cybersecurity Crossword Puzzles

CrowdStrike 2025-05-14

CrowdStrike crossword puzzle
Across
  1. Stock Symbol
  2. Our Team Manager
  3. CEO's First Name
  4. Jeong's Team
  5. Our Department
Down
  1. What Crowdstrike does
  2. Crowdstrike motto
  3. Ahmed's Team
  4. Agatha's Team
  5. Beau's Team
  6. Company Logo

11 Clues: Beau's TeamStock SymbolAhmed's TeamCompany LogoJeong's TeamAgatha's TeamOur DepartmentOur Team ManagerCEO's First NameCrowdstrike mottoWhat Crowdstrike does

Enterprise Risk Management Puzzle Activity 2025-01-02

Enterprise Risk Management Puzzle Activity crossword puzzle
Across
  1. The type of hazard that includes bacteria and viruses
  2. A risk that can be caused by inadequate policies
  3. A common cybersecurity threat that uses fake emails
  4. The act that aims to safeguard individuals in various settings
  5. The office that ensures transparent government procurement
  6. The kind of financial losses that can result from misuse of public funds
  7. A type of hazard that can cause musculoskeletal injuries
  8. The practice of protecting digital systems from attacks
  9. The division that reviews financial regulations in Jamaica
  10. The act that mandates corporate governance and accountability
Down
  1. Public sector program focused on workforce development
  2. A way to secure important documents
  3. A plan for maintaining operations during disruptions
  4. A type of data that must be handled with care
  5. The ministry that has implemented training and development programs
  6. Type of bond providing rapid financial support after a disaster
  7. A type of risk that can result in cessation of business activity
  8. A potential source of harm or adverse effects
  9. A risk that may be caused by natural disasters

19 Clues: A way to secure important documentsA type of data that must be handled with careA potential source of harm or adverse effectsA risk that may be caused by natural disastersA risk that can be caused by inadequate policiesA common cybersecurity threat that uses fake emailsA plan for maintaining operations during disruptions...

Cybersecurity Crossword Puzzle 2021-08-14

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Fake organisations will send SMSes that usually contain spelling or --- errors
  2. Although strictly not under cybersecurity, --- activities via digital devices are becoming common.
  3. Scams involve emotions such as fear and ---
  4. A good way is to use password --- apps
  5. Seniors should use uppercase and --- letters, numbers or symbols to make passwords harder to crack
  6. The third topic that we discussed is Handling ---
  7. Fear messages are meant to force the seniors into --- action without stopping to think
  8. DAs are encouraged to use real-life --- in sharing cybersecurity information with seniors
Down
  1. Share with seniors how to --- between legitimate and fake organisations
  2. Legitimate organisations will never ask for personal --- information such as passwords, bank account and OTPs
  3. A common scam these days : –-- jobs with high salaries
  4. Seniors can use 2 notebooks as a way to remember passwords and personal information but they must keep the 2 notebooks ---
  5. Seniors are encouraged to use a strong ---
  6. Use --- bells as imagery
  7. Seniors should be wary of providing --- information
  8. Not sure, --- back
  9. Online --- apps will most likely make seniors lose money
  10. Seniors should never click on unknown links or ---

18 Clues: Not sure, --- backUse --- bells as imageryA good way is to use password --- appsSeniors are encouraged to use a strong ---Scams involve emotions such as fear and ---The third topic that we discussed is Handling ---Seniors should never click on unknown links or ---Seniors should be wary of providing --- information...

Cybersecurity and Healthcare 2021-05-31

Cybersecurity and Healthcare crossword puzzle
Across
  1. Limiting the risks or impacts of a cyber threat.
  2. Generic term for computer viruses, trojans, etc. designed for malicious purposes.
  3. A type of cyberattack that holds your systems or information hostage until a ransom is paid.
  4. You should never share this.
  5. The policies and measures taken to ensure the authenticity, availability, and integrity of electronic information.
Down
  1. When should you report an IT breach or potential breach?
  2. A cyberattack attempting to discover your personal information.
  3. Federal law protecting patient privacy.
  4. The US Food and Drug Administration.
  5. Whose responsibility is cybersecurity?

10 Clues: You should never share this.The US Food and Drug Administration.Whose responsibility is cybersecurity?Federal law protecting patient privacy.Limiting the risks or impacts of a cyber threat.When should you report an IT breach or potential breach?A cyberattack attempting to discover your personal information....

book day 2023-05-17

book day crossword puzzle
Across
  1. asas pendawaian
  2. engineering ethics fourth edition
  3. networking basics 2 edition
  4. sistem bekalan elektrik dan pengagihan
  5. instrumentasi
  6. design for hackers
  7. perak good food guide
  8. key concepts in information & communication technology
  9. design for software
  10. embedded system
  11. cybersecurity
Down
  1. website optimization
  2. compliance
  3. koleksi menu orang bujang
  4. computer network security
  5. wireless communication principles & practise
  6. intelectuals creativity & intolerance
  7. teknologi biotenaga
  8. writing for impact
  9. android phones for dummies

20 Clues: complianceinstrumentasicybersecurityasas pendawaianembedded systemdesign for hackerswriting for impactteknologi biotenagadesign for softwarewebsite optimizationperak good food guidekoleksi menu orang bujangcomputer network securityandroid phones for dummiesnetworking basics 2 editionengineering ethics fourth edition...

FIND THE WORDS 2023-05-17

FIND THE WORDS crossword puzzle
Across
  1. Asas Pendawaian
  2. Engineering Ethics Fourth Edition
  3. Networking Basics 2 Edition
  4. Sistem Bekalan Elektrik&Pengagihan
  5. Instrumentasi
  6. Design for Hackers
  7. Perak Good Food Guide
  8. Key Concepts in Information&Communication Technology
  9. Design for Software
  10. Embedded System
  11. Cybersecurity
Down
  1. Website Optimization
  2. Compliance
  3. Koleksi Menu Orang Bujang
  4. Computer Network Security
  5. Wireless Communication Principles&Practise
  6. Intelectuals Creativity&Intolerance
  7. Teknologi Biotenaga
  8. Writing for Impact
  9. Android Phones for Dummies

20 Clues: ComplianceInstrumentasiCybersecurityAsas PendawaianEmbedded SystemDesign for HackersWriting for ImpactTeknologi BiotenagaDesign for SoftwareWebsite OptimizationPerak Good Food GuideKoleksi Menu Orang BujangComputer Network SecurityAndroid Phones for DummiesNetworking Basics 2 EditionEngineering Ethics Fourth Edition...

crossword 2024-10-21

crossword crossword puzzle
Across
  1. ICT-related field of study
  2. Cloud computing platform
  3. ICT-related job role
  4. Internet protocol
  5. ICT professional
  6. Computer virus type
  7. ICT acronym for "Information and Communication Technology" ()
  8. Computer input device
  9. Website design principle
  10. Digital image format
Down
  1. Network security threat
  2. Cybersecurity measure
  3. Database management system
  4. Programming language
  5. Mobile operating system
  6. Network topology
  7. Data transmission speed
  8. Computer hardware component
  9. Software development method
  10. Data storage unit

20 Clues: ICT professionalNetwork topologyInternet protocolData storage unitComputer virus typeICT-related job roleProgramming languageDigital image formatCybersecurity measureComputer input deviceNetwork security threatMobile operating systemData transmission speedCloud computing platformWebsite design principleICT-related field of study...

Technology 2025-06-26

Technology crossword puzzle
Across
  1. people connect online
  2. picture of your screen
  3. small useful device
  4. finds info online
  5. wireless internet point
  6. tech you wear
  7. stores and sends data
  8. virtual reality game
Down
  1. protects computers
  2. gives internet access
  3. tech with internet and apps
  4. small programs
  5. free software
  6. share and post online
  7. opens websites
  8. smart computer thinking

16 Clues: free softwaretech you wearsmall programsopens websitesfinds info onlineprotects computerssmall useful devicevirtual reality gamepeople connect onlinegives internet accessshare and post onlinestores and sends datapicture of your screenwireless internet pointsmart computer thinkingtech with internet and apps

Technology 2025-06-26

Technology crossword puzzle
Across
  1. picture of your screen
  2. tech with internet and apps
  3. smart computer thinking
  4. tech you wear
  5. share and post online
  6. protects computers
  7. opens websites
Down
  1. finds info online
  2. free software
  3. gives internet access
  4. wireless internet point
  5. small useful device
  6. virtual reality game
  7. stores and sends data
  8. small programs
  9. people connect online

16 Clues: free softwaretech you wearsmall programsopens websitesfinds info onlineprotects computerssmall useful devicevirtual reality gamegives internet accessstores and sends datapeople connect onlineshare and post onlinepicture of your screenwireless internet pointsmart computer thinkingtech with internet and apps

AATT Cybersecurity 2024-10-21

AATT Cybersecurity crossword puzzle
Across
  1. Using more than one criteria for authentication
  2. Internal communications network only accessibly by employees
  3. Word used to gain access
  4. The process of verifying the identity of a user, device, or system
  5. A type of malware that demands payment in exchange for restoring access to data
  6. A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
  7. Type of attack that tricks users into revealing sensitive info
Down
  1. Network device that filters incoming and outgoing network traffic based on defined rules
  2. Using social interactions to gain information from a target
  3. A type of software that is designed to damage or exploit a computer system
  4. Type of attack where the attacker impersonates persons or companies in order to gain information
  5. Type of malware that allows an attacker to remotely control a system or network
  6. Malware removal software
  7. Unwanted emails

14 Clues: Unwanted emailsWord used to gain accessMalware removal softwareUsing more than one criteria for authenticationUsing social interactions to gain information from a targetInternal communications network only accessibly by employeesType of attack that tricks users into revealing sensitive info...

Cybersecurity Threats 2025-08-27

Cybersecurity Threats crossword puzzle
Across
  1. programs or program code that replicate (copies themselves) with the intention of deleting or corrupting files, or causing a computer to malfunction.
  2. occurs when a cybercriminal sends out legitimate-looking emails to users. The emails may contain links or attachments that, when initiated, take the user to a fake website; or they may trick the user into responding with personal data
  3. a program which is often disguised as legitimate software but with malicious instructions embedded within it.
  4. is malicious code installed on a user’s computer or on an infected website. The code redirects the user’s browser to a fake website without the user’s knowledge
  5. the act of gaining illegal access to a computer system without the user’s permission.
  6. spam traffic originates from many different computers, which makes it hard to block the attack.
Down
  1. a malware which will attempt to flood an end-user with unwanted advertising.
  2. when a cybercriminal creates a social situation that can lead to a potential victim dropping their protection. It involves the manipulation of people into breaking their normal security procedures and not following best practice.
  3. is software that gathers information by monitoring a user’s activities carried out on their computer. The gathered information is sent back to the cybercriminal who originally sent this malware.
  4. a type of stand-alone malware that can self-replicate. Their intention is to spread to other computers and corrupt whole networks
  5. are programs that encrypt data on a user’s computer and ‘hold the data hostage’. The cybercriminal waits until the ransom money is paid and, sometimes, the decryption key is then sent to the user.
  6. an attack that attempts at preventing users from accessing part of a network, notably an internet server.
  7. form of stealing data by tapping into a wired or wireless communication link. The intent is to compromise privacy or to obtain confidential information.
  8. an attack to 'crack’ password by systematically trying all thedifferent combinations of letters, numbers and other symbols until eventuallythe password is found.

14 Clues: a malware which will attempt to flood an end-user with unwanted advertising.the act of gaining illegal access to a computer system without the user’s permission.spam traffic originates from many different computers, which makes it hard to block the attack....

cybersecurity Crossword 2025-08-26

cybersecurity Crossword crossword puzzle
Across
  1. Type of hacker who violates securities for personal gain
  2. Any information that can be acccessed through a combination of information
  3. Revealing of personal details online with intention of harassment, intimidation, or threats
  4. Special piece of software that stores data and can be easily acccessed
  5. Information stored digitally
  6. Field dedicated to the protection of individuals and corporations from the misuse of technology
Down
  1. Using the internet with intentions of with intention of harassment, intimidation, or threats
  2. System that connects multiple devices to enable communication and sharing internet, files, etc.
  3. A weakness or flaw in a digital system or software
  4. Type of hacker who uses their skills to test and assess the security of networks and systems
  5. Someone who wrongly uses a software or database than intended
  6. A term meaning that a system was acccessed by someone unauthorized
  7. Person in charge of maintaining a network
  8. Type of hacker who may violates laws without ill intent

14 Clues: Information stored digitallyPerson in charge of maintaining a networkA weakness or flaw in a digital system or softwareType of hacker who may violates laws without ill intentType of hacker who violates securities for personal gainSomeone who wrongly uses a software or database than intended...

Mobil tijorat (m-commerce) 2025-11-26

Mobil tijorat (m-commerce) crossword puzzle
Across
  1. Raqamli xavfsizlik sohasi
  2. Onlayn savdo faoliyati
  3. Raqamli ma’lumotlar jamlanmasi
  4. Hisoblash qoidalari majmui
  5. Yangi raqamli yechimlar yaratish
  6. Zanjirsimon ma’lumotlar bazasi
  7. Innovatsion biznes loyihasi
Down
  1. Raqamli xizmatlar ekotizimi
  2. Raqamli moliya texnologiyasi
  3. Jarayonlarni raqamga o‘tkazish
  4. Bulutli hisoblash tizimi
  5. Internet orqali ulangan qurilmalar
  6. Sun’iy intellekt tizimi
  7. Katta hajmdagi ma’lumotlar
  8. Raqamli aktiv birligi

15 Clues: Raqamli aktiv birligiOnlayn savdo faoliyatiSun’iy intellekt tizimiBulutli hisoblash tizimiRaqamli xavfsizlik sohasiHisoblash qoidalari majmuiKatta hajmdagi ma’lumotlarRaqamli xizmatlar ekotizimiInnovatsion biznes loyihasiRaqamli moliya texnologiyasiJarayonlarni raqamga o‘tkazishRaqamli ma’lumotlar jamlanmasiZanjirsimon ma’lumotlar bazasi...

Digital Partner 2024-11-10

Digital Partner crossword puzzle
Across
  1. Return on Investment
  2. New ideas
  3. Enterprise Resource Planning
  4. Employee engagement survey
  5. Online storage
  6. Pfizer's COVID-19 vaccine
  7. Efficiency
Down
  1. working together
  2. Breast cancer treatment
  3. Digital protection
  4. General Data Protection Regulation
  5. Key Performance Indicator

12 Clues: New ideasEfficiencyOnline storageworking togetherDigital protectionReturn on InvestmentBreast cancer treatmentKey Performance IndicatorPfizer's COVID-19 vaccineEmployee engagement surveyEnterprise Resource PlanningGeneral Data Protection Regulation

Puzzle voor engels 2025-02-13

Puzzle voor engels crossword puzzle
Across
  1. Software_met_vrij_toegankelijke_broncode
  2. Visuele_weergave_van_softwarebediening
  3. Flexibele_en_iteratieve_softwareontwikkeling
  4. Originele_programmeercode_van_een_applicatie
  5. Systeem_voor_het_beheren_van_codeversies
  6. Software_voor_het_beheren_van_databases
  7. Serverkant_van_een_applicatie
  8. Proces_om_software_op_fouten_te_testen
  9. Externe_opslag_en_verwerking_van_data
  10. Omzetting_van_gegevens_in_een_onleesbare_vorm
  11. Scherm_waarmee_gebruikers_software_bedienen
  12. Ontwikkelt_applicaties_en_systemen
  13. Software_die_de_hardware_van_een_computer_beheert
  14. Professionele_softwareontwikkelaar
  15. Klantkant_van_een_applicatie
  16. Beheer_van_softwarekwaliteit_en_betrouwbaarheid
Down
  1. Regelmatige_integratie_van_codewijzigingen
  2. Koppeling_tussen_verschillende_softwaretoepassingen
  3. Programma_dat_code_omzet_naar_uitvoerbare_bestanden
  4. Computer_of_systeem_dat_diensten_levert_aan_andere_computers
  5. Taal_waarin_software_wordt_geschreven
  6. Automatische_uitrol_van_software-updates
  7. Stap-voor-stap_procedure_om_een_probleem_op_te_lossen
  8. Publicatie_van_software_naar_een_live_omgeving
  9. Ontwikkeling_van_websites_en_webapplicaties
  10. Gesimuleerde_computer_binnen_een_ander_systeem
  11. Technologie_die_menselijke_intelligentie_nabootst
  12. Opsporen_en_verhelpen_van_fouten_in_code
  13. Vernieuwing_of_verbetering_van_software
  14. Ontwikkeling_van_apps_voor_mobiele_apparaten
  15. Controle_van_programmeercode_door_anderen
  16. Ontwikkelomgeving_met_hulpmiddelen_voor_codering
  17. Computers_die_leren_zonder_expliciete_programmering
  18. Organisatie_en_opslag_van_gegevens
  19. Opslagplaats_voor_programmeercode
  20. Netwerk_van_verbonden_slimme_apparaten
  21. Bescherming_tegen_digitale_bedreigingen
  22. Gestructureerde_opslag_van_gegevens
  23. Basisstructuur_voor_softwareontwikkeling

39 Clues: Klantkant_van_een_applicatieServerkant_van_een_applicatieOpslagplaats_voor_programmeercodeOrganisatie_en_opslag_van_gegevensOntwikkelt_applicaties_en_systemenProfessionele_softwareontwikkelaarGestructureerde_opslag_van_gegevensTaal_waarin_software_wordt_geschrevenExterne_opslag_en_verwerking_van_dataVisuele_weergave_van_softwarebediening...

Hive's Crossword Puzzle 2024-06-19

Hive's Crossword Puzzle crossword puzzle
Across
  1. The right to keep one's personal matters and information confidential or secret.
  2. Ensuring this is maintained involves protecting sensitive data from unauthorised access or disclosure in cybersecurity.
  3. Information that can be used to identify a specific individual.
  4. Protected from online harm and dangers.
  5. Safeguarding and protecting personal data
  6. Protection of internet-connected systems, including hardware, software, and data, from cyberattacks.
Down
  1. Officially recognised as meeting certain standards or requirements.
  2. Changing information into a code to prevent unauthorised access.
  3. Formal instruction designed to improve skills in a particular area.
  4. Recognition granted to individuals who have met certain standards in a particular fieId
  5. Traces left by a person's online activity or presence.
  6. The organisation offering the crossword puzzle and training/certification in data protection and security.

12 Clues: Protected from online harm and dangers.Safeguarding and protecting personal dataTraces left by a person's online activity or presence.Information that can be used to identify a specific individual.Changing information into a code to prevent unauthorised access.Formal instruction designed to improve skills in a particular area....

Technologies 2024-01-30

Technologies crossword puzzle
Across
  1. interconnected
  2. Customer
  3. Talk online
  4. Programme
  5. device used to select items
  6. enter data into a computer for processing
  7. secret word
  8. set of keys
  9. state of being safe from electronic crime
  10. Unit of data
Down
  1. Problem-solving steps
  2. computer part
  3. Computer memory
  4. organised data retrieved by a computer
  5. collection of related data
  6. primary display screen
  7. transfer
  8. single worldwide computer network
  9. the capacity of a computer
  10. to remove defects

20 Clues: CustomertransferProgrammeTalk onlinesecret wordset of keysUnit of datacomputer partinterconnectedComputer memoryto remove defectsProblem-solving stepsprimary display screencollection of related datathe capacity of a computerdevice used to select itemssingle worldwide computer networkorganised data retrieved by a computer...

Hapebeast career advice gang 2021-12-28

Hapebeast career advice gang crossword puzzle
Across
  1. IT manager for an FMCG company in Singapore
  2. The Career advice channel podcast host
  3. The guy with 6,000 lines in this discord
  4. Hapelinked founder
  5. The healthcare investor
  6. Founder of a creative agency (and 15 other companies...) in Portland
  7. Our dropshipping entrepreneur
  8. Hey, can you help us pin this?
  9. Ecommerce B2B specialist
  10. IT specialist in healthcare and insurance
  11. Cybersecurity in banking
  12. Our Canadian social media influencer with 3 million followers
  13. Car mechanic in Switzerland
  14. Land investor across the US
  15. Aspiring architect from New Jersey
  16. Investor and artist in LA
Down
  1. The investor who works in Republic Realm
  2. A financial manager for the US Military
  3. The investment banker
  4. A student / sneakerhead based in Singapore
  5. A real estate agent who was also a D3 basketball player
  6. Hapelinked co-founder
  7. Social media manager who was a professional chef
  8. The one and only
  9. Corporate finance advisor in one of the "Big 4"
  10. Investment consultant in Chicago
  11. Electrical Engineer with experience in renewable sector
  12. Cybersecurity specialist in Pennsylvania
  13. Our LA law firm partner
  14. Ecommerce, international freight entrepreneur.

30 Clues: The one and onlyHapelinked founderThe investment bankerHapelinked co-founderThe healthcare investorOur LA law firm partnerEcommerce B2B specialistCybersecurity in bankingInvestor and artist in LACar mechanic in SwitzerlandLand investor across the USOur dropshipping entrepreneurHey, can you help us pin this?Investment consultant in Chicago...

RU ITEC411CH2 2025-04-20

RU ITEC411CH2 crossword puzzle
Across
  1. When information is used for another reason than initially intended
  2. When space is invaded by an unwanted party
  3. The term for when websites store data on someones computer
  4. Right for officers to seize information within view on a device
  5. Acronym for device which knows exactly where someone is
  6. Act of comparing records from seperate databases
  7. Malicious actor trying to release company data
  8. Using data to figure out what characteristics engage with what
  9. Protection for business implementing cybersecurity
  10. Type of ad that uses user data to advertise
Down
  1. Act of observing with intent of maintaining order
  2. Searching for patterns in data to make something new
  3. When users are notified and made aware of how their data is being used
  4. Hiding important information through cryptography
  5. Information that is available to the public for access
  6. Acronym of Government org responsible for the United States' cybersecurity
  7. Acronym for device which identifies people with radio waves
  8. Abbreviation of law that requires all telephones to be vulnerable to US government hacks
  9. Action of giving the data collector data only if users says yes
  10. Acronym of the government office that watches its privacy policies

20 Clues: When space is invaded by an unwanted partyType of ad that uses user data to advertiseMalicious actor trying to release company dataAct of comparing records from seperate databasesAct of observing with intent of maintaining orderHiding important information through cryptographyProtection for business implementing cybersecurity...

INFORMATION TECHNOLOGY 2021-06-27

INFORMATION TECHNOLOGY crossword puzzle
Across
  1. A
  2. C
  3. F
  4. B
Down
  1. E
  2. D
  3. G
  4. H

8 Clues: EDGAHCFB

Farah thee Sattar 2023-11-20

Farah thee Sattar crossword puzzle
Across
  1. farah's first friend
  2. he will be found
  3. be careful online
  4. thing 2
  5. 40th birthday gift
  6. the spice of life
  7. the other f word
  8. one r
Down
  1. signature look
  2. where was farah born
  3. flip the pan
  4. da who?
  5. the best yogurt variety
  6. thing 1

14 Clues: one rthing 2da who?thing 1flip the pansignature lookhe will be foundthe other f wordbe careful onlinethe spice of life40th birthday giftfarah's first friendwhere was farah bornthe best yogurt variety

Clément_34_Cyberattack,nuclear weapon, destruction 2020-02-27

Clément_34_Cyberattack,nuclear weapon, destruction crossword puzzle
Across
  1. impossible situation
  2. non civilian
  3. science of online security
  4. virtual attack
  5. oil train
  6. most powerful bomb
Down
  1. online fight
  2. injuries
  3. refineries science
  4. Gain access

10 Clues: injuriesoil trainGain accessonline fightnon civilianvirtual attackrefineries sciencemost powerful bombimpossible situationscience of online security

Cybersecurity 2024-06-05

Cybersecurity crossword puzzle
Across
  1. a person who uses computers to gain unauthorized access to data.
  2. malicious act that seeks to damage data, steal data, or disrupt digital life
  3. the fraudulent use of a person's private identifying information.
Down
  1. prove or show (something) to be true, genuine, or valid.
  2. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  4. the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information
  5. a secure, apparently private network is achieved using encryption over a public network.

8 Clues: prove or show (something) to be true, genuine, or valid.a person who uses computers to gain unauthorized access to data.the fraudulent use of a person's private identifying information.malicious act that seeks to damage data, steal data, or disrupt digital lifea secure, apparently private network is achieved using encryption over a public network....

Cybersecurity 2023-09-20

Cybersecurity crossword puzzle
Across
  1. A security protocol that ensures data integrity
  2. A type of attack that floods a network with traffic
  3. Method of verifying a user's identity
  4. A system's first line of defense
Down
  1. A piece of information used to access an account
  2. A common social engineering tactic
  3. A set of rules that filters network traffic
  4. A program that appears legitimate but is malicious

8 Clues: A system's first line of defenseA common social engineering tacticMethod of verifying a user's identityA set of rules that filters network trafficA security protocol that ensures data integrityA piece of information used to access an accountA program that appears legitimate but is maliciousA type of attack that floods a network with traffic

Cybersecurity 2024-02-21

Cybersecurity crossword puzzle
Across
  1. Technique of asymmetric encryption
  2. Malicious program capable of replicating and spreading
  3. Another protocol for securing internet communications
  4. Authentication system based on something the user possesses
Down
  1. Protocol for securing internet communications
  2. Technique for protecting data by transforming it irreversibly
  3. Type of attack that involves making a service unavailable
  4. International organization establishing information security standards

8 Clues: Technique of asymmetric encryptionProtocol for securing internet communicationsAnother protocol for securing internet communicationsMalicious program capable of replicating and spreadingType of attack that involves making a service unavailableAuthentication system based on something the user possesses...

Cybersecurity 2024-08-09

Cybersecurity crossword puzzle
Across
  1. A type of malware that replicates itself by infecting other programs or files.
  2. A method used to circumvent security measures.
  3. An attempt to gain unauthorized access or cause harm to a system.
  4. Weaknesses in a system that can be exploited by attackers.
  5. A technique where attackers use fraudulent emails to steal sensitive information.
Down
  1. Malicious software designed to disrupt, damage, or gain unauthorized access to a system.
  2. The act of disguising communication to appear as if it comes from a trusted source.
  3. An incident where data is accessed without authorization.

8 Clues: A method used to circumvent security measures.An incident where data is accessed without authorization.Weaknesses in a system that can be exploited by attackers.An attempt to gain unauthorized access or cause harm to a system.A type of malware that replicates itself by infecting other programs or files....

Cybersecurity 2023-05-10

Cybersecurity crossword puzzle
Across
  1. Defensive computer technology, software or hardware-based, created and installed to keep hackers and malware out. The firewall filters interactions with a computer, allowing or denying entry, to keep systems secure.
  2. Algorithmic technique utilized to change the contents of a file into something unreadable by anyone outside a specific chain of communication.
  3. A type of hacker. Whitehat hackers use their skills for good, helping organizations test their cybersecurity measures and find vulnerabilities.
Down
  1. A type of hacker. A blackhat hacker is an individual that uses their skills to cause damage like breaking into a computer system and stealing confidential information.
  2. Type of malware that prevents access to computer files. When a computer is infected with ransomware, the malicious software will encrypt files and request a ransom for decryption.
  3. Computer systems that have been infected by malware. The malware then allows the hacker to connect infected computers creating a network. This network, instructed by the hacker, can be used to carry out malicious attacks.
  4. Malware used to cause damage on personal computers, aimed at changing, erasing, or modifying data.
  5. To protect digital data, a consistently updated copy of files should be stored safely offline, in case a system is hacked and data is encrypted or lost.

8 Clues: Malware used to cause damage on personal computers, aimed at changing, erasing, or modifying data.Algorithmic technique utilized to change the contents of a file into something unreadable by anyone outside a specific chain of communication....

Information Security 2023-12-12

Information Security crossword puzzle
Across
  1. 57% of organizations see at least weekly phishing attempts
  2. The most common target of phishing attacks are ____
  3. The US holds ____ place in the tanks of countries targeted for cybersecurity tasks
  4. 94% of malware is delivered by ____
  5. You should ____ over a link in an email to preview the actual address before clicking
Down
  1. Lock your ____ when you step away
  2. German American's Information Security Officer is
  3. ____ is one of the most common and dangerous forms of cyber crime
  4. Phishing is an attempt to obtain sensitive ____ with malicious intent
  5. Display names and email domains can be ____ hiding the true identity and appearing trustworthy
  6. Report spam/suspicious emails through the ____ button on the Outlook toolbar
  7. Our first line of defense against cybersecurity attacks and fraud is ___
  8. At German American, _____ is responsible for information security

13 Clues: Lock your ____ when you step away94% of malware is delivered by ____German American's Information Security Officer isThe most common target of phishing attacks are ____57% of organizations see at least weekly phishing attempts____ is one of the most common and dangerous forms of cyber crime...

cybersecurity 2023-04-21

cybersecurity crossword puzzle
Across
  1. facts provided or learned about something or someone
  2. A human error is an action or decision which was not intended. A violation is a deliberate deviation from a rule or procedure
  3. he use of centralized planning in an attempt to manage social change and regulate the future development and behaviour of a society.
  4. the action of obtaining something by using persuasion or guile.
Down
  1. facts and statistics collected together for reference or analysis
  2. put (something heavy) over one's shoulder or shoulders to carry.
  3. any information that relates to an identified or identifiable living individual.
  4. a person who uses computers to gain unauthorized access to data

8 Clues: facts provided or learned about something or someonea person who uses computers to gain unauthorized access to datathe action of obtaining something by using persuasion or guile.put (something heavy) over one's shoulder or shoulders to carry.facts and statistics collected together for reference or analysis...

Cybersecurity 2023-04-21

Cybersecurity crossword puzzle
Across
  1. type of malicious software, or malware, that spreads between computers and causes damage to data and software.
  2. replicates itself in order to spread to other computers.
  3. raw facts and figures
  4. information about a particular person
Down
  1. facts provided or learned about something or someone
  2. a network of computers infected by malware
  3. malicious software designed to harm or exploit any programmable device, service or network.
  4. a network security device

8 Clues: raw facts and figuresa network security deviceinformation about a particular persona network of computers infected by malwarefacts provided or learned about something or someonereplicates itself in order to spread to other computers.malicious software designed to harm or exploit any programmable device, service or network....

cybersecurity 2021-02-12

cybersecurity crossword puzzle
Across
  1. make sure you password doesn't contain ________ information
  2. it is malware which Uses vulnerabilities to move into your machine.
  3. it should be 8 or more letters
  4. never tell your _______ passwords
Down
  1. what is the shortened word for malicious software
  2. cyber = _______
  3. you password needs to be hard to _____
  4. it is scams which are mostly found in emails or fake log in pages

8 Clues: cyber = _______it should be 8 or more lettersnever tell your _______ passwordsyou password needs to be hard to _____what is the shortened word for malicious softwaremake sure you password doesn't contain ________ informationit is scams which are mostly found in emails or fake log in pages...

Cybersecurity 2024-03-22

Cybersecurity crossword puzzle
Across
  1. Downloaded software that holds data hostage
  2. ____ sensitive data sent outside of the company
  3. Can expose sensitive data to identity theft
  4. Cybersecurity Framework
  5. Fake emails that appear to be from a verified internal source
Down
  1. Requires Additional Steps beyond legging in with a password
  2. When to disconnect devices infected by ransomware
  3. Type of email containing links, usually appears to be from someone you know

8 Clues: Cybersecurity FrameworkDownloaded software that holds data hostageCan expose sensitive data to identity theft____ sensitive data sent outside of the companyWhen to disconnect devices infected by ransomwareRequires Additional Steps beyond legging in with a passwordFake emails that appear to be from a verified internal source...

Cybersecurity 2024-04-03

Cybersecurity crossword puzzle
Across
  1. A piece of audio or video that has been altered and changed to make it seem authentic or credible.
  2. Software designed to detect, prevent, and remove malicious software from computers.
  3. A malware that spreads through networks without human interaction.
Down
  1. A cybersecurity specialist who uses their skills to find and fix vulnerabilities in computer systems.
  2. A cyber-attack that floods a network or website with excessive traffic to disrupt service.
  3. A barrier that monitors and controls network traffic based on security rules.
  4. An online scam involving the impersonation of reputable entities to obtain sensitive personal information.
  5. A technology that secures connections over the internet, providing secure access to private networks.

8 Clues: A malware that spreads through networks without human interaction.A barrier that monitors and controls network traffic based on security rules.Software designed to detect, prevent, and remove malicious software from computers.A cyber-attack that floods a network or website with excessive traffic to disrupt service....

Cybersecurity 2025-11-03

Cybersecurity crossword puzzle
Across
  1. A method of verifying a user's identity using two different factors.
  2. A small file stored on a user’s device that tracks online activity.
Down
  1. A general term for malicious software.
  2. A scam that tricks users into revealing personal information, often by email.
  3. A person who gains unauthorized access to computer systems.
  4. A secret string used to gain access to a system.
  5. A system that blocks unauthorized access to or from a network.
  6. A self-replicating program that spreads from one computer to another.

8 Clues: A general term for malicious software.A secret string used to gain access to a system.A person who gains unauthorized access to computer systems.A system that blocks unauthorized access to or from a network.A small file stored on a user’s device that tracks online activity.A method of verifying a user's identity using two different factors....

The Top 10 Emerging Technologies 2025-05-08

The Top 10 Emerging Technologies crossword puzzle
Across
  1. A type of computing that uses qubits to solve complex problems faster.
  2. A type of scam mentioned as a cybersecurity threat.
  3. Technology that creates immersive virtual worlds.
  4. Self-driving cars and drones that navigate without human drivers.
  5. The basic units used in quantum computing.
  6. Technology that adds digital information to the real world.
  7. Innovations like solar panels and electric cars that help the environment.
  8. A method to secure data, especially important with quantum computing.
Down
  1. A secure digital ledger used for transparent transactions.
  2. The latest generation of mobile network technology.
  3. A company mentioned in the example of autonomous vehicles.
  4. The field involving machines that can perform tasks automatically.
  5. A gas reduced by a food supplement in sustainable technology.
  6. The process of making tasks run without human intervention.
  7. Abbreviation for the network of everyday objects connected to the internet.
  8. The future mobile network technology being developed for 2030.
  9. The practice of protecting devices and data from digital threats.
  10. Abbreviation for the technology that can act on its own to complete tasks.

18 Clues: The basic units used in quantum computing.Technology that creates immersive virtual worlds.The latest generation of mobile network technology.A type of scam mentioned as a cybersecurity threat.A secure digital ledger used for transparent transactions.A company mentioned in the example of autonomous vehicles....

Cybersecurity 2024-02-21

Cybersecurity crossword puzzle
Across
  1. a set of instructions, data or programs
  2. traceroute protocol
  3. malware demanding a ransom
  4. a person doing hack legally
Down
  1. encrypt information to ensure confidentiality
  2. malware masked by genuine software
  3. known to its sole owner and used by him alone to decipher a message of which he is the recipient
  4. Computer spying device that records the sequences of keys typed on a keyboard.

8 Clues: traceroute protocolmalware demanding a ransoma person doing hack legallymalware masked by genuine softwarea set of instructions, data or programsencrypt information to ensure confidentialityComputer spying device that records the sequences of keys typed on a keyboard....

Cybersecurity 2023-05-18

Cybersecurity crossword puzzle
Across
  1. Menghantar semula email yang bukan-bukan kepada semua orang yang mengenali anda boleh dikenali sebagai
  2. Apakah tindakan yang perlu dilakukan jika anda menerima pautan atau perkara yang mencurigakan di dalam telefon bimbit?
  3. Link yang ________ sering didapati di media sosial dan SMS merupakan salah satu Phishing Scams
  4. Jenayah _______ adalah salah satu jenayah yang dilakukan melalui computer dalam internet. Perbuatan ini menyebabkan mangsa menderita dan mengalami kerugian.
Down
  1. Mengelakkan perkongsian maklumat ________ di laman social dan internet dapat melindungi diri dari menjadi mangsa siber.
  2. Sentiasa kemas kini kata ________ sekurang-kurangnya 6 bulan sekali agar tidak mudah digodam oleh pihak yang tidak bertanggungjawab.
  3. Jangan ________ kata laluan anda
  4. Dengan berkongsi tarikh _________ ia berpotensi mengancam keselamatan diri.

8 Clues: Jangan ________ kata laluan andaDengan berkongsi tarikh _________ ia berpotensi mengancam keselamatan diri.Link yang ________ sering didapati di media sosial dan SMS merupakan salah satu Phishing ScamsMenghantar semula email yang bukan-bukan kepada semua orang yang mengenali anda boleh dikenali sebagai...

Cybersecurity 2024-10-21

Cybersecurity crossword puzzle
Across
  1. Tricking people to reveal information (6 letters)
  2. Tricking people into giving up confidential information (16 letters)
Down
  1. A safe practice for creating unique keys for accounts (8 letters)
  2. Malicious software demanding payment
  3. Phone-based scam to trick people (7 letters)
  4. Fake identity in an email (8 letters)
  5. Online trick to steal information via fake websites (8 letters)
  6. Cautiously sharing personal details (6 letters)

8 Clues: Malicious software demanding paymentFake identity in an email (8 letters)Phone-based scam to trick people (7 letters)Cautiously sharing personal details (6 letters)Tricking people to reveal information (6 letters)Online trick to steal information via fake websites (8 letters)A safe practice for creating unique keys for accounts (8 letters)...

Cybersecurity 2021-09-25

Cybersecurity crossword puzzle
Across
  1. a person who tries to access your computer without your knowledge
  2. a sequence of characters you use to access your accounts
  3. a type of malware that pretends to be a program you want
  4. a type of malware that copies itself into other files on your computer
  5. a nasty program that can harm your device or computer
Down
  1. an email that tries to trick you into visiting a scam website or to get your personal details
  2. a program you use to access the internet
  3. a location on the internet you can save your data

8 Clues: a program you use to access the interneta location on the internet you can save your dataa nasty program that can harm your device or computera sequence of characters you use to access your accountsa type of malware that pretends to be a program you wanta person who tries to access your computer without your knowledge...

Cybersecurity 2021-09-25

Cybersecurity crossword puzzle
Across
  1. a program you use to access the internet
  2. a nasty program that can harm your device or computer
  3. an email that tries to trick you into visiting a scam website or to get your personal details
  4. a type of malware that pretends to be a program you want
  5. a location on the internet you can save your data
Down
  1. a type of malware that copies itself into other files on your computer
  2. a sequence of characters you use to access your accounts
  3. a person who tries to access your computer without your knowledge

8 Clues: a program you use to access the interneta location on the internet you can save your dataa nasty program that can harm your device or computera sequence of characters you use to access your accountsa type of malware that pretends to be a program you wanta person who tries to access your computer without your knowledge...

CyberSecurity 2024-10-10

CyberSecurity crossword puzzle
Across
  1. Router Security Protocol
  2. Action for infected computer
  3. One part of user's credentials
  4. social engineering by phone
Down
  1. malware lockouts
  2. Dual Authentication
  3. security of non-public data
  4. Social engineering by text

8 Clues: malware lockoutsDual AuthenticationRouter Security ProtocolSocial engineering by textsecurity of non-public datasocial engineering by phoneAction for infected computerOne part of user's credentials

cybersecurity 2024-10-10

cybersecurity crossword puzzle
Across
  1. Another protocol for securing internet communications
  2. A piece of software designed to fix a vulnerability or bug.
  3. Malicious software designed to disrupt computer operations, steal data, or gain unauthorized access to a computer system.
  4. The process of converting information into a secret code to prevent unauthorized access.
Down
  1. someone who seeks to break into unauthorized computer systems.
  2. A type of malware that restricts access to a computer system or data until a ransom is paid.
  3. A cyberattack where a hacker poses as a trusted entity to trick a user into providing sensitive information.
  4. A network security system that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic.

8 Clues: Another protocol for securing internet communicationsA piece of software designed to fix a vulnerability or bug.someone who seeks to break into unauthorized computer systems.The process of converting information into a secret code to prevent unauthorized access....

Cybersecurity 2025-01-21

Cybersecurity crossword puzzle
Across
  1. Software designed to protect systems from malware and cyber threats
  2. The act of stealing personal information for fraudulent use
  3. Unauthorized access to a computer system or network.
  4. A method hackers use to deceive users into sharing sensitive information
Down
  1. The process of converting data into a secure format
  2. A weakness in software that can be exploited by attackers.
  3. The process of identifying and fixing software bugs or vulnerabilities
  4. A type of malicious software that demands payment to restore access

8 Clues: The process of converting data into a secure formatUnauthorized access to a computer system or network.A weakness in software that can be exploited by attackers.The act of stealing personal information for fraudulent useSoftware designed to protect systems from malware and cyber threats...

Cybersecurity 2025-09-16

Cybersecurity crossword puzzle
Across
  1. Malware that misleads users as its true intent by disguising itself as a normal program.
  2. Software that automatically displays or downloads advertisements based on user activity, often slowing down devices.
  3. Any malware that aims to gather information about a person and send it to another entity in a way that harms the user by violating their privacy, endangering their device's security, or other means.
  4. A malicious program that infects computers without user knowledge or permission.
  5. A common type of scam where a fraudster tries to gain your trust by convincing you they are someone they are not.
Down
  1. A form of fraud that involves contacting victims through email, telephone, or text to trick them into sharing personal information.
  2. The process of identifying someone's or something's identity, making sure that something is true, genuine, or valid.
  3. The practice of protecting your personal information and devices from malicious intent.

8 Clues: A malicious program that infects computers without user knowledge or permission.The practice of protecting your personal information and devices from malicious intent.Malware that misleads users as its true intent by disguising itself as a normal program....

FSRW - MS Digital Tools 2021-10-05

FSRW - MS Digital Tools crossword puzzle
Across
  1. Lisa Golia
  2. credit protection
  3. secure document sharing
  4. Secured Approval
  5. Training
  6. client can do it instead of FA
Down
  1. Protecting digital information
  2. substitute for pen and paper
  3. Eco friendly
  4. consolidated accounts
  5. quick 1-800 tool
  6. great for happy hours
  7. Self-Service Platform
  8. generates recommendations

14 Clues: TrainingLisa GoliaEco friendlyquick 1-800 toolSecured Approvalcredit protectionconsolidated accountsgreat for happy hoursSelf-Service Platformsecure document sharinggenerates recommendationssubstitute for pen and paperProtecting digital informationclient can do it instead of FA

Buckeye Hills Career Center 2024-11-15

Buckeye Hills Career Center crossword puzzle
Across
  1. police work & practice
  2. construction safety & crew leadership
  3. child & adolescent development
  4. patient centered care
  5. hand & foot treatment
  6. automotive steering & suspension
  7. telecommunications power
Down
  1. network management
  2. painting & refinishing
  3. heating, cooling & electrical
  4. catering & banquet services
  5. gas metal arc welding

12 Clues: network managementpatient centered caregas metal arc weldinghand & foot treatmentpolice work & practicepainting & refinishingtelecommunications powercatering & banquet servicesheating, cooling & electricalchild & adolescent developmentautomotive steering & suspensionconstruction safety & crew leadership

Cybersecurity Vocabulary 2025-10-15

Cybersecurity Vocabulary crossword puzzle
Across
  1. (ANSWER IN HEX)Malware disguised as legitimate software
  2. Network security system that filters traffic
  3. Software update to fix vulnerabilities
  4. Deceptive emails or messages to steal information
  5. Verifying the identity of a user or device
  6. Malware that encrypts files and demands payment
Down
  1. (ANSWER IN HEX)Self-replicating malware that spreads without a host file
  2. Malware that records keystrokes
  3. Process of converting data into a secret code
  4. General term for malicious software
  5. Determines what a user is allowed to access
  6. One-way transformation of data into a fixed string
  7. Malware that attaches to other programs and spreads

13 Clues: Malware that records keystrokesGeneral term for malicious softwareSoftware update to fix vulnerabilitiesVerifying the identity of a user or deviceDetermines what a user is allowed to accessNetwork security system that filters trafficProcess of converting data into a secret codeMalware that encrypts files and demands payment...

Bridal Shower 2022-04-18

Bridal Shower crossword puzzle
Across
  1. Bride's Maiden Name
  2. City Where Wedding will be Held
  3. College Where Couple Graduated From
  4. Groom
  5. Where Bride grew up
  6. Month Bride was Born
  7. Honeymoon
  8. Site of Gift Registry
  9. Month of Wedding
Down
  1. Bride's car
  2. Instrument Groom Plays
  3. Josh's Major in College
  4. Number of Attendants
  5. Bride's High School Sport
  6. Last Name of Groom
  7. Groom's car
  8. Groom's sport
  9. Month the Groom was born

18 Clues: GroomHoneymoonBride's carGroom's carGroom's sportMonth of WeddingLast Name of GroomBride's Maiden NameWhere Bride grew upNumber of AttendantsMonth Bride was BornSite of Gift RegistryInstrument Groom PlaysJosh's Major in CollegeMonth the Groom was bornBride's High School SportCity Where Wedding will be HeldCollege Where Couple Graduated From

Cybersecurity Crossword 2021-12-07

Cybersecurity Crossword crossword puzzle
Across
  1. the process of converting information or data into a code, especially to prevent unauthorized access.
  2. an individual, group, or application that receives data in the form of a collection. The data is used for query, analysis, and reporting.
  3. a random string of bits generated specifically to scramble and unscramble data. Is created with algorithms designed to ensure that each key is unique and unpredictable.
  4. assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the information.
  5. a process in which organizations assess the data that they hold and the level of protection it should be given.
  6. a senior stakeholder within your organisation who is accountable for the quality of one or more data sets.
  7. a computer network that is optimized to process a very high volume of data messages with minimal delay
Down
  1. a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.
  2. a central or distributed university unit or computer system administrator responsible for the operation and management of systems and servers which collect, manage and provide access to institutional data.
  3. a person responsible for the organization's Privacy Program including but not limited to daily operations of the program, development, implementation, and maintenance of policies and procedures.
  4. a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
  5. a user interface, service or device that collects data that is relevant to a business. In many cases, multiple systems and processes may produce data for the same data entity.
  6. a form of encryption where a pair of keys are responsible for encrypting and decrypting data.

13 Clues: a form of encryption where a pair of keys are responsible for encrypting and decrypting data.the process of converting information or data into a code, especially to prevent unauthorized access.a computer network that is optimized to process a very high volume of data messages with minimal delay...

Cybersecurity Crossword 2024-08-19

Cybersecurity Crossword crossword puzzle
Across
  1. A malicious software program designed to replicate itself and spread to other system.
  2. Malicious software designed to secretly monitor and collect user information
  3. A security system designed to monitor, filter, and control network traffic to protect a computer or network
  4. The process of verifying the identity of a user
  5. A method for gaining unauthorized access or control
  6. A secret string of characters used to authenticate a user's identity and grant access to secured systems
  7. The use of digital platforms, such as social media or messaging services, to harass, threaten, or intimidate individuals
Down
  1. An individual or entity that engages in harmful, malicious, or unethical behavior.
  2. A manipulation technique used to deceive individuals into divulging confidential information or performing actions that compromise security
  3. A type of phishing attack that specifically targets high-level executives or senior officials
  4. A form of social engineering to deceive individuals
  5. A program designed to detect, prevent, and remove malicious software, such as viruses, worms
  6. The right or condition of being free from unauthorized observation or intrusion

13 Clues: The process of verifying the identity of a userA form of social engineering to deceive individualsA method for gaining unauthorized access or controlMalicious software designed to secretly monitor and collect user informationThe right or condition of being free from unauthorized observation or intrusion...

Cybersecurity - malware 2022-01-31

Cybersecurity - malware crossword puzzle
Across
  1. The Computer ____ Act makes it an offence to impair the operation of a computer
  2. Do this to movies or games from illegal websites to catch a become infected from a computer virus
  3. Gaining unauthorised access to a computer system
  4. Attacker demands that a ransom be paid before they decrypt files and unlock the computer
  5. A large collection of malware-infected devices
  6. Self-replicating software
Down
  1. May be disguised as a game which then gives an attacker access via a backdoor
  2. Malicious software
  3. Distributed Denial of Service attack
  4. Monitors and gathers information on a person and how they use their computer
  5. Replicates themselves and spread through the network and use the system's resources
  6. Displays malicious adverts or pop-ups
  7. Records every keystroke made by a user

13 Clues: Malicious softwareSelf-replicating softwareDistributed Denial of Service attackDisplays malicious adverts or pop-upsRecords every keystroke made by a userA large collection of malware-infected devicesGaining unauthorised access to a computer systemMonitors and gathers information on a person and how they use their computer...

Cybersecurity Crossword 2024-10-10

Cybersecurity Crossword crossword puzzle
Across
  1. for detecting and analyzing malicious activities within a network (3 letters)
  2. A attack where a hacker tricks someone into revealing confidential information (6 letters)
  3. Authentication factor using your fingerprint or face (7 letters)
  4. Security incident where sensitive data is exposed to unauthorized parties (9 letters)
  5. A hidden or disguised computer virus, 5 letters)
  6. A type of network that connects devices wirelessly over short distances, 4 letters)
Down
  1. Code injected by an attacker, usually for malicious purposes (5 letters)
  2. Software that is installed without the user's knowledge and collects data, 7 letters)
  3. The process of encoding data to keep it secure, 10 letters)
  4. An unauthorized individual gaining access to systems, 6 letters)
  5. A protection layer to prevent unauthorized access to a network (7 letters)
  6. An encryption method that uses the same key to encrypt and decrypt data (3 letters)
  7. A malicious software designed to disrupt or damage a system, 6 letters)

13 Clues: A hidden or disguised computer virus, 5 letters)The process of encoding data to keep it secure, 10 letters)An unauthorized individual gaining access to systems, 6 letters)Authentication factor using your fingerprint or face (7 letters)A malicious software designed to disrupt or damage a system, 6 letters)...

cybersecurity axel 2025-11-26

cybersecurity axel crossword puzzle
Across
  1. – A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy source.
  2. – The process of confirming that someone or something is genuine.
  3. – Software designed to harm or exploit any device, service, or network.
  4. - Protocol similar to arp , but for IPv6
  5. – A secret word or phrase used to verify a user’s identity.
Down
  1. - Type of malware that secretly gathers information from an infected computer.
  2. - Code that assigns a numerical value to basic English letters, characters, and symbols
  3. - Used to perform distributed denial-of-service (DDoS) attacks.
  4. - Secret method of bypassing normal authentication or security controls.
  5. - A standalone malware that replicates itself in order to spread to other computers.
  6. - A group of communicating computers and peripherals known as hosts
  7. – An attempt to damage, steal, or disrupt digital systems or networks.
  8. – The process of converting data into a code to prevent unauthorized access

13 Clues: - Protocol similar to arp , but for IPv6– A secret word or phrase used to verify a user’s identity.- Used to perform distributed denial-of-service (DDoS) attacks.– The process of confirming that someone or something is genuine.- A group of communicating computers and peripherals known as hosts...

Basic of Cyber Sercurity 2019-07-10

Basic of Cyber Sercurity crossword puzzle
Across
  1. items or people of value online
  2. making sure every individual working with an information system has specific responsibilities for information assurance
  3. preventing unauthorized access to information and actively detecting, documenting, and counteracting such threats
  4. the virtual, online world
  5. provides a way for denial to be impossible
  6. a weakness or gap in our effort to protect ourselves
  7. assures online information is trustworthy and accurate
Down
  1. infrastructure government term describing assets that keep society and the economy functioning (including national and economic security, public health and safety, communication, transportation, and electricity generation)
  2. guarantee of reliable access to information
  3. three-pronged system of cybersecurity
  4. the practice of protecting digital and non-digital information
  5. a set of rules limiting access to certain information, much like privacy
  6. the state of being protected against criminal or unauthorized online activity
  7. guarantee that the message, transaction, or other exchange of information has shown its proof of identity

14 Clues: the virtual, online worlditems or people of value onlinethree-pronged system of cybersecurityprovides a way for denial to be impossibleguarantee of reliable access to informationa weakness or gap in our effort to protect ourselvesassures online information is trustworthy and accuratethe practice of protecting digital and non-digital information...

Cyber security LO1 & LO2 Crossword 2022-10-16

Cyber security LO1 & LO2 Crossword crossword puzzle
Across
  1. email claiming to be from an authority/bank and demand for personal information
  2. type of vulnerability that can be exploited by hackers attacking individuals.
  3. type of vulnerability caused by natural disasters
  4. Availability is when Information is ……………………when required
  5. cybersecurity security threat type which is planned set of actions designed to cause threat/damage
Down
  1. users directed to fake websites
  2. Accidentally disclosing personal information of customers in an organisation could lead to this
  3. Availability is when Information is only accessible to ………………… viewers
  4. pretending to be from bank/software company
  5. cybersecurity security threat type which is unintended consequence of an action

10 Clues: users directed to fake websitespretending to be from bank/software companytype of vulnerability caused by natural disastersAvailability is when Information is ……………………when requiredAvailability is when Information is only accessible to ………………… viewerstype of vulnerability that can be exploited by hackers attacking individuals....

CyberAware&Prep 2023-04-14

CyberAware&Prep crossword puzzle
Across
  1. You should always ____ your screen when stepping away from the computer
  2. a _____ should be difficult for attackers to guess, but easy for you to remember
  3. The people responsible for cybersecurity
Down
  1. if you receive a strange email, never open any ___
  2. You can flag suspicious emails asking for information using the 'report ____' option
  3. the abbreviation for multiple layers of access control/login protections
  4. Frequent software ___ can help keep systems secure
  5. ____ are the weakest link in cybersecurity
  6. always ___ out when you are done using a website
  7. Shoulder ____ is when someone tries to gain information from a device by peeking over your shoulder

10 Clues: The people responsible for cybersecurity____ are the weakest link in cybersecurityalways ___ out when you are done using a websiteif you receive a strange email, never open any ___Frequent software ___ can help keep systems secureYou should always ____ your screen when stepping away from the computer...

June Crossword: How to Secure the Manufacturing Edge 2025-05-27

June Crossword: How to Secure the Manufacturing Edge crossword puzzle
Across
  1. Feature of edge solutions that helps in maintaining data privacy
  2. Method to protect data both in transit and at rest
  3. Company providing edge computing solutions for manufacturing cybersecurity
  4. Type of computing that processes data locally to reduce network transmission
Down
  1. Advanced capability to identify and respond to security incidents
  2. Critical aspect of manufacturing cybersecurity involving GDPR and ISO standards
  3. Process to ensure the integrity of the system and prevent unauthorized access
  4. Unified security practices help in minimizing this
  5. Frequent actions to patch vulnerabilities and protect against new threats
  6. Regular checks to identify and address security vulnerabilities

10 Clues: Unified security practices help in minimizing thisMethod to protect data both in transit and at restRegular checks to identify and address security vulnerabilitiesFeature of edge solutions that helps in maintaining data privacyFrequent actions to patch vulnerabilities and protect against new threats...

Computer language , Browsing safely 2025-06-12

Computer language , Browsing safely crossword puzzle
Across
  1. protects computer
  2. fooling email
  3. Language used by computer
  4. prevent unauthorised entry in computer
  5. unethical hackers
  6. criminal activities in computer
  7. Illegal entry in computer
Down
  1. misleading email
  2. online befriending
  3. Prevents virus
  4. hacks computer
  5. Illegal method of getting money
  6. bullying someone using computer

13 Clues: fooling emailPrevents virushacks computermisleading emailprotects computerunethical hackersonline befriendingLanguage used by computerIllegal entry in computerIllegal method of getting moneybullying someone using computercriminal activities in computerprevent unauthorised entry in computer

Cyberland Magazine 2021-03-29

Cyberland Magazine crossword puzzle
Across
  1. being literate in virtual world
  2. virtual
  3. virtual culture
  4. acts of virtual world
  5. virtual assault
  6. science fiction stories in virtual world
  7. virtual offense
Down
  1. misguide in virtual world
  2. virtual vacancy
  3. pirate of virtual world
  4. voyager in virtual world
  5. virtual tyranny
  6. science of virtual fields
  7. half human half robot
  8. safeness of virtual world

15 Clues: virtualvirtual vacancyvirtual tyrannyvirtual culturevirtual assaultvirtual offenseacts of virtual worldhalf human half robotpirate of virtual worldvoyager in virtual worldmisguide in virtual worldscience of virtual fieldssafeness of virtual worldbeing literate in virtual worldscience fiction stories in virtual world

Cybersecurity 2022-11-17

Cybersecurity crossword puzzle
Across
  1. a malicious form of self-replicating software that does not attach itself to a file
  2. infects a computer so that it displays malicious adverts or pop-ups when the victim is online.
  3. a useful bot that monitors the prices of items to find the best deal
  4. a useful bot that provides customer service online
Down
  1. software that gains access to your computer with malicious intent.
  2. a malicious form of self-replicating software.
  3. a large collection of malware-infected devices
  4. software that appears as useful but actually performs malicious actions

8 Clues: a malicious form of self-replicating software.a large collection of malware-infected devicesa useful bot that provides customer service onlinesoftware that gains access to your computer with malicious intent.a useful bot that monitors the prices of items to find the best dealsoftware that appears as useful but actually performs malicious actions...

cybersecurity 2020-08-25

cybersecurity crossword puzzle
Across
  1. little files that webs save in your computer, like user, password etc.
  2. word used to refer to any type of malicious software
  3. it recopiles your information and sends it to an extern person without your consent
  4. programs that have as an objective to alter your computer's funcionment
Down
  1. security system against evil internet hackers or viruses.
  2. unsolicited mail.
  3. it is designed to combat viruses before they enter your system
  4. it's objective is to appear good to then trick you and hack you.

8 Clues: unsolicited mail.word used to refer to any type of malicious softwaresecurity system against evil internet hackers or viruses.it is designed to combat viruses before they enter your systemit's objective is to appear good to then trick you and hack you.little files that webs save in your computer, like user, password etc....

CYBERSECURITY 2023-03-22

CYBERSECURITY crossword puzzle
Across
  1. A PROGRAM YOU USE FOR SEARCHING SOMETHING ON THE INTERNET; IT'S A PROGRAM WHICH STORES COOKIES
  2. FORM OF CRYPTOGRAPHY THAT ENCODES YOUR DATA
  3. A LANGUAGE WHICH ALLOWS YOU TO CODE A WEBSITE
Down
  1. PROGRAM WHICH GETS YOUR DATA
  2. DATA THAT DESCRIBES THE FILE
  3. SEGMENT OF LARGER MESSAGE SENT OVER NETWORKS; YOU CAN SEE ITS CONTENT USING A PROGRAM LIKE WIRESHARK OR Burp Suite ;)
  4. A PROGRAMMING LANGUAGE IN WHICH A PROGRAM (MALICOUS ONE; USED FOR DoS ATTACK) CALLED slowloris WAS WRITTEN
  5. THE NAME OF HACKING COMPETITION TO FIND SOME FLAG LOOKING FOR EXAMPLE LIKE THAT: flag{easyCrossword}

8 Clues: PROGRAM WHICH GETS YOUR DATADATA THAT DESCRIBES THE FILEFORM OF CRYPTOGRAPHY THAT ENCODES YOUR DATAA LANGUAGE WHICH ALLOWS YOU TO CODE A WEBSITEA PROGRAM YOU USE FOR SEARCHING SOMETHING ON THE INTERNET; IT'S A PROGRAM WHICH STORES COOKIESTHE NAME OF HACKING COMPETITION TO FIND SOME FLAG LOOKING FOR EXAMPLE LIKE THAT: flag{easyCrossword}...

Cybersecurity 2024-03-20

Cybersecurity crossword puzzle
Across
  1. a technology that creates a secure, encrypted connection over a less secure network, such as the internet. It allows users to securely access a private network from a remote location.
  2. It's a security software or device that monitors network or system activities for malicious activities or policy violations and produces reports to a management console. It's designed to detect and respond to potential security threats in real-time.
  3. It refers to a cyberattack where the attacker floods a network, server, or website with traffic or requests, causing it to become overwhelmed and unable to respond to legitimate requests from users, thus denying service to legitimate users.
  4. the process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can decrypt and access the original information.
  5. a malicious and deliberate attempt to disrupt, damage, or gain unauthorized access to computer systems, networks, or data, often carried out through the use of digital tools and techniques.
Down
  1. short for malicious software, refers to any software intentionally designed to cause damage to a computer, server, network, or device, or to gain unauthorized access to sensitive information.
  2. a cyberattack method where fraudulent emails, messages, or websites are used to deceive individuals into revealing sensitive information such as passwords, credit card numbers, or personal details.
  3. a security system that monitors and controls incoming and outgoing network traffic, protecting against unauthorized access and malicious activities.

8 Clues: a security system that monitors and controls incoming and outgoing network traffic, protecting against unauthorized access and malicious activities.the process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can decrypt and access the original information....

Cybersecurity 2024-05-07

Cybersecurity crossword puzzle
Across
  1. A secret combination of characters used to authenticate users and protect accounts.
  2. A weakness or flaw in a system that can be exploited by attackers.
  3. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
  4. A cyberattack method via email that involves tricking individuals into disclosing sensitive information.
Down
  1. A barrier that monitors and controls incoming and outgoing network traffic.
  2. A deliberate attempt to compromise the security, availability, or integrity of computer systems or networks.
  3. The process of verifying the identity of a user or system.
  4. The process of converting data into a code to prevent unauthorized access.

8 Clues: The process of verifying the identity of a user or system.A weakness or flaw in a system that can be exploited by attackers.The process of converting data into a code to prevent unauthorized access.A barrier that monitors and controls incoming and outgoing network traffic....

Cybersecurity 2025-10-21

Cybersecurity crossword puzzle
Across
  1. malicious actor disguising their identity by faking a trusted source
  2. he state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
  3. accessing data without authorisation
Down
  1. a computer program that damages or reveals data
  2. a protective system for computer systems
  3. unauthorised access to confidential, sensitive or protected data
  4. a malicious attack via email
  5. information stored on a computer or system

8 Clues: a malicious attack via emailaccessing data without authorisationa protective system for computer systemsinformation stored on a computer or systema computer program that damages or reveals dataunauthorised access to confidential, sensitive or protected datamalicious actor disguising their identity by faking a trusted source...

Newsletter Issue 2 2023-11-02

Newsletter Issue 2 crossword puzzle
Across
  1. A famous Russian cybercriminal group known for ransomware attacks.
  2. A network cybersecurity strategy that isolates potentially compromised systems.
  3. An organization that sets cybersecurity standards to combat ransomware.
  4. A famous 2017 ransomware attack.
Down
  1. Ransomware attack variant that disguises itself as a legitimate program.
  2. The first cryptocurrency used in ransomware payments.
  3. Ransomware attacks that demand payment in Monero, not Bitcoin.
  4. A practice of intentionally spreading fake ransomware to extort money.

8 Clues: A famous 2017 ransomware attack.The first cryptocurrency used in ransomware payments.Ransomware attacks that demand payment in Monero, not Bitcoin.A famous Russian cybercriminal group known for ransomware attacks.A practice of intentionally spreading fake ransomware to extort money....

risky business 2017-07-18

risky business crossword puzzle
Across
  1. riding in a car unrestrained (2,8)
  2. flint + stone=
  3. not having the appropriate materials
  4. jumping out of a plane
  5. sharp kitchen utensils
  6. inhalation of nicotine
  7. under the legal age
  8. marijuana, methamphetamine
Down
  1. a fermented drink
  2. people may _____ you to do things
  3. online safety (5,8)
  4. SMS
  5. trying to impress people (7,3)
  6. having too much
  7. may inflict wounds and physical damage
  8. people you don't know
  9. operating a vehicle
  10. lack of sleep
  11. going very fast
  12. cruel or violent treatment

20 Clues: SMSlack of sleepflint + stone=having too muchgoing very fasta fermented drinkonline safety (5,8)operating a vehicleunder the legal agepeople you don't knowjumping out of a planesharp kitchen utensilsinhalation of nicotinecruel or violent treatmentmarijuana, methamphetaminetrying to impress people (7,3)people may _____ you to do things...

VCRA July 2024 Puzzle 2024-07-12

VCRA July 2024 Puzzle crossword puzzle
Across
  1. Data recovery solution
  2. Target-specific phishing
  3. Unauthorized data exposure
  4. Secure code conversion process
  5. Malicious computer network
  6. Security for web connections
  7. Relating to computer security
  8. Monitors and controls network traffic
  9. Traffic disrupting attack
Down
  1. Following legal standards
  2. Fixes software vulnerabilities
  3. Unauthorized computer access
  4. Review of cybersecurity practices
  5. Potential negative impact
  6. Data-locking extortion malware
  7. Software meant to damage systems
  8. Sensitive info stealing method
  9. Potential for IT loss

18 Clues: Potential for IT lossData recovery solutionTarget-specific phishingFollowing legal standardsPotential negative impactTraffic disrupting attackUnauthorized data exposureMalicious computer networkUnauthorized computer accessSecurity for web connectionsRelating to computer securityFixes software vulnerabilitiesData-locking extortion malware...

Cybersecurity Crossword 2025-01-17

Cybersecurity Crossword crossword puzzle
Across
  1. Data visualization tool
  2. Data analysis technique
  3. Data science tool for data manipulation
  4. Type of data distribution
  5. Deep learning architecture
  6. Data mining technique
Down
  1. Data visualization library
  2. Data storage solution
  3. Data preprocessing step
  4. Type of machine learning algorithm
  5. Machine learning model evaluation metric
  6. Statistical measure of spread
  7. Programming language for data science

13 Clues: Data storage solutionData mining techniqueData preprocessing stepData visualization toolData analysis techniqueType of data distributionData visualization libraryDeep learning architectureStatistical measure of spreadType of machine learning algorithmProgramming language for data scienceData science tool for data manipulation...

cybersecurity 2024-02-27

cybersecurity crossword puzzle
Across
  1. (Firewall)
  2. (Password)
  3. ( cybersecurity)
Down
  1. (Malware)
  2. (Phishing )

5 Clues: (Malware)(Firewall)(Password)(Phishing )( cybersecurity)

Mobil tijorat (m-commerce) 2025-11-26

Mobil tijorat (m-commerce) crossword puzzle
Across
  1. Raqamli xavfsizlik sohasi
  2. Onlayn savdo faoliyati
  3. Raqamli ma’lumotlar jamlanmasi
  4. Hisob-kitob qoidalari majmui
  5. Yangi raqamli yechimlar yaratish
  6. Zanjirsimon ma’lumotlar bazasi
  7. Innovatsion biznes loyihasi
Down
  1. Raqamli xizmatlar ekotizimi
  2. Raqamli moliya texnologiyasi
  3. Jarayonlarni raqamga o‘tkazish
  4. Bulutli hisoblash tizimi
  5. Internet orqali ulangan qurilmalar
  6. Sun’iy intellekt tizimi
  7. Katta hajmdagi ma’lumotlar
  8. Raqamli aktiv birligi

15 Clues: Raqamli aktiv birligiOnlayn savdo faoliyatiSun’iy intellekt tizimiBulutli hisoblash tizimiRaqamli xavfsizlik sohasiKatta hajmdagi ma’lumotlarRaqamli xizmatlar ekotizimiInnovatsion biznes loyihasiRaqamli moliya texnologiyasiHisob-kitob qoidalari majmuiJarayonlarni raqamga o‘tkazishRaqamli ma’lumotlar jamlanmasiZanjirsimon ma’lumotlar bazasi...

Cybersecurity Crossword Puzzle 2023-09-01

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. credit card info and SSN
  2. cereal with first hacking tool
  3. injection attack
  4. email sent to attempt hack
  5. computer virus spreads through network
  6. logs keys pressed; spyware
  7. Denial of Service
  8. pretends to be a game/application
  9. sms text phishing
  10. voicemail phishing
  11. password ____ helps store/secure passwords
  12. first IT scam
Down
  1. chase bank experienced this
  2. hackers that help companies
  3. long, complicated, and unique
  4. e.g. fingerprints, facial recognition
  5. excess refund scam outlet
  6. movie about hacking
  7. hacker using your SIM data
  8. scam vague from unknown sources

20 Clues: first IT scaminjection attackDenial of Servicesms text phishingvoicemail phishingmovie about hackingcredit card info and SSNexcess refund scam outletemail sent to attempt hacklogs keys pressed; spywarehacker using your SIM datachase bank experienced thishackers that help companieslong, complicated, and uniquecereal with first hacking tool...

Cybersecurity Awareness Month 2023-08-24

Cybersecurity Awareness Month crossword puzzle
Across
  1. A type of malware that denies a user's access to a system or data until a sum of money is paid
  2. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data
  3. Unsolicited emails sent to many addresses
  4. Computer programs that can block, detect, and remove viruses and other malware
  5. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information
  6. A collection of computers compromised by malicious code and controlled across a network
  7. A string of characters used to authenticate an identity
  8. A mechanism for creating a secure connection between a computing device and a computer network
  9. Software the compromises the operation of a system by performing an unauthorized function or process
  10. Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from a trusted source
  11. the ability of individuals to understand and exercise control over how information about themselves may be used by others
  12. A cybersecurity risk that originates from within an organization
  13. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
  14. An unauthorized user who attempts to or gains access to an information system
Down
  1. A replacement for passwords that provide more secure sign-ins to websites and apps across a user's device
  2. Extra copies of computer files that can be used to restore files that are lost or damaged
  3. Software designed to black malware from entering protected networks
  4. Software that is secretly installed into an information system without the knowledge of the system user or owner
  5. A process or measure used to verify a user's identity
  6. Faking the sending address of a transmission to gain illegal entry into a secure system
  7. A flaw or weakness in an information system that could be exploited
  8. Converting data into a form that cannot be easily understood by unauthorized people
  9. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization
  10. Part of the internet that isn't indexed by search engines

24 Clues: Unsolicited emails sent to many addressesA process or measure used to verify a user's identityA string of characters used to authenticate an identityPart of the internet that isn't indexed by search enginesA cybersecurity risk that originates from within an organizationSoftware designed to black malware from entering protected networks...

Cybersecurity Crossword Puzzle 2025-03-11

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. A network of infected computers
  2. Committing identity or financial fraud
  3. Bullying someone online
  4. Data exposed or stolen by attackers
  5. When body parts used for authentication
  6. Sell knowledge of hardware to attackers
  7. Scam email or message
  8. Insurance against data loss
Down
  1. Electronic equipment no longer used
  2. Ensures person accessing software is authentic
  3. Something that makes us safe
  4. Harmful software that enters a device
  5. Program designed to copy itself
  6. Hardware used to keep intruders out
  7. How to open a password-protected device
  8. Software designed to detect malware
  9. A lock on data for protection
  10. An individual responsible for launching cyberattacks
  11. Where you store passwords
  12. Malware pretending to be a program

20 Clues: Scam email or messageBullying someone onlineWhere you store passwordsInsurance against data lossSomething that makes us safeA lock on data for protectionA network of infected computersProgram designed to copy itselfMalware pretending to be a programElectronic equipment no longer usedHardware used to keep intruders out...

Cybersecurity Crossword Puzzle 2025-03-14

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. unauthorized use of a target's devices
  2. convert plaintext to ciphertex
  3. bullying on internet
  4. Distributed Denial-of-Service
  5. email scamming
  6. verifying the identity of a user
  7. a protection to a device or account
  8. causes damage to data and software
  9. Science, technology, engineering, and mathematics
  10. The process of granting or denying access
  11. barrier between trusted internal/untrusted external networks.
Down
  1. devices controlled by a hacker for malicion
  2. deliberate attempt to breach the information system
  3. data loss insurance
  4. weakness in a system that attackers can exploit
  5. denied privileges or access
  6. notification that an attack has been detected
  7. converting information into a code
  8. a person who is inexperienced in computing
  9. stolen data by hackers
  10. Short for malicious software

21 Clues: email scammingdata loss insurancebullying on internetstolen data by hackersdenied privileges or accessShort for malicious softwareDistributed Denial-of-Serviceconvert plaintext to ciphertexverifying the identity of a userconverting information into a codecauses damage to data and softwarea protection to a device or account...

Cybersecurity Awareness Month 2024-10-17

Cybersecurity Awareness Month crossword puzzle
Across
  1. When sensitive information is exposed after a security failure, it’s a data ______.
  2. Always ______ your software to the latest version to fix bugs and stay secure!
  3. Always use a password _______ to store and organize your passwords safely!
  4. Bad software installed on a computer to damage or harm it. Examples include viruses, worms, trojans, spyware, ransomware, etc.
  5. __________ is a type of malware that locks your files and demands payment to unlock them.
  6. When malicious threat actors disguise themselves as a trusted source to deceive you, it's called ________.
  7. Technology that scrambles your data so it can only be read by those authorized is called __________.
  8. When malicious threat actors create a fake email or website to trick you it is called ________.
  9. Technology that enables machines to mimic human intelligence, learning, and decision-making is known as __.
Down
  1. When hackers pretend to be a trusted entity to manipulate you into giving up sensitive information or access unauthorized systems, it’s called ______ engineering.
  2. A fake video, image, or audio created using AI to impersonate someone is known as a ________.
  3. A ________ is a security system that blocks unauthorized access to your computer or network.
  4. Always use long and unique _________ for each of your accounts.
  5. Leaving a tempting item, like a free download or USB, to trick people into installing malware is called _______.
  6. If you receive a strange text message asking for personal info, it might be ________ (SMS Phishing).
  7. When bad threat actors use a QR code to trick you into visiting a malicious site, it’s called ________.
  8. Multi-factor Authentication, or ___, helps protect your account by adding another layer of security.
  9. Open source ____________ is when cybercriminals exploit publicly available information to build a profile about a target.
  10. A phone call that tricks you into sharing personal information is a form of voice phishing called _______.
  11. A ___ is a private network that makes your internet activity anonymous (abbreviation).

20 Clues: Always use long and unique _________ for each of your accounts.Always use a password _______ to store and organize your passwords safely!Always ______ your software to the latest version to fix bugs and stay secure!When sensitive information is exposed after a security failure, it’s a data ______....

Cybersecurity Crossword Puzzle 2024-03-12

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. short for malicious software.
  2. someone trying to access data that isn't authorized.
  3. unintended software or hardware problem.
  4. computers infected with malicious software.
  5. converting information into a code.
  6. a physical device connected to a computer network.
  7. a network security device.
  8. Day recently discovered exploits.
  9. technological processes for telling a computer which tasks to perform.
Down
  1. practice of securing information and communication through writing and solving codes.
  2. refers to a weak point or flaw.
  3. an identity verification process.
  4. an intersection where networks with different transmission protocols meet.
  5. Web only accessible through special software or tools.
  6. cybercriminals disguise their identity.
  7. is a type of malware.
  8. software tool to access another machine without being detected.
  9. a malicious program that infects computers.
  10. a group of connected computers.
  11. is a form of fraud.

20 Clues: is a form of fraud.is a type of malware.a network security device.short for malicious software.refers to a weak point or flaw.a group of connected computers.an identity verification process.Day recently discovered exploits.converting information into a code.cybercriminals disguise their identity.unintended software or hardware problem....

Cybersecurity Vocabulary words 2022-10-17

Cybersecurity Vocabulary words crossword puzzle
Across
  1. concealing data into code with an assigned key
  2. citizenship responsible use of technology
  3. the act of purposely being mean, rude, or malicious towards an individual over the web
  4. malicious attempt to hack into a system without permission with the goal of stealing info
  5. individuals practicing the act of solving codes
  6. the act of securing a network utilizing tools
  7. malicious attempt to seek a vulnerability using code
  8. the process of converting confidential information into to be revealed with a key
  9. info on individual via internet
  10. device that monitors traffic that is going in and out of a network
Down
  1. studying and/or writing codes
  2. The dos and donts of hacking that can be malicious or ethical
  3. algorithms that covert plain text into code
  4. gaining access to a network without permission for malicious intent
  5. an obsessive act of watching what an individual does over the web
  6. best practices over the web
  7. a digitally altered picture to appear as another individual
  8. malicious hacking with multiple service requests
  9. trying to reveal a encryption without knowing the key
  10. something or someone that you are unable to understand or seems mysterious
  11. certificate cryptography link to an entity

21 Clues: best practices over the webstudying and/or writing codesinfo on individual via internetcitizenship responsible use of technologycertificate cryptography link to an entityalgorithms that covert plain text into codethe act of securing a network utilizing toolsconcealing data into code with an assigned key...

Cybersecurity Term Bank 2025-08-27

Cybersecurity Term Bank crossword puzzle
Across
  1. Breach Unauthorized release or theft of information
  2. Verifying a user’s identity
  3. Access Terminal Device (screen/keyboard) for interacting with a computer
  4. Malware that self-replicates and spreads across networks
  5. Trick users into giving information via fake messages
  6. Privilege Giving users the minimum access needed
  7. Instructions that run on hardware to perform tasks
  8. Device that forwards data between networks
  9. attacks Flooding a target with traffic to overwhelm it
  10. Number used by a protocol for communication
  11. Event with potential to harm systems or data
  12. Computer providing resources to others
  13. Reliable access to data and systems
  14. in Depth Multiple layers of security protection
Down
  1. Converting plaintext into unreadable code
  2. Software designed to harm systems or data
  3. Weakness that can be exploited
  4. Keeping info accessible only to authorized users
  5. Reducing features or data exposure
  6. Ensuring data is accurate and unchanged
  7. Control Process of granting or denying use of resources
  8. Information at rest, in use, or in transit
  9. Malware that spreads by attaching to files/programs
  10. in the Middle (MITM) Attacker intercepts and alters communication
  11. Physical parts of a computer
  12. System that filters network traffic

26 Clues: Verifying a user’s identityPhysical parts of a computerWeakness that can be exploitedReducing features or data exposureSystem that filters network trafficReliable access to data and systemsComputer providing resources to othersEnsuring data is accurate and unchangedConverting plaintext into unreadable codeSoftware designed to harm systems or data...

Cybersecurity Crossword Puzzle 2023-04-22

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Change IP on email to seem legitimate
  2. Attempts access with malicious intent
  3. When hacker successfully get information
  4. Fake made to seem real
  5. Coding to protect information
  6. Misleading computer program
  7. Spying on personal information
  8. Tricks them into selecting wrong thing
  9. Stops Viruses
Down
  1. Spams website with lots of requests
  2. prevents other users from hacking
  3. Two or more computers connected
  4. Malware which is made to damage
  5. Bad software that infects devices
  6. Technology to keep intruders out
  7. Holds your files until given money
  8. Hacker poses as a business
  9. Data not on computer goes here
  10. Internet Protocol
  11. Replaces your IP with another

20 Clues: Stops VirusesInternet ProtocolFake made to seem realHacker poses as a businessMisleading computer programCoding to protect informationReplaces your IP with anotherSpying on personal informationData not on computer goes hereTwo or more computers connectedMalware which is made to damageTechnology to keep intruders outprevents other users from hacking...

Cybersecurity Crossword Puzzle 2023-07-26

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Prevents unauthorized access.
  2. Unauthorized alteration of data.
  3. (Common Vulnerabilities and Exposures) Software vulnerability database.
  4. Flaws Software vulnerabilities.
  5. Breach Stealing sensitive data.
  6. Misleading email attacks.
  7. Malware with a harmful payload.
  8. Unauthorized access to data.
  9. Common entry point for attacks.
  10. Malware that hides within legitimate software.
  11. Engineering Attacks exploiting human behavior.
Down
  1. Encrypting communication data.
  2. Control Access rights limitation.
  3. Insecure code exploit.
  4. Scrambling data for security.
  5. Protects from viruses.
  6. Removing sensitive data.
  7. Malicious self-replicating code.
  8. Protects data from unauthorized changes.
  9. Malware that spreads via networks.

20 Clues: Insecure code exploit.Protects from viruses.Removing sensitive data.Misleading email attacks.Unauthorized access to data.Prevents unauthorized access.Scrambling data for security.Encrypting communication data.Flaws Software vulnerabilities.Breach Stealing sensitive data.Malware with a harmful payload.Common entry point for attacks....

Cybersecurity Participation Activity 2023-08-23

Cybersecurity Participation Activity crossword puzzle
Across
  1. Designed to prevent unauthorized computer access
  2. Virus that spreads through a network
  3. ______ engineering (gaining trust)
  4. They break into a computer system
  5. Phishing using voicemail
  6. Username and password
  7. Scam that clones your phone
  8. Manipulated image used for propaganda
  9. Typically junk email
  10. Their malintent is financial gain
  11. Authentication that employs login barriers
  12. Malicious software
Down
  1. Webpages not indexed by search engine
  2. Important password feature
  3. Pretends to be legitimate; hides virus
  4. Records credit card information
  5. Professional hackers who help organizations
  6. Unique combination of words
  7. Technological use of biological characteristics
  8. Acronym for flooding, shutting down website
  9. Webpages used for illegal activity

21 Clues: Malicious softwareTypically junk emailUsername and passwordPhishing using voicemailImportant password featureUnique combination of wordsScam that clones your phoneRecords credit card informationThey break into a computer systemTheir malintent is financial gain______ engineering (gaining trust)Webpages used for illegal activity...

Cybersecurity terminology challenge 2023-09-12

Cybersecurity terminology challenge crossword puzzle
Across
  1. A type of wireless security encryption.
  2. A network for wireless device connections.
  3. Regularly saving important files.
  4. Keeping applications and systems current.
  5. Securing sensitive information through encryption.
  6. Malicious software that locks your data and demands payment.
  7. Malicious software, often used in phishing.
  8. Deceptive emails with links or attachments to steal data.
  9. Fixing damaged equipment or systems.
  10. Mandating password usage for device access.
  11. A device managing internet connections.
  12. Using additional authentication steps.
Down
  1. Information that requires protection due to its importance.
  2. Informing relevant parties about a situation.
  3. Unauthorized entry by individuals who should not have access.
  4. A system of interconnected computers and devices.
  5. Small removable storage devices.
  6. The process of restoring normalcy after an incident.
  7. Suspicious requests for sensitive information.
  8. Isolate infected computers from the network.

20 Clues: Small removable storage devices.Regularly saving important files.Fixing damaged equipment or systems.Using additional authentication steps.A type of wireless security encryption.A device managing internet connections.Keeping applications and systems current.A network for wireless device connections.Malicious software, often used in phishing....

Cybersecurity Crossword Puzzle 2024-06-07

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Hint: Mends security holes.
  2. Hint: Blocks unauthorized access.
  3. Hint: Digital fingerprint.
  4. Hint: Protects data in transit.
  5. Hint: Dock for data transfer.
  6. Hint: Concealing information using codes.
  7. Hint: Echo request.
  8. Hint: Padlock for websites.
  9. Hint: Sounds like a sharp inhale.
  10. Hint: Base of a tree.
Down
  1. Hint: Neutral ground.
  2. Hint: Inbox clutter.
  3. Hint: Crawling through networks.
  4. Hint: Cyber mischief.
  5. Hint: Shields your identity.
  6. Hint: Infectious code.
  7. Hint: Minor glitch.
  8. Hint: Sounds like a fishing technique.
  9. Hint: Private internet highway.
  10. Hint: Automated program.

20 Clues: Hint: Minor glitch.Hint: Echo request.Hint: Inbox clutter.Hint: Neutral ground.Hint: Cyber mischief.Hint: Base of a tree.Hint: Infectious code.Hint: Automated program.Hint: Digital fingerprint.Hint: Mends security holes.Hint: Padlock for websites.Hint: Shields your identity.Hint: Dock for data transfer.Hint: Protects data in transit....

Cybersecurity Awareness Month 2024-09-16

Cybersecurity Awareness Month crossword puzzle
Across
  1. Function that converts data into a fixed size
  2. Measures taken to protect data
  3. Impersonating someone or something to deceive
  4. Securing data by converting it into code
  5. Software that records keystrokes
  6. Software that shows unwanted ads
  7. Malware that encrypts files demanding ransom
  8. Attack using trial and error to guess passwords)
  9. Investment scam involving fake accounts
  10. Vulnerabilities exploited before being patched
  11. Fraudulent attempts to steal sensitive information)
Down
  1. Malicious software designed to damage systems
  2. Hidden way of bypassing security controls
  3. Virtual Private Network for secure connections
  4. Software that collects data secretly
  5. Online harassment or bullying
  6. Multi-Factor Authentication
  7. Self-replicating malware that spreads across networks)
  8. Image, video or audio generated by AI
  9. A system that protects networks
  10. Network of compromised computers under attacker control)
  11. Software update to fix security vulnerabilities

22 Clues: Multi-Factor AuthenticationOnline harassment or bullyingMeasures taken to protect dataA system that protects networksSoftware that records keystrokesSoftware that shows unwanted adsSoftware that collects data secretlyImage, video or audio generated by AIInvestment scam involving fake accountsSecuring data by converting it into code...

Cybersecurity Training Exercise 2024-10-02

Cybersecurity Training Exercise crossword puzzle
Across
  1. *You can thank MIT for this term that once described quick and dirty code that was functional but not stable*
  2. A network of computers infected by malware that are under the control of a single attacking party
  3. *Occam says that a principle that states that the simplest explanation is usually the best*
  4. Taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
  5. A feature or defect of a computer system that allows surreptitious unauthorized access to data
  6. Computer security programs that simulate network resources that hackers are likely to look for to trap them
  7. *0b11111101000, but in words*
  8. Type of internet fraud that seeks to acquire a user’s credentials by deception
  9. A security system that forms a virtual perimeter around a network of workstations
  10. Code that has been written to take advantage of a vulnerability before the software vendor knows about it and can publish a patch for it
Down
  1. Weaknesses in software programs
  2. Every RazorPower Co. employee's favorite drink!
  3. Any type of intrusive computer software with malicious intent against the user
  4. Tricking someone into clicking on one object on a web page while they think they are clicking on another
  5. Malicious computer program that is often sent as an email attachment or a download
  6. protecting personal privacy and proprietary information
  7. The process of decoding cipher text to plain text
  8. Data is complete, trustworthy and has not been modified
  9. The property of being genuine and being able to be verified and trusted
  10. Everyday objects that are connected to the internet and are able to collect and transfer data automatically
  11. Malicious programs designed to extort money from victims by blocking access to the computer or encrypting stored data

21 Clues: *0b11111101000, but in words*Weaknesses in software programsEvery RazorPower Co. employee's favorite drink!The process of decoding cipher text to plain textprotecting personal privacy and proprietary informationData is complete, trustworthy and has not been modifiedThe property of being genuine and being able to be verified and trusted...

Cybersecurity Crossword Puzzle 2025-03-10

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Unwanted, unsolicited messages
  2. Computer network security system that restricts internet traffic
  3. Use of online platforms to bully/harass
  4. Receives and sends data on computer networks
  5. A person who breaks into computer system
  6. Software tool to take advantage of software
  7. Small update to fix bugs
  8. A technology that creates secure connection
  9. Storing and accessing data
  10. Software application to access/view websites
  11. Technique for attempting to acquire data
  12. Network of computers infected by malware
Down
  1. Malware that spreads causing damage to data
  2. Program that's intentionally harmful to computers
  3. Process of verifying someone's identity
  4. Application of intelligent algorithms
  5. Process of making a copy
  6. Network acting as entrance to another network
  7. Safe and responsible use of information/technology
  8. Way to scramble data

20 Clues: Way to scramble dataProcess of making a copySmall update to fix bugsStoring and accessing dataUnwanted, unsolicited messagesApplication of intelligent algorithmsProcess of verifying someone's identityUse of online platforms to bully/harassA person who breaks into computer systemTechnique for attempting to acquire data...

Edgescan Cybersecurity Crossword 2025-02-20

Edgescan Cybersecurity Crossword crossword puzzle
Across
  1. Attempt to breach security
  2. Verifying user identity
  3. Malware that encrypts files and demands payment
  4. Deceptive emails trying to steal information
  5. Relating to computers and networks
  6. Potential danger to a system
  7. Checking for vulnerabilities
  8. Self-replicating malicious code
  9. Person attempting unauthorized access
  10. Software update to fix vulnerabilities
  11. Taking advantage of a vulnerability
  12. Security event that may indicate a breach
  13. Review of security controls
  14. Information stored on a system
  15. Attack that disrupts service availability
  16. Restoring data after a loss
  17. Malware disguised as legitimate software
  18. Connected computers and devices
  19. Weakness that can be exploited
  20. Unsolicited bulk email
Down
  1. Copy of data for recovery
  2. Simulated attack to find weaknesses
  3. Ensuring systems are accessible
  4. Ensuring data accuracy
  5. Unauthorized access to data
  6. Software that hides malware on a system
  7. Scrambling data to make it unreadable
  8. Programs that run on a computer
  9. Software that secretly monitors user activity
  10. Keeping information secret
  11. Protecting systems and data
  12. Secret word for access
  13. Protecting personal information
  14. Measures to prevent attacks
  15. Network of infected computers
  16. Network security system controlling traffic
  17. Safeguard from harm
  18. Malicious software designed to harm systems
  19. Potential for loss or damage

39 Clues: Safeguard from harmEnsuring data accuracySecret word for accessUnsolicited bulk emailVerifying user identityCopy of data for recoveryAttempt to breach securityKeeping information secretUnauthorized access to dataProtecting systems and dataReview of security controlsMeasures to prevent attacksRestoring data after a lossPotential danger to a system...

AI and Cybersecurity 2025-03-02

AI and Cybersecurity crossword puzzle
Across
  1. A technique that identifies anomalies by learning normal system behavior.
  2. A strategy that uses decoy systems to mislead potential attackers.
  3. A method that detects patterns without pre‐labelled data.
  4. A general term for software designed to damage or exploit systems.
  5. The process of converting unstructured text into structured threat intelligence.
  6. An algorithm that groups similar data points without prior labels.
  7. A process of embedding hidden messages within non-secret data.
  8. A generative model used in adversarial defense strategies.
  9. A decentralized ledger technology that records transactions securely.
  10. A deceptive email tactic aiming to steal sensitive information.
  11. A vulnerability exploited before any patch becomes available.
  12. A method used to scramble data so only authorised parties can read it.
  13. A process that identifies deviations from normal system behavior.
  14. A simulated attack conducted to assess a system’s security.
  15. An attack strategy that manipulates inputs to avoid detection.
  16. A computing paradigm with the potential to break current cryptographic systems.
  17. A short-lived digital key that grants temporary access to a system.
  18. The process of integrating security measures early in the development cycle.
  19. An autoencoder variant adept at detecting long-term attack patterns.
  20. A security barrier that filters incoming and outgoing network traffic.
  21. A security model that denies trust by default.
  22. A learning technique that uses labelled training data.
  23. Short abbreviation for a cyberattack that persists undetected.
  24. A technique that examines user actions to detect irregular behavior.
  25. A systematic method for testing systems to uncover vulnerabilities.
Down
  1. The standard established for normal system behavior to flag outliers.
  2. A type of malware that locks files until a ransom is paid.
  3. A learning approach where systems adapt through trial and error.
  4. A GAN-based framework that sanitizes adversarial inputs.
  5. A decoy system designed to lure attackers away from real assets.
  6. Coordinated automation of multi-step incident response workflows.
  7. Neural networks that automatically extract complex features from data.
  8. An approach combining CNN and RNN for enhanced threat detection.
  9. A neural network variant particularly effective at visual data analysis.
  10. The process of confirming a user’s or device’s identity.
  11. A practice that limits user rights to only what is necessary.
  12. A technique for extracting actionable intelligence from text.
  13. The practice of quantifying and managing potential security risks.
  14. A technique that maps adversarial inputs to a learned data manifold.
  15. The security centre challenged by overwhelming daily alerts.
  16. A sequence of operations used to process or secure data.
  17. A model that integrates spatial and temporal data for threat detection.
  18. A framework that maps tactics and techniques in cyberattacks.
  19. A tool that suggests security-focused improvements during code writing.
  20. The process of cleansing inputs by projecting them onto benign data.
  21. A software solution that detects and removes malicious programs.
  22. A network model that captures sequential dependencies in data.
  23. A device that directs data between networks while managing traffic.
  24. Abbreviation for analytics that monitor user behavior for anomalies.
  25. A system designed to monitor network traffic for suspicious activities.

50 Clues: A security model that denies trust by default.A learning technique that uses labelled training data.A GAN-based framework that sanitizes adversarial inputs.The process of confirming a user’s or device’s identity.A sequence of operations used to process or secure data.A method that detects patterns without pre‐labelled data....

Cybersecurity Crossword Puzzle 2025-03-14

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Network of hijacked computers
  2. Manipulating people for access
  3. Physically isolates a system
  4. Vulnerability with no fix yet
  5. Isolates programs for security
  6. Adds extra login security
  7. Impersonates a trusted source
  8. Blocks unauthorized network access
  9. Fixes security vulnerabilities
  10. Self-replicates across networks
  11. Steals active user session
  12. Takes advantage of a weakness
  13. Disguised malware for attacks
  14. Malicious software harming devices
  15. Tricks users into clicking links
Down
  1. Hidden entry for unauthorized access
  2. Secretly monitors user activity
  3. Secures internet connection
  4. Tries all password combinations
  5. Converts data into fixed string
  6. Unwanted or junk emails
  7. Attacks databases with queries
  8. Records keystrokes for theft
  9. Displays unwanted advertisements
  10. Encrypts files for payment
  11. Overwhelms a server with traffic
  12. Secures data using codes
  13. Fraudulent attempt to steal data
  14. Hidden part of the internet
  15. Hides malware in a system

30 Clues: Unwanted or junk emailsSecures data using codesAdds extra login securityHides malware in a systemEncrypts files for paymentSteals active user sessionSecures internet connectionHidden part of the internetPhysically isolates a systemRecords keystrokes for theftNetwork of hijacked computersVulnerability with no fix yetImpersonates a trusted source...

cybersecurity crossword puzzle 2025-03-14

cybersecurity crossword puzzle crossword puzzle
Across
  1. authentication two-step identity verification
  2. exploits unknown software vulnerability
  3. verifies user identity
  4. secretly monitors user activity
  5. hides malicious activities
  6. engineering manipulates people for information
  7. fixes software vulnerabilities
  8. force attack tries all password combinations
  9. self-replicating malicious program
  10. horse disguised malicious software
  11. blocks unauthorized network access
Down
  1. hidden access to systems
  2. spreads copies across networks
  3. converts data into code
  4. encrypts data, demands ransom
  5. testing simulates attacks to find vulnerabilities
  6. fraudulent attempt to obtain information
  7. network of infected devices
  8. malicious software causing harm
  9. overwhelms service with traffic

20 Clues: verifies user identityconverts data into codehidden access to systemshides malicious activitiesnetwork of infected devicesencrypts data, demands ransomspreads copies across networksfixes software vulnerabilitiessecretly monitors user activitymalicious software causing harmoverwhelms service with trafficself-replicating malicious program...

Allie's Cybersecurity Crossword 2025-03-15

Allie's Cybersecurity Crossword crossword puzzle
Across
  1. Longer, complicated phrase to enter accounts
  2. Converting data into unreadable code
  3. Malware disguised as legitimate software
  4. Duplicate copy preventing data loss
  5. Webpages not indexed by search engines
  6. Small file tracking website activity
  7. Unauthorized individual with skill to gain access to
  8. Verifying a user's claimed identity
  9. Malware attached to files stealing/damaging data
  10. Monitors/controls incoming and outgoing traffic
  11. Ending access to secure system
  12. Self-replicating malware
Down
  1. Fraudulent attempt to steal sensitive information
  2. Malware demanding payment for access
  3. Malicious software that harms systems
  4. Weakness exploitable by security threats
  5. Security method using physical traits
  6. Installing newest software security versions
  7. Private browsing hiding local history
  8. Encrypted connection masking user location

20 Clues: Self-replicating malwareEnding access to secure systemDuplicate copy preventing data lossVerifying a user's claimed identityMalware demanding payment for accessConverting data into unreadable codeSmall file tracking website activityMalicious software that harms systemsSecurity method using physical traitsPrivate browsing hiding local history...

Principles of CyberSecurity 2025-04-02

Principles of CyberSecurity crossword puzzle
Across
  1. The process of saving data in case it is lost or damaged
  2. The law that stops that states it is illegal to use or share peoples data except for the reason it was collected
  3. A type of virus that you think is one thing but is really another thing
  4. The methods we employ to keep data safe
  5. a security method where more than one way of determining identity is utilised
  6. Gaining unauthorised access to a system
  7. A scam method using email
  8. A security method where data is put into a code
  9. The law that says you can have access to any info kept about you
Down
  1. When an Enterprise has experiences unauthorised access to their data
  2. Is the data accurate, updated and from a reliable source
  3. Software that locks your system and you need to pay a few for the code
  4. The right to keep info about ourselves confidential
  5. A scam method using SMS
  6. Where one person pretends to be someone else using confidential information
  7. landscape The environment in which a system exists and the risks involved in regard to security
  8. A piece of software designed to block unauthorised access to a system
  9. The hat colour of a "good" hacker
  10. Software used to prevent malicious programs from damaging a system
  11. damage A business may suffer this after a breach
  12. Security systems that are based on a human feature
  13. Software designed to damage a system

22 Clues: A scam method using SMSA scam method using emailThe hat colour of a "good" hackerSoftware designed to damage a systemThe methods we employ to keep data safeGaining unauthorised access to a systemA security method where data is put into a codedamage A business may suffer this after a breachSecurity systems that are based on a human feature...

Cybersecurity and Networking 2025-05-16

Cybersecurity and Networking crossword puzzle
Across
  1. (No spaces) Overwhelms a network, server, or website with excessive traffic, making it unavailable to users.
  2. The C in FCAPS
  3. A future event that could negatively impact the project processes or outcome
  4. The A in MFA
  5. A type of malware, encrypts files until a payment is made.
  6. The name of Unit 1, no spaces.
  7. How attackers deceive individuals into revealing sensitive information, usually by email
  8. The act of compromising digital devices and networks through unauthorised access to an account or computer system.
  9. Highly secure as they rely on unique biological traits that are difficult to forge.
  10. the P in FCAPS
  11. Using a legitimate/authorised user's credentials to gain unauthorised access.
Down
  1. The M in MAN
  2. What the "mal" is short for in malware
  3. Sets of rules and formats that define how data is exchanged between devices on a network.
  4. These capture, track and analyse packets sent over a Network.
  5. A strict step by step approach to project management, originates from construction.
  6. A network over a larger area, typically when multiple LANs are connected together.
  7. Server, Switch, hub and router are all examples of this type of device
  8. A hybrid of Bus and Star networks
  9. Ensure compatibility and interoperability among different devices, vendors, and applications.
  10. The I in CIA Triad
  11. Used to describe attacks motivated by ideological or political reasons.
  12. Protects sensitive data by converting it into unreadable code
  13. Act as a barrier between trusted internal networks and untrusted external sources, blocking malicious traffic.
  14. (No spaces) The act of searching for Wi-Fi networks from a moving vehicle.
  15. Stage 3 of the project management lifecycle

26 Clues: The M in MANThe A in MFAThe C in FCAPSthe P in FCAPSThe I in CIA TriadThe name of Unit 1, no spaces.A hybrid of Bus and Star networksWhat the "mal" is short for in malwareStage 3 of the project management lifecycleA type of malware, encrypts files until a payment is made.These capture, track and analyse packets sent over a Network....

Cybersecurity Awareness Puzzle 2025-10-14

Cybersecurity Awareness Puzzle crossword puzzle
Across
  1. An event or occurrence, often unexpected or problematic.
  2. Hidden programs providing remote access.
  3. Business Email Compromise, impersonating executives, vendors, or partners to steal funds or sensitive info.
  4. More than one kind of proof.
  5. Special access or rights given to certain users.
  6. Self-replicating malware spreading across systems.
  7. Encrypts data and demands payment for decryption.
  8. You should do this to all of your software.
  9. Voice (phone-based) phishing.
  10. SMS/text-based phishing.
  11. Security Awareness Training is provided ___.
Down
  1. Proof of who someone is.
  2. Permission to access a system, file, or resource.
  3. A modification or update to a system, process, or configuration.
  4. Protection against threats or attacks on computer and data.
  5. Using someone else's access without permission to enter a building.
  6. Records everything you type on a keyboard.
  7. A system that blocks unauthorized access to a network or computer.
  8. Cheating someone out of Money or personal Information
  9. Deceptive emails that trick users into clicking malicious links or sharing credentials.
  10. Secret words or codes used to unlock accounts.
  11. Copying data to keep it safe in case something is lost or damaged.

22 Clues: Proof of who someone is.SMS/text-based phishing.More than one kind of proof.Voice (phone-based) phishing.Hidden programs providing remote access.Records everything you type on a keyboard.You should do this to all of your software.Security Awareness Training is provided ___.Secret words or codes used to unlock accounts....

Trending Technologies by Raj 2024-06-17

Trending Technologies by Raj crossword puzzle
Across
  1. Popular programming language
  2. Container orchestration tool
  3. Augmented reality
  4. Distributed ledger technology
  5. Scripting language for web development
  6. Data processing at the network's edge
  7. Expertise in both front-end and back-end development
  8. Internet of Things
  9. Internet-based computing
  10. Subset of machine learning
Down
  1. Protecting computer systems
  2. Digital currency technology
  3. Containerization platform
  4. Subset of AI
  5. Artificial intelligence
  6. Advanced computational technology
  7. Large-scale data analysis
  8. Development and operations collaboration
  9. Virtual reality
  10. Robotic process automation

20 Clues: Subset of AIVirtual realityAugmented realityInternet of ThingsArtificial intelligenceInternet-based computingContainerization platformLarge-scale data analysisRobotic process automationSubset of machine learningProtecting computer systemsDigital currency technologyPopular programming languageContainer orchestration toolDistributed ledger technology...

Crosswords & Commitments 2025-07-15

Crosswords & Commitments crossword puzzle
Across
  1. Adams car brand
  2. Brenton & Shey's Dogs Name (Husky)
  3. Grooms Fav Snack
  4. The One-Eyed Sales Manager
  5. UD, MFA, SSO
  6. Brides Maiden Name
  7. Grooms Name
  8. MD of Obscure
  9. Video Game Phil & Arthur Play
  10. PANW Sales Director
  11. Tori & Bran's Dogs Name
Down
  1. Piet/Henri's Security Vendor
  2. Where Aidan/Holly flew from
  3. Garth & Tyrone's Vendor
  4. Like the Singer, but Sakkie's Wife's name
  5. Clint's Surname
  6. XON Head Of Cybersecurity
  7. Bride's Name
  8. Grooms Boss
  9. Gender of Dillon & Ilze's baby

20 Clues: Grooms NameGrooms BossUD, MFA, SSOBride's NameMD of ObscureAdams car brandClint's SurnameGrooms Fav SnackBrides Maiden NamePANW Sales DirectorGarth & Tyrone's VendorTori & Bran's Dogs NameXON Head Of CybersecurityThe One-Eyed Sales ManagerWhere Aidan/Holly flew fromPiet/Henri's Security VendorVideo Game Phil & Arthur Play...

Cybersecurity Key Terms 2023-11-30

Cybersecurity Key Terms crossword puzzle
Across
  1. Network of compromised computers.
  2. Tracks users with hidden elements.
  3. Unique numbers that identify device.
  4. Protects data during encryption process.
  5. Scrambling data to limit access.
  6. Software that damages or disrupts.
  7. Using technology to harass others.
  8. Email scams targeting sensitive information.
  9. Confirms identity before making changes.
Down
  1. Detects, prevents, and removes malware.
  2. Creating false realities using media.
  3. Commonly available unsecured networks.
  4. Blocks traffic and data flow.
  5. Utilizing personal devices for work.
  6. Helps create and store passwords.
  7. Business strategy to improve cybersecurity.
  8. Collects and shares sensitive information.
  9. Malware that appears harmless.
  10. Allows remote connection to networks.
  11. Unauthorized users gain data access.

20 Clues: Blocks traffic and data flow.Malware that appears harmless.Scrambling data to limit access.Network of compromised computers.Helps create and store passwords.Tracks users with hidden elements.Software that damages or disrupts.Using technology to harass others.Unique numbers that identify device.Utilizing personal devices for work....

Cybersecurity Crossword Puzzle 2024-03-14

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Malicious software disguise
  2. Data unscrambling process
  3. Malicious software infection
  4. Identity verification process
  5. Access security code
  6. Malicious software programs
  7. Internal threat actors
  8. Data hostage software
  9. Website tracking data
  10. Deceptive online attacks
Down
  1. Online terrorism actors
  2. Activist hackers
  3. Data protection method
  4. Personal information protection
  5. Electronic waste disposal
  6. Online harassment
  7. Self-replicating malware program
  8. Wireless internet connection
  9. Persistent online harassment
  10. Unsolicited email messages

20 Clues: Activist hackersOnline harassmentAccess security codeData hostage softwareWebsite tracking dataData protection methodInternal threat actorsOnline terrorism actorsDeceptive online attacksData unscrambling processElectronic waste disposalUnsolicited email messagesMalicious software disguiseMalicious software programsMalicious software infection...

Cybersecurity Final Vocab 2024-05-01

Cybersecurity Final Vocab crossword puzzle
Across
  1. a logical element in programming languages that are used for storing a sequence of data elements of the same basic type
  2. a security mechanism that creates a virtual trap to lure attackers.
  3. Distributed denial of service (DDoS); involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic.
  4. a field of technology that uses investigative techniques to identify and store evidence from a computer device
  5. A UI redress attack; when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the top level page.
  6. horse a type of malware that downloads onto a computer disguised as a legitimate program.
  7. servers that are accessed over the Internet, and the software and databases that run on those servers.
  8. undocumented way of gaining access to computer system.
  9. a code that takes advantage of a software vulnerability or security flaw.
  10. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
  11. any incident that results in unauthorized access to computer data, applications, networks or devices.
  12. a software program that performs automated, repetitive, pre-defined tasks.
  13. A computer program that can copy itself and infect a computer without permission or knowledge of the user.
  14. a scam where thieves attempt to steal personal or financial account information by sending deceptive electronic messages that trick unsuspecting consumers into disclosing personal information.
  15. penetration testing or ethical hacking; the intentional launching of simulated cyberattacks that seek out exploitable vulnerabilities in computer systems, networks, websites, and applications.
Down
  1. malware that employs encryption to hold a victim's information at ransom.
  2. the set of instructions, or a system of rules, written in a particular programming language
  3. a sphere of knowledge identified by a name
  4. the conversion of data from a readable format into an encoded format
  5. a computer network security system that restricts internet traffic in, out, or within a private network.
  6. a series of numbers that identifies any device on a network.
  7. a cybercrime that happens when someone impersonates a trusted contact or brand, pretending to be someone you trust in order to access sensitive personal information.
  8. a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
  9. when a person or program records login and password information from a legitimate user to illegally gain access to their account(s)
  10. also called encryption algorithms, are systems for encrypting and decrypting data.
  11. a process that transforms encrypted information into its original format.
  12. the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents.
  13. passing some data through a formula that produces a result, called a hash.
  14. - short for bot network; is a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker.
  15. instructions that tell a computer what to do.

30 Clues: a sphere of knowledge identified by a nameinstructions that tell a computer what to do.undocumented way of gaining access to computer system.a series of numbers that identifies any device on a network.a security mechanism that creates a virtual trap to lure attackers.the conversion of data from a readable format into an encoded format...