cybersecurity Crossword Puzzles

CyberSecurity Puzzle 2024-06-06

CyberSecurity Puzzle crossword puzzle
Across
  1. __________ IS SOMETHING YOU KEEP SECRET AND DO NOT SHARE WITH OTHERS.
  2. SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION.
  3. OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL.
  4. EMAIL IS THE MOST USED MEDIUM TO __________________ IN ORGANSATIONS.
Down
  1. CYBER ATTACK CAN CAUSE HUGE ____________
  2. IT IS NECESSARY TO CONFIRM IDENTITY BEFORE ALLOWING __________ IN OUR ORGANISATION.
  3. IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION.
  4. HACKER WILL DEMAND ____________ MONEY WHEN THEY TAKE COTROL OF YOUR COMPUTER.
  5. MAKE SURE THAT YOU HAVE ____________ SOFTWARE IN YOUR COMPUTER TO BE SAFE ONLINE.
  6. ___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS.

10 Clues: CYBER ATTACK CAN CAUSE HUGE ____________SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION.OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL.IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION.___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS....

Cybersecurity Essentials 2024-11-06

Cybersecurity Essentials crossword puzzle
Across
  1. monitors your online activity and can log every key you press
  2. a computer program that replicates and attaches to files
  3. holds data until it makes a payment
  4. a program that scans a computer for malicious software and deletes it
  5. replicates itself to spread from one computer to another
  6. a decoy to sneak malicious software past unsuspecting users
Down
  1. hackers who are self-employed or working for large crime organization
  2. hardware or software that prevents hackers from accessing your personal data
  3. converting information into a form where an unauthorized people cannot read it
  4. any code that can steal data or cause harm to a system

10 Clues: holds data until it makes a paymentany code that can steal data or cause harm to a systema computer program that replicates and attaches to filesreplicates itself to spread from one computer to anothera decoy to sneak malicious software past unsuspecting usersmonitors your online activity and can log every key you press...

ACES 2022-12-19

ACES crossword puzzle
Across
  1. ACES IS A MEMBER OF THE ______ COLLEGE
  2. ACES FOUNDING PARTNER
  3. WHAT ACES STUDENTS STUDY
  4. STUDENT UNION
  5. GROUP THAT PLANS SOCIAL EVENTS FOR ACES
  6. COMPUTER SCIENCE BUILDING
Down
  1. THE DAY THE WEEKLY EMAIL COMES OUT
  2. ACES IS MADE UP OF AN LLP AND A _____
  3. LAST NAME OF ACES DIRECTOR
  4. CODING USED IN ACES COURSES
  5. COURSE CODE FOR ACES COURSES REGISTRATION
  6. HOME TO ACES LLP
  7. TYPE OF PROJECT COMPLETED IN HACS200 or 202
  8. HOME TO ACES NORTH
  9. UNIVERSITY OF MARYLAND MASCOT

15 Clues: STUDENT UNIONHOME TO ACES LLPHOME TO ACES NORTHACES FOUNDING PARTNERWHAT ACES STUDENTS STUDYCOMPUTER SCIENCE BUILDINGLAST NAME OF ACES DIRECTORCODING USED IN ACES COURSESUNIVERSITY OF MARYLAND MASCOTTHE DAY THE WEEKLY EMAIL COMES OUTACES IS MADE UP OF AN LLP AND A _____ACES IS A MEMBER OF THE ______ COLLEGEGROUP THAT PLANS SOCIAL EVENTS FOR ACES...

Boredom buster 2023-06-28

Boredom buster crossword puzzle
Across
  1. Delicious Korean dish
  2. Creepy kids playground equipment at Minnippi parkland
  3. Dan's dream celebrity date
  4. Dan's alter ego
  5. 'Rejoice' in latin
  6. Place where the best conversations are had
  7. Dan's favourite mayonnaise
Down
  1. Hand-built spacecraft
  2. Name for a pressure cooker
  3. Bec's forbidden name
  4. I'm an ...
  5. 14th song on playlist
  6. Nerdy basketball team with cute point scorer
  7. Never would Dan ever ...
  8. I see you've played __ before
  9. Beloved kungfu fantasy series
  10. Term for a handsome cybersecurity person
  11. Powerful choral piece during epic space fight scene
  12. Best-looking hobbits in the Shire
  13. Name for a white Kona
  14. Brooklyn
  15. Dan's favourite book genre

22 Clues: BrooklynI'm an ...Dan's alter ego'Rejoice' in latinBec's forbidden nameHand-built spacecraftDelicious Korean dish14th song on playlistName for a white KonaNever would Dan ever ...Name for a pressure cookerDan's dream celebrity dateDan's favourite book genreDan's favourite mayonnaiseI see you've played __ beforeBeloved kungfu fantasy series...

FIT_Vocab.JT 2013-05-15

FIT_Vocab.JT crossword puzzle
Across
  1. picture for a business
  2. internet service provider
  3. headphone port
  4. TB
  5. online presentation maker
  6. Wireless Fidelity
  7. flash drive, disc
  8. who is asking, what they asking, why are they asking
  9. Google Bing Yahoo
  10. flash drive plug in
  11. online protection
  12. GB
  13. smallest storage amount
  14. 3g 4g
  15. MG
Down
  1. light emitting diode
  2. speakers, printer
  3. cd drive
  4. computer screen
  5. Safari, iTunes, iMovie, App Store
  6. central circuit board
  7. main engine of computer
  8. central processing unit
  9. National Cyber Security Alliance
  10. online manners
  11. Random Access Memory
  12. KB
  13. eight bits
  14. liquid crystal display

29 Clues: TBKBGBMG3g 4gcd driveeight bitsheadphone portonline mannerscomputer screenspeakers, printerWireless Fidelityflash drive, discGoogle Bing Yahooonline protectionflash drive plug inlight emitting diodeRandom Access Memorycentral circuit boardpicture for a businessliquid crystal displaymain engine of computercentral processing unit...

Technology 2023-06-11

Technology crossword puzzle
Across
  1. (Step-by-step problem-solving procedure)
  2. (Global computer network)
  3. (Intelligence that mimics human behavior)
  4. (Securing data with codes)
  5. (Global Positioning System)
  6. (Pocket-sized mobile device)
  7. (Identification based on unique human characteristics)
  8. (Remote data storage and computing)
  9. (Wireless network connectivity)
  10. (Unmanned aerial vehicles)
  11. (Process of making systems operate automatically)
Down
  1. (Protection of computer systems)
  2. (Electronic data processing machine)
  3. (Distributed digital ledger)
  4. (Simulated or computer-generated)
  5. (Enhancement of real-world experiences with digital content)
  6. (Manipulation of matter at the atomic and molecular scale)
  7. (Field of building and programming robots)
  8. Printing (Additive manufacturing process)
  9. Data (Large sets of complex data)

20 Clues: (Global computer network)(Securing data with codes)(Unmanned aerial vehicles)(Global Positioning System)(Distributed digital ledger)(Pocket-sized mobile device)(Wireless network connectivity)(Protection of computer systems)(Simulated or computer-generated)Data (Large sets of complex data)(Remote data storage and computing)...

Cybersecurity Terms Crossword Puzzle 2024-02-28

Cybersecurity Terms Crossword Puzzle crossword puzzle
Across
  1. Secure connection for private browsing
  2. Hostage-taking malware for files
  3. Vulnerability before the fix
  4. Identity verification for access
  5. Computer virus and harmful software
  6. Guard against harmful computer viruses
  7. Protecting digital systems and data
  8. Monitor for malicious activities
  9. Deceptive emails for sensitive data
Down
  1. Deliberate act to disrupt systems
  2. Malicious software's harmful action
  3. Secretly records keystrokes for theft
  4. System's exploitable weak point
  5. Network traffic gatekeeper and monitor
  6. Secret entry to bypass security
  7. Impersonation for unauthorized access
  8. Secure data with secret code
  9. Authorized entities' access list
  10. Flood of traffic to disrupt
  11. Software update to fix vulnerabilities

20 Clues: Flood of traffic to disruptVulnerability before the fixSecure data with secret codeSystem's exploitable weak pointSecret entry to bypass securityHostage-taking malware for filesIdentity verification for accessAuthorized entities' access listMonitor for malicious activitiesDeliberate act to disrupt systemsMalicious software's harmful action...

Wedding Crossword 2024-11-18

Wedding Crossword crossword puzzle
Across
  1. Where Bride was working when the couple met
  2. Amanda's middle name
  3. Bride’s favorite cuisine
  4. Month of the proposal
  5. Amanda's birth month
  6. Bride’s profession
  7. Location of the wedding venue
  8. Couple's favorite fantasy series
  9. Bride's Eye Color
  10. Groom’s favorite holiday
  11. Groom’s favorite takeout
Down
  1. Where the couple get engaged
  2. Russ' middle name
  3. Bride's favorite outdoor activity
  4. Russ' birth month
  5. Bride’s favorite holiday
  6. What Russ is in school for
  7. Groom's Eye Color
  8. # of years couple has been together
  9. Where Groom was born
  10. Couple's favorite hobby
  11. Their cat's name
  12. Groom's favorite hobby
  13. Where Bride was born
  14. Honeymoon Destination

25 Clues: Their cat's nameRuss' middle nameRuss' birth monthGroom's Eye ColorBride's Eye ColorBride’s professionAmanda's middle nameWhere Groom was bornAmanda's birth monthWhere Bride was bornMonth of the proposalHoneymoon DestinationGroom's favorite hobbyCouple's favorite hobbyBride’s favorite holidayBride’s favorite cuisineGroom’s favorite holiday...

Module 1 Introductory Course Telehealth 2017-03-01

Module 1 Introductory Course Telehealth crossword puzzle
Across
  1. Electronic health
  2. Providing remote healthcare
  3. Ability of computers exchange information"
  4. health Popular emerging term
Down
  1. Mobile health
  2. Measures taken to protect a computer
  3. Refers to teleconsultations
  4. Extended term for information technology

8 Clues: Mobile healthElectronic healthProviding remote healthcareRefers to teleconsultationshealth Popular emerging termMeasures taken to protect a computerExtended term for information technologyAbility of computers exchange information"

Cyber Security 2016-05-24

Cyber Security crossword puzzle
Across
  1. Likes to chase mice
  2. Man's best friend
  3. Steals data and holds it for ransom
  4. Has a trunk
  5. Flying mammal
Down
  1. Large marsupial
  2. What are we here for?
  3. What is my name?

8 Clues: Has a trunkFlying mammalLarge marsupialWhat is my name?Man's best friendLikes to chase miceWhat are we here for?Steals data and holds it for ransom

CYBER SECURITY 2023-09-20

CYBER SECURITY crossword puzzle
Across
  1. to steal sensitive information
  2. malware
  3. protection of computing systems and data that these systems store
  4. set of rules
Down
  1. the virtual and dynamic space created by the machine clones
  2. protecting info.from inauthorized parties
  3. attack data to web application
  4. malicious software
  5. attack uses trial & attack method
  6. automated process

10 Clues: malwareset of rulesautomated processmalicious softwareto steal sensitive informationattack data to web applicationattack uses trial & attack methodprotecting info.from inauthorized partiesthe virtual and dynamic space created by the machine clonesprotection of computing systems and data that these systems store

Cybersecurity Awareness 2021-09-28

Cybersecurity Awareness crossword puzzle
Across
  1. An attempt to get an individual to reveal personal or sensitive information using email and disguising as a legitimate source.
  2. A network security system that is used for monitoring incoming and outgoing network traffic in reference to preset network security rules. This system is used to block unauthorized access to maintain network safety and security.
  3. The process of converting information or data into a code to further prevent unauthorized access.
  4. Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. A vulnerability, or a system flaw, that is taken advantage of for malicious goals.
Down
  1. Unauthorized access to computer data, applications, networks, or devices.
  2. _____Engineering is used to manipulate end-users and exploiting human errors as a way to gain access to private information, access, or anything that the attacker deems valuable.
  3. Malicious software that is used to enter a computer of a device to get her data and information to then forward it to a third-party without the consent of the user.
  4. Malicious Software that blocks access to systems or threatens to release data until a predetermined debt is paid.
  5. Malicious code, or a computer program, that is designed to change the way a computer operates and can spread from one computer to another by copying itself. It then attaches to other programs or documents to execute the malicious code which can result in corruption or damage to data.

