the Soup BowlA youtuber who gained popularity through his FNAF playthroughsThe month with a nickname of “madness” that is famous for basketballA sport played by throwing a disc, usually plastic, to another person...

CyberSecurity Awareness - Cyber Knowledge 2024-09-24

CyberSecurity Awareness - Cyber Knowledge crossword puzzle
Across
  1. is a cybersecurity threat in which attackers use QR codes to redirect victims to malicious websites or prompt them to download harmful content.
  2. email that is not wanted, email that is sent to large numbers of people and that consists mostly of advertising
  3. a weakness that can be accidentally triggered or intentionally exploited
  4. a software update inserted (or patched) into the code of an executable program that fixes bugs, installs new drivers
  5. computer software that is provided usually for free but contains advertisements
  6. a type of malicious software—or malware—that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return. Ransomware attacks can cause costly disruptions to operations and the loss of critical information and data.
  7. a program that is designed to harm a computer by deleting data,
  8. a string of words and characters that you type in to authenticate yourself
  9. preventive cybersecurity action
  10. a scam by which an email user is duped into revealing personal or confidential information which the scammer can use illicitly
  11. A tailgating attack is a breach of security where an unauthorized actor gains access to a controlled area by closely following someone with legitimate access credentials.
  12. a usually small self-contained and self-replicating computer program that invades computers on a network and usually performs a destructive action
Down
  1. the act of obtaining or attempting to obtain sensitive information by manipulating an individual into revealing secure information
  2. measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack
  3. having or showing realization, perception, or knowledge
  4. Employs deceptive text messages (SMS) to lure victims into sharing personal information or clicking malicious links.
  5. software designed to interfere with a computer's normal functioning
  6. computer software that secretly records information about the way you use your computer
  7. a potential circumstance, entity or event capable of exploiting a vulnerability and causing harm
  8. a secret series of numbers or letters that allows you to use a computer system
  9. Personal Identifiable Information (PII) is defined as: Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect mean

21 Clues: preventive cybersecurity actionhaving or showing realization, perception, or knowledgea program that is designed to harm a computer by deleting data,software designed to interfere with a computer's normal functioninga weakness that can be accidentally triggered or intentionally exploited...

Spam Nation 2024-10-30

Spam Nation crossword puzzle
Across
  1. Popular tool used to filter out spam emails.
  2. To make information unclear, often to hide malicious code.
  3. Country where many major spam and cybercrime networks originate.
  4. A popular blog by the author covering cybersecurity.
  5. Fraudulent emails pretending to be legitimate to steal data.
  6. Process of moving a suspect from one country to face trial.
  7. Describes servers resistant to being shut down, popular with criminals.
  8. Malware that locks a computer until a ransom is paid.
  9. A targeted form of phishing aimed at specific individuals.
  10. First name of author
  11. To take control of someone else’s computer or online account.
  12. Leader of a significant Russian spam network.
  13. An affiliate program used to promote prescription drugs online.
  14. Attack that overloads a website to shut it down.
  15. The primary motivation behind spamming and cybercrime.
  16. A term describing a command signal used to connect to a botnet.
  17. Name of Book
  18. Faking information to deceive, often used in phishing.
  19. Another spam affiliate network similar to Glavmed.
Down
  1. An organized criminal scheme for profit, like illegal spamming.
  2. Criminal who deals in stolen credit card information.
  3. A cybersecurity expert mentioned in the book.
  4. A hacker with malicious intentions.
  5. Author and cybersecurity expert.
  6. People who transfer stolen money on behalf of criminals.
  7. A nickname for a notorious Russian spammer in the book.
  8. A network of hacked computers controlled by cybercriminals for sending spam.
  9. A member of a spam network who promotes illegal products.
  10. Crime committed through computers and the internet.
  11. Software that automatically displays or downloads ads on your computer.
  12. The main leader of a criminal organization.
  13. A major Russian spam organization mentioned in *Spam Nation*.
  14. A Russian organization that facilitated illegal online drug sales.
  15. Software tools that hide malware on a hacked computer.
  16. Harmful software used by spammers to control computers.
  17. Encoding data to keep it secure.
  18. A large botnet used in major spam and malware campaigns.
  19. Spam emails often advertise these for selling unregulated drugs online.
  20. A type of malware that hides in legitimate-looking software.
  21. Device or software that captures credit card info illegally.
  22. A known figure involved in the illegal spam trade.
  23. Organization that fights against spam globally.
  24. Unwanted and unsolicited email, often advertising shady products.

43 Clues: Name of BookFirst name of authorAuthor and cybersecurity expert.Encoding data to keep it secure.A hacker with malicious intentions.The main leader of a criminal organization.Popular tool used to filter out spam emails.A cybersecurity expert mentioned in the book.Leader of a significant Russian spam network....

Spam Nation 2024-10-30

Spam Nation crossword puzzle
Across
  1. A major Russian spam organization mentioned in *Spam Nation*.
  2. Spam emails often advertise these for selling unregulated drugs online.
  3. Popular tool used to filter out spam emails.
  4. A term describing a command signal used to connect to a botnet.
  5. Attack that overloads a website to shut it down.
  6. To make information unclear, often to hide malicious code.
  7. An affiliate program used to promote prescription drugs online.
  8. Harmful software used by spammers to control computers.
  9. Malware that locks a computer until a ransom is paid.
  10. A popular blog by the author covering cybersecurity.
  11. A Russian organization that facilitated illegal online drug sales.
  12. Crime committed through computers and the internet.
  13. Author and cybersecurity expert.
  14. A type of malware that hides in legitimate-looking software.
  15. Another spam affiliate network similar to Glavmed.
  16. Process of moving a suspect from one country to face trial.
  17. Faking information to deceive, often used in phishing.
  18. Criminal who deals in stolen credit card information.
  19. People who transfer stolen money on behalf of criminals.
  20. A cybersecurity expert mentioned in the book.
  21. A member of a spam network who promotes illegal products.
Down
  1. Organization that fights against spam globally.
  2. A known figure involved in the illegal spam trade.
  3. A large botnet used in major spam and malware campaigns.
  4. A hacker with malicious intentions.
  5. Fraudulent emails pretending to be legitimate to steal data.
  6. Software that automatically displays or downloads ads on your computer.
  7. Device or software that captures credit card info illegally.
  8. A targeted form of phishing aimed at specific individuals.
  9. The primary motivation behind spamming and cybercrime.
  10. Describes servers resistant to being shut down, popular with criminals.
  11. Unwanted and unsolicited email, often advertising shady products.
  12. Software tools that hide malware on a hacked computer.
  13. To take control of someone else’s computer or online account.
  14. Encoding data to keep it secure.
  15. A network of hacked computers controlled by cybercriminals for sending spam.
  16. An organized criminal scheme for profit, like illegal spamming.
  17. Leader of a significant Russian spam network.
  18. Country where many major spam and cybercrime networks originate.
  19. A nickname for a notorious Russian spammer in the book.
  20. The main leader of a criminal organization.

41 Clues: Encoding data to keep it secure.Author and cybersecurity expert.A hacker with malicious intentions.The main leader of a criminal organization.Popular tool used to filter out spam emails.Leader of a significant Russian spam network.A cybersecurity expert mentioned in the book.Organization that fights against spam globally....

CyberSecurity-battaglia 2021-03-22

CyberSecurity-battaglia crossword puzzle
Across
  1. an electronic machine that calculates data very quickly, used for storing, writing, organizing, and sharing information
  2. the quality of being able to be trusted or believed
  3. the condition or state of being kept safe, damage, or loss
  4. used to describe websites that are safe and will not cause problems for your computer
Down
  1. the possibility of harm or death, or of something unpleasant happening
  2. a choice that you make about something after thinking about several possibilities
  3. not enjoyable or pleasant
  4. physical harm or damage to someone's body caused by an accident or an attack
  5. to try to hurt or defeat using violence
  6. an amount of something that is being kept for future use
  7. information in an electronic form that can be stored and processed by a computer

11 Clues: not enjoyable or pleasantto try to hurt or defeat using violencethe quality of being able to be trusted or believedan amount of something that is being kept for future usethe condition or state of being kept safe, damage, or lossthe possibility of harm or death, or of something unpleasant happening...

CyberSecurity-battaglia 2021-03-22

CyberSecurity-battaglia crossword puzzle
Across
  1. information in an electronic form that can be stored and processed by a computer
  2. an electronic machine that calculates data very quickly, used for storing, writing, organizing, and sharing information
  3. the quality of being able to be trusted or believed
  4. an amount of something that is being kept for future use
  5. the condition or state of being kept safe, damage, or loss
  6. the possibility of harm or death, or of something unpleasant happening
Down
  1. a choice that you make about something after thinking about several possibilities
  2. not enjoyable or pleasant
  3. used to describe websites that are safe and will not cause problems for your computer
  4. physical harm or damage to someone's body caused by an accident or an attack
  5. to try to hurt or defeat using violence

11 Clues: not enjoyable or pleasantto try to hurt or defeat using violencethe quality of being able to be trusted or believedan amount of something that is being kept for future usethe condition or state of being kept safe, damage, or lossthe possibility of harm or death, or of something unpleasant happening...

