cybersecurity Crossword Puzzles
Cybersecurity Awareness Month 2024-07-26
Across
- A fence provides this
- From white to red
- Virtual storage in the sky
- Malicious software holding data hostage
- Digital mischief-maker
- Verifying Identity
- Artificial or Real?
- Identity verification through unique traits Yellow Data
Down
- Digital bouncer for unauthorized data
- AI-generated deception
- Deceptive online lure
- Computer ninja with a keyboard
- Personal secret sentence for entry
- Your computer is under the weather
- Security theft exposing data
- Cyber vigilance
- Wireless internet access point
- Voice trickery that sounds fishy!
- BIG catch for cyber criminals
- Security in scrambled letters
- Interconnected web of computers
21 Clues: Cyber vigilance • From white to red • Verifying Identity • Artificial or Real? • Deceptive online lure • A fence provides this • AI-generated deception • Digital mischief-maker • Virtual storage in the sky • Security theft exposing data • BIG catch for cyber criminals • Security in scrambled letters • Computer ninja with a keyboard • Wireless internet access point • ...
Introduction to Cybersecurity 2023-09-09
Across
- Its job is to put a digital signature on outgoing mail so servers could actually verify that it is you sending that email.
- Unwanted messages are usually referred to as spam.
- It's the third tool for email authentication. DMARC verifies that this address matches the “from” address you see.
- when a victim is bullied and harassed through electronics.
- Policy Framework (SPF)- an email authentication method that helps to identify the mail servers that are allowed to send email for a given domain.
- This is a part of a computer system that is utilized to block unauthorized data.
- protection against unauthorized access
- It is the process of converting data into a different type of form or code.
- Its an email authentication policy that protects against bad people who use fake email addresses.
- It is an area where computer systems and networks are utilized.
- program is referred to as clientless if it can operate wholly over the network without needing to install any software.
Down
- an email authentication method that uses a digital signature to let the receiver of an email know that the message was sent and authorized by the owner of a domain.
- this is when you pass an organization’s existing security systems.
- spoof logos and make up fake email addresses. Scammers use familiar company names or pretend to be someone you know.
- attempt to gain unauthorized access to a computer
- a software used as an intent to destroy or disrupt unauthorized access.
- Wifi protected access is a security standard for computing devices.
- insurance- Cyber insurance is one option that can help protect your business against losses resulting from a cyber attack.
- This is when users can send and receive data using a virtual private network.
- authentication This technology allows a receiving server to verify an email from your company and block emails from an imposter.
20 Clues: protection against unauthorized access • attempt to gain unauthorized access to a computer • Unwanted messages are usually referred to as spam. • when a victim is bullied and harassed through electronics. • It is an area where computer systems and networks are utilized. • this is when you pass an organization’s existing security systems. • ...
Cybersecurity terminology challenge 2023-09-12
Across
- authentication: Using additional authentication steps.
- Data: Information that requires protection due to its importance.
- devices: Securing sensitive information through encryption.
- A system of interconnected computers and devices.
- Fixing damaged equipment or systems.
- backup: Regularly saving important files.
- Malicious software, often used in phishing.
- passwords: Mandating password usage for device access.
- network: A network for wireless device connections.
Down
- Malicious software that locks your data and demands payment.
- Isolate infected computers from the network.
- attempt: Suspicious requests for sensitive information.
- Informing relevant parties about a situation.
- software: Keeping applications and systems current.
- The process of restoring normalcy after an incident.
- Personnel Access: Unauthorized entry by individuals who should not have access.
- encryption: A type of wireless security encryption.
- Drives: Small removable storage devices.
- A device managing internet connections.
- Deceptive emails with links or attachments to steal data.
20 Clues: Fixing damaged equipment or systems. • A device managing internet connections. • Drives: Small removable storage devices. • backup: Regularly saving important files. • Malicious software, often used in phishing. • Isolate infected computers from the network. • Informing relevant parties about a situation. • A system of interconnected computers and devices. • ...
Cybersecurity Crossword Puzzle 2025-03-11
Across
- Insurance against data loss
- Malware pretending to be a program
- Software designed to detect malware
- A network of infected computers
- Something that makes us safe
- Data exposed or stolen by attackers
- An individual responsible for launching cyberattacks
- Electronic equipment no longer used
- Bullying someone online
- Scam email or message
- How to open a password-protected device
Down
- Harmful software that enters a device
- Sell knowledge of hardware to attackers
- Where you store passwords
- Committing identity or financial fraud
- When body parts used for authentication
- Ensures person accessing software is authentic
- Hardware used to keep intruders out
- A lock on data for protection
- Program designed to copy itself
20 Clues: Scam email or message • Bullying someone online • Where you store passwords • Insurance against data loss • Something that makes us safe • A lock on data for protection • A network of infected computers • Program designed to copy itself • Malware pretending to be a program • Software designed to detect malware • Hardware used to keep intruders out • ...
Cybersecurity Terminology Puzzle 2025-03-14
Across
- Targeted high-profile phishing attack
- Manipulating people for information
- Unauthorized system intruder
- Malware demanding payment
- Software that spies
- Malware disguised as legitimate
- Faking identity
- Malicious software
- Software to detect malware
- Self-replicating malware
Down
- Records keystrokes secretly
- Data Protection technique
- Secret code
- Network security system
- Fingerprint or facial recognition
- Fraudulent email scam
- Unknown software vulnerability
- Taking advantage of vulnerability
- Secure network connection
- Hidden access method
20 Clues: Secret code • Faking identity • Malicious software • Software that spies • Hidden access method • Fraudulent email scam • Network security system • Self-replicating malware • Data Protection technique • Malware demanding payment • Secure network connection • Software to detect malware • Records keystrokes secretly • Unauthorized system intruder • Unknown software vulnerability • ...