10 Clues: Unauthorized access to computer data, applications, networks, or devices.A vulnerability, or a system flaw, that is taken advantage of for malicious goals.Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.The process of converting information or data into a code to further prevent unauthorized access....

Cybersecurity Crossword 2024-06-25

Cybersecurity Crossword crossword puzzle
Across
  1. Faking an email, phone number or website.
  2. Attack that looks at/steals your data.
  3. Software used to protect your device.
  4. A string of random words used as a password.
Down
  1. We are not allowed to plug this into departmental devices.
  2. A program or programming code that self-replicates
  3. Attack that locks your data and demands money.
  4. Unsolicited emails that try to sell you products.
  5. Process used to help identify phishing.
  6. Malicious software.

10 Clues: Malicious software.Software used to protect your device.Attack that looks at/steals your data.Process used to help identify phishing.Faking an email, phone number or website.A string of random words used as a password.Attack that locks your data and demands money.Unsolicited emails that try to sell you products....

cybersecurity 2 2024-05-07

cybersecurity 2 crossword puzzle
Across
  1. reacting to an incident
  2. assurance that information is not disclosed
  3. finding the problem
  4. the data or information is being maintained
  5. limiting access from everyone
Down
  1. making sure the information doesn't breach
  2. obtaining what was lost
  3. guarantees that systems are available
  4. information about something that one possess
  5. looking for the problem

10 Clues: finding the problemobtaining what was lostreacting to an incidentlooking for the problemlimiting access from everyoneguarantees that systems are availablemaking sure the information doesn't breachassurance that information is not disclosedthe data or information is being maintainedinformation about something that one possess

cybersecurity 4 2024-05-07

cybersecurity 4 crossword puzzle
Across
  1. where all of the data is kept
  2. (1 trillion bytes)
  3. a passive way to direct someone to a malicious website
  4. (1000 bytes)
  5. (1 million bytes)
  6. threat actor that registers a domain name
Down
  1. a campaign desighned to steal account credentials.
  2. ( 1 billion bytes)
  3. remote access trojan
  4. an infected malware that's desighned to replicate and spread from device to device

10 Clues: (1000 bytes)(1 million bytes)(1 trillion bytes)( 1 billion bytes)remote access trojanwhere all of the data is keptthreat actor that registers a domain namea campaign desighned to steal account credentials.a passive way to direct someone to a malicious websitean infected malware that's desighned to replicate and spread from device to device

Cybersecurity Terms 2023-10-08

Cybersecurity Terms crossword puzzle
Across
  1. Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
  2. Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
  3. Verifying the identity of users or systems to ensure secure access.
  4. Safeguarding personal information to ensure confidentiality and compliance with regulations.
Down
  1. Pertaining to the security challenges and measures for smartphones and tablets.
  2. A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
  3. Malware that encrypts files, demanding payment for their release.
  4. An update to fix vulnerabilities or improve security in software or systems.
  5. Converting data into a code to prevent unauthorized access, especially during transmission.
  6. A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.

10 Clues: Malware that encrypts files, demanding payment for their release.Verifying the identity of users or systems to ensure secure access.An update to fix vulnerabilities or improve security in software or systems.Pertaining to the security challenges and measures for smartphones and tablets....

Cybersecurity Class 2024-03-26

Cybersecurity Class crossword puzzle
Across
  1. Used to keep intruders out
  2. Malware that spreads
  3. Malware used by hackers to spy
  4. Tricking users to reveal information
  5. Bad software that damages systems
  6. Two or more computers connected
Down
  1. Protect your information from hackers
  2. Identifying a user’s identity
  3. Malware that hijacks your system
  4. Shields users against viruses

10 Clues: Malware that spreadsUsed to keep intruders outIdentifying a user’s identityShields users against virusesMalware used by hackers to spyTwo or more computers connectedMalware that hijacks your systemBad software that damages systemsTricking users to reveal informationProtect your information from hackers

Cybersecurity M.A 2024-10-17

Cybersecurity M.A crossword puzzle
Across
  1. A method used for guessing password using a high volume of combinaisons
  2. A way for cybercriminals to trick someone for redirecting them in a not authorized jacket
  3. A system designed to prevent unauthorized access to or from a computer network
  4. A way for cybercriminals to hide stolen data or malicious code in images, audio files and others malicious code in images, audio files and other media
Down
  1. A weakness in a computer system or network that can possibly be exploited by attackers to compromise the security.
  2. A malfunction or weakness in the software
  3. Completly Automated Public Turing Test To Tell Computers and Humans Apart
  4. An exploitation system for computer
  5. A type of attack where the pirate takes the victim’s files has an hostages and ask for money to give them back
  6. A way to verify someone identity

10 Clues: A way to verify someone identityAn exploitation system for computerA malfunction or weakness in the softwareA method used for guessing password using a high volume of combinaisonsCompletly Automated Public Turing Test To Tell Computers and Humans ApartA system designed to prevent unauthorized access to or from a computer network...

Ylan cybersecurity 2024-11-21

Ylan cybersecurity crossword puzzle
Across
  1. Open-source operating system based on a kernel created by Linus Torvalds.
  2. A company that makes equipment and software to help connect and protect computer network
  3. A protocol that ensures reliable and ordered data transmission over a network.
  4. Raising awareness is the act of drawing attention to a previously overlooked topic
  5. A secret part of the internet, often used for anonymous activities.
Down
  1. A protocol for connecting to a remote computer without encryption
  2. A type of cyberattack where attackers impersonate legitimate organizations to steal sensitive information, like passwords or credit card details.
  3. A test used to verify if a user is human and not a robot.
  4. Identity theft to mask malicious communication.
  5. Software that secretly gathers information about a user without their consent.

10 Clues: Identity theft to mask malicious communication.A test used to verify if a user is human and not a robot.A protocol for connecting to a remote computer without encryptionA secret part of the internet, often used for anonymous activities.Open-source operating system based on a kernel created by Linus Torvalds....

Week 1 Puzzle 2020-08-25

Week 1 Puzzle crossword puzzle
Across
  1. This is an example of "something you know"--one of the key factors in MFA.
  2. Approximately $6 trillion is planned on being spent on this by 2021.
  3. General term for the type of device most often connecting to public WiFi.
  4. This is a type of malware that threatens to publish the victim's data or perpetually block access to it unless the victim pays money.
  5. Globally, one of these attacks every 39 seconds.
  6. By 2025, there will be an estimated 75 billion of these devices connected to the internet.
  7. 95% of cybersecurity breaches involve this type of error.
Down
  1. Any incident that results in unauthorized access to computer data, applications, networks or devices.
  2. The most dangerous type of WiFi.
  3. This is an example of "something you are"--one of the key factors of MFA.
  4. This typically is a 4 or 6 digit password used to lock/unlock a mobile device.
  5. To increase your personal internet security, consider turning off the "save password" feature in this.
  6. 93% of these organizations have experienced a data breach within the past 3 years.
  7. Software that is created specifically to help detect, prevent and remove malicious software.

14 Clues: The most dangerous type of WiFi.Globally, one of these attacks every 39 seconds.95% of cybersecurity breaches involve this type of error.Approximately $6 trillion is planned on being spent on this by 2021.This is an example of "something you are"--one of the key factors of MFA....

Week 6-7 spelling 2016-03-01

Week 6-7 spelling crossword puzzle
Across
  1. a decorative plate to finish motor vehicles
  2. to be someone's favorite
  3. a device to look at stars
  4. you usually hit BALLS with this
  5. to put up with something
  6. to think or believe that something is true
  7. to cancel something
Down
  1. to blend in
  2. to be safe online
  3. a device to look at very very small things
  4. to make a continuous low humming sound
  5. an area of land
  6. to make up your mind
  7. to secretly get married
  8. the past tense of strive

15 Clues: to blend inan area of landto be safe onlineto cancel somethingto make up your mindto secretly get marriedto be someone's favoriteto put up with somethingthe past tense of strivea device to look at starsyou usually hit BALLS with thisto make a continuous low humming sounda device to look at very very small things...

PeopleTec Engineering Week 2024-02-12

PeopleTec Engineering Week crossword puzzle
Across
  1. operations security
  2. exploratory programming marathon session
  3. use of scientific discoveries for practical purposes
  4. people first, technology always
  5. cyberattack prevention measures
  6. composing instructions for a computer to follow
  7. individual that provides products or services to the government
  8. Information technology role responsible for data security
Down
  1. representation of a real-world system
  2. training algorithms to create self-learning models
  3. designing and experimenting with a model
  4. connected computer systems
  5. professional problem solver
  6. next generation...
  7. document attesting to a level of achievement

15 Clues: next generation...operations securityconnected computer systemsprofessional problem solverpeople first, technology alwayscyberattack prevention measuresrepresentation of a real-world systemexploratory programming marathon sessiondesigning and experimenting with a modeldocument attesting to a level of achievement...

Cyberbullying 2024-05-02

Cyberbullying crossword puzzle
Across
  1. Platforms where cyberbullying often occurs.
  2. Connected to the internet.
  3. Malicious digital intrusion.
  4. Online harassment targeting high school students.
  5. Person who intimidates or mistreats others.
  6. Persistent online abuse or intimidation.
  7. Measures taken to protect against online threats.
Down
  1. Individual singled out for cyberbullying.
  2. Moral principles governing online behavior.
  3. Person who posts provocative or offensive messages.
  4. Without a known identity.
  5. Someone subjected to cyberbullying.
  6. Illegal activities carried out online.
  7. Relating to electronic technology.
  8. Online space for real-time communication.

15 Clues: Without a known identity.Connected to the internet.Malicious digital intrusion.Relating to electronic technology.Someone subjected to cyberbullying.Illegal activities carried out online.Persistent online abuse or intimidation.Individual singled out for cyberbullying.Online space for real-time communication....

Cybersecurity Crossword 2021-10-08

Cybersecurity Crossword crossword puzzle
Across
  1. verifying the identity of a user, process, or device
  2. a flaw or weakness that may allow harm to occur to a system
  3. malicious code like virus, worm
  4. Blink's single sign-on(SSO) solution
  5. an unauthorized user who attempts to or gains access to an information system
Down
  1. ensuring that data has not been altered or destroyed in an unauthorized manner
  2. an undocumented way of gaining access to a computer system
  3. how we work since covid started
  4. incident that results in disclosure of sensitive data
  5. individually identifiable health information

10 Clues: how we work since covid startedmalicious code like virus, wormBlink's single sign-on(SSO) solutionindividually identifiable health informationverifying the identity of a user, process, or deviceincident that results in disclosure of sensitive dataan undocumented way of gaining access to a computer system...

Cybersecurity Risk 2021-09-07

Cybersecurity Risk crossword puzzle
Across
  1. Abbreviation of Internet of Things.
  2. Short for "malicious software."
  3. Data that in published and can be found by anyone
  4. The type of data that should not be known to everyone.
  5. Pretending to be a friend or a trusted source online.
Down
  1. software that encrypts data on someone's device until that person agrees to pay to regain access.
  2. measures taken to protect computer systems.
  3. Joined or linked together.
  4. is a password made up of a saying or memorable set of words.
  5. Legitimate or innocent emails trying to trick you in clicking a link or providing personal information.

10 Clues: Joined or linked together.Short for "malicious software."Abbreviation of Internet of Things.measures taken to protect computer systems.Data that in published and can be found by anyonePretending to be a friend or a trusted source online.The type of data that should not be known to everyone....

Cybersecurity Password 2020-01-10

Cybersecurity Password crossword puzzle
Across
  1. You may not divulge this information while you are working for an employer or after you leave.
  2. Malware that extorts money from victims by blocking access to their computer or encrypting the data stored on it.
  3. E-mailing victims to trick them into voluntarily giving up their confidential information.
  4. Software aimed at protecting your computer from malware.
Down
  1. A flaw in a system that leaves it open to attack.
  2. A bunch of compromised computers running malicious programs and being remotely controlled by cybercriminals.
  3. It is the scrambling of data into a secret code that can be read only by software set to decode the information.
  4. A netork-based technology that allows user to store a large amount of data and have access to it with any Internet-connected device.
  5. Malware that secretly installs more malware on a computer.
  6. A remote infrastructure for developing and deploying new online software applications.

10 Clues: A flaw in a system that leaves it open to attack.Software aimed at protecting your computer from malware.Malware that secretly installs more malware on a computer.A remote infrastructure for developing and deploying new online software applications.E-mailing victims to trick them into voluntarily giving up their confidential information....

cybersecurity story 2024-02-23

cybersecurity story crossword puzzle
Across
  1. - software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access
  2. - The protection of the cyber realms
  3. - a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware
  4. - the technique by which any kind of information can be converted into a secret form that conceals the actual meaning
  5. - someone who tries to access data they aren't authorized to view
  6. - monitoring network security system
Down
  1. - What happens when the firewall is broken
  2. - A security incident where confidential information is stolen
  3. - the story this puzzle is about
  4. - a mechanism for creating a secure connection

10 Clues: - the story this puzzle is about- The protection of the cyber realms- monitoring network security system- What happens when the firewall is broken- a mechanism for creating a secure connection- A security incident where confidential information is stolen- someone who tries to access data they aren't authorized to view...

Cybersecurity Crossword 2024-04-13

Cybersecurity Crossword crossword puzzle
Across
  1. What feature can you activate to secure your Habbo account from hacking attempts?
  2. What security measure adds an extra layer of protection to online accounts beyond just a username and password?
  3. What term refers to groups of individuals in Habbo who aim to maximize profit by any means necessary, including illegal activities?
  4. What should you do if you receive messages containing offers that seem too good to be true on Habbo DMs?
  5. What precautionary measure should you take to protect your personal information when using public networks?
  6. What is the first step you should take before giving personal information to a stranger online?
Down
  1. What symbol is often found on the badges and mottos of mafia members?
  2. What is the type of app you can use to scan the QR code for setting up 2FA on Habbo?
  3. What action should you take if someone threatens you or attempts to scam you on Habbo?
  4. What type of software can protect your devices from malware, trojans, and ransomware?

10 Clues: What symbol is often found on the badges and mottos of mafia members?What feature can you activate to secure your Habbo account from hacking attempts?What is the type of app you can use to scan the QR code for setting up 2FA on Habbo?What type of software can protect your devices from malware, trojans, and ransomware?...

cybersecurity 5 2024-05-07

cybersecurity 5 crossword puzzle
Across
  1. turning a code into the information it was originally
  2. a program that threats to destroy data if they don't give money
  3. a program that decides whether to allow or block specific traffic
  4. to avoid
  5. a software that automates the process of scanning systems
  6. managing and protecting information assets
Down
  1. use of copying IT resources by employees
  2. type of substitution cipher in which each letter in plaintext is replaced
  3. practice of secure communication or information from the public
  4. converting information into a code

10 Clues: to avoidconverting information into a codeuse of copying IT resources by employeesmanaging and protecting information assetsturning a code into the information it was originallya software that automates the process of scanning systemsa program that threats to destroy data if they don't give money...

Cybersecurity Awareness 2024-10-17

Cybersecurity Awareness crossword puzzle
Across
  1. A security system that monitors and controls incoming and outgoing network traffic
  2. A security model that requires strict identity verification for every person and device trying to access resources on a network
  3. Software that secretly gathers information about a user's activities
  4. The process of encoding information to protect it from unauthorized access
  5. Malicious software that misleads users of its true intent by disguising itself as legitimate software
Down
  1. Manipulating people into divulging confidential information
  2. Phishing attacks conducted via SMS messages
  3. A malware designed to deny a user or organization access to files on their computer
  4. A type of online scam that tricks people into sharing sensitive information, such as login credentials and credit card numbers
  5. Small files stored on a user’s system to recognize the user and track preferences

10 Clues: Phishing attacks conducted via SMS messagesManipulating people into divulging confidential informationSoftware that secretly gathers information about a user's activitiesThe process of encoding information to protect it from unauthorized accessSmall files stored on a user’s system to recognize the user and track preferences...

Cybersecurity Awareness - 2024-10-08

Cybersecurity Awareness - crossword puzzle
Across
  1. [?] is a situation where a victim is tempted into clicking a malicious link
  2. Virus, Trojans and Worms are forms of [?]
  3. [?] are attackers whose motivation are political or social causes
  4. [?] is the term we used to to state that a transaction performed cannot be denied
  5. The minimum length of password we aim for is [?} numeric representation
Down
  1. [?} is a common social engineering tactic involving fake emails
  2. Fingerprint and/or facial recognition are form of authentication known as [?] scans
  3. The term [?] is commonly used in cybersecurity as a representation of weakness
  4. Account [?} is when an employee's email is hacked and used to make payments to fraudster's accounts.
  5. The microsoft brand for mobile device management is known as [?]

10 Clues: Virus, Trojans and Worms are forms of [?][?} is a common social engineering tactic involving fake emailsThe microsoft brand for mobile device management is known as [?][?] are attackers whose motivation are political or social causesThe minimum length of password we aim for is [?} numeric representation...

SULAM cybersecurity 2023-06-15

SULAM cybersecurity crossword puzzle
Across
  1. Perlindungan maklumat peribadi atau data daripada capaian yang tidak dibenarkan.
  2. Upaya untuk menembusi sistem komputer dengan niat jahat.
  3. Ilmu dan teknik menyulitkan maklumat supaya hanya dapat dibaca oleh pihak yang dibenarkan.
  4. Proses memulihkan data atau sistem selepas berlaku kejadian yang tidak diingini.
Down
  1. Program jahat yang cuba merosakkan atau mengganggu komputer dan peranti elektronik.
  2. Sekumpulan peranti yang berhubung dan berkongsi maklumat antara satu sama lain.
  3. Potensi bahaya atau kejadian yang boleh menjejaskan keselamatan sistem atau maklumat digital.
  4. Kemungkinan berlakunya ancaman atau kejadian yang boleh menyebabkan kerugian atau gangguan.
  5. Keadaan maklumat atau data yang tidak diubah atau diubah suai tanpa kebenaran.
  6. Program yang digunakan untuk mengesan, menghalang, dan membuang program jahat dari sistem komputer.

10 Clues: Upaya untuk menembusi sistem komputer dengan niat jahat.Keadaan maklumat atau data yang tidak diubah atau diubah suai tanpa kebenaran.Sekumpulan peranti yang berhubung dan berkongsi maklumat antara satu sama lain.Perlindungan maklumat peribadi atau data daripada capaian yang tidak dibenarkan....

Cybersecurity - General 2022-05-26

Cybersecurity - General crossword puzzle
Across
  1. Large scale attacks using remotely controlled malware-infected devices
  2. Systems, functions & data being provided on-demand, based on levels of service and defined parameters
  3. Number of stages of Penetration Testing
  4. Flooding a network / computer by overloading the system with huge number of requests and making it incapable of responses
  5. Only authorized parties permitted to access sensitive information / functions
Down
  1. Process of psychologically manipulating people to divulge personal or critical information
  2. A method of interrupting data traffic between nodes and stealing the required information
  3. Hostile spyware, ransomware & viruses that breach through vulnerabilities like clicking on suspicious links / installing risky applications
  4. Ensuring only authorized users can enter, modify or delete information / functions
  5. An attack that takes advantage of opportunity between a vulnerability announcement and corresponding security patch solution

10 Clues: Number of stages of Penetration TestingLarge scale attacks using remotely controlled malware-infected devicesOnly authorized parties permitted to access sensitive information / functionsEnsuring only authorized users can enter, modify or delete information / functions...

Cybersecurity Awareness 2021-09-29

Cybersecurity Awareness crossword puzzle
Across
  1. An attempt to get an individual to reveal personal or sensitive information using email and disguising as a legitimate source.
  2. A network security system that is used for monitoring incoming and outgoing network traffic in reference to preset network security rules. This system is used to block unauthorized access to maintain network safety and security.
  3. The process of converting information or data into a code to further prevent unauthorized access.
  4. Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. A vulnerability, or a system flaw, that is taken advantage of for malicious goals.
Down
  1. Unauthorized access to computer data, applications, networks, or devices.
  2. _____Engineering is used to manipulate end-users and exploiting human errors as a way to gain access to private information, access, or anything that the attacker deems valuable.
  3. Malicious software that is used to enter a computer of a device to get her data and information to then forward it to a third-party without the consent of the user.
  4. Malicious Software that blocks access to systems or threatens to release data until a predetermined debt is paid.
  5. Malicious code, or a computer program, that is designed to change the way a computer operates and can spread from one computer to another by copying itself. It then attaches to other programs or documents to execute the malicious code which can result in corruption or damage to data.

10 Clues: Unauthorized access to computer data, applications, networks, or devices.A vulnerability, or a system flaw, that is taken advantage of for malicious goals.Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.The process of converting information or data into a code to further prevent unauthorized access....

Cybersecurity Crossword 2021-02-12

Cybersecurity Crossword crossword puzzle
Across
  1. Something to protect your personal data.
  2. It locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
  3. A malicious form of self-replicating software.
  4. It appears to be a useful or fun application but unbeknown to the user it also performs malicious actions.
Down
  1. It is any information relating to an identifiable person.
  2. a person who uses computers to gain unauthorized access to data.
  3. It is unwanted software that monitors and gathers information on a person and how they use their computer.
  4. It is an attack in which the victim receives an email disguised to look as if it has come from a reputable source
  5. They are able to exploit vulnerabilities in the a computer’s operating system or a networks hardware.
  6. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.

10 Clues: Something to protect your personal data.A malicious form of self-replicating software.It is any information relating to an identifiable person.a person who uses computers to gain unauthorized access to data.They are able to exploit vulnerabilities in the a computer’s operating system or a networks hardware....

Cybersecurity Introduction 2023-06-18

Cybersecurity Introduction crossword puzzle
Across
  1. Protects your online accounts and prevents unauthorized access
  2. A program that self-replicates and spreads to other computers
  3. The practice of tricking individuals into revealing sensitive information
  4. A type of software designed to block or remove computer viruses
  5. A software vulnerability that allows unauthorized access to a system
  6. Malicious software that encrypts files and demands a ransom
Down
  1. The unauthorized copying or distribution of copyrighted material
  2. The act of intentionally damaging or disrupting computer systems
  3. A set of characters used to gain access to a computer system
  4. A method used to verify the identity of a user

10 Clues: A method used to verify the identity of a userMalicious software that encrypts files and demands a ransomA set of characters used to gain access to a computer systemA program that self-replicates and spreads to other computersProtects your online accounts and prevents unauthorized access...

CyberSecurity Crossword 2023-09-02

CyberSecurity Crossword crossword puzzle
Across
  1. Pengiriman pesan maupun objek secara masif dan berulang yang tidak dikehendaki penerimanya. (bahasa inggris)
  2. Program komputer yang dapat menggandakan diri dan menyebar serta merusak sistem penggunanya
  3. Salah satu tipe malware yang menyandera data hingga suatu jumlah tebusan dibayarkan (bahasa inggris)
  4. Sedang marak mengalami kebocoran. Didapatkan dengan ilegal dan diperjualbelikan di dark web.
Down
  1. Facebook, X, Instagram, dll. (dua kata, bahasa indonesia)
  2. Serangkaian kata yang digunakan untuk autentikasi pengguna pada suatu sistem (bahasa inggris)
  3. Alat yang digunakan untuk mentransmisikan data secara aman terhadap jaringan publik sehingga lebih privat, dapat digunakan untuk bekerja remote (singkatan)
  4. Layanan komputasi termasuk penyimpanan data, perangkat lunak, perangkat keras dan lain-lain, melalui internet. Biasa disebut komputasi awan. (bahasa inggris)
  5. Istilah untuk jebolnya sistem keamanan data maupun informasi pada suatu entitas (bahasa inggris)
  6. Salah satu bentuk malware yang bersifat menyamar sebagai suatu program yang valid. Biasa diasosiasikan dengan jenis kuda. (bahasa inggris)

10 Clues: Facebook, X, Instagram, dll. (dua kata, bahasa indonesia)Program komputer yang dapat menggandakan diri dan menyebar serta merusak sistem penggunanyaSedang marak mengalami kebocoran. Didapatkan dengan ilegal dan diperjualbelikan di dark web.Serangkaian kata yang digunakan untuk autentikasi pengguna pada suatu sistem (bahasa inggris)...

Cybersecurity Concepts 2024-03-31

Cybersecurity Concepts crossword puzzle
Across
  1. a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system
  2. the name commonly given to unwanted emails
  3. Made up of devices that are all connected to each other, like computers and
  4. a security system that forms a virtual perimeter around a network of workstations preventing an attack
  5. the process of verifying the identity of a user or piece of information
Down
  1. a process of maintaining data confidentiality by converting plain data into secret code
  2. makes sure that there are no unauthorized changes to information of systems
  3. A Virtual Private Network
  4. a collection of compromised computers running malicious programs that are controlled remotely by a cyber-criminal
  5. a program that gives a hacker remote access to, and control over, a computer or network

10 Clues: A Virtual Private Networkthe name commonly given to unwanted emailsthe process of verifying the identity of a user or piece of informationmakes sure that there are no unauthorized changes to information of systemsMade up of devices that are all connected to each other, like computers and...

CyberSecurity 1 2024-07-23

CyberSecurity 1 crossword puzzle
Across
  1. Entitlement is very closely related to ... performed
  2. ... to standard is verified during audit
  3. IAM also differentiates 'authenticate' and ...
  4. We differentiate between User and ... in IAM
  5. ISO 27000 standards has 14 categories for ...
Down
  1. S in SOD
  2. Issue faced by user in IT
  3. A in CIA
  4. C in PDCA
  5. Example of non-human identity

10 Clues: S in SODA in CIAC in PDCAIssue faced by user in ITExample of non-human identity... to standard is verified during auditWe differentiate between User and ... in IAMISO 27000 standards has 14 categories for ...IAM also differentiates 'authenticate' and ...Entitlement is very closely related to ... performed

Cybersecurity Basics 2024-07-25

Cybersecurity Basics crossword puzzle
Across
  1. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  2. An incident where data, trade secrets, or intellectual property is viewed, stolen, or used by an unauthorized individual.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. An event that could lead to loss of, or disruption to, an organization's operations, services, or functions.
Down
  1. A security process that verifies the identity of a user or device attempting to access a system.
  2. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. The process of converting information or data into a code, especially to prevent unauthorized access.
  4. A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
  5. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  6. A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.

10 Clues: A security process that verifies the identity of a user or device attempting to access a system.Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.The process of converting information or data into a code, especially to prevent unauthorized access....

Cybersecurity Puzzle 2024-07-19

Cybersecurity Puzzle crossword puzzle
Across
  1. Unauthorized access to or manipulation of a computer system or network
  2. A secret word or phrase used to gain access to a system.
  3. The practice of protecting systems, networks, and programs from digital attacks
  4. A digital certificate used to encrypt and authenticate a website
  5. A type of software designed to harm or exploit any programmable device.
Down
  1. The act of pretending to be someone else to gain sensitive information
  2. A type of malicious software that demands ransom
  3. An attack that floods a network with excessive traffic, disrupting service
  4. Unwanted email that often contains malware or phishing attempts
  5. Software designed to detect and remove malicious software

10 Clues: A type of malicious software that demands ransomA secret word or phrase used to gain access to a system.Software designed to detect and remove malicious softwareUnwanted email that often contains malware or phishing attemptsA digital certificate used to encrypt and authenticate a website...

cybersecurity Y.V 2024-10-17

cybersecurity Y.V crossword puzzle
Across
  1. Way a programmer may bypass securityto access a computer through trapdoor programs
  2. Security system that forms a virtual perimeter around a network
  3. An attack where the attacker secretly relays and possibly alters the communications between two parties (4_words)
  4. software that is secretly installed on a user's device to gather sensitive data
  5. Damage or destroy a computer network or system
  6. A malicious computer program
Down
  1. Block elements from sending you information
  2. Unwanted advertising, the email equivalant of physical junk
  3. person who use their skills and talents for good work and keep data safe from other (2_words)
  4. Person who try to gain unauthorized

10 Clues: A malicious computer programPerson who try to gain unauthorizedBlock elements from sending you informationDamage or destroy a computer network or systemUnwanted advertising, the email equivalant of physical junkSecurity system that forms a virtual perimeter around a network...

cybersecurity Y.V 2024-10-17

cybersecurity Y.V crossword puzzle
Across
  1. Damage or destroy a computer network or system
  2. A malicious computer program
  3. person who use their skills and talents for good work and keep data safe from other (2_words)
  4. Security system that forms a virtual perimeter around a network
Down
  1. Way a programmer may bypass securityto access a computer through trapdoor programs
  2. An attack where the attacker secretly relays and possibly alters the communications between two parties (4_words)
  3. Block elements from sending you information
  4. Unwanted advertising, the email equivalant of physical junk
  5. Person who try to gain unauthorized
  6. software that is secretly installed on a user's device to gather sensitive data

10 Clues: A malicious computer programPerson who try to gain unauthorizedBlock elements from sending you informationDamage or destroy a computer network or systemUnwanted advertising, the email equivalant of physical junkSecurity system that forms a virtual perimeter around a network...

Crossword - Harold Benjamin 2023-09-08

Crossword - Harold Benjamin crossword puzzle
Across
  1. Financial institution licensed
  2. Stationery company
  3. Fraudulent practice of acquiring sensitive data via emails
  4. Document sent via telecommunications
  5. Concealing management of illegally earnt money
  6. Protection of computer systems and networks
  7. Secured lending partner (last name)
  8. Goddess of health
  9. Client booking system at HH
  10. Transfer of property from one to another
  11. Private client partner (last name)
Down
  1. Equitable and fair treatment
  2. Operations director (last name)
  3. Dishonest persuasion with a gift or money
  4. Process of taking legal action
  5. Emailing system at HB
  6. Folder of court documents
  7. Offsite archiving company
  8. Case management system at HB
  9. Qualified legal professional
  10. Managing partner (last name)

21 Clues: Goddess of healthStationery companyEmailing system at HBFolder of court documentsOffsite archiving companyClient booking system at HHEquitable and fair treatmentCase management system at HBQualified legal professionalManaging partner (last name)Financial institution licensedProcess of taking legal actionOperations director (last name)...

AWS 2024-08-14

AWS crossword puzzle
Across
  1. O D D U O
  2. P T R A B
  3. M E O L A
  4. C L O U D
  5. T R A D A
  6. I N I U B
  7. S O N I A
Down
  1. T U M P N
  2. Z E M T G
  3. O 1 O S T
  4. I C T C L
  5. T R A N S
  6. A N E O S

13 Clues: T U M P NZ E M T GO 1 O S TI C T C LO D D U OT R A N SP T R A BM E O L AC L O U DT R A D AA N E O SI N I U BS O N I A

AWS 2024-08-14

AWS crossword puzzle
Across
  1. O D D U O
  2. P T R A B
  3. M E O L A
  4. C L O U D
  5. T R A D A
  6. I N I U B
  7. S O N I A
Down
  1. T U M P N
  2. Z E M T G
  3. O 1 O S T
  4. I C T C L
  5. T R A N S
  6. A N E O S

13 Clues: T U M P NZ E M T GO 1 O S TI C T C LO D D U OT R A N SP T R A BM E O L AC L O U DT R A D AA N E O SI N I U BS O N I A

Issue #1 2023-09-11

Issue #1 crossword puzzle
Across
  1. The Spooky Month Holiday
  2. Red ________ Week - Keeping kids drug-free
  3. Magnolia ________ Institute
  4. Racket sport this season
  5. Recent Hurricane in California
Down
  1. Seniors should be thinking about their college __________
  2. Homecoming King and ______
  3. Applying to a 4-year __________
  4. Future __________ Leaders of America Club

9 Clues: The Spooky Month HolidayRacket sport this seasonHomecoming King and ______Magnolia ________ InstituteRecent Hurricane in CaliforniaApplying to a 4-year __________Future __________ Leaders of America ClubRed ________ Week - Keeping kids drug-freeSeniors should be thinking about their college __________

Shayaans Life 2023-01-11

Shayaans Life crossword puzzle
Across
  1. My favorite game
  2. what I have as another pet
  3. what i think my future job is going to be
  4. pc
  5. what is aphone
Down
  1. where i used to live
  2. what i do
  3. something better than cookies
  4. what is the base of a computer
  5. what I have as a pet

10 Clues: pcwhat i dowhat is aphoneMy favorite gamewhere i used to livewhat I have as a petwhat I have as another petsomething better than cookieswhat is the base of a computerwhat i think my future job is going to be

Cybersecurity : Keselamatan Sosial Media 2023-06-02

Cybersecurity : Keselamatan Sosial Media crossword puzzle
Across
  1. Fikir sebelum __
  2. Kebiasaan phishing dilakukan melalui __
  3. Sejenis malware yang menyerang komputer sehingga dituntut tebusan
  4. Set strict __ pada akaun media sosial
  5. Perbuatan mencuri maklumat peribadi seseorang
  6. Sejenis scam menggunakan e-mel atau mesej
  7. Sejenis bully yang berlaku dalam talian
Down
  1. Sosial media merupakan satu rangkaian __
  2. Cyberbully dilakukan melalui text, imej dan __
  3. Tutup __ lama
  4. Maklumat peribadi
  5. Amalan melindungi rangkaian daripada serangan digital

12 Clues: Tutup __ lamaFikir sebelum __Maklumat peribadiSet strict __ pada akaun media sosialKebiasaan phishing dilakukan melalui __Sejenis bully yang berlaku dalam talianSosial media merupakan satu rangkaian __Sejenis scam menggunakan e-mel atau mesejPerbuatan mencuri maklumat peribadi seseorangCyberbully dilakukan melalui text, imej dan __...

Lesson 1.3 2023-03-08

Lesson 1.3 crossword puzzle
Across
  1. they mitigate vulnerabilities
  2. its top priority is make money
  3. personal identity information
  4. financial information
Down
  1. it's a byproduct of technological change
  2. bugs and …
  3. arise new security issues
  4. a weakness or a lack of countermeasures

8 Clues: bugs and …financial informationarise new security issuesthey mitigate vulnerabilitiespersonal identity informationits top priority is make moneya weakness or a lack of countermeasuresit's a byproduct of technological change

Nicole & Sam 2023-04-26

Nicole & Sam crossword puzzle
Across
  1. What is Sam's favorite color?
  2. Nicole's major in college
  3. The couple's favorite football team
  4. Where they went the night they met
  5. Sam's major in college
  6. The bride's new last name
Down
  1. Groom's middle name
  2. Who is the couple's dog?
  3. Bride's first name
  4. Name of restaurant where the couple had their first date
  5. Where Sam went to college
  6. Where Nicole went to college
  7. Who made the first move?
  8. number of years together

14 Clues: Bride's first nameGroom's middle nameSam's major in collegeWho is the couple's dog?Who made the first move?number of years togetherWhere Sam went to collegeNicole's major in collegeThe bride's new last nameWhere Nicole went to collegeWhat is Sam's favorite color?Where they went the night they metThe couple's favorite football team...

Cybersecurity and Cryptography 2024-10-17

Cybersecurity and Cryptography crossword puzzle
Across
  1. What is a digital document that verifies the ownership of a public key?
  2. What type of malware records keystrokes made by a user?
  3. What term refers to the permission to enter or use a system or network?
  4. What term refers to malicious software designed to harm or exploit devices?
  5. What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
  6. term describes a weakness in a system that can be exploited by threats?
  7. What is the process of verifying the identity of a user or system?
  8. What is the process of converting data into a fixed-size string of characters for security?
Down
  1. What device monitors and controls incoming and outgoing network traffic?
  2. What is the process of converting ciphertext back into plaintext?
  3. What protocol secures data sent over the internet by encrypting it?
  4. What is the process of converting plaintext into ciphertext to protect information?
  5. What is the process of creating copies of data to restore in case of loss?
  6. What is a physical or digital object used to prove identity in security systems?
  7. What type of malware disguises itself as legitimate software?

15 Clues: What type of malware records keystrokes made by a user?What type of malware disguises itself as legitimate software?What is the process of converting ciphertext back into plaintext?What is the process of verifying the identity of a user or system?What protocol secures data sent over the internet by encrypting it?...

Technology in PMI 2024-04-19

Technology in PMI crossword puzzle
Across
  1. problem solver, creator
  2. a machine that compresses the leaves
  3. new creative ideas
Down
  1. design trial phase
  2. online safety
  3. base or foundation
  4. a simplified model or imitation of an object or a process
  5. detects changes

8 Clues: online safetydetects changesdesign trial phasebase or foundationnew creative ideasproblem solver, creatora machine that compresses the leavesa simplified model or imitation of an object or a process

Cybersecurity Careers Crossword 2022-09-26

Cybersecurity Careers Crossword crossword puzzle
Across
  1. the process of getting new software or hardware up and running
  2. small groups of similar careers within a career cluster
  3. the study of technologies to determine their usefulness
  4. a person who creates, manages, and maintains computer networks, software, and systems
  5. they ensure hardware, software, and other systems are working properly
  6. This person improves and maintains an information technology system
  7. creating or improving any part of technology
  8. the change in the number of people that are employed in a certain occupation in the future
  9. computer programs that run by giving instructions to the computer
Down
  1. a flaw or weakness that may allow harm to occur in an information technology system
  2. it is two or more computers or devices that exchange data
  3. all hardware, software, and other equipment operated by a group of users
  4. A type of software that can be installed and run on a computer, tablet, or other electronic device
  5. clusters a group of careers with similar features
  6. the physical parts that make up a computer or device

15 Clues: creating or improving any part of technologyclusters a group of careers with similar featuresthe physical parts that make up a computer or devicesmall groups of similar careers within a career clusterthe study of technologies to determine their usefulnessit is two or more computers or devices that exchange data...

Cybersecurity In December 2022-12-21

Cybersecurity In December crossword puzzle
Across
  1. 2 or more computers/devices connected together to share resources
  2. The process of identifying a user's identity
  3. Coding used to protect your information from unauthorized access
  4. a form of malware that spies on you and your computer activities
  5. acronym for Virtual Private Network
  6. an update released to fix bugs and other vulnerabilities
  7. Used to keep intruders out
Down
  1. Software or device that has a flaw that can be exploited
  2. software or hardware used to combat viruses
  3. malware that looks legitimate, like the Greek horse
  4. MALicious softWARE
  5. a copy of data that is used in case of emergencies
  6. Software that is used to encrypt a user's files then demand ransom
  7. Trying to get sensitive information through social engineering
  8. the act of using a vulnerability

15 Clues: MALicious softWAREUsed to keep intruders outthe act of using a vulnerabilityacronym for Virtual Private Networksoftware or hardware used to combat virusesThe process of identifying a user's identitya copy of data that is used in case of emergenciesmalware that looks legitimate, like the Greek horse...

Puzzle #4 2024-05-07

Puzzle #4 crossword puzzle
Across
  1. corrective action/suggestions for improvement
  2. proof
  3. process effected by management to provide reasonable assurance
  4. daily paid union
  5. an illegal act for financial or personal gain
  6. protecting sensitive information from unauthorised persons
Down
  1. monthly paid union
  2. formal statement of organisation's goal and objectives
  3. protecting systems, networks, and programs from digital attacks
  4. proper disclosure of financial information
  5. competing interest
  6. highest governing body
  7. event/action that negatively affects the achievement of objectives

13 Clues: proofdaily paid unionmonthly paid unioncompeting interesthighest governing bodyproper disclosure of financial informationcorrective action/suggestions for improvementan illegal act for financial or personal gainformal statement of organisation's goal and objectivesprotecting sensitive information from unauthorised persons...

Tech Talk 2024-03-23

Tech Talk crossword puzzle
Across
  1. Machine mimicking human intelligence
  2. Machines that work like humans
  3. Global network of computers
  4. A place you can visit without leaving your chair
  5. Math behind problem-solving
  6. Can be plug in many devices
  7. The brain of a computer
  8. Protects your computer from attacks
Down
  1. A field that protect computer systems,networks from digital attacks.
  2. Graphics processor unit
  3. Physical parts of a computer
  4. Getting a file from the internet
  5. A collection of data
  6. Malicious software
  7. The programs of computer
  8. Needs a mouse and keyboard

16 Clues: Malicious softwareA collection of dataGraphics processor unitThe brain of a computerThe programs of computerNeeds a mouse and keyboardGlobal network of computersMath behind problem-solvingCan be plug in many devicesPhysical parts of a computerMachines that work like humansGetting a file from the internetProtects your computer from attacks...

#InfraNet Cyber Awareness 2022-10-13

#InfraNet Cyber Awareness crossword puzzle
Across
  1. Security or house
  2. Password attack method
  3. Doesn'trequire a host file to replicate itself
  4. This horse can stampede your security defenses
  5. Who is responsible for cybersecurity
  6. Verifying identity
  7. Unauthorized access to a network
  8. Scrambling text into an unreadable format
  9. Similar to a password
Down
  1. Any crime committed electronically
  2. Watches where you go on the internet
  3. Multi-factor authentication
  4. Cyber awareness month
  5. Wireless technology using short-wave UHF radio waves
  6. Attack attempt to acquire personal information
  7. Prevents unauthorized access to or from a private network
  8. The address of a webpage
  9. Program that is designed to automate tasks
  10. Chief information security officer

19 Clues: Security or houseVerifying identityCyber awareness monthSimilar to a passwordPassword attack methodThe address of a webpageMulti-factor authenticationUnauthorized access to a networkAny crime committed electronicallyChief information security officerWatches where you go on the internetWho is responsible for cybersecurity...

4IR Technologies Pillars 2023-09-11

4IR Technologies Pillars crossword puzzle
Across
  1. 4IR Sense element (C)
  2. 4IR Sense element (I)
  3. 4IR Analysis element (C)
  4. 4IR Act element (3)
  5. 4IR Act element (A)
  6. 4IR Analysis element (B)
Down
  1. 4IR Sense element (C)
  2. 4IR Act element (S)
  3. 4IR Analysis element (A)
  4. 4IR Act element (A)

10 Clues: 4IR Act element (S)4IR Act element (3)4IR Act element (A)4IR Act element (A)4IR Sense element (C)4IR Sense element (C)4IR Sense element (I)4IR Analysis element (A)4IR Analysis element (C)4IR Analysis element (B)

NAVFAC's Ten Capabilities 2023-02-13

NAVFAC's Ten Capabilities crossword puzzle
Across
  1. ________Facilities and Equipment Engineering
  2. detailed coordination of a complex operation involving people, facilities, or supplies.
  3. NAVFAC Capabilities: ______ & Construction
  4. NEPA requirement: Environmental __________
  5. a proposed or planned undertaking
  6. NAVFAC Capabilities: Environmental ___________
  7. Real Estate _________ and Management
  8. Basic physical and organizational structures and facilities
  9. ________ Handling Ashore Procurement
Down
  1. Protection against criminal or unauthorized use of electronic data
  2. Military Construction Acronym
  3. _______ and Facilities Operations
  4. ___________ Conservation: Health assessment of natural and cultural resources
  5. NAVFAC Capabilities: _________ & Facility Operations
  6. _________ Vehicles provide transportation services

15 Clues: Military Construction Acronym_______ and Facilities Operationsa proposed or planned undertakingReal Estate _________ and Management________ Handling Ashore ProcurementNAVFAC Capabilities: ______ & ConstructionNEPA requirement: Environmental __________________Facilities and Equipment EngineeringNAVFAC Capabilities: Environmental ___________...

Issue 1 2023-04-14

Issue 1 crossword puzzle
Across
  1. Teacher in charge of MagTV
  2. Farm behind Magnolia
  3. Water sports (not necessarily just swimming)
  4. Vietnamese Dual Language Immersion Program
  5. Magnolia _______ Institute
  6. City we're located in
Down
  1. Girls' soccer and ________ made it to CIF
  2. The classic writing tool for students (that always seems to go missing when you need it)
  3. Book and _____ Club
  4. Associated Student Body
  5. Room 404 teacher
  6. Medical pathway, BITA, and JROTC are ___ programs
  7. Teacher in charge of Theater classes

13 Clues: Room 404 teacherBook and _____ ClubFarm behind MagnoliaCity we're located inAssociated Student BodyTeacher in charge of MagTVMagnolia _______ InstituteTeacher in charge of Theater classesGirls' soccer and ________ made it to CIFVietnamese Dual Language Immersion ProgramWater sports (not necessarily just swimming)...

Cybersecurity Awareness 2023 2023-10-06

Cybersecurity Awareness 2023 crossword puzzle
Across
  1. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
  2. Sensationalist headline or link to an article, blogpost, or other Internet content that exists for the purpose of attracting attention, or “drawing clicks.” Once a user clicks on the headline or image, the website is often mostly ads
  3. Digital ______ is the ability to use digital technology and media effectively
  4. Illegal _____ of copyrighted material is often referred to as piracy
  5. Your digital _____ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  6. Cybersecurity awareness month
  7. Online commenter whose intent is to attack views expressed online; these attacks are often personal
  8. Many features in online _____ can expose players to predators
  9. A type of cyber attack that attempts to fool users into providing sensitive information, such as passwords or credit card details, via fake emails and websites
Down
  1. A person who attempts to gain unauthorized access to computer systems
  2. _____ settings help control things like your profile, contact, and other information relating to your account
  3. Online harrassment
  4. A type of cyber attack that locks users out of their computer systems until they pay a ransom, typically in the form of cryptocurrency, such as Bitcoin
  5. ______ theft is a type of crime in which your private information is stolen and used for criminal activity
  6. Designed to detect and destroy computer viruses

15 Clues: Online harrassmentCybersecurity awareness monthDesigned to detect and destroy computer virusesMany features in online _____ can expose players to predatorsIllegal _____ of copyrighted material is often referred to as piracyA person who attempts to gain unauthorized access to computer systems...

Cybersecurity and Cryptography 2024-10-17

Cybersecurity and Cryptography crossword puzzle
Across
  1. What device monitors and controls incoming and outgoing network traffic?
  2. What is a digital document that verifies the ownership of a public key?
  3. term describes a weakness in a system that can be exploited by threats?
  4. What is the process of converting data into a fixed-size string of characters for security?
  5. What is the process of converting plaintext into ciphertext to protect information?
  6. What is the process of converting ciphertext back into plaintext?
  7. What type of malware disguises itself as legitimate software?
  8. What type of malware records keystrokes made by a user?
Down
  1. What is a physical or digital object used to prove identity in security systems?
  2. What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
  3. What term refers to malicious software designed to harm or exploit devices?
  4. What term refers to the permission to enter or use a system or network?
  5. What protocol secures data sent over the internet by encrypting it?
  6. What is the process of verifying the identity of a user or system?
  7. What is the process of creating copies of data to restore in case of loss?

15 Clues: What type of malware records keystrokes made by a user?What type of malware disguises itself as legitimate software?What is the process of converting ciphertext back into plaintext?What is the process of verifying the identity of a user or system?What protocol secures data sent over the internet by encrypting it?...

Cybersecurity Vocab 2 2021-09-28

Cybersecurity Vocab 2 crossword puzzle
Across
  1. biometrics considered invalid
  2. Resources such as computers and accounts
  3. cycle or new roles
  4. Validating a user
  5. authorizing access to user using biological feature
  6. token into USB port
  7. permission giver from other things
  8. denying authorized biometircs credential
  9. permission recieved from higher level
Down
  1. Everyplace the hacker can get into
  2. standard authentication protocol
  3. permission given at certain lications
  4. reducing vulnerability
  5. Identity Managementsemi-independent systems
  6. FAR and FRR are equal

15 Clues: Validating a usercycle or new rolestoken into USB portFAR and FRR are equalreducing vulnerabilitybiometrics considered invalidstandard authentication protocolEveryplace the hacker can get intopermission giver from other thingspermission given at certain licationspermission recieved from higher levelResources such as computers and accounts...

October Cybersecurity Month 2019-09-19

October Cybersecurity Month crossword puzzle
Across
  1. Department to call for computer problem
  2. A device you should not plug in
  3. Think before you -- ?
  4. A type of malware that encrypts your file
  5. Something you should never share
  6. Programs installed on your phone are called?
Down
  1. Location of the Bank's Disaster Recovery Site
  2. A type of an email scam
  3. key word used to send secure email
  4. Password should always be?
  5. Northern Bank's Mission Statement
  6. Location of the Bank's head quarter
  7. A way to access the bank resources remotely
  8. Last name of the head of IT
  9. Type of an Operating system

15 Clues: Think before you -- ?A type of an email scamPassword should always be?Last name of the head of ITType of an Operating systemA device you should not plug inSomething you should never shareNorthern Bank's Mission Statementkey word used to send secure emailLocation of the Bank's head quarterDepartment to call for computer problem...

cybersecurity Puzzle-Enrique 2023-08-22

cybersecurity Puzzle-Enrique crossword puzzle
Across
  1. prevents unauthorized changes
  2. scrambling data
  3. UI redress attack
  4. false perception of reality
  5. disguised attacks
  6. fools users into providing sensitive information
  7. personal laptop, smart phones, ect
Down
  1. online harassment
  2. virtual private network
  3. locks users out until they pay
  4. short for malicious software
  5. prevents unauthorized access
  6. transmits information without user knowing
  7. codes that protect data
  8. carry out cyber attacks on other systems

15 Clues: scrambling dataonline harassmentUI redress attackdisguised attacksvirtual private networkcodes that protect datafalse perception of realityshort for malicious softwareprevents unauthorized accessprevents unauthorized changeslocks users out until they paypersonal laptop, smart phones, ectcarry out cyber attacks on other systems...

October Cybersecurity Month 2019-09-19

October Cybersecurity Month crossword puzzle
Across
  1. A device you should not plug in
  2. Last name of the head of IT
  3. Location of the Bank's Disaster Recovery Site
  4. Type of an Operating system
  5. key word used to send secure email
  6. Programs installed on your phone are called?
  7. Think before you -- ?
Down
  1. A type of malware that encrypts your file
  2. Something you should never share
  3. A type of an email scam
  4. Department to call for computer problem
  5. Location of the Bank's head quarter
  6. Northern Bank's Mission Statement
  7. Password should always be?
  8. A way to access the bank resources remotely

15 Clues: Think before you -- ?A type of an email scamPassword should always be?Last name of the head of ITType of an Operating systemA device you should not plug inSomething you should never shareNorthern Bank's Mission Statementkey word used to send secure emailLocation of the Bank's head quarterDepartment to call for computer problem...

October Cybersecurity Month 2019-09-19

October Cybersecurity Month crossword puzzle
Across
  1. Something you should never share
  2. A type of an email scam
  3. Location of the Bank's Disaster Recovery Site
  4. Northern Bank's Mission Statement
  5. Last name of the head of IT
  6. Department to call for computer problem
  7. Location of the Bank's head quarter
  8. Password should always be?
Down
  1. A type of malware that encrypts your file
  2. Type of an Operating system
  3. Think before you -- ?
  4. A way to access the bank resources remotely
  5. Programs installed on your phone are called?
  6. key word used to send secure email
  7. A device you should not plug in

15 Clues: Think before you -- ?A type of an email scamPassword should always be?Type of an Operating systemLast name of the head of ITA device you should not plug inSomething you should never shareNorthern Bank's Mission Statementkey word used to send secure emailLocation of the Bank's head quarterDepartment to call for computer problem...

Cybersecurity and Cryptography 2024-10-17

Cybersecurity and Cryptography crossword puzzle
Across
  1. What device monitors and controls incoming and outgoing network traffic?
  2. What is a digital document that verifies the ownership of a public key?
  3. term describes a weakness in a system that can be exploited by threats?
  4. What is the process of converting data into a fixed-size string of characters for security?
  5. What is the process of converting plaintext into ciphertext to protect information?
  6. What is the process of converting ciphertext back into plaintext?
  7. What type of malware disguises itself as legitimate software?
  8. What type of malware records keystrokes made by a user?
Down
  1. What is a physical or digital object used to prove identity in security systems?
  2. What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
  3. What term refers to malicious software designed to harm or exploit devices?
  4. What term refers to the permission to enter or use a system or network?
  5. What protocol secures data sent over the internet by encrypting it?
  6. What is the process of verifying the identity of a user or system?
  7. What is the process of creating copies of data to restore in case of loss?

15 Clues: What type of malware records keystrokes made by a user?What type of malware disguises itself as legitimate software?What is the process of converting ciphertext back into plaintext?What is the process of verifying the identity of a user or system?What protocol secures data sent over the internet by encrypting it?...

Cybersecurity 2022-11-01

Cybersecurity crossword puzzle
Across
  1. A strong password has at least __ characters
  2. Is this a strong password: Muff1n M@n!!
  3. Should you make your password 5 characters?
  4. The best passwords have lowercase and __ letters
Down
  1. The best passwords are easy to ____
  2. ___ should use a unsecure password

6 Clues: ___ should use a unsecure passwordThe best passwords are easy to ____Is this a strong password: Muff1n M@n!!Should you make your password 5 characters?A strong password has at least __ charactersThe best passwords have lowercase and __ letters

Cybersecurity 2023-08-14

Cybersecurity crossword puzzle
Across
  1. Designed to deny a user or organisation access to files on their computer.
  2. The act of compromising digital devices and networks through unauthorized access to an account or computer system.
  3. An attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
Down
  1. Intrusive software developed to steal data and damage or destroy computers and computer systems.
  2. When attackers attempt to trick users into doing 'the wrong thing.
  3. Process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.

6 Clues: When attackers attempt to trick users into doing 'the wrong thing.Designed to deny a user or organisation access to files on their computer.Intrusive software developed to steal data and damage or destroy computers and computer systems.The act of compromising digital devices and networks through unauthorized access to an account or computer system....

Cybersecurity 2024-02-29

Cybersecurity crossword puzzle
Across
  1. is a cyber attack intended to redirect a website's traffic to another, fake site
  2. PIN numbers.
  3. is the act of creating a scenario where the victim gives out personal information
Down
  1. is observing a person's private information over their shoulder e.g. cashpoint
  2. is a technique of fraudulently obtaining private information, often using email or SMS.
  3. Malicious software is called?

6 Clues: PIN numbers.Malicious software is called?is observing a person's private information over their shoulder e.g. cashpointis a cyber attack intended to redirect a website's traffic to another, fake siteis the act of creating a scenario where the victim gives out personal information...

Information Security Terms 2024-01-31

Information Security Terms crossword puzzle
Across
  1. Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
  2. A software vulnerability that is exploited by attackers before the vendor releases a fix.
  3. of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
  4. Response: The process of responding to and managing the aftermath of a cybersecurity incident.
  5. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  6. Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
  7. The process of converting data into a code to prevent unauthorized access.
  8. Weaknesses in a system that can be exploited by threats to compromise its security.
Down
  1. Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
  2. Software designed to detect and remove malicious software from a computer.
  3. The process of verifying the identity of a user, system, or device.
  4. Security: Security measures to protect network endpoints, such as computers and mobile devices.
  5. Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
  6. A network security device that monitors and controls incoming and outgoing network traffic.
  7. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  8. A software update designed to fix vulnerabilities or improve security.

16 Clues: The process of verifying the identity of a user, system, or device.A software update designed to fix vulnerabilities or improve security.Software designed to detect and remove malicious software from a computer.The process of converting data into a code to prevent unauthorized access....

Information Security Terms 2024-01-31

Information Security Terms crossword puzzle
Across
  1. Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
  2. A software vulnerability that is exploited by attackers before the vendor releases a fix.
  3. of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
  4. Response: The process of responding to and managing the aftermath of a cybersecurity incident.
  5. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  6. Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
  7. The process of converting data into a code to prevent unauthorized access.
  8. Weaknesses in a system that can be exploited by threats to compromise its security.
Down
  1. Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
  2. Software designed to detect and remove malicious software from a computer.
  3. The process of verifying the identity of a user, system, or device.
  4. Security: Security measures to protect network endpoints, such as computers and mobile devices.
  5. Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
  6. A network security device that monitors and controls incoming and outgoing network traffic.
  7. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  8. A software update designed to fix vulnerabilities or improve security.

16 Clues: The process of verifying the identity of a user, system, or device.A software update designed to fix vulnerabilities or improve security.Software designed to detect and remove malicious software from a computer.The process of converting data into a code to prevent unauthorized access....

Shayaans Life 2023-01-11

Shayaans Life crossword puzzle
Across
  1. My favorite game
  2. what is aphone
  3. an animal I hate
  4. my favorite food
  5. where i used to live
Down
  1. what i think my future job is going to be
  2. are something better than cookies
  3. what I have as another pet
  4. what is the base code of a computer
  5. what I have as a pet

10 Clues: what is aphoneMy favorite gamean animal I hatemy favorite foodwhat I have as a petwhere i used to livewhat I have as another petare something better than cookieswhat is the base code of a computerwhat i think my future job is going to be

M3 test crossword 2023-06-14

M3 test crossword crossword puzzle
Across
  1. Stops electricity from flowing, rubber.
  2. Power from water.
  3. Happens again and again.
  4. Power from Earth's heat.
  5. Online protection.
Down
  1. Power lines connecting power supplies to homes in a large area.
  2. Measures the voltage in the circuit.
  3. Makes power and electricity.
  4. If it's high, power is low.
  5. Allows electricity to flow, metal.

10 Clues: Power from water.Online protection.Happens again and again.Power from Earth's heat.If it's high, power is low.Makes power and electricity.Allows electricity to flow, metal.Measures the voltage in the circuit.Stops electricity from flowing, rubber.Power lines connecting power supplies to homes in a large area.

CROSSWORD 2023-01-12

CROSSWORD crossword puzzle
Across
  1. The art of cooking.
  2. Learns to handle and drive large machines.
  3. Focuses on fighting fires.
  4. Information Technology.
  5. Learns to teach young children.
  6. Deals with teeth.
  7. The art of mending metals.
  8. Dog, cat, and pet care.
  9. Digital photography, planning, and recording.
  10. Heating, ventilation, and air Conditioning.
Down
  1. Builds and constructs things.
  2. Learns how to do procedures on people in need.
  3. Hair, makeup, and nails.
  4. Learns to keep devices safe and secure.
  5. Laws, justice, and how to enforce them.
  6. Learns to design and print.
  7. Nursing and saving lives.
  8. Learns to do auto care and maintenance.
  9. Installs, removes, and repairs electric.

19 Clues: Deals with teeth.The art of cooking.Information Technology.Dog, cat, and pet care.Hair, makeup, and nails.Nursing and saving lives.Focuses on fighting fires.The art of mending metals.Learns to design and print.Builds and constructs things.Learns to teach young children.Learns to keep devices safe and secure.Laws, justice, and how to enforce them....

Telecom Olympics 2020 2020-04-10

Telecom Olympics 2020 crossword puzzle
Across
  1. Making copies of data
  2. Tech Support Company
  3. Don't open ___ from people you don't know
  4. WCTA is ____ years old
  5. Use ____ passwords
  6. The capacity of a telecom line to carry signals
  7. Network security system used to stop unauthorized access
  8. Communication over a distance
  9. A piece of code that is capable of destroying data
Down
  1. Board President
  2. NIST involves strategies for ____
  3. The activity of defrauding by posing as a legit business
  4. Someone who seeks to exploit weaknesses in a network
  5. What is a CDR?

14 Clues: What is a CDR?Board PresidentUse ____ passwordsTech Support CompanyMaking copies of dataWCTA is ____ years oldCommunication over a distanceNIST involves strategies for ____Don't open ___ from people you don't knowThe capacity of a telecom line to carry signalsA piece of code that is capable of destroying data...

Garrett & Angie 2024-04-23

Garrett & Angie crossword puzzle
Across
  1. The city where Garrett proposed
  2. Angie's favorite type of wine
  3. Garrett's college degree
  4. Their favorite sport to watch together
  5. Couples' favorite sport to play together
  6. The current city the couple lives in
  7. The # of years the couple has been together
Down
  1. Couples' favorite TV show to watch together
  2. The sport Garrett played in college
  3. Garrett's middle name
  4. Angie's middle name
  5. City where Angie was born
  6. The state where the couple went to college
  7. Angie's college degree

14 Clues: Angie's middle nameGarrett's middle nameAngie's college degreeGarrett's college degreeCity where Angie was bornAngie's favorite type of wineThe city where Garrett proposedThe sport Garrett played in collegeThe current city the couple lives inTheir favorite sport to watch togetherCouples' favorite sport to play together...

Profesi dan peluang usaha dibildang tkjt 2023-11-17

Profesi dan peluang usaha dibildang tkjt crossword puzzle
Across
  1. memastikan perusahaan mematuhi peraturan dan standar keamanan TI
  2. pembuat konten
  3. mengelola dan memelihara jaringan komputer perusahaan
  4. bertanggung jawab memelihara jaringan komputer
  5. mengkroordinasikan proyek proyek TI
Down
  1. yang mengelola jaringan komputer
  2. membangun dan mengembangkan situs web
  3. memberikan pelatihan tentang penggunaan teknologi
  4. yang mengembangkan kecerdasan buatan
  5. yang menjaga keamanan terhadap sistem insfastrukur TI

10 Clues: pembuat kontenyang mengelola jaringan komputermengkroordinasikan proyek proyek TIyang mengembangkan kecerdasan buatanmembangun dan mengembangkan situs webbertanggung jawab memelihara jaringan komputermemberikan pelatihan tentang penggunaan teknologiyang menjaga keamanan terhadap sistem insfastrukur TI...

Cybersecurity 2022-09-29

Cybersecurity crossword puzzle
Across
  1. An attack that attempts to make an online service unavailable by overwhelming it with traffic from multiple sources.
  2. Attacker invents a scenario in order to convince the victim to give them data or money.
  3. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
  1. Sending an email designed to trick the recipient into giving away personal information
  2. Any malware that misleads users of its true intent.
  3. Someone that gains unauthorised access to a device or sever.

6 Clues: Any malware that misleads users of its true intent.Someone that gains unauthorised access to a device or sever.Sending an email designed to trick the recipient into giving away personal informationAttacker invents a scenario in order to convince the victim to give them data or money....

Cybersecurity 2024-01-09

Cybersecurity crossword puzzle
Across
  1. Software update to fix vulnerabilities
  2. A secret code to access your account
  3. Malicious code that can harm your computer
Down
  1. Process of converting data to prevent unauthorized access
  2. Type of social engineering attack
  3. Protective barrier against unauthorized access

6 Clues: Type of social engineering attackA secret code to access your accountSoftware update to fix vulnerabilitiesMalicious code that can harm your computerProtective barrier against unauthorized accessProcess of converting data to prevent unauthorized access

Cybersecurity 2020-08-24

Cybersecurity crossword puzzle
Across
  1. Proposito informatico de detectar virus
  2. Estafa que busca sacrte datos bancarios, o tarjetas
  3. Se quedan con tu informacion como la de ingreso, nombre de usuario no espian
Down
  1. Sofwtare malo que esta hecho para meterse infiltradamente a una computadora
  2. Programas que no son originales y que te cambian y inhabilitan el acceso a tu computadora
  3. Hace que no pueda entrar nadie infiltrado a tu computadora

6 Clues: Proposito informatico de detectar virusEstafa que busca sacrte datos bancarios, o tarjetasHace que no pueda entrar nadie infiltrado a tu computadoraSofwtare malo que esta hecho para meterse infiltradamente a una computadoraSe quedan con tu informacion como la de ingreso, nombre de usuario no espian...

Cybersecurity 2022-08-15

Cybersecurity crossword puzzle
Across
  1. Flying mammal
  2. The United States' first state-specific consumer privacy law
  3. Has a trunk
  4. Man's best friend
Down
  1. Large marsupial
  2. Likes to chase mice

6 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase miceThe United States' first state-specific consumer privacy law

Cybersecurity 2022-11-01

Cybersecurity crossword puzzle
Across
  1. A strong password has at least __ characters
  2. Is this a strong password: Muff1n M@n!!
  3. Should you make your password 5 characters?
  4. The best passwords have lowercase and __ letters
Down
  1. The best passwords are easy to ____
  2. ___ should use a unsecure password

6 Clues: ___ should use a unsecure passwordThe best passwords are easy to ____Is this a strong password: Muff1n M@n!!Should you make your password 5 characters?A strong password has at least __ charactersThe best passwords have lowercase and __ letters

NCSAM 2021 Crossword 2021-08-05

NCSAM 2021 Crossword crossword puzzle
Across
  1. TIAA’s associates are our company’s first and best line of _______ against cyber criminals.
  2. Smart devices such as Amazon Alexa, Google Speakers, and Smart Appliances are examples of what?
  3. What malware propagates without a host program?
  4. Tips to keep your home office secure: _____ your computer when you step away, and shut it down at the end of the day.
  5. A _____ is email monitoring designed to prevent unwanted email and deliver good email. Messages that this will block include spam, phishing attacks, malware or fraudulent content.
  6. What does the A in CAP stand for?
  7. What TIAA Cybersecurity team manages the full lifecycle of user access to applications and systems. Hint: _______ and Access Management
  8. What malware encrypts files and demands money for the decryption key?
  9. This year Cyber has rebranded as TIAA _____ Cybersecurity
Down
  1. What is the last name of the TIAA Bank CISO?
  2. A good way to secure your devices at home is by regularly _______
  3. What type of attack do patches not prevent against?
  4. The probability of exposure or loss of assets is considered what?
  5. What type of information is private and identifies people?
  6. What technology allows information sent over the internet to remain private or confidential?
  7. What do most modern websites use to provide encryption?
  8. Which industry is most targeted by social engineers?
  9. Multifactor _____ adds extra layers of security when logging in.
  10. A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.

19 Clues: What does the A in CAP stand for?What is the last name of the TIAA Bank CISO?What malware propagates without a host program?What type of attack do patches not prevent against?Which industry is most targeted by social engineers?What do most modern websites use to provide encryption?This year Cyber has rebranded as TIAA _____ Cybersecurity...

Guess me If you Can 2022-06-29

Guess me If you Can crossword puzzle
Across
  1. Moral philosophy
  2. of conduct A set of rules
  3. An event that is either unpleasant or unusual
  4. The act of obeying an order, rule, or request
  5. Possibility of loss or injury
  6. A set of guidelines
Down
  1. An official inspection
  2. One who reports suspected wrongdoing
  3. Verification of the identity
  4. Protection of internet-connected system

10 Clues: Moral philosophyA set of guidelinesAn official inspectionof conduct A set of rulesVerification of the identityPossibility of loss or injuryOne who reports suspected wrongdoingProtection of internet-connected systemAn event that is either unpleasant or unusualThe act of obeying an order, rule, or request

Guess Me If You Can 2022-06-29

Guess Me If You Can crossword puzzle
Across
  1. Moral philosophy
  2. of conduct A set of rules
  3. An event that is either unpleasant or unusual
  4. The act of obeying an order, rule, or request
  5. Possibility of loss or injury
  6. A set of guidelines
Down
  1. An official inspection
  2. One who reports suspected wrongdoing
  3. Verification of the identity
  4. Protection of internet-connected system

10 Clues: Moral philosophyA set of guidelinesAn official inspectionof conduct A set of rulesVerification of the identityPossibility of loss or injuryOne who reports suspected wrongdoingProtection of internet-connected systemAn event that is either unpleasant or unusualThe act of obeying an order, rule, or request

Majors and Concentrations 2022-01-26

Majors and Concentrations crossword puzzle
Across
  1. learns to protect on a digital platform
  2. the scientific study of mind and behavior
  3. works with chemicals and beakers
  4. spends a lot of time with a calculator
  5. studies the ocean
  6. synthesizes math science and creativity to build things
Down
  1. studies how to effectively target consumers
  2. synthesizes biology and chemistry
  3. clinicals are part of the program
  4. studies the past
  5. lights...camera...action!
  6. the study of living organisms

12 Clues: studies the paststudies the oceanlights...camera...action!the study of living organismsworks with chemicals and beakerssynthesizes biology and chemistryclinicals are part of the programspends a lot of time with a calculatorlearns to protect on a digital platformthe scientific study of mind and behaviorstudies how to effectively target consumers...

NAVFAC Capabilities 2023-02-16

NAVFAC Capabilities crossword puzzle
Across
  1. NEPA regulations requirement
  2. ________ Handling Ashore Procurement
  3. ________Facilities and Equipment Engineering
  4. Protection against criminal or unauthorized use of electronic data
  5. Basic physical and organizational structures and facilities
  6. Real Estate _________ and Management
Down
  1. _______ and Facilities Operations
  2. _________ Vehicles provide transportation services
  3. Relating to impact of human activity on the natural world
  4. Proposed or planned undertaking
  5. NAVFAC Capabilities: ______ & Construction
  6. Detailed coordination of a complex operation involving people, facilities, or supplies.

12 Clues: NEPA regulations requirementProposed or planned undertaking_______ and Facilities Operations________ Handling Ashore ProcurementReal Estate _________ and ManagementNAVFAC Capabilities: ______ & Construction________Facilities and Equipment Engineering_________ Vehicles provide transportation services...

Family Puzzle Time! 2022-01-11

Family Puzzle Time! crossword puzzle
Across
  1. A game completed by all three (human) family members
  2. Messengers for Demon Slayers
  3. The most dignified gentleman in the house
  4. The go-to nightly unwind YouTube videos
  5. Katie's favorite novel!
  6. Both our favorite burger AND a character on Venture Brothers
Down
  1. Taylor's favorite dinner food
  2. Beckett's college major!
  3. Toss a coin to this guy
  4. He loves nighttime belly pets!
  5. Please don't tell people how he lives
  6. He loves to play on the bachelor pad
  7. Our favorite doggo!
  8. This guy loves to grind...

14 Clues: Our favorite doggo!Toss a coin to this guyKatie's favorite novel!Beckett's college major!This guy loves to grind...Messengers for Demon SlayersTaylor's favorite dinner foodHe loves nighttime belly pets!He loves to play on the bachelor padPlease don't tell people how he livesThe go-to nightly unwind YouTube videos...

Jenny and Nate 2023-01-19

Jenny and Nate crossword puzzle
Across
  1. Jenny is the _________ of her siblings
  2. What God has _______, let not man separate
  3. State where honeymoon will be
  4. Relationship of flower girl (Esther) to Jenny
  5. Name of wedding venue
  6. ”Mawiage, mawiage, is what ______ us together today”
  7. Nate’s birthday month
  8. Jenny's major
  9. The couple's favorite author, hint: Narnia
Down
  1. _____ is patient and kind
  2. Nate’s hometown, hint: rhymes with “mutton”
  3. Jenny played this sport in high school
  4. Nate plays this instrument
  5. Nate's major
  6. The formal event to declare a marriage
  7. Jenny’s birthday month
  8. First date, hint: Omaha Art Museum
  9. You may now _____ the bride
  10. Who drinks coffee black? Him or her
  11. Class Nate and Jenny met in

20 Clues: Nate's majorJenny's majorName of wedding venueNate’s birthday monthJenny’s birthday month_____ is patient and kindNate plays this instrumentYou may now _____ the brideClass Nate and Jenny met inState where honeymoon will beFirst date, hint: Omaha Art MuseumWho drinks coffee black? Him or herJenny is the _________ of her siblings...

Puzzle 2023-01-13

Puzzle crossword puzzle
Across
  1. we comply this compliance
  2. Financial platform for business
  3. Password Manager
  4. Our own ERP
  5. we protect from malicious attacks
Down
  1. I am Zoho’s new bee for calibri
  2. As a manufacturer we ship this
  3. I help you plan and visualise
  4. Zoho’s attempt on server less journey

9 Clues: Our own ERPPassword Managerwe comply this complianceI help you plan and visualiseAs a manufacturer we ship thisI am Zoho’s new bee for calibriFinancial platform for businesswe protect from malicious attacksZoho’s attempt on server less journey

ict 2023-09-16

ict crossword puzzle
Across
  1. unwanted and unsolicited email.
  2. machine that processes data.
  3. a structured collection of data.
  4. prevents data loss.
  5. writing code to instruct a computer.
  6. helps data find its way
  7. return to an initial state.
  8. Usually in one location.
  9. online storage and computing resources.
  10. blocks unwanted traffic
Down
  1. connects devices in a network.
  2. step-by-step procedure for solving a problem.
  3. wireless data transfer technology.
  4. programs that run on a computer.
  5. protecting computer systems from threats.
  6. a global network of connected computers.
  7. technology that allows data transmission without physical connections.
  8. keeps data secure.
  9. electroniconic communication method for sending and receiving messages.
  10. the global system of interconnected computer networks.

20 Clues: keeps data secure.prevents data loss.helps data find its wayblocks unwanted trafficUsually in one location.return to an initial state.machine that processes data.connects devices in a network.unwanted and unsolicited email.a structured collection of data.programs that run on a computer.wireless data transfer technology....

Production & Process 2024-07-11

Production & Process crossword puzzle
Across
  1. a series of actions or steps taken in order to achieve a particular end result
  2. Teddy Swims loses this
  3. American painter Norman _______
  4. abbreviation for digital transformation
  5. continually rhymes with domination
  6. large scale industrial production
Down
  1. protection from digital attacks
  2. "baby you can _____ my car"
  3. for indicating, measuring, and recording physical quantities
  4. Cirrus, Stratus, Cumulus to name a few
  5. setting standards for controls and automation
  6. should always be first

12 Clues: Teddy Swims loses thisshould always be first"baby you can _____ my car"protection from digital attacksAmerican painter Norman _______large scale industrial productioncontinually rhymes with dominationCirrus, Stratus, Cumulus to name a fewabbreviation for digital transformationsetting standards for controls and automation...

Majors and Concentrations 2022-01-26

Majors and Concentrations crossword puzzle
Across
  1. studies the past
  2. studies the ocean
  3. lights...camera...action!
  4. spends a lot of time with a calculator
  5. the study of living organisms
Down
  1. studies how to effectively target consumers
  2. the scientific study of mind and behavior
  3. clinicals are part of the program
  4. synthesizes biology and chemistry
  5. learns to protect on a digital platform
  6. works with chemicals and beakers
  7. synthesizes math science and creativity to build things

12 Clues: studies the paststudies the oceanlights...camera...action!the study of living organismsworks with chemicals and beakersclinicals are part of the programsynthesizes biology and chemistryspends a lot of time with a calculatorlearns to protect on a digital platformthe scientific study of mind and behaviorstudies how to effectively target consumers...

Cyberpatriot 2023-02-08

Cyberpatriot crossword puzzle
Across
  1. gives instructions on what to do
  2. protection of digital assets
  3. where users are sorted and adjusted
  4. protects against incoming cyberattacks
Down
  1. the scrambling of data to protect it
  2. gives points for answering questions
  3. where the competition takes place
  4. file disguised as something else
  5. software with ill intents

9 Clues: software with ill intentsprotection of digital assetsfile disguised as something elsegives instructions on what to dowhere the competition takes placewhere users are sorted and adjustedthe scrambling of data to protect itgives points for answering questionsprotects against incoming cyberattacks

Computer Basics 2023-04-06

Computer Basics crossword puzzle
Across
  1. email scam
  2. computers talking to computers
  3. a computer used for math
  4. instructions for a computer online
  5. online protection from hackers
  6. shortcut for linking in a document
Down
  1. a common output from typing or drawing
  2. a set of step-by-step instructions
  3. an input device with letters and numbers
  4. people that try to take your online inforamtion
  5. a websites name
  6. most used search engine
  7. device that takes an input and gives an output

13 Clues: email scama websites namemost used search enginea computer used for mathcomputers talking to computersonline protection from hackersa set of step-by-step instructionsinstructions for a computer onlineshortcut for linking in a documenta common output from typing or drawingan input device with letters and numbers...

klausimai 2023-05-17

klausimai crossword puzzle
Across
  1. Kas yra „object-oriented programming“?
  2. Kas yra žurnalavimas?
  3. Kas yra „data cente?
  4. Kas yra „software development life cycle“?
  5. Kas yra „operating system“?
  6. Kas yra „network protocol“?
  7. Kas yra „serveris“?
  8. Kas yra „cloud computing“?
  9. Kas yra „version control“?
  10. Kas yra „URL“?
  11. Kas yra „cybersecurity“?
  12. Kas yra „cache“?
  13. Kas yra „cyber attack“?
  14. Kas yra „bug“
  15. Kas yra „router“?
  16. Kas yra „firewall“?
Down
  1. Kas yra „artificial intelligence“?
  2. Kas yra „RAM“?
  3. Kas yra „encryption“?
  4. Kas yra „HTML“?
  5. Kas yra „API“?
  6. Kas yra „data backup“?
  7. Kas yra „malware“?
  8. Kas yra „database management system“?
  9. Kas yra algoritmas
  10. Kas yra duomenų bazė?
  11. Kas yra „programming language“?
  12. Kas yra „data mining“?
  13. Kas yra „open source“?
  14. Kas yra „user interface“?

30 Clues: Kas yra „bug“Kas yra „RAM“?Kas yra „API“?Kas yra „URL“?Kas yra „HTML“?Kas yra „cache“?Kas yra „router“?Kas yra „malware“?Kas yra algoritmasKas yra „serveris“?Kas yra „firewall“?Kas yra „data cente?Kas yra „encryption“?Kas yra žurnalavimas?Kas yra duomenų bazė?Kas yra „data backup“?Kas yra „data mining“?Kas yra „open source“?Kas yra „cyber attack“?...

Cybersecurity Awareness Month 2024-10-16

Cybersecurity Awareness Month crossword puzzle
Across
  1. A type of malware that demands payment in exchange for restoring access to data
  2. A type of malicious software that replicates itself by attaching to other programs or files, potentially causing harm to computer systems, networks, or data.
  3. Creating a copy of data to prevent its loss in case of a disaster or data breach
  4. A type of software that is designed to damage or exploit a computer system
  5. The process of converting data into a secure format to prevent unauthorized access and ensure confidentiality.
  6. The potential for loss or damage when a threat exploits a vulnerability, often assessed in terms of likelihood and impact on organizational assets.
  7. The process of verifying the identity of a user, device, or system
Down
  1. A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
  2. Type of malware that allows an attacker to remotely control a system or network
  3. A network that encrypts internet connections and helps secure remote access to a network
  4. Adhering to regulatory requirements and industry standards for data protection and privacy in cloud environments
  5. Unsolicited, unwanted, and often malicious messages sent in bulk.
  6. Attack where an attacker gains unauthorized access to a system or network
  7. The act of revising software or systems to fix vulnerabilities and enhance security against emerging threats.

14 Clues: Unsolicited, unwanted, and often malicious messages sent in bulk.The process of verifying the identity of a user, device, or systemAttack where an attacker gains unauthorized access to a system or networkA type of software that is designed to damage or exploit a computer system...