Cybersecurity Newsletter 2023-02-03

Cybersecurity Newsletter crossword puzzle
Across
  1. a malicious program that records the strokes on the keyboard to capture sensitive information
  2. Faith Healthcare's EHR solution for the clinics
  3. any malware that misleads users of its true intent
  4. any software intentionally designed to cause disruption to a computer.
  5. the psychological manipulation of people into performing actions or divulging confidential information
Down
  1. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
  2. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. an internal website used for sharing resources and information. In other words, FHC uses SharePoint as its ___.
  4. Time & attendance, payroll, and soon-to-be education is managed with this system
  5. a form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
  6. 4-letter abbreviation for protected health information (PHI) that is produced, saved, transferred or received in an electronic form.

11 Clues: Faith Healthcare's EHR solution for the clinicsany malware that misleads users of its true intentany software intentionally designed to cause disruption to a computer.Time & attendance, payroll, and soon-to-be education is managed with this systema malicious program that records the strokes on the keyboard to capture sensitive information...

Cybersecurity Terms 2024-09-20

Cybersecurity Terms crossword puzzle
Across
  1. Unsolicited commercial email, junk mail.
  2. Small program that is timed to perform an operation on a system.
  3. A place where commands can be entered in Linux.
  4. Takes advantage of code flaws that have very recently been discovered.
  5. A program that blocks access until a ransom is paid.
Down
  1. Appears to be legitimate but really contains malicious code.
  2. Proving who you are so trust can be established.
  3. Software that installs advertisements on the PC in the form of toolbars or popups.
  4. Software that gathers data and forwards it without consent.
  5. Something you have.
  6. Files that appear to be legitimate programs, but really contain malicious code.

11 Clues: Something you have.Unsolicited commercial email, junk mail.A place where commands can be entered in Linux.Proving who you are so trust can be established.A program that blocks access until a ransom is paid.Software that gathers data and forwards it without consent.Appears to be legitimate but really contains malicious code....

cybersecurity Crossword 2024-09-27

cybersecurity Crossword crossword puzzle
Across
  1. A person who tries to break into computers to find information or cause trouble.
  2. A special tool that helps keep your computer safe by blocking bad stuff from getting in
  3. A secret word or code you use to protect your accounts and keep them safe.
  4. A new version of software that makes it better or fixes problems, helping to keep your computer safe
  5. A type of software that secretly watches what you do on your computer without your permission.
  6. A harmful program that can make your computer sick, just like a virus can make you sick
  7. A way to change your information into a secret code so only the right people can read it.
Down
  1. Guess the word
  2. Short for "malicious software," it's a type of bad program that can hurt your computer or steal your information
  3. A trick where someone pretends to be someone else to steal your personal information, usually through fake emails.
  4. A process to check if you are who you say you are, often by using a password or a special code.

11 Clues: Guess the wordA secret word or code you use to protect your accounts and keep them safe.A person who tries to break into computers to find information or cause trouble.A special tool that helps keep your computer safe by blocking bad stuff from getting inA harmful program that can make your computer sick, just like a virus can make you sick...

How well do you know Nick? 2021-05-16

How well do you know Nick? crossword puzzle
Across
  1. Nick favorite girl
  2. What does he hunt in Texas?
  3. Favorite sport
  4. Fathers name.
  5. What will Nick major in in college?
  6. Mothers name.
Down
  1. Where was Nick born?
  2. Make of Nick's truck?
  3. Month Nick was born.
  4. Where will he attend college?

10 Clues: Fathers name.Mothers name.Favorite sportNick favorite girlWhere was Nick born?Month Nick was born.Make of Nick's truck?What does he hunt in Texas?Where will he attend college?What will Nick major in in college?

Digital Citizenship Vocabulary 2022-05-09

Digital Citizenship Vocabulary crossword puzzle
Across
  1. digital data.
  2. Legal protection of intellectual
  3. Data and files are available to
  4. goods or services.
  5. Responsible use of technology
  6. unlawful or criminal use
  7. Using the intellectual property of
  8. Equal access to the Internet.
  9. A benchmark model for website
Down
  1. Everything you leave behind on the
  2. Privacy of data.
  3. Privacy of data.
  4. Unauthorized access to data or a
  5. The state of being protected
  6. A word, phrase, or symbol
  7. as your own.
  8. Data has not been tampered with.
  9. Online behavior
  10. using, or selling an
  11. Digital etiquette
  12. A right to prevent others from
  13. Internet Service Provider

22 Clues: as your own.digital data.Online behaviorPrivacy of data.Privacy of data.Digital etiquettegoods or services.using, or selling anunlawful or criminal useA word, phrase, or symbolInternet Service ProviderThe state of being protectedResponsible use of technologyEqual access to the Internet.A benchmark model for websiteA right to prevent others from...

Cybersecurity Crossword 2021-12-07

Cybersecurity Crossword crossword puzzle
Across
  1. __ safeguards intended for the actual users
  2. IT firm that was subject of a Russian cyberattack
  3. always practice ____ password management to prevent against cyberattacks
  4. another work for SMS-based phishing
  5. __ safeguards intended for software and hardware
  6. process of preventing unauthorized access to IT systems
Down
  1. you can download ____ software to protect your devices
  2. cyberattack that demands a ransom payment
  3. name of criminal organization that hacked into the IT network of Colonial Pipeline
  4. this country was the subject of a Russian cyberattack in 2007
  5. most common form of cyberattack

11 Clues: most common form of cyberattackanother work for SMS-based phishingcyberattack that demands a ransom payment__ safeguards intended for the actual users__ safeguards intended for software and hardwareIT firm that was subject of a Russian cyberattackyou can download ____ software to protect your devices...

cybersecurity 3 2024-05-07

cybersecurity 3 crossword puzzle
Across
  1. raw facts
  2. taking data out of a computer
  3. device operating controlled instructions
  4. use mechanical operations to perform calculations
  5. a series of related
Down
  1. your history
  2. instructions waiting to be executed
  3. a notebook computer
  4. entering data into a computer
  5. the most powerful computer that performs trillions of calculations per second
  6. a stationary location with a computer on top

11 Clues: raw factsyour historya notebook computera series of relatedtaking data out of a computerentering data into a computerinstructions waiting to be executeddevice operating controlled instructionsa stationary location with a computer on topuse mechanical operations to perform calculations...

Cybersecurity Awareness 2023-09-14

Cybersecurity Awareness crossword puzzle
Across
  1. A piece of data from a website that is saved within a web browser and can be retrieved by the website at a later time
  2. Virtual Private Network
  3. A type of malicious software
  4. Fraudulent email that demands urgent action
  5. The manipulation of facial appearance through deep generative methods.
  6. The use of electronics to bully someone
Down
  1. Artificial intelligence
  2. The conversion of information or data into a code
  3. A part of the internet that isn't indexed by search engines
  4. An error, fault in a computer system
  5. Network security system

11 Clues: Artificial intelligenceVirtual Private NetworkNetwork security systemA type of malicious softwareAn error, fault in a computer systemThe use of electronics to bully someoneFraudulent email that demands urgent actionThe conversion of information or data into a codeA part of the internet that isn't indexed by search engines...

Cybersecurity Week! 2023-10-11

Cybersecurity Week! crossword puzzle
Across
  1. Software used to prevent, scan, detect and delete viruses from a computer.
  2. A type of cyber attack that exploits a vulnerability in software that no one is aware of yet.
  3. A piece of audio or video that has been altered and changed to make it seem authentic or credible.
  4. A type of malware designed to give hackers access to and control over a target device.
  5. A cyber-attack that targets individuals through SMS or text messages.
  6. Tools that can record every keystroke that you type into a computer or mobile keyboard.
Down
  1. A type of malware that disguises itself as legitimate code or software.
  2. Any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission.
  3. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
  4. A technique through which a cybercriminal disguises themselves as a known or trusted source.
  5. A network of compromised computers used to carry out cyberattacks on other systems.

11 Clues: A cyber-attack that targets individuals through SMS or text messages.A type of malware that disguises itself as legitimate code or software.Software used to prevent, scan, detect and delete viruses from a computer.A network of compromised computers used to carry out cyberattacks on other systems....

GC-CYBERSECURITY 2022-05-19

GC-CYBERSECURITY crossword puzzle
Across
  1. A piece of malicious code that encrypts files so the user can not access them until they pay.
  2. A piece of malicious code that is downloaded by pretending to be a useful piece of code
  3. Malicious code can be transferred from one computer to another using physical devices such as a _ _ _ _ _ _ _ _
  4. Old software and hardware may contain vulnerabilities that a hacker can e _ _ _ _ _ _ to gain access to a device.
  5. A piece of malicious code used to damage computers or steal data
  6. A hacker intercepts and steals data.
  7. Emails sent that appear to come from a legitimate organisation but links within the mail may install malicious code.
Down
  1. hackers attempt every posiible combination of characters to find a password
  2. A piece of malicious code. It infects computers by being downloaded within files.
  3. social ____________. Manipulating users into sharing their data.
  4. A common way to infect a computer with malicious code is to _ _ _ _ _ _ it from the internet or by clicking on suspicious links in mail.

11 Clues: A hacker intercepts and steals data.A piece of malicious code used to damage computers or steal datasocial ____________. Manipulating users into sharing their data.hackers attempt every posiible combination of characters to find a passwordA piece of malicious code. It infects computers by being downloaded within files....