Cybersecurity Crossword Puzzle 2025-08-27
Across
- Secret way into system
- Extra login security method
- Fake emails stealing info
- Locks files demands payment
- Secretly collects user data
- Software security update
- Secure internet connection
- Malware disguised as software
- Overwhelms server with traffic
- Network of infected computers
Down
- Malicious software program
- Unauthorized data access
- Records keystrokes secretly
- Self-replicating malware
- Scrambling data for security
- Blocks unauthorized network access
- Detects removes malware
- Device for authentication
- Converts data to fixed value
- Hidden malicious software
20 Clues: Secret way into system • Detects removes malware • Unauthorized data access • Self-replicating malware • Software security update • Fake emails stealing info • Device for authentication • Hidden malicious software • Malicious software program • Secure internet connection • Records keystrokes secretly • Extra login security method • Locks files demands payment • ...
Cybersecurity Awareness Month 2025-09-10
Across
- Keeping your software and systems current with the latest fixes
- A person who uses computers to gain unauthorized access to data
- A copy of data stored separately in case the original is lost or damaged
- A program that replicates itself and spreads to other computers
- Manipulating people into giving up confidential information
- A username and password used to verify identity
- A deceptive email or message that tricks you into giving information
- A type of malware that locks your files and demands payment to unlock them
Down
- The action you do to potential phishing attempts
- A Device or software that blocks unauthorized access to a network
- The process of converting data into a code to prevent unauthorized access
- A type of software designed to detect and remove malicious programs
- a dishonest scheme used to trick people into giving up information or money
- A state where systems and data are protected from threats
- A method of confirming your identity using two or more factors
- An incident where data is accessed without authorization
- Pretending to be someone else to gain access
- Software that secretly gathers information about a person or organization
- A secret word or phrase used to gain access to a system
- A general term for software designed to harm or exploit systems
20 Clues: Pretending to be someone else to gain access • A username and password used to verify identity • The action you do to potential phishing attempts • A secret word or phrase used to gain access to a system • An incident where data is accessed without authorization • A state where systems and data are protected from threats • ...
Unit 1: Cybersecurity 2025-09-09
Across
- Laws in Europe that regulate how companies can collect personal data
- Flaw or weakness in a system or device
- Type of authentication that requires 2 ways to identify a user
- Type of data that stores users medical records
- General term used to describe an individual or a group of hackers
- Process of measuring what is happening within the system
- The ability to find information, evaluate information credibility, and use information effectively
- Software that prevents users from accessing their files or network until a ransom is paid.
- Type of data that stores users bank account and credit card numbers
- Videos, images, or audio recordings that have been convincingly altered using artificial intelligence
- The science of making machines that can "think" and “create” like humans.
- Type of software that is designed to intentionally harm or damage a computer or network.
- The assurance that systems and data are accessible by authorized users when and where needed
- The protection of information from people who are not authorized to view it
- Software that secretly gathers information about a person or organization and sends it to an attacker
- Type of malware that attaches itself onto a host program, such as a document. It can cause serious damage to files or an entire device.
- Cybercrime in which a person is contacted by email, telephone or text message by someone who is posing as a legitimate company
- Authentication that uses an individual’s physical characteristics to verify their identity
- Ensures that one cannot deny having sent or received a message
- Type of data that store a users fingerprint or facial recognition
- Potential for a cybercriminal to exploit a vulnerability
- Specific group of hackers who are motivated by their ideological views.
- A long password be made of a sentence or a series of words
- The information about a particular person that exists on the Internet as a result of their online activity
- Software that make it easy to have strong, unique passwords for all of your accounts
Down
- AI algorithms can help flag anomalies in data
- Current or former employees who seek revenge on a company by abusing their access to files and passwords
- Any information that can be used to identify an individual (aka Personal Data)
- Network security device that monitors and filters incoming and outgoing network traffic.
- Systems that suggest the next video or song based on your patterns and the patterns of other similar consumers
- Process of enforcing policies and user privileges
- Aims at ensuring that information is protected from unauthorized or unintentional alteration
- External mechanism of control. Rules set in place by someone else.
- Hackers that are sponsored by a country.
- Group of hackers with ideological views but act with the intent to harm, typically resulting in violence
- Potential for loss when an attack happens
- Hackers that attack computers for the fun and challenge of it all
- Legal document outlining how a company can collect and use your data
- Process of identifying a user and granting them access
- Laws in California that protect consumers and regulates companies that collect and sell data
- Network of physical devices embedded with electronics which enables things to connect and exchange data
- Internal system of controls. Knowing the difference between right and wrong.
42 Clues: Flaw or weakness in a system or device • Hackers that are sponsored by a country. • Potential for loss when an attack happens • AI algorithms can help flag anomalies in data • Type of data that stores users medical records • Process of enforcing policies and user privileges • Process of identifying a user and granting them access • ...
Cybersecurity Vocabulary words 2022-10-17
Across
- concealing data into code with an assigned key
- citizenship responsible use of technology
- the act of purposely being mean, rude, or malicious towards an individual over the web
- malicious attempt to hack into a system without permission with the goal of stealing info
- individuals practicing the act of solving codes
- the act of securing a network utilizing tools
- malicious attempt to seek a vulnerability using code
- the process of converting confidential information into to be revealed with a key
- info on individual via internet
- device that monitors traffic that is going in and out of a network
Down
- studying and/or writing codes
- The dos and donts of hacking that can be malicious or ethical
- algorithms that covert plain text into code
- gaining access to a network without permission for malicious intent
- an obsessive act of watching what an individual does over the web
- best practices over the web
- a digitally altered picture to appear as another individual
- malicious hacking with multiple service requests
- trying to reveal a encryption without knowing the key
- something or someone that you are unable to understand or seems mysterious
- certificate cryptography link to an entity
21 Clues: best practices over the web • studying and/or writing codes • info on individual via internet • citizenship responsible use of technology • certificate cryptography link to an entity • algorithms that covert plain text into code • the act of securing a network utilizing tools • concealing data into code with an assigned key • ...
Cybersecurity XC 101 2023-12-09
Across
- a barrier between a trusted network and an untrustworthy network.
- tries to access data they aren’t authorized to view.
- a form of malware. It is designed to block users from accessing a computer system until a sum of money has been paid.
- a physical device connected to a computer network.
- converting information into a code to prevent unauthorized access.
- process for telling a computer which tasks to perform in order to solve problems.
- cybercriminals disguise their identity as a trusted source to exploit an unassuming user.
- anti-malware
Down
- weak point or flaw
- short for malicious software
- converting coded or encrypted data to its original form.
- a form of fraud that involves contacting victims through email, telephone, or text to trick them into sharing personal information.
- converting plain data into an encrypted format.
- network of private computers infected with malicious software.
- attempts by hackers to cause harm, destroy, or access sensitive information.
- unintended software or hardware problem
- a set of software tools that give users access to another machine without being detected.
- a group of connected computers
- infects computers
- serve as the entry and exit points for all data.
20 Clues: anti-malware • infects computers • weak point or flaw • short for malicious software • a group of connected computers • unintended software or hardware problem • converting plain data into an encrypted format. • serve as the entry and exit points for all data. • a physical device connected to a computer network. • tries to access data they aren’t authorized to view. • ...
Cybersecurity Awareness Puzzle 2023-09-29
Across
- A type of cyberattack in which an attacker systematically attempts all possible combinations of passwords or encryption keys to gain unauthorized access.
- A network security device or software that monitors and controls incoming and outgoing network traffic to protect against unauthorized access and cyber threats.
- Malicious software designed to harm or gain unauthorized access to computer systems, including viruses, Trojans, and ransomware.
- A form of cyberattack in which attackers impersonate trusted entities to trick individuals into disclosing sensitive information or taking malicious actions.
- The world's greatest Flamingo
- Unauthorized interception and monitoring of network communications, typically for the purpose of gathering sensitive information.
- The potential for financial loss, reputation damage, or other adverse consequences resulting from cybersecurity threats,
- A decoy system or network intentionally set up to attract and deceive cyber attackers, allowing security professionals to observe and study their activities.
- A vulnerability or software flaw that is unknown to the software vendor and therefore has no available fix or patch, making it highly exploitable.
- A part of the internet that is intentionally hidden and only accessible using special software, where users can browse anonymously and engage in activities that often include illegal or illicit transactions.
- A software update or fix released by vendors to address security vulnerabilities and improve the functionality or stability of a program or system.
- Social ___ is when individuals manipulate or deceive others, often using psychological tactics, to gain unauthorized access to information, systems, or physical spaces or to influence their actions for malicious purposes.
- is a phishing cybersecurity attack carried out over mobile text messaging, also known as SMS phishing
Down
- Contact the ___ ___ if you suspect malicious activity on your computer.
- The process of converting data into a secure, unreadable format to protect it from unauthorized access or interception.
- Malicious software that can replicate itself and infect other computer files, often causing harm by altering, corrupting, or deleting data and compromising the affected computer's operation.
- Malicious software that encrypts a victim's files or system and demands a ransom payment in exchange for the decryption key.
- Report Suspicious emails with the ___ ___ ___
- A secret combination of characters, typically known only to the authorized user
- A secure network connection that encrypts data traffic between a user's device and a remote server, providing privacy and anonymity, especially on public networks.
- A cyber crime that uses the phone to steal personal confidential information
- A network of interconnected physical devices, such as smart appliances and sensors, that can collect and exchange data over the internet.
- A malicious cyber tactic that attempts to distribute malware through online advertisements.
- Practicing cyber ___ is when you consistently follow best practices and take proactive measures to protect your digital devices, personal information, and online activities from cybersecurity threats and vulnerabilities.
- Software designed to detect, prevent, and remove computer viruses and other malware from a computer or network.
- Email ___ makes it seem that an email is coming from a legitimate or trusted source when, in reality, it may be sent by malicious actors with malicious intent.
26 Clues: The world's greatest Flamingo • Report Suspicious emails with the ___ ___ ___ • Contact the ___ ___ if you suspect malicious activity on your computer. • A cyber crime that uses the phone to steal personal confidential information • A secret combination of characters, typically known only to the authorized user • ...
Cybersecurity Crossword Puzzle 2023-09-11
Across
- - Refers to a revision or improvement made to a software program or system in order to fix bugs, enhance features, or patch security vulnerabilities.
- - The prefix "cyber" relates to computers, digital technology, and the internet. It frequently appears in contexts related to cybersecurity and cyber-related terms.
- - Ensuring its safety and protecting it from threats, risks, or vulnerabilities. In the realm of cybersecurity, it often entails safeguarding assets and data.
- - In cybersecurity, the term "spoofed" is used to describe the act of fabricating or deceiving information or the origin of data.
- - Short for advertisements, are messages or content created to promote products, services, or ideas.
- - DomainKeys Identified Mail (DKIM) is another method of email authentication. It allows recipients to verify if an email was genuinely sent from the claimed domain and authorized by it.
- - The process of converting information or data into code to prevent access or protect it from being read by anyone without the decryption key.
- - Verification.
- - To restore.
Down
- - A password is a combination of letters, numbers, and symbols that grants access to a computer system, account, or digital resource.
- - A type of coverage that businesses obtain to protect themselves against losses and liabilities resulting from cyberattacks and data breaches.
- - Sender Policy Framework is an email authentication protocol that helps prevent email spoofing by verifying if the sending mail server has permission to send emails on behalf of a domain.
- - An organized method or collection of recommendations for implementing security measures and protocols aimed at safeguarding an organization's assets.
- - Which stands for Domain-based Message Authentication, Reporting, and Conformance, is a protocol used for email authentication and reporting. Its primary purpose is to assist organizations in safeguarding their email domains against misuse in email spoofing attacks.
- - The practice of safeguarding computer systems, networks, and data from theft, damage, or unauthorized entry.
- - Refers to a collection of programs, data, or instructions that provide tasks or functions to a computer.
- - Email is a used method of exchanging messages over the internet. It serves as a communication tool for both business purposes.
- DRIVE - A portable device used for storing and transferring data between computers. It relies on flash memory technology.
- - Refers to a fraudulent scheme intended to deceive individuals or organizations into providing money, personal information, or other valuable assets.
- - When a computer or device is infected, it means that it has been compromised by malware or a virus. This can disrupt its functioning and lead to data theft.
20 Clues: - To restore. • - Verification. • - Short for advertisements, are messages or content created to promote products, services, or ideas. • - Refers to a collection of programs, data, or instructions that provide tasks or functions to a computer. • - The practice of safeguarding computer systems, networks, and data from theft, damage, or unauthorized entry. • ...
Cybersecurity Crossword Puzzle 2024-03-13
Across
- Tricks you by posing as a real company
- coding to hide information from hackers
- Audio/video altered to assume credibilty
- Harmful programs like viruses/trojans
- Used to auto-perform repetitive tasks
- Intruder changes IP address of an email
- Malware that hijacks and encrypts files
- Malware that can reproduce itself and spread
- Unauthorized access to a network
- Weakness in a system
- Tricked into clicking on web page object
Down
- Creates a secure encrypted connection
- Software used to protect from intruders
- Malware used to spy on computer activity
- Verifying user identity
- Malware that changes/corrupts information
- "Bring your own device" policy
- Online data storage system
- Network of computers infected with a virus
- Two or more computers connected together
- The address of a webpage
21 Clues: Weakness in a system • Verifying user identity • The address of a webpage • Online data storage system • "Bring your own device" policy • Unauthorized access to a network • Creates a secure encrypted connection • Harmful programs like viruses/trojans • Used to auto-perform repetitive tasks • Tricks you by posing as a real company • Software used to protect from intruders • ...
Cybersecurity Crossword Puzzle 2023-01-25
Across
- acquiring user info through deception
- faking transmissions to gain access
- software that provides unwanted ads
- process to identify user identity
- uses external verification to login
- unauthorized transfer of information
- software for spying on users
- risk-reduction controls on a system
- collection of compromised systems
- capability to limit network traffic
- distributed attack on a network
- unwanted advertising/unsolicited emails
- everyday objects connected to internet
Down
- malicious program you pay to unlock
- unencrypted information
- cypher used to protect information
- intrusive or malicious computer software
- software used to protect systems
- capture of data over networks
- test to verify if human
- process of decoding cyphers
21 Clues: unencrypted information • test to verify if human • process of decoding cyphers • software for spying on users • capture of data over networks • distributed attack on a network • software used to protect systems • process to identify user identity • collection of compromised systems • cypher used to protect information • malicious program you pay to unlock • ...
Cybersecurity Crossword Puzzle 2023-03-17
Across
- Prevents unauthorized axes.
- Encrypts user data.
- Malware disguised as legit files.
- Provides services over the internet.
- Scrambles data for security.
- Dangerous and can bypass security.
- A group of applications.
- Series of computers and peripherals.
- Waves of requests force shutdown.
- Malware that collects and transmits.
- Changes, corrupts, or destroys information.
Down
- Protects data during encryption.
- Shields users against viruses.
- Hacker changes the IP address.
- Malware that hijacks and encrypts.
- Network of compromised computers.
- Bad, evil software.
- Fools victim into giving information.
- A series of numbers.
- Malware that reproduces and spreads.
20 Clues: Encrypts user data. • Bad, evil software. • A series of numbers. • A group of applications. • Prevents unauthorized axes. • Scrambles data for security. • Shields users against viruses. • Hacker changes the IP address. • Protects data during encryption. • Network of compromised computers. • Malware disguised as legit files. • Waves of requests force shutdown. • ...
Cybersecurity Midterm Vocab 2022-12-09
Across
- electronic device which takes input, process the information and provides an output.
- software that is free of charge for a limited time after which if you choose to continue using it you have to either pay for or register the software.
- Graphics Processing Unit
- The process of applying the cipher to plaintext to convert it to ciphertext
- the server, application and database that work behind the scenes to deliver information to the user and store user data.
- collection of information that is organized so that it can be easily accessed, managed and updated.
- part of the operating system that has control over everything. It handles all of the interactions between the hardware and software.
- Random-Access Memory
- an arrangement of data that is logically organized in a row-and-column format
- a base 2 number system that represents any number using 2 digits (0-1).
- fastest form of data storage
- a base 16 number system that represents any number using 16 digits (0-9, A, B, C, D, E, F).
Down
- software that has been permanently installed in a machine, device, or microchip, usually by the manufacturer
- Central Processing Unit
- software that is free of charge for the lifetime of a user owning that software.
- The process of converting ciphertext back into plaintext
- Structured Query Language
- Information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other information that is linked or linkable to a specific individual.
- the use of technology to repeatedly and intentionally harass, hurt, embarrass, humiliate, or intimidate another person.
- a small amount of data generated by a website and saved by your web browser.
- the main board to which components are connected, facilitating communication
- the number of different digits or combination of digits and letters that a system of counting uses to represent numbers
- a philosophy of right or wrong behavior.
- the part of website where user can see information
- a base 10 number system that represents any number using 10 digits (0-9).
25 Clues: Random-Access Memory • Central Processing Unit • Graphics Processing Unit • Structured Query Language • fastest form of data storage • a philosophy of right or wrong behavior. • the part of website where user can see information • The process of converting ciphertext back into plaintext • a base 2 number system that represents any number using 2 digits (0-1). • ...
AAugard - Cybersecurity Terms 2023-04-06
Across
- Compromised computers attaacking other computers
- Tricks user into clicking
- False perception of reality
- Taking data hostage
- Denying one's internet service
- Attempt to gain sensitive information
- Multiple computers connected as one
- Corrupts or destroys information
- Harassing others online
- An address from your modem
- Gain access to a computer
Down
- Unauthorized access to data
- Connecting to another secure service
- Preventing unauthorized access to network
- A key created by you
- Reproduces it's self
- Scrambling data for protection
- Prevent infections on a system
- Collecting information secretly
- Attacks system once opened
20 Clues: Taking data hostage • A key created by you • Reproduces it's self • Harassing others online • Tricks user into clicking • Gain access to a computer • Attacks system once opened • An address from your modem • Unauthorized access to data • False perception of reality • Scrambling data for protection • Prevent infections on a system • Denying one's internet service • ...
Cybersecurity Crossword Puzzle 2023-05-16
Across
- Weakness or flaw in a system that can be exploited by attackers.
- Science of secure communication using codes and ciphers.
- Isolated environment used for testing potentially malicious software.
- Authentication method that uses unique physical or behavioral characteristics.
- Software designed to harm or exploit computer systems.
- Process of verifying the identity of a user or s
- Virtual Private Network that provides secure and private communication over public networks.
- Decoy system designed to attract and monitor unauthorized access attempts.
- Network security device that monitors and filters incoming and outgoing network traffic.
- Measures taken to protect computer systems and data from unauthorized access or attacks.
- A secret word or phrase used for authentication and access control.
- Malicious code that replicates itself and infects computer systems.
Down
- Unauthorized access to computer systems or networks.
- Distributed Denial of Service attack that overwhelms a target system with traffic.
- Vulnerability or exploit that is unknown to software developers or security researchers.
- Cyber attack method that tricks users into revealing sensitive information.
- Process of converting information into a secret code to prevent unauthorized access.
- Malicious software that disguises itself as legitimate software.
- A hidden entry point into a system that bypasses normal security mechanisms.
- Criminal activities conducted over the internet.
- A person who uses their programming skills to gain unauthorized access to computer systems.
- Malicious software that encrypts files and demands a ransom for their release.
- Software update that fixes security vulnerabilities.
23 Clues: Criminal activities conducted over the internet. • Process of verifying the identity of a user or s • Unauthorized access to computer systems or networks. • Software update that fixes security vulnerabilities. • Software designed to harm or exploit computer systems. • Science of secure communication using codes and ciphers. • ...
Cybersecurity Awareness Crossword 2025-02-27
Across
- Engineering A trick to manipulate people into giving information
- A term for something that is not real or is misleading
- A secret code to access accounts
- Extra security using multiple verification steps
- A symbol that shows a website is secure
- A virus that locks files until a payment is made
- Keeps your software secure and up to date
- A person who tries to break into computer systems
- The process of signing into an account
- A wireless network connection that should be protected
- A fake email or message that tries to steal your information
- Avoiding dangerous or suspicious websites
Down
- Small pieces of data websites store on your computer
- Unwanted or fake emails
- A trick to steal money or information
- Blocks hackers and harmful internet traffic
- When data is stolen or leaked
- A misleading link or title that tricks people into clicking
- Protects your online activity by hiding your location
- A copy of important files in case they are lost
- Where you adjust security and privacy options
- A program that protects computers from viruses
- The name used to sign into an account
- Protects your data by scrambling it so others can't read it
24 Clues: Unwanted or fake emails • When data is stolen or leaked • A secret code to access accounts • A trick to steal money or information • The name used to sign into an account • The process of signing into an account • A symbol that shows a website is secure • Keeps your software secure and up to date • Avoiding dangerous or suspicious websites • ...
Cybersecurity Awareness Month 2025-10-08
Across
- A strategic procedures that were carefully designed and implemented to ensure the success of our organization.
- This scavenger hunt poster is located in the Marketing\BRANDING G drive folder.
- A small sample of someone's voice can be used to generate speech that sounds like a real person.
- _____ _____ is a gold mine of information hackers can use to trick you and your co-workers.
- This group keeps shelling out the coin for ransomware that has been used to strongarm companies out of millions and bring even the most robust IT teams to their knees.
- A process that requires less effort on the attacker's part and means they can target a greater number of people.
- Many attackers use ____ and manipulation to scam people out of money or information.
- Server as the first responders to security incidents by reporting the incident immediately.
Down
- A calculating and cunning group that know just the right tactics to convince users to download malware, click suspicious links or share confidential information.
- His mission is to lock up treasured information and data for his own uses, or just because he doesn't want you to have it.
- Takes on the form of users just like you in an attempt to keep the actions of their cybercriminal comrades hidden.
- Social ____ is one of the most common ways bad actors break into computer networks.
- This is where hackers create and distribute false information to manipulate your thoughts and actions.
- Social engineering is the art of hacking human _____.
- The top attack method for social engineers.
- When you should report anything unusual.
- A form of malware that encrypts data or locks up systems until the victim pays a ransom.
- _____ unattended workstations.
- One of the goals of social engineering is to gain _____ access.
- A policy which means keeping important items locked away when not in use.
20 Clues: _____ unattended workstations. • When you should report anything unusual. • The top attack method for social engineers. • Social engineering is the art of hacking human _____. • One of the goals of social engineering is to gain _____ access. • A policy which means keeping important items locked away when not in use. • ...
A Love Story 2024-04-17
Across
- Caroline's family name
- Their second dog
- Favorite animal
- Caroline's field of work
- Kind of car they drive
- Honeymoon destination
- Dylan's family name
Down
- Dylan's field of work
- Caroline's favorite sport
- School they both attended
- Their first dog
- Dylan's branch of the military
- Place Caroline is from
- Their favorite food to make/eat
- Place Dylan is from
- Dylan's favorite sport
- City they got engaged
17 Clues: Favorite animal • Their first dog • Their second dog • Place Dylan is from • Dylan's family name • Dylan's field of work • Honeymoon destination • City they got engaged • Caroline's family name • Place Caroline is from • Dylan's favorite sport • Kind of car they drive • Caroline's field of work • Caroline's favorite sport • School they both attended • Dylan's branch of the military • ...
Cyberland Magazine Crossword Puzzle 2021-05-06
12 Clues: virtual • virtual vacancy • virtual tyranny • virtual assault • virtual offense • half human half robot • pirate of cyber world • acts of virtual world • misguide in virtual world • safeness of virtual world • science of virtual fields • being literate in virtual world
Praetorian 2020-07-01
Across
- This tool graphs relationships in AD environments
- Our Friday retroactive meeting where we take a look at all of the exciting things we accomplished that week
- The open source tool that Diana uses to identify flaws in containers
- This AWS service sometimes allows you to fetch API credentials from instances
- Publicly known exploits and weaknesses often get designated one of these
- The protocol used in TLS to exchange keys
- Each services team's name starts with this
Down
- The cow in the Austin Office is covered with graphics from this song
- The reporting CLI tool that allows us to edit reports
- Praetorian's product that helps secure our client's software through continuous security analysis
- a governance model that helps evaluate cybersecurity practices, establish or improve a cybersecurity program, and inform your security roadmap and buying decisions
- Integrating security into the entirety of software's lifetime, from plan to monitor
- _SRF
- Carbonated yerba mate drink for all your energy needs
- New hires build these during their first week at Praetorian
15 Clues: _SRF • The protocol used in TLS to exchange keys • Each services team's name starts with this • This tool graphs relationships in AD environments • The reporting CLI tool that allows us to edit reports • Carbonated yerba mate drink for all your energy needs • New hires build these during their first week at Praetorian • ...
CSE 167 Vocab / Terminology 2022-04-28
Across
- the idea of adding defense in layers.
- basic Linux file permissions include: read, write, and ____.
- assumes people can get that information when they need it.
- the type of key in asymmetric encryption that you use to decrypt a message when someone encrypts a message for you.
- protection of computer systems and networks from information disclosure.
- type of encryption where only one key is shared amongst sender and receiver.
Down
- only authorized people have access to records.
- verification of identity.
- saving a copy of system data for restoration in the event that the system would need to be reset.
- a system or place that must be protected.
- only authorized people can modify data.
- the practice of secure communications that allow only the sender and receiver to view a message's contents.
- covers the protection of encryption systems.
- the problem with cybersecurity today is that people use TRUST instead of ______.
- come in four types: physical, technical, procedural, and legal.
15 Clues: verification of identity. • the idea of adding defense in layers. • only authorized people can modify data. • a system or place that must be protected. • covers the protection of encryption systems. • only authorized people have access to records. • assumes people can get that information when they need it. • basic Linux file permissions include: read, write, and ____. • ...
komputer 2023-11-19
Across
- (Komputer pusat dalam jaringan)
- (Jenis penyimpanan sementara)
- (Versi protokol internet)
- (Keamanan dalam dunia digital)
- computing (Pengolahan data melalui internet)
- (Pengenalan identitas melalui fitur fisik)
- (Antarmuka pemrograman aplikasi)
- (Kecerdasan buatan)
- (Aplikasi untuk menjelajahi internet)
- (Bahasa markup untuk web)
Down
- (Penulisan skrip untuk otomatisasi)
- (Peralatan pengaturan jaringan)
- (Penyimpanan cadangan data)
- (Proses mencari dan memperbaiki bug)
- (Penyimpanan sementara data)
- (Proses penyandian data)
- (Perangkat lunak dengan kode sumber terbuka)
- (Perlindungan jaringan)
- (Aturan komunikasi dalam jaringan)
- (Program jahat)
20 Clues: (Program jahat) • (Kecerdasan buatan) • (Perlindungan jaringan) • (Proses penyandian data) • (Versi protokol internet) • (Bahasa markup untuk web) • (Penyimpanan cadangan data) • (Penyimpanan sementara data) • (Jenis penyimpanan sementara) • (Keamanan dalam dunia digital) • (Komputer pusat dalam jaringan) • (Peralatan pengaturan jaringan) • (Antarmuka pemrograman aplikasi) • ...
testjue2 2023-06-02
Across
- Collection of links to the important cybersecurity resources can be found on go/_ _ b_ _g _
- "Know Your Customer Record" comes under which confidentiality classification
- Reporting a cybersecurity incident can be done by visiting go/_e_ _r_ c_ _ _ r _n _ _ d _ _ t
Down
- Provides a secure way to compress/encrypt and decompress/decrypt files
- Provides Firmwide Cybersecurity Education & Awareness and trainings
- Internal Web Tools for Text encoding, encryption, data compression, hash and checksum calculation, data formatting
6 Clues: Provides Firmwide Cybersecurity Education & Awareness and trainings • Provides a secure way to compress/encrypt and decompress/decrypt files • "Know Your Customer Record" comes under which confidentiality classification • Collection of links to the important cybersecurity resources can be found on go/_ _ b_ _g _ • ...
Information Technology Puzzle 2025-02-11
Across
- Cloud computing platform developed by Google
- IT service management framework that emphasizes customer satisfaction
- Type of database that stores data in a graph structure
- Type of malware that demands payment in exchange for restoring access to encrypted data
- Type of malware that steals sensitive information, such as login credentials
- Cybersecurity framework that provides guidelines for securing IoT devices
- Cybersecurity technique that uses machine learning to detect and prevent threats
- A cloud service in Azure is a platform that enables you to build, deploy, and manage applications
- Type of artificial intelligence that enables machines to learn from experience
Down
- Data analytics technique that uses statistical models to predict future events
- Cloud computing platform developed by Amazon
- Technology that enables the creation of immersive, interactive experiences
- Technology that enables the creation of decentralized applications
- Next-generation wireless network technology that offers faster speeds and lower latency
- Cloud computing service model that provides on-demand access to computing resources
- Programming language used for developing iOS and macOS apps
- Data analytics technique that uses machine learning to identify patterns and trends
- Type of artificial intelligence that simulates human conversation
- IT service management framework that emphasizes continuous improvement
- Programming language used for developing Android apps
20 Clues: Cloud computing platform developed by Google • Cloud computing platform developed by Amazon • Programming language used for developing Android apps • Type of database that stores data in a graph structure • Programming language used for developing iOS and macOS apps • Type of artificial intelligence that simulates human conversation • ...
CyberSecurity Awareness 2021 2021-10-15
Across
- 123456 and MyDOB01012010 are examples of what kind of Password?
- a type of malware that functions by spying on user activity without their knowledge and includes activity monitoring, collection keystrokes, data harvesting capabilities
- a type of software application or script that performs tasks on command allowing an attacker to take complete control remotely of an affected compute
- a form of malware that deliberately prevents you from accessing files on your computer holding your data hostage
- refers to a company security policy that allows for employees own devices to be used in business
- a technology that allows us to access our files and/or services through the internet from anywhere
- a group of computers, printers and devices that are interconnected and governed as a whole
- an umbrella term that describes all forms of malicious software designed to wreak havoc on a computer
- the moment a hacker successfully exploits a vulnerability in a computer or device and gains access to its files and network
- disruptive, unsolicited messages (such as emails, text messages, or Internet postings) especially commercial messages, sent to a large number of recipients or posted in a large number of places.
- a tool that allows the user the user to remain anonymous while using the internet by masking the location and encrypting traffic
- a malicious application or script that can be used to take advantage of a computer’s vulnerability
- misspelled words and a sense of urgency for you to take a questionable action an email, are be considered to be
- subject matter of the most clicked on email from our 11/07/21 phish campaign
- the process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity.
- Engineering the art of manipulating, influencing or deceiving you in order to gain control over your computer system.
- type of phishing that is a small, focused, targeted attack via email on a particular person or organization with the goal to penetrate their defenses.
- a type of malware aimed to corrupt, erase o modify information on a computer before spreading to others
- a set of programs that tell a computer to perform a task
Down
- the process of encoding data to prevent theft by ensuring the data can only be accessed with a key
- a defensive technology designed to keep the bad guys out
- a piece of malware that can replicate itself in order to spread the infection to other connected computers
- a method used by social engineers to gain access to a building or other protected area.
- an audio or video clip that has been edited and manipulated to seem real or believable and can easily convince people into believing a story or theory that may result in user-behavior that causes a political or financial impact
- subject matter of the most clicked on email from our 11/14/21 phish campaign
- an internet version of a home address for your computer which is identified when it communication over a network
- October is Awareness Month for this
- MyCowRanAwayToTheMoon is an example of a
28 Clues: October is Awareness Month for this • MyCowRanAwayToTheMoon is an example of a • a defensive technology designed to keep the bad guys out • a set of programs that tell a computer to perform a task • 123456 and MyDOB01012010 are examples of what kind of Password? • subject matter of the most clicked on email from our 11/14/21 phish campaign • ...
Intro To Cybersecurity 2023-09-10
Across
- Regain information
- online theft to be someone else
- Access to the internet network device
- Digital currency that is decentralized
- Center of a attention
- Infected Software
- Codes are used to secure data.
- Impersonate someone else
- a thief
Down
- Mandatory
- safe and sound
- National Institute of Standards and Technology
- Spot something
- Connection without the need of physical wires
- Web hosting service provider
- Includes break or promotion
- External Service
- Wi-Fi security protocol that is strong
- Difficult to proceed with
- About electronics and the internet
20 Clues: a thief • Mandatory • safe and sound • Spot something • External Service • Infected Software • Regain information • Center of a attention • Impersonate someone else • Difficult to proceed with • Includes break or promotion • Web hosting service provider • Codes are used to secure data. • online theft to be someone else • About electronics and the internet • ...
CIS 120 Cybersecurity 2024-03-10
Across
- strength in the security structure
- off personal computer storage
- thief through computerized means
- needed for accessing secure information
- unsolicited meat banter
- casting cyber bait
- blocks out unauthorized access
- security tactics
- address for accessing websites
Down
- level for information security
- used to harm your computer
- software to monitor computerized information
- a code for keeping secrets
- weak point in security
- ID with magnetic access chip
- software used for destruction
- data to identify a person
- holds data hostage
- lying about your location
- the simplest part of security
20 Clues: security tactics • holds data hostage • casting cyber bait • weak point in security • unsolicited meat banter • data to identify a person • lying about your location • used to harm your computer • a code for keeping secrets • ID with magnetic access chip • off personal computer storage • software used for destruction • the simplest part of security • level for information security • ...
Cybersecurity Crossword Puzzle 2025-03-13
Across
- Unwanted email messages
- Hides internet browsing activity
- Software flaw exposing systems
- Software detecting cyber threats
- Person tricked into hacking
- Secret key for authentication
- Authentication requiring two factors
- Tracks and records keystrokes
- Deceptive attack to steal info
Down
- Unauthorized code execution attack
- Fake email for stealing data
- Attack security vulnerabilities
- Malicious software category
- Scrambles data for security
- Multiple accounts, one password
- Cybersecurity framework for networks
- Malicious program holding data hostage
- Unauthorized access attempt
- Digital fingerprint identifier
- Cyber attack flooding network packets
20 Clues: Unwanted email messages • Malicious software category • Scrambles data for security • Person tricked into hacking • Unauthorized access attempt • Fake email for stealing data • Secret key for authentication • Tracks and records keystrokes • Software flaw exposing systems • Digital fingerprint identifier • Deceptive attack to steal info • Attack security vulnerabilities • ...
Cybersecurity Crossword Puzzle 2025-03-14
Across
- Hackers engaging in illegal activities.
- Fraudulent attempt to steal data.
- Overloading systems by traffic flood.
- Manipulating people for sensitive data.
- Converting data into a secure format.
- Malware that demands payment for release.
- A weakness in system security.
- Malicious software disguised as useful.
- Advanced Wi-Fi security proticol.
- Trying all possible combinations to crack passwords.
- Unauthorized access to confidential data.
- Malicious software designed for harm.
Down
- Verifying user identity through credentials.
- Maliciouse code that replicates and spreads.
- Virtual Private Network for encrypted connections.
- Ethical hackers who improve security.
- Software that detects and removes malware.
- Software that secretly gathers information.
- Network security to monitor traffic.
- Update fixing security flaws or bugs.
20 Clues: A weakness in system security. • Fraudulent attempt to steal data. • Advanced Wi-Fi security proticol. • Network security to monitor traffic. • Overloading systems by traffic flood. • Ethical hackers who improve security. • Converting data into a secure format. • Update fixing security flaws or bugs. • Malicious software designed for harm. • ...
NETWORKING & CYBERSECURITY CROSSWORD 2025-06-06
Across
- – Good behavior and ethics while using the internet.
- – A key value in responsible online behavior.
- – Something related to computers or the internet.
- – Keeping personal information safe and confidential online.
- – A set of rules for transferring data over networks.
- – Unwanted or junk emails often sent in bulk.
- – Text or communication sent online or by email.
- – Legal rules that apply to use of the internet.
- – The online trace or activity left by a user.
- – A central system that stores and provides data to other computers.
- – A short-range wireless communication technology.
Down
- – Backup systems that reduce data loss risk.
- – A secret word used to access devices or accounts.
- – A harmful program that can damage computers.
- – Sending data or files from your device to the internet.
- – A person who tries to break into computer systems.
- – A file sent along with an email message.
- – A group of computers connected to share information.
- – Measures to protect data and systems from threats.
- – A system that protects a network from unauthorized access.
20 Clues: – A file sent along with an email message. • – Backup systems that reduce data loss risk. • – A key value in responsible online behavior. • – Unwanted or junk emails often sent in bulk. • – A harmful program that can damage computers. • – The online trace or activity left by a user. • – Text or communication sent online or by email. • ...
CYBER SECURITY 2023-09-20
10 Clues: malware • set of rules • trial and error • malicious software • cyber architecture • distributive information • steal sensitive information • protection of computing security • authorised parties able to access • protecting info from unauthorised party
CYBERSECURITY AWARENESS 2024-10-22
Across
- Unauthorized access to sensitive information (6 LETTERS)
- A security method involving two types of validation (3 LETTERS)
- The process of converting data into unreadable code (10 LETTERS)
- Fake websites that mimic legitimate ones to steal info (8 LETTERS)
- A secure way to browse the internet by hiding your data (3 LETTERS)
- Regular updates to fix software vulnerabilities (7 LETTERS)
Down
- A type of malware that demands payment (10 LETTERS)
- Secret word or phrase used to gain access (8 LETTERS)
- A form of attack where hackers trick users via email (8 LETTERS)
- Software designed to disrupt, damage, or gain unauthorized access (7 LETTERS)
- Protects your system from harmful software (9 LETTERS)
- Harmful email attachment often used to spread malware (6 LETTERS)
12 Clues: A type of malware that demands payment (10 LETTERS) • Secret word or phrase used to gain access (8 LETTERS) • Protects your system from harmful software (9 LETTERS) • Unauthorized access to sensitive information (6 LETTERS) • Regular updates to fix software vulnerabilities (7 LETTERS) • A security method involving two types of validation (3 LETTERS) • ...
Cybersecurity Vocab 2022-11-01
Across
- program designed to breach the security of a computer system.
- verifying identity.
- info is stolen without knowledge or authorization.
- attempt by hackers to damage or destroy a computer network or system.
- self replicating and infects other computers while remaining active on other infected systems.
Down
- preventing and mitigating attacks on computer systems.
- software that enables a user to obtain covert information from one's computer activities.
- software that blocks access to a computer until a sum of money is paid.
- fake e-mails to gain access to credit cards or personal information.
- area of control or sphere of knowledge.
- the process of converting info or date into a code.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer.
12 Clues: verifying identity. • area of control or sphere of knowledge. • info is stolen without knowledge or authorization. • the process of converting info or date into a code. • preventing and mitigating attacks on computer systems. • program designed to breach the security of a computer system. • fake e-mails to gain access to credit cards or personal information. • ...
Cybersecurity Awareness Month 2024 2024-09-13
Across
- If there is a last minute change in details, treat this as a ___ flag.
- Think before you ____.
- Tampa Bay Water scans approximately 88,000 emails each month for malware, _______, and spam.
- Always ____ information from AI.
- In Business Email Compromise (BEC), a cybercriminal can trick victims into making an unauthorized __________.
- If you receive a suspicious email from someone you know, contact them ________to verify, such as by phone or face to face contact.
- On average, Tampa Bay Water cybersecurity team protects 65 _____ web requests per month.
- Cybercriminals impersonate your suppliers or other contacts to receive _____.
Down
- Cybersecurity is everyone’s responsibility, do you part by becoming a human _______.
- The ____ Alert Button is a tool built into Outlook to report suspicious emails.
- Never input sensitive or _________ data into AI regenerative models, such as Chat GPT.
- Never leave your devices ________.
- Cybercriminals count on distraction, fatigue, and ______ error in their victims.
- If in doubt, contact ______.
14 Clues: Think before you ____. • If in doubt, contact ______. • Always ____ information from AI. • Never leave your devices ________. • If there is a last minute change in details, treat this as a ___ flag. • Cybercriminals impersonate your suppliers or other contacts to receive _____. • The ____ Alert Button is a tool built into Outlook to report suspicious emails. • ...
#PDF19 2019-06-20
Across
- kunstmatige intelligentie
- software defined everything
- digipolis software standaarden
- slimme optimalisatie van IT operaties (moonshot 2019)
- privacy wetgeving
- uiterst stabiele, performante, efficiënte en effectieve toepassingen
- digitale beveiliging (moonshot 2019)
- een innovatieve opdracht
Down
- nog slimmere operations (moonshot lab 2019)
- een innovatief bedrijf
- doe je in een lab
- huidige software architectuur standaard
- quality gate
- move-to-production
- eerste kleinschalige implementatie van een product
- city platform
16 Clues: quality gate • city platform • doe je in een lab • privacy wetgeving • move-to-production • een innovatief bedrijf • een innovatieve opdracht • kunstmatige intelligentie • software defined everything • digipolis software standaarden • digitale beveiliging (moonshot 2019) • huidige software architectuur standaard • nog slimmere operations (moonshot lab 2019) • ...
Information Security and CyberSecurity 2023-06-14
Across
- One of the common careers found in Cybersecurity and that is Cybersecurity ________.
- One of the words that was added in the CIA triad, The Usefulness fitness for a particular use.
- The CIA triad is a common model that forms the basis for the development of security systems.
- A security tool that monitors network traffic or system activities to identify and respond to potential unauthorized access or malicious behavior.
- Strategies, policies, and technologies implemented to prevent the unauthorized loss or exfiltration of sensitive or confidential data.
- It is a set of six elements of information security. It adds three additional attributes to the three classic security attributes of the CIA triad.
- The two protocols that provide secure communication over the internet by encrypting data transmitted between a web server and a client browser.
- A security tool that monitors and actively blocks or prevents malicious activities or attacks on a network or system.
- The two protocols that provide secure communication