Cybersecurity Week 2022-10-14

Cybersecurity Week crossword puzzle
Across
  1. a service that creates a secure tunnel between your device and the internet
  2. a malicious software that spreads from one computer to another
  3. the process of verifying a users identity
  4. malicious code or software
Down
  1. taking readable plaintext, and converting it into ciphertext
  2. when attackers send malicious emails to trick people into a scam
  3. a software update that fixes bugs or updates security
  4. a security technique that requires multiple methods of authentication
  5. a malware that encrypts user data, and requires payment to get back
  6. a secret word or phrase that must be used to gain access to something
  7. a network security device that monitors traffic to or from your network

11 Clues: malicious code or softwarethe process of verifying a users identitya software update that fixes bugs or updates securitytaking readable plaintext, and converting it into ciphertexta malicious software that spreads from one computer to anotherwhen attackers send malicious emails to trick people into a scam...

CyberSecurity-battaglia 2021-03-22

CyberSecurity-battaglia crossword puzzle
Across
  1. to try to hurt or defeat using violence
  2. an electronic machine that calculates data very quickly, used for storing, writing, organizing, and sharing information
  3. the possibility of harm or death, or of something unpleasant happening
  4. the quality of being able to be trusted or believed
  5. used to describe websites that are safe and will not cause problems for your computer
Down
  1. not enjoyable or pleasant
  2. information in an electronic form that can be stored and processed by a computer
  3. the condition or state of being kept safe, damage, or loss
  4. a choice that you make about something after thinking about several possibilities
  5. an amount of something that is being kept for future use
  6. physical harm or damage to someone's body caused by an accident or an attack

11 Clues: not enjoyable or pleasantto try to hurt or defeat using violencethe quality of being able to be trusted or believedan amount of something that is being kept for future usethe condition or state of being kept safe, damage, or lossthe possibility of harm or death, or of something unpleasant happening...

Harper Cybersecurity Review 2024-03-05

Harper Cybersecurity Review crossword puzzle
Across
  1. software we use to protect your laptop
  2. phishing attack thorough voice or phone call
  3. our email filter system
  4. #1 threat to our security
  5. usual media that a phish comes to
  6. type of request that is weird
  7. tactic that a phisher uses
  8. social media site where phisher researches
  9. phishing attack through text message
  10. used in phishing attack called Quishing
Down
  1. where people write the Wifi password
  2. public charging station stealing your info
  3. used for remote access
  4. authentication for VPN access
  5. Information Security is everyone's
  6. 12 or more characters
  7. site where you can scan your own attachments

17 Clues: 12 or more charactersused for remote accessour email filter system#1 threat to our securitytactic that a phisher usesauthentication for VPN accesstype of request that is weirdusual media that a phish comes toInformation Security is everyone'swhere people write the Wifi passwordphishing attack through text message...

ICT EDUCATION IN ELEMENTARY GRADES 2024-09-29

ICT EDUCATION IN ELEMENTARY GRADES crossword puzzle
Across
  1. Visual content for education.
  2. Immersive digital environment experience.
  3. Replication of real-world scenarios.
  4. Audio program for listening.
  5. Recording of screen activities.
  6. Step-by-step problem-solving procedure.
  7. Protection against online threats.
  8. Software for specific tasks.
  9. Moving images for storytelling.
Down
  1. Producing physical objects from digital models.
  2. Connected devices for communication.
  3. Information used for analysis.
  4. Interactive display for learning.
  5. Online writing and sharing.
  6. Creating interactive educational games.

15 Clues: Online writing and sharing.Audio program for listening.Software for specific tasks.Visual content for education.Information used for analysis.Recording of screen activities.Moving images for storytelling.Interactive display for learning.Protection against online threats.Connected devices for communication.Replication of real-world scenarios....

CyberSecurity Terms (Participation 3) 2023-01-28

CyberSecurity Terms (Participation 3) crossword puzzle
Across
  1. Lots of attackers preventing users
  2. Tricking users to click an image
  3. Malware disguised as normal software
  4. Public internet access
  5. Malware that tracks you
  6. Bring your own device
  7. Attack seeking out personal info
  8. Malware that makes you pay
  9. Attack that exploits unknown vulnerability
  10. Making data unreadable by scrambling
  11. Shield for data
  12. Network pro learning hacking techniques
Down
  1. Malicious hackers
  2. Security keeping internet users safe
  3. Software that is harmful
  4. Software that checks for malware
  5. Malware that displays ads
  6. Media altered realistically
  7. Virtual private network
  8. Unauthorized access to sensitive info

20 Clues: Shield for dataMalicious hackersBring your own devicePublic internet accessMalware that tracks youVirtual private networkSoftware that is harmfulMalware that displays adsMalware that makes you payMedia altered realisticallySoftware that checks for malwareTricking users to click an imageAttack seeking out personal info...

How well do you know the Gagnon Family? 2023-12-03

How well do you know the Gagnon Family? crossword puzzle
Across
  1. Christina's career field
  2. Travis's nemesis
  3. Travis's career field
  4. Corbin's favorite band
  5. Best weather in the world
  6. Savior of the world
  7. Edmond's hobby horse
  8. Welcome to ________, I love you
  9. Travis and Christina's shared heritage
  10. Where Edmond met Eugene
  11. Edmond's overlord
  12. Where Travis met Christina
Down
  1. Former cult leader
  2. Best grocery store outside of Texas
  3. Edmond's career field
  4. Edmond's roommate
  5. Corbin's roommate
  6. Best burger chain
  7. Corbin's birthplace
  8. Christina's obsession
  9. Travis's favorite vacation
  10. Favorite car maker
  11. Where Corbin met Philip
  12. Best grocery store in Texas
  13. Christina's favorite band

25 Clues: Travis's nemesisEdmond's roommateCorbin's roommateBest burger chainEdmond's overlordFormer cult leaderFavorite car makerCorbin's birthplaceSavior of the worldEdmond's hobby horseEdmond's career fieldTravis's career fieldChristina's obsessionCorbin's favorite bandWhere Corbin met PhilipWhere Edmond met EugeneChristina's career field...

american33 2024-06-08

american33 crossword puzzle
Across
  1. Sustainable energy sources.
  2. Technology in biological research.
  3. Technology on an atomic scale.
  4. Large sets of complex data.
  5. Private space exploration company.
  6. Protection of internet connected systems.
  7. Technology involving robots.
  8. Popular electric vehicle.
  9. Internet of Things.
  10. Technology worn on the body.
  11. Amazon's virtual assistant.
  12. Automated home technology.
Down
  1. Virtual model of a physical object.
  2. Process of making three-dimensional objects.
  3. Digital currency using encryption.
  4. Remote diagnosis and treatment.
  5. Highspeed internet cables.
  6. Type of reality merging physical and digital.
  7. Type of computing involving quantum states.
  8. Study of genomes.

20 Clues: Study of genomes.Internet of Things.Popular electric vehicle.Highspeed internet cables.Automated home technology.Sustainable energy sources.Large sets of complex data.Amazon's virtual assistant.Technology involving robots.Technology worn on the body.Technology on an atomic scale.Remote diagnosis and treatment.Digital currency using encryption....

day 1 2022-03-29

day 1 crossword puzzle
Across
  1. Steve Smith used to play...?
  2. Only drinks beer with lemon in it
  3. Year of foundation
  4. To which cybersecurity framework is Pentera mapped?
  5. Which department did the first POCs?
  6. First customer's industry
  7. Arik's given name on passport
Down
  1. NA office based in
  2. Prior to Pentera
  3. Mike Magno's dog
  4. An X folk-dancer
  5. Chen started his career as

12 Clues: Prior to PenteraMike Magno's dogAn X folk-dancerNA office based inYear of foundationFirst customer's industryChen started his career asSteve Smith used to play...?Arik's given name on passportOnly drinks beer with lemon in itWhich department did the first POCs?To which cybersecurity framework is Pentera mapped?

All About Cindy & Kevin! 2024-07-27

All About Cindy & Kevin! crossword puzzle
Across
  1. Kevin’s job
  2. Cindy’s job
  3. Our Favorite Place for Anniversary Trips
  4. Where Kevin is from (city)
  5. Where Cindy is from (city)
  6. Kevin’s Last Name
Down
  1. Our 1st Date
  2. Where HE asked HER out AND proposed
  3. Name of our Female Dog
  4. The breed of our fur babies
  5. Name of our Male Dog
  6. Cindy’s Last Name

12 Clues: Kevin’s jobCindy’s jobOur 1st DateCindy’s Last NameKevin’s Last NameName of our Male DogName of our Female DogWhere Kevin is from (city)Where Cindy is from (city)The breed of our fur babiesWhere HE asked HER out AND proposedOur Favorite Place for Anniversary Trips

Cyber Security 2023-08-17

Cyber Security crossword puzzle
Across
  1. a quick access website based directory
  2. Entering into someone or something else’s data stream either by means of hacking or password changing.
  3. Being in favor of, or creating aspects towards a decision that will skew an argument at the expense of reputation.
  4. Company, known as a open network browser
  5. the world wide web is also known as
  6. The remnant that is left after browsing. Could be seen by researching through search history and clicking confirmation tickets.
Down
  1. Known as an asset in the stock market, these are an investment type
  2. False hyperlinks made in order to create data infiltration, used as a tactic, primary objective of account takeover.
  3. Trademarking an intellectual property in order to avoid copying an idea, commonly used in business material.
  4. an accessible tech support
  5. Protective strategy tailored towards the internet, an ever evolving shield against data infiltration.
  6. Company, known for computer backup and storage networking
  7. The street credit as well as infamy an idea creates.
  8. Company, known for cybersecurity basics software, recently deceased creator
  9. often used as a financial tolerance policy, this is used to measure the amount of danger one can obtain without failure.

15 Clues: an accessible tech supportthe world wide web is also known asa quick access website based directoryCompany, known as a open network browserThe street credit as well as infamy an idea creates.Company, known for computer backup and storage networkingKnown as an asset in the stock market, these are an investment type...

CSec 2023-11-01

CSec crossword puzzle
Across
  1. Cybersecurity work result that gives a conclusive statement about the status of the cybersecurity-related quotation, concept, implementation, verification and validation activities within a project.
Down
  1. Role responsible to create the cybersecurity concept.
  2. Abbreviation used for Cybersecurity Engineering process.
  3. The international standard for the automotive industry, addressing cybersecurity risks within modern road vehicles.

4 Clues: Role responsible to create the cybersecurity concept.Abbreviation used for Cybersecurity Engineering process.The international standard for the automotive industry, addressing cybersecurity risks within modern road vehicles....

Tiffany & Matt 2023-03-14

Tiffany & Matt crossword puzzle
Across
  1. The Bride's maiden name
  2. The wedding month!
  3. The holiday the couple met on
  4. "You may now ____ the bride."
  5. The Groom's hometown
  6. The month he proposed
  7. The Bride's ethnicity
  8. A small, circular band. Typically of precious metal.
  9. The Bride's favorite movie series
  10. The Groom's occupation
Down
  1. Degree The Bride graduated with
  2. The city he proposed at
  3. The fraternity The Groom is in
  4. The Groom's favorite sport
  5. Mr. & Mrs. _______
  6. The Best Man
  7. "____ is in the air!"
  8. The name of the couple's first pet
  9. The Matron of Honor
  10. Location of the first date (restaurant)

20 Clues: The Best ManThe wedding month!Mr. & Mrs. _______The Matron of HonorThe Groom's hometown"____ is in the air!"The month he proposedThe Bride's ethnicityThe Groom's occupationThe Bride's maiden nameThe city he proposed atThe Groom's favorite sportThe holiday the couple met on"You may now ____ the bride."The fraternity The Groom is in...

IEM Social Media Crossword Puzzle 2021-07-22

IEM Social Media Crossword Puzzle crossword puzzle
Across
  1. Practicing personal appreciation
  2. VDEM’s #______Monday
  3. The CISA, FBI, and the NSA published a Joint ____ Advisory
  4. Know ______ (Call to action)
  5. Have you made a family ____ plan?
  6. FEMA announced two initiatives to address
  7. Tool for public safety and emergency response
  8. IEM Spotlight
  9. Thank you postal workers
  10. Rapidly spreading variant
  11. Hire a _____ Day
Down
  1. Beat the…
  2. July Holiday
  3. Give Something Away Day
  4. Hernando County, Florida
  5. Summer heat brings increased risk
  6. Conservation Day
  7. IEM Senior Executive Advisor providing insight
  8. First hurricane of the 2021 season
  9. Connect with county leaders

20 Clues: Beat the…July HolidayIEM SpotlightConservation DayHire a _____ DayVDEM’s #______MondayGive Something Away DayHernando County, FloridaThank you postal workersRapidly spreading variantConnect with county leadersKnow ______ (Call to action)Practicing personal appreciationSummer heat brings increased riskHave you made a family ____ plan?...

Security Safety 2023-07-19

Security Safety crossword puzzle
Across
  1. Biological user authentication methods
  2. Software used to prevent cyberattacks
  3. Malicious web browser advertisements
  4. Publishing private user information
  5. Blocks fraudulent network traffic
  6. Maliciously placed computer system infection
  7. Attacker changes DNS server information
  8. Intimidating and threatening electronic communication
  9. Words used for account access
Down
  1. Tracks user's keystrokes
  2. Practice of protecting computer systems
  3. Computer networks used for cyberattacks
  4. Forceful hacker password guessing technique
  5. Fraudulent solicitation through an email
  6. More than two authentication techniques
  7. Requires users to confirm identity
  8. Tracks user's online behavior
  9. Plans and implements security measures
  10. Malicious click tricks
  11. Use of fake website addresses

20 Clues: Malicious click tricksTracks user's keystrokesTracks user's online behaviorUse of fake website addressesWords used for account accessBlocks fraudulent network trafficRequires users to confirm identityPublishing private user informationMalicious web browser advertisementsSoftware used to prevent cyberattacksBiological user authentication methods...

Jas & Cian: Sip & Solve 2024-07-30

Jas & Cian: Sip & Solve crossword puzzle
Across
  1. Cian's family cat's name
  2. Cian's coffee order
  3. The month we got engaged
  4. Number of degrees Jasvin has
  5. City that Cian was born in
  6. The location of our first date
  7. Where do we live
  8. Jasvin's birthday month
  9. Jasvin's favourite Marvel character
  10. Jasvin's middle name
  11. The subject Jasvin teaches
Down
  1. The honeymoon destination
  2. The gemstone in Jasvin's engagement ring
  3. The policy area Cian works in
  4. Our favourite board game
  5. Cian's university
  6. The number of bridesmaids
  7. Our first overseas holiday
  8. Jasvin's home town
  9. The number of groomsmen
  10. Cian's football team
  11. Cian's middle name

22 Clues: Where do we liveCian's universityJasvin's home townCian's middle nameCian's coffee orderCian's football teamJasvin's middle nameThe number of groomsmenJasvin's birthday monthCian's family cat's nameOur favourite board gameThe month we got engagedThe honeymoon destinationThe number of bridesmaidsOur first overseas holidayCity that Cian was born in...

public safty crossword 2024-08-20

public safty crossword crossword puzzle
Across
  1. control, to protect dangered animals and control thm
  2. to protect the city and people
  3. watch over an area
  4. protected
  5. security of things online
  6. to watch out for
  7. help minor injuries
  8. sound for an emergency
  9. to be quiet and away from windows
Down
  1. danger
  2. unexpected dangerous situation
  3. a statement that could mean possible danger
  4. to protect
  5. let someone know something important
  6. saving someone from danger
  7. flames
  8. to be kept safe
  9. to clear out quickly
  10. health, health of the population
  11. medical attention on the move
  12. being protected

21 Clues: dangerflamesprotectedto protectto be kept safebeing protectedto watch out forwatch over an areahelp minor injuriesto clear out quicklysound for an emergencysecurity of things onlinesaving someone from dangermedical attention on the moveunexpected dangerous situationto protect the city and peoplehealth, health of the population...

Cybercryptics: A Crossword for the IT Detective 2023-10-31

Cybercryptics: A Crossword for the IT Detective crossword puzzle
Across
  1. Protection against malware
  2. Intelligence The wizard behind the curtain
  3. The superhero of software integration
  4. Data recovery
  5. A magical land of digital storage in the sky
  6. Online scam
  7. Analytics The detective of the data world
  8. Interconnected computers
  9. Website address
  10. The defender of the digital realm
  11. Computer programs
  12. Network Security Barrier
Down
  1. A code-scrambling lock for your data
  2. Digital ledger
  3. Wreaks havoc on your computer
  4. Network traffic controller
  5. Malicious Software
  6. Central data host
  7. of Things The tech spider web connecting all the things
  8. Information storage

20 Clues: Online scamData recoveryDigital ledgerWebsite addressCentral data hostComputer programsMalicious SoftwareInformation storageInterconnected computersNetwork Security BarrierProtection against malwareNetwork traffic controllerWreaks havoc on your computerThe defender of the digital realmA code-scrambling lock for your data...

Trade school vs 4-year college 2024-02-26

Trade school vs 4-year college crossword puzzle
Across
  1. provide health care info
  2. works with customers
  3. program systems that work with info
  4. works with money
  5. justices for criminals
  6. Bills medicine
  7. could be describes as beauty worker
  8. combination vehicle driver
  9. cheaper and takes less time
Down
  1. therapist that messages
  2. Air vehicle maintenance
  3. administrate healthcare
  4. culinary trade
  5. Heating, ventilation, and air conditioning
  6. program info tech
  7. Longer and more expensive
  8. protecting online platforms
  9. works with hair
  10. diagnose and fix cars
  11. work with different metals

20 Clues: culinary tradeBills medicineworks with hairworks with moneyprogram info techworks with customersdiagnose and fix carsjustices for criminalstherapist that messagesAir vehicle maintenanceadministrate healthcareprovide health care infoLonger and more expensivecombination vehicle driverwork with different metalsprotecting online platforms...

GenCyber Cybersecurity Concepts 2022-06-08

GenCyber Cybersecurity Concepts crossword puzzle
Across
  1. n
  2. c
  3. f
  4. c
Down
  1. g
  2. y
  3. c
  4. e

8 Clues: gynccefc

Cybersecurity Awareness (Refresher) 2022-08-08

Cybersecurity Awareness (Refresher) crossword puzzle
Across
  1. Malicious software that is inserted into a system with the intention of compromising victim's data
  2. It is commonly given by banks for use at ATMs
  3. It is an internet scam that targets unsuspecting users via email
  4. Lock your __ when not in use
  5. Cybersecurity is our shared __
  6. Creating a strong __ is the top priority in keeping your online world safe
  7. you should not post private and confidential __ such as credit card number or CVC code
  8. This the best action to take if you receive a suspicious email
  9. It refers to a copy of an e-record, kept to protect information loss
Down
  1. It is a software program to protect computer from internet viruses
  2. Unwanted advertising in email addresses
  3. An unauthorized person who maliciously disrupt or damage a computer
  4. It is a type of malware designed to block access to a computer system until monies are paid
  5. __ engineering refers to the method attackers use to manipulate people into sharing sensitive information
  6. Not to be clicked in emails from unknown sources
  7. A malicious program that spreads by inserting copies of itself into other programs
  8. Hardware or software mechanism to prevent unauthorized users from accessing a computer network

17 Clues: Lock your __ when not in useCybersecurity is our shared __Unwanted advertising in email addressesIt is commonly given by banks for use at ATMsNot to be clicked in emails from unknown sourcesThis the best action to take if you receive a suspicious emailIt is an internet scam that targets unsuspecting users via email...

Cybersecurity Awareness Crossword 2024-10-17

Cybersecurity Awareness Crossword crossword puzzle
Across
  1. A piece of data about your online history that creates a trail of crumbs
  2. A file or program that appears legitimate but is actually malicious
  3. Manipulating individuals to divulge confidential information
  4. An authentication method of verifying a user’s identity using two or more different methods
  5. A network security system that monitors and controls incoming and outgoing network traffic
  6. Software that secretly monitors and collects information from a computer
  7. A method of securing data by converting it into a code
  8. When bad actors create a fake identity to send phishing emails
Down
  1. A decoy system set up to attract and analyze cyber attackers
  2. Protects your computer from viruses
  3. Unauthorized access by following someone into a secure area
  4. A type of malware that demands payment to restore access to data
  5. A software update that fixes security vulnerabilities
  6. A secret word or phrase used to access a computer system
  7. Unauthorized access to data in a system
  8. A method of securing data by converting it into a code
  9. Software designed to harm or exploit any programmable device
  10. A scam where a person is tricked into giving personal information

18 Clues: Protects your computer from virusesUnauthorized access to data in a systemA software update that fixes security vulnerabilitiesA method of securing data by converting it into a codeA method of securing data by converting it into a codeA secret word or phrase used to access a computer systemUnauthorized access by following someone into a secure area...

Mrs. Dewey - CSIT - Operating System and Configuration 2021-10-08

Mrs. Dewey - CSIT - Operating System and Configuration crossword puzzle
Across
  1. released 2012
  2. how to get OS on device
  3. copy of data stored elsewhere
  4. founded by Bill Gates and Paul Allen
  5. released 2009
  6. to customize and configure the OS
Down
  1. basic input output system
  2. released 2015
  3. protects devices & data from harm(2words)
  4. stores, retrieves, and processes data
  5. a logical division of a hard disk
  6. best teacher
  7. loaded on a device(answer is abbreviated)
  8. network connecting computers globally

14 Clues: best teacherreleased 2012released 2015released 2009how to get OS on devicebasic input output systemcopy of data stored elsewherea logical division of a hard diskto customize and configure the OSfounded by Bill Gates and Paul Allenstores, retrieves, and processes datanetwork connecting computers globallyprotects devices & data from harm(2words)...

DC9111 2024-08-09

DC9111 crossword puzzle
Across
  1. A framework used to manage and mitigate cybersecurity risks.
  2. A cybersecurity tool used to monitor, detect, and respond to threats.
  3. - The process of converting data into a code to prevent unauthorized access.
  4. The practice of finding and fixing security flaws.
  5. A common online attack method involving fraudulent emails.
  6. A network security device that monitors and filters incoming and outgoing traffic.
  7. An open-source intelligence gathering technique.
  8. A term for ethically hacking a system.
  9. An organized event where hackers test their skills.
  10. The art of disguising communication within another medium.
  11. A type of malware that demands payment for the return of stolen data.
  12. The practice of attacking a system to test its security.
  13. A person who finds and reports security vulnerabilities for rewards.
  14. A malicious program that spreads across systems and networks.
  15. A type of attack where multiple systems flood a target with traffic.
Down
  1. The exploitation of software vulnerabilities by malicious hackers.
  2. The unauthorized access of data in transit.
  3. A cryptographic key used in public key cryptography.
  4. A protocol used for secure internet communication.
  5. The process of analyzing network traffic for malicious activity.
  6. An organization that sets standards for securing information systems.
  7. A type of attack that overwhelms a system with traffic.
  8. A hidden malicious software that provides backdoor access.
  9. A form of social engineering to manipulate users into giving up confidential information.
  10. A global, decentralized group known for hacktivism.
  11. A popular TV series about a hacker with dissociative identity disorder.

26 Clues: A term for ethically hacking a system.The unauthorized access of data in transit.An open-source intelligence gathering technique.The practice of finding and fixing security flaws.A protocol used for secure internet communication.An organized event where hackers test their skills.A global, decentralized group known for hacktivism....

Dm literacy 2021-11-03

Dm literacy crossword puzzle
Across
  1. a blue bird
  2. A social media used for old people
  3. post pictures
Down
  1. online security
  2. Videos
  3. bitmoji
  4. 3-180 second clips
  5. ai that pushes out content

8 Clues: Videosbitmojia blue birdpost picturesonline security3-180 second clipsai that pushes out contentA social media used for old people

Productive Techs Crossword Puzzle 2023-10-10

Productive Techs Crossword Puzzle crossword puzzle
Across
  1. How you can help me grow my business
  2. We offer dependable ______ against digital threats
  3. My retail experience in tech
  4. One-on-one tech advise session
  5. State born and raised
  6. My name
  7. My profession
Down
  1. Ongoing commitment for specialized services
  2. Continuous measure of system health under our watch
  3. My primary remote management tool
  4. My business
  5. New service package subscription
  6. Regular checkups for optimal performance

13 Clues: My nameMy businessMy professionState born and raisedMy retail experience in techOne-on-one tech advise sessionNew service package subscriptionMy primary remote management toolHow you can help me grow my businessRegular checkups for optimal performanceOngoing commitment for specialized servicesWe offer dependable ______ against digital threats...

GenCyber Cybersecurity Concepts 2022-06-08

GenCyber Cybersecurity Concepts crossword puzzle
Across
  1. n
  2. g
  3. c
Down
  1. c
  2. y
  3. e
  4. c
  5. f

8 Clues: cngyeccf

nlg 2023-10-17

nlg crossword puzzle
Across
  1. a
  2. b
  3. c
Down
  1. f
  2. e
  3. d

6 Clues: feadbc

Cybersecurity Legislations Crossword 2023-12-13

Cybersecurity Legislations Crossword crossword puzzle
Across
  1. Legal framework that requires organisations to protect sensitive data
  2. This act empowers law enforcement agencies to investigate and combat cybercrime in the UK
  3. This act focuses on protecting critical national infrastructure from cyber threats
  4. The UK's primary legislation for the protection of personal data
Down
  1. This law ensures the security of electronic communications services in the UK
  2. Law that requires public sector organisations to follow specific cybersecurity standards (blankblank scheme)
  3. An organisation responsible for overseeing the implementation of cybersecurity strategies and policies in the UK
  4. Legislation that governs the interception and monitoring of communications in the UK

8 Clues: The UK's primary legislation for the protection of personal dataLegal framework that requires organisations to protect sensitive dataThis law ensures the security of electronic communications services in the UKThis act focuses on protecting critical national infrastructure from cyber threats...

GenCyber Cybersecurity Concepts 2022-06-08

GenCyber Cybersecurity Concepts crossword puzzle
Across
  1. c
  2. y
  3. g
  4. n
  5. e
Down
  1. f
  2. c
  3. c

8 Clues: fccycgne

Computer Science 2024-03-19

Computer Science crossword puzzle
Across
  1. Best department of the Interdep
  2. Name of the robot dog
  3. Associative role which is most found in the department
  4. Something you don't like to see while coding
  5. Head of the computer science department
  6. (Only) Friend
Down
  1. Favorite snake
  2. It's the dep info ....
  3. Programming web language
  4. Something unknown
  5. Field of 3A in the department
  6. the other field of 3A in the department
  7. Commonly used software to code
  8. Favorite dish
  9. Number of times the department won the Interdep
  10. Death project

16 Clues: Favorite dishDeath project(Only) FriendFavorite snakeSomething unknownName of the robot dogIt's the dep info ....Programming web languageField of 3A in the departmentCommonly used software to codeBest department of the Interdepthe other field of 3A in the departmentHead of the computer science departmentSomething you don't like to see while coding...

Emerging Cyber Threats and Attack Vectors Puzzle 2024-11-13

Emerging Cyber Threats and Attack Vectors Puzzle crossword puzzle
Across
  1. Cyberattack method involving reused login credentials
  2. Field focused on protecting digital information from unauthorized access
  3. A type of cyberattack where attackers demand payment to restore access
Down
  1. A breach involving an entertainment company that revealed weaknesses in cybersecurity
  2. A technique that makes it hard for attackers to distinguish between real and decoy assets
  3. A famous malware that targeted industrial control systems, raising concerns over cyber warfare
  4. Name of the ransomware known for using traditional tradecraft in its attacks

7 Clues: Cyberattack method involving reused login credentialsA type of cyberattack where attackers demand payment to restore accessField focused on protecting digital information from unauthorized accessName of the ransomware known for using traditional tradecraft in its attacks...

PhD crossword 2023-02-25

PhD crossword crossword puzzle
Across
  1. Antica istituzione alcolica del venerdì
  2. Il cognome del direttore d'istituto più odiato
  3. È severamente vietato prenderlo a Fai della Paganella
  4. Ci vanno coloro che vengono licenziati
  5. Osservare per essere ...
  6. Strumenti a percussione usati durante i rituali post mensa
  7. Si usa fare alla Winter School
  8. Nome dello startupper più influente degli ultimi anni
  9. Delle API... Ne fece una passione
  10. Nome del trofeo assegnato a chi si aggiudica il Valico dei 3 Faggi
  11. l'ambrosia della mensa
  12. L'autore di celebri racconti erotici
  13. Seconda solo dopo la riduzione della CO2
  14. Progetto inculata (solo per te)
  15. Tutti quanti vogliamo essere come lui
  16. Consiglio Nazionale delle Ricerche
  17. Soprannome dello storico direttore dell'IIT
  18. Gioco virale inventato per passare il tempo a mensa
  19. Il Quentin non Tarantino
  20. Città famosa per i suoi tortini stopposi
Down
  1. Scrisse "general_used_RAM_gt_75%"
  2. Incredibile, straordinario, ...
  3. Famosa località turistica romagnola
  4. Si mangia a colazione
  5. Località di mare conosciuta per lo Smart working
  6. Detto tipico viareggino
  7. Parola che non sa pronunciare Martinelli
  8. L'osservatorio di Cybersecurity
  9. L'ideatore del servizio "Access Policy"
  10. Il Gengis Khan dell'IIT
  11. superstar del bar
  12. Sulla bandiera sarda così come al CNR
  13. Il sosia di Ruggero dei Timidi
  14. Nomignolo affibbiato da Fabio per le persone di basso rango
  15. Nome della signora che fa le tagliatelle più buone della romagna
  16. Common Vulnerability and Exposure
  17. Storico avversario del Rosetti

37 Clues: superstar del barSi mangia a colazionel'ambrosia della mensaDetto tipico viaregginoIl Gengis Khan dell'IITOsservare per essere ...Il Quentin non TarantinoSi usa fare alla Winter SchoolIl sosia di Ruggero dei TimidiStorico avversario del RosettiIncredibile, straordinario, ...L'osservatorio di CybersecurityProgetto inculata (solo per te)...

Love Letters 2024-05-07

Love Letters crossword puzzle
Across
  1. First movie we "watched"
  2. Name a woman
  3. These stay in the backseat
  4. Tucker's dry food brand
  5. I DON'T HAVE ONE!
  6. My favorite food
Down
  1. My favorite fidget toy puzzle
  2. Character's name I make in every game
  3. Pokemon Bridget painted
  4. Lesbian label you taught me
  5. Certification I'm working on
  6. Dish I make for you
  7. Text on shirt you offered to fix
  8. First Birthday gift I gave you
  9. My hometown (not New Orleans)

15 Clues: Name a womanMy favorite foodI DON'T HAVE ONE!Dish I make for youPokemon Bridget paintedTucker's dry food brandFirst movie we "watched"These stay in the backseatLesbian label you taught meCertification I'm working onMy favorite fidget toy puzzleMy hometown (not New Orleans)First Birthday gift I gave youText on shirt you offered to fix...

Cyber Security Crossword 2021-09-26

Cyber Security Crossword crossword puzzle
Across
  1. Malicious computer program (not to be confused with Corona)
  2. A defensive technology designed to keep the bad guys out. They can be hardware or software-based.
  3. A type of malicious software that locks your files until you pay up
  4. Unwanted but not malicious emails
  5. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  6. Short name for MALicious softWARE
  7. Sending a fake email to try and personal or sensitive information
Down
  1. The creators of our anime cybersecurity traing videos
  2. A type of malware that functions by spying on user activity without their knowledge
  3. Secret word or phrase used to gain access to a system (the longer the better)
  4. The name of the cybersecurity drama series (no space)
  5. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network or if you were to send customer details to the wrong person.

12 Clues: Unwanted but not malicious emailsShort name for MALicious softWAREThe creators of our anime cybersecurity traing videosThe name of the cybersecurity drama series (no space)Malicious computer program (not to be confused with Corona)Sending a fake email to try and personal or sensitive information...

Technology 2024-07-18

Technology crossword puzzle
Across
  1. Protection against online threats
  2. Remote storage accessed via the internet
  3. Simulation of human intelligence
  4. Unm
  5. Secure digital ledger technology
  6. Electronic device for processing data
Down
  1. Programs that run on computers
  2. Simulation of a physical environment
  3. Device that directs network traffic
  4. Global network of connected devices
  5. Software application for mobile devices

11 Clues: UnmPrograms that run on computersSimulation of human intelligenceSecure digital ledger technologyProtection against online threatsDevice that directs network trafficGlobal network of connected devicesSimulation of a physical environmentElectronic device for processing dataSoftware application for mobile devices...

Emerging Web Technologies 2022-07-02

Emerging Web Technologies crossword puzzle
Across
  1. Pencipta HTML
  2. Sekuriti
  3. V______ Reality
  4. A_______ Reality
Down
  1. _______ Web Design
  2. Salah satu senarai teknologi web baru muncul
  3. Maksud Muncul

7 Clues: SekuritiPencipta HTMLMaksud MunculV______ RealityA_______ Reality_______ Web DesignSalah satu senarai teknologi web baru muncul

Technology Buzzwords 2023-09-05

Technology Buzzwords crossword puzzle
Across
  1. - Leading internet search engine.
  2. - Online buying and selling.
  3. - High-tech mobile device.
  4. - Digital audio or video series.
  5. - Rapidly spreading on the internet.
  6. - Wireless internet connection.
Down
  1. - Online journal or web log.
  2. - Protection against online threats.
  3. - Online seminar or workshop.
  4. - Digital symbols conveying emotions.

10 Clues: - High-tech mobile device.- Online journal or web log.- Online buying and selling.- Online seminar or workshop.- Wireless internet connection.- Digital audio or video series.- Leading internet search engine.- Protection against online threats.- Rapidly spreading on the internet.- Digital symbols conveying emotions.

My Dream Job: Computer Programer 2023-05-03

My Dream Job: Computer Programer crossword puzzle
Across
  1. keeping information found online safe
  2. internet servers
  3. problem-solving operation
  4. testing for problems
  5. building a computer program
  6. the components that form a computer
Down
  1. acronym for hyper text markup language
  2. designing and building
  3. the storage and organization of data
  4. minimum level of education required

10 Clues: internet serverstesting for problemsdesigning and buildingproblem-solving operationbuilding a computer programminimum level of education requiredthe components that form a computerthe storage and organization of datakeeping information found online safeacronym for hyper text markup language

Cyber Hackers & Cybersecurity 2023-06-01

Cyber Hackers & Cybersecurity crossword puzzle
Across
  1. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  2. An incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner
  3. A form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable
  4. Type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
  5. Software designed to detect and destroy computer viruses
  6. Interconnected computing devices that can exchange data and share resources with each other
  7. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
  1. The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  2. The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers
  3. It involves using computers, the internet, and other digital technologies to attack or defend against computer systems, networks, and infrastructure attacks
  4. Creation of a false identity by a cybercriminal with the intention of defrauding a victim
  5. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  6. Software that automatically displays or downloads advertising material (often unwanted) when a user is online
  7. Group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses
  8. Baiting a trap for hackers
  9. The process of exploiting the flaws of a locked-down electronic device to install software other than what the manufacturer has made available for that device. Jailbreaking allows the device owner to gain full access to th

16 Clues: Baiting a trap for hackersSoftware designed to detect and destroy computer virusesCreation of a false identity by a cybercriminal with the intention of defrauding a victimInterconnected computing devices that can exchange data and share resources with each other...

Cybersecurity revision crossword 2022-01-31

Cybersecurity revision crossword crossword puzzle
Across
  1. Checks incoming and outgoing network traffic for threats
  2. Hackers with no technical hacking knowledge
  3. Mathematically converts data into a form that is unreadable without a key
  4. Updating software to remove vulnerabilities automatically
  5. Type of testing that tests a network for vulnerabilities
  6. Directly observing someone enter personal details eg Pin, password
  7. Looking at common attacks and methods to protect ourselves and our networks against attacks
Down
  1. Inventing a scenario to obtaining personal information
  2. Verifying the identity of a user or process
  3. Raw facts and figures
  4. Created from the user fingerprint, iris, retina, facial, voice
  5. gaining unauthorised access to or control of a computer system
  6. Adverts for products a user may be interested in, based on internet history
  7. Distributed Denial of Service
  8. Data that has been processed and has context
  9. Completely Automated Public Turing Test To Tell Computers and Humans Apart

16 Clues: Raw facts and figuresDistributed Denial of ServiceVerifying the identity of a user or processHackers with no technical hacking knowledgeData that has been processed and has contextInventing a scenario to obtaining personal informationChecks incoming and outgoing network traffic for threatsType of testing that tests a network for vulnerabilities...

Saint Mary 2022-07-07

Saint Mary crossword puzzle
Across
  1. Saint Mary Mascot
  2. We own a copy of this Amendment
  3. These are underground so we stay warm and dry
  4. One of four Saint Mary Values
  5. Colors are Navy and ____
Down
  1. Newest Major
  2. Residence Hall
  3. Saint ______ Dining Hall where we eat lunch
  4. ______ Memorial Stadium
  5. We eat at Oak Kiln
  6. _______ of Charity
  7. President whose lock of hair is in the KLC

12 Clues: Newest MajorResidence HallSaint Mary MascotWe eat at Oak Kiln_______ of Charity______ Memorial StadiumColors are Navy and ____One of four Saint Mary ValuesWe own a copy of this AmendmentPresident whose lock of hair is in the KLCSaint ______ Dining Hall where we eat lunchThese are underground so we stay warm and dry

CBL Puzzle 2023-09-01

CBL Puzzle crossword puzzle
Across
  1. Rhymes with fishing
  2. Something you are (Inherence factor)
  3. Roofies mixed in software
  4. Divide and conquer. Tool to reduce scope
  5. Your cybersecurity partner
  6. Malicious code on a horse
Down
  1. Vaccine for your systems
  2. 12 characters long in PCI DSS v4.0
  3. Burning walls in cold rooms
  4. Party host
  5. Secure data with a pinch of salt
  6. Data secured. Locked with a key

12 Clues: Party hostRhymes with fishingVaccine for your systemsRoofies mixed in softwareMalicious code on a horseYour cybersecurity partnerBurning walls in cold roomsData secured. Locked with a keySecure data with a pinch of salt12 characters long in PCI DSS v4.0Something you are (Inherence factor)Divide and conquer. Tool to reduce scope

Emerging Web Technologies 2022-07-02

Emerging Web Technologies crossword puzzle
Across
  1. Pencipta HTML
  2. Sekuriti
  3. V______ Reality
  4. A_______ Reality
Down
  1. _______ Web Design
  2. Salah satu senarai teknologi web baru muncul
  3. Maksud Muncul

7 Clues: SekuritiPencipta HTMLMaksud MunculV______ RealityA_______ Reality_______ Web DesignSalah satu senarai teknologi web baru muncul

IEM's October Social Media Crossword Puzzle 2021-10-21

IEM's October Social Media Crossword Puzzle crossword puzzle
Across
  1. Wash your hands with _____ and water
  2. October is ________ Awareness Month
  3. IEMer moderating Techniques for Successful Grant Applications session at IAEM (last name)
  4. Important tool to protect your family during a fire emergency
  5. Theme of hurricane preparedness tip
  6. IEMer moderating FEAM Forum Panel at IAEM (last name)
  7. Sites opening across Virginia
  8. International Day for Disaster ______
Down
  1. Great Shake Out Drill
  2. Cyber attack
  3. FEMA Administrator (last name)
  4. 246th Birthday
  5. Committed to stabilizing ______ security
  6. NEMA 2021 Annual Forum
  7. ______ Week
  8. Annual Conference in Grand Rapids, MI
  9. Conferences are an opportunity to…

17 Clues: ______ WeekCyber attack246th BirthdayGreat Shake Out DrillNEMA 2021 Annual ForumSites opening across VirginiaFEMA Administrator (last name)Conferences are an opportunity to…October is ________ Awareness MonthTheme of hurricane preparedness tipWash your hands with _____ and waterAnnual Conference in Grand Rapids, MI...

Pentagon leaks 2023-04-19

Pentagon leaks crossword puzzle
Across
  1. A form of rupture, usually used in context of a laboratory or prison
  2. running out of..
  3. five sided shape
  4. a man who guards
  5. currently in war
  6. which concerns the nation
Down
  1. you’re being explained something
  2. Technology safety
  3. the opposite of attack
  4. what happens when a pipe is damaged
  5. unidentified floating...
  6. currently in war

12 Clues: running out of..five sided shapea man who guardscurrently in warcurrently in warTechnology safetythe opposite of attackunidentified floating...which concerns the nationyou’re being explained somethingwhat happens when a pipe is damagedA form of rupture, usually used in context of a laboratory or prison

CYBERSECURITY CROSSWORD CHALLENGE 2024-10-20

CYBERSECURITY CROSSWORD CHALLENGE crossword puzzle
Across
  1. If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
  2. Encryption technique used to protect data
  3. A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
  4. Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
  5. A sequence of words or text used to control access to a computer; similar to a password.
  6. System(software or hardware) used to manage network security and monitor traffic
  7. Malicious program that can replicate itself
  8. An attack using computer program to guess the correct user credentials
  9. This testing simulates a full stack attack, probing every possible weakness
Down
  1. Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
  2. Protocol used for encryption which protects data in transit
  3. Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
  4. The act of tricking someone into giving up sensitive information
  5. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  6. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  7. A piece of data stored on your device by websites you visit. Not chocolate chip, though

16 Clues: Encryption technique used to protect dataMalicious program that can replicate itselfProtocol used for encryption which protects data in transitThe act of tricking someone into giving up sensitive informationAn attack using computer program to guess the correct user credentials...

NAVFAC Capabilities 2023-02-13

NAVFAC Capabilities crossword puzzle
Across
  1. _____ Handling Ashore Procurement
  2. NEPA Requirement: Environmental ______
  3. _______ and Facilities Operations
  4. Real Estate _______ and Management
  5. _______ Facilities and Equipment Engineering
Down
  1. Military Construction acronym
  2. Basic physical and organizational structures and facilities
  3. Protection against unauthorized data usage
  4. _______Vehicles providing transportation services
  5. _______ Conservation: Health assessment of natural and cultural resources

10 Clues: Military Construction acronym_____ Handling Ashore Procurement_______ and Facilities OperationsReal Estate _______ and ManagementNEPA Requirement: Environmental ______Protection against unauthorized data usage_______ Facilities and Equipment Engineering_______Vehicles providing transportation services...

Cybersecurity Awareness Month Crossword Challenge 2023-09-25

Cybersecurity Awareness Month Crossword Challenge crossword puzzle
Across
  1. When malicious actors send an email-based attack to trick the recipient into taking an action.
  2. The term for an email-based attack that involves the use of a QR code
  3. Instead of a simple password, it is recommended that you use a _______ for your log-in credentials.
  4. The month associated with Cybersecurity Awareness.
  5. The Be:_____ Viva Engage (Yammer) community keeps Goodyear associates up to date on cyber news.
Down
  1. A disgruntled or financially motivated employee is called a(n) ______ threat.
  2. The color of the banner that indicates a company email is from an external source.
  3. The acronym for the tool used to verify your identity for access. (Something you know. Something you have. Something you are)
  4. The title of the Goodyear 2023 cybersecurity awareness training is "Data _____ Basics."
  5. The action every associate must take when a suspicious email message is identified.

10 Clues: The month associated with Cybersecurity Awareness.The term for an email-based attack that involves the use of a QR codeA disgruntled or financially motivated employee is called a(n) ______ threat.The color of the banner that indicates a company email is from an external source....

CYBERSECURITY CROSSWORD CHALLENGE 2024-10-20

CYBERSECURITY CROSSWORD CHALLENGE crossword puzzle
Across
  1. An attack using computer program to guess the correct user credentials
  2. If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
  3. Protocol used for encryption which protects data in transit
  4. A piece of data stored on your device by websites you visit. Not chocolate chip, though
  5. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  6. Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
  7. Encryption technique used to protect data
  8. A sequence of words or text used to control access to a computer; similar to a password.
  9. A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
Down
  1. The act of tricking someone into giving up sensitive information
  2. System(software or hardware) used to manage network security and monitor traffic
  3. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  4. Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
  5. Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
  6. This testing simulates a full stack attack, probing every possible weakness
  7. Malicious program that can replicate itself

16 Clues: Encryption technique used to protect dataMalicious program that can replicate itselfProtocol used for encryption which protects data in transitThe act of tricking someone into giving up sensitive informationAn attack using computer program to guess the correct user credentials...

CYBERSECURITY CROSSWORD CHALLENGE 2024-10-20

CYBERSECURITY CROSSWORD CHALLENGE crossword puzzle
Across
  1. If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
  2. Encryption technique used to protect data
  3. A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
  4. Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
  5. A sequence of words or text used to control access to a computer; similar to a password.
  6. System(software or hardware) used to manage network security and monitor traffic
  7. Malicious program that can replicate itself
  8. An attack using computer program to guess the correct user credentials
  9. This testing simulates a full stack attack, probing every possible weakness
Down
  1. Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
  2. Protocol used for encryption which protects data in transit
  3. Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
  4. The act of tricking someone into giving up sensitive information
  5. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  6. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  7. A piece of data stored on your device by websites you visit. Not chocolate chip, though

16 Clues: Encryption technique used to protect dataMalicious program that can replicate itselfProtocol used for encryption which protects data in transitThe act of tricking someone into giving up sensitive informationAn attack using computer program to guess the correct user credentials...

Girl Scouts Cybersecurity 2022-03-13

Girl Scouts Cybersecurity crossword puzzle
Across
  1. The official procedure or system of rules
  2. A virus that covertly monitors your online behavior without your knowledge or permission
  3. A program that seems to be a helpful but actually is a virus
  4. A string of characters that allows access to a computer system or service
  5. Program instructions or a secret message
  6. A group or system of interconnected people or things
  7. A Software designed to detect and destroy computer viruses
  8. a piece of code which is capable corrupting a system or destroying data
Down
  1. A person who uses computers to gain unauthorized access to data
  2. an identification used by a person with access to a computer, network, or online service
  3. Software that displays unwanted pop-up adverts
  4. copy data from one computer system to another, typically over the internet
  5. A virus that employs encryption to hold a victim's information at ransom
  6. A piece of code that's main goal is to self-replicate and infect other computers while remaining active on infected systems
  7. A secret or disguised way of writing
  8. Digital junk mail

16 Clues: Digital junk mailA secret or disguised way of writingProgram instructions or a secret messageThe official procedure or system of rulesSoftware that displays unwanted pop-up advertsA group or system of interconnected people or thingsA Software designed to detect and destroy computer virusesA program that seems to be a helpful but actually is a virus...

Cybersecurity Crossword 2021-02-12

Cybersecurity Crossword crossword puzzle
Across
  1. a worm, virus, or trojan that infects a computer and causes it to download or display malicious pop-ups
  2. unwanted software that monitors and gathers information on a person
  3. an attack where a victim gets an email disguised to look legit, in order to trick them into giving up valuable data
  4. malicious software
  5. a secret sequence of letters, numbers and characters to help verify someone.
Down
  1. a virus which tricks you into being downloaded
  2. information that relates to an identified or identifiable individual
  3. a type of worm, virus or trojan that demands money
  4. a malicious form of self-replicating software
  5. exploit vulnerabilities in a computer's operating system or a networks hardware

10 Clues: malicious softwarea malicious form of self-replicating softwarea virus which tricks you into being downloadeda type of worm, virus or trojan that demands moneyunwanted software that monitors and gathers information on a personinformation that relates to an identified or identifiable individual...

Cybersecurity Crossword 2024-10-15

Cybersecurity Crossword crossword puzzle
Across
  1. Security mechanism that involves multiple authentication methods (3 letters)
  2. The process of encoding data to keep it secure(10 letters)
  3. A Weakness in a system that can be exploited (13 letters)
  4. Process of finding and fixing errors in code (9 letters)
  5. An attack where a hacker tricks someone into revealing confidential information(8 letters)
Down
  1. Security incident where sensitive data is exposed to unauthorized parties (8 letters)
  2. A hidden or disguised computer virus(6 letters)
  3. A protection layer to prevent unauthorized access to a network(8 letters)
  4. Authentication factor using your fingerprint or face (10 letters)
  5. Online platform for hosting and reviewing code (6 letters)

10 Clues: A hidden or disguised computer virus(6 letters)Process of finding and fixing errors in code (9 letters)A Weakness in a system that can be exploited (13 letters)The process of encoding data to keep it secure(10 letters)Online platform for hosting and reviewing code (6 letters)Authentication factor using your fingerprint or face (10 letters)...

CBL Puzzle 2023-09-01

CBL Puzzle crossword puzzle
Across
  1. Divide and conquer. Tool to reduce the scope
  2. Roofies mixed in software
  3. Party host
  4. Secure data with a pinch of salt
  5. Chained blocks. Runs crypto
  6. 12 characters long in PCI DSS v4.0
Down
  1. Something you are (Inherence factor)
  2. Rhymes with fishing
  3. Your cybersecurity partner
  4. Vaccine for your Ssystems
  5. Burning wall in cold rooms
  6. Data secured. Locked with a key
  7. Malicious code on a horse

13 Clues: Party hostRhymes with fishingVaccine for your SsystemsRoofies mixed in softwareMalicious code on a horseYour cybersecurity partnerBurning wall in cold roomsChained blocks. Runs cryptoData secured. Locked with a keySecure data with a pinch of salt12 characters long in PCI DSS v4.0Something you are (Inherence factor)...

DAMPAK SOSIAL INFORMATIKA 2023-11-08

DAMPAK SOSIAL INFORMATIKA crossword puzzle
Across
  1. salah satu fitur keamanan windows10
  2. Dampak sosial informatika
  3. angka sandi rahasia antara pengguna dan sistem
  4. perangkat lunakk yang menempel pada perangkat lain
  5. salah satu fitur windows security
  6. keamanan data di internet
  7. Data dapat berupa
  8. perkakas peretasan
Down
  1. pengkodean data sebelum dikirim
  2. contoh otentifikasi biomtrik
  3. pishing biasanya melakukan kejahatannya melalaui
  4. contoh sistem operasi
  5. contoh Perkakas melindungi data atau informasi
  6. sistem operasi seluler
  7. program komputer yang mampu menyalin dirinya sendiri kekomputer lain
  8. Data atau keterangan yang benar (fakta)
  9. perdagangan elektronik
  10. individu yang membool, melepaskan virus, membobol komputer untuk mrncuri informasi
  11. kesalahan dalam aplikasi atau program
  12. world wide web

20 Clues: world wide webData dapat berupaperkakas peretasancontoh sistem operasisistem operasi selulerperdagangan elektronikDampak sosial informatikakeamanan data di internetcontoh otentifikasi biomtrikpengkodean data sebelum dikirimsalah satu fitur windows securitysalah satu fitur keamanan windows10kesalahan dalam aplikasi atau program...

Cyber Safety 2024-08-06

Cyber Safety crossword puzzle
Across
  1. - Bullying online
  2. - Being safe online
  3. - Putting agressive presure on someone
  4. - Stands up against bullies
Down
  1. - Protecting systems
  2. - Supporting bullies
  3. - Sites that are accessed using a web browser
  4. - Connected computers share resources

8 Clues: - Bullying online- Being safe online- Protecting systems- Supporting bullies- Stands up against bullies- Connected computers share resources- Putting agressive presure on someone- Sites that are accessed using a web browser

Cybersecurity Crossword 2023-05-24

Cybersecurity Crossword crossword puzzle
Across
  1. Practice of protecting information by converting it into a secret code
  2. Act of bombarding someone with a large number of negative comments
  3. Act of deliberately using digital communication to harass or intimidate someone
  4. Software designed to protect against malicious software
Down
  1. Term for sexually explicit material available on the internet
  2. Act of sending deceptive emails to trick individuals
  3. Act of creating fake online profiles to deceive and harass others
  4. Process of gaining unauthorized access to computer systems
  5. A secret word or phrase that must be used to gain admission
  6. Every aspect of protecting an organization and its employees and assets against cyber threats

10 Clues: Act of sending deceptive emails to trick individualsSoftware designed to protect against malicious softwareProcess of gaining unauthorized access to computer systemsA secret word or phrase that must be used to gain admissionTerm for sexually explicit material available on the internetAct of creating fake online profiles to deceive and harass others...

Cybersecurity Applications 2023-12-12

Cybersecurity Applications crossword puzzle
Across
  1. An attacker might attempt to trick someone through manipulation or deception.
  2. to prevent vulnerabilities and injection attacks.
  3. determines what actions they are allowed to perform
  4. The process of verifying the identity of a user or device
Down
  1. Systems can detect and respond to potential security threats
  2. An attacker might flood the RFID reader with requests, preventing legitimate users from gaining access.
  3. to regulate who can access what resources
  4. to keep software and firmware updated to protect against known vulnerabilities
  5. It is important to secure data
  6. You must secure the actual, tangible devices.

10 Clues: It is important to secure datato regulate who can access what resourcesYou must secure the actual, tangible devices.to prevent vulnerabilities and injection attacks.determines what actions they are allowed to performThe process of verifying the identity of a user or deviceSystems can detect and respond to potential security threats...

Crossword cybersecurity 2024-04-17

Crossword cybersecurity crossword puzzle
Across
  1. resolv a fault
  2. fault what developer don't know
  3. attack on link of fish
  4. attack try multiple combination
Down
  1. virus look all you make on your pc
  2. most pc attack server
  3. program hide your IP
  4. program infect you
  5. person hack you
  6. protect to virus

10 Clues: resolv a faultperson hack youprotect to virusprogram infect youprogram hide your IPmost pc attack serverattack on link of fishfault what developer don't knowattack try multiple combinationvirus look all you make on your pc

OT cybersecurity 2024-07-16

OT cybersecurity crossword puzzle
Across
  1. A system that monitors and controls industrial processes
  2. An unauthorized act of bypassing security mechanisms
  3. A secret word or phrase used to authenticate access
  4. A security flaw that can be exploited
  5. Protection of sensitive information from unauthorized access
Down
  1. A unique identifier for a network device
  2. The practice of securing computer systems and networks
  3. An act of gaining unauthorized access to systems and networks
  4. A device used to control the flow of electricity in OT systems
  5. A network security system that monitors and controls incoming and outgoing network traffic

10 Clues: A security flaw that can be exploitedA unique identifier for a network deviceA secret word or phrase used to authenticate accessAn unauthorized act of bypassing security mechanismsThe practice of securing computer systems and networksA system that monitors and controls industrial processesProtection of sensitive information from unauthorized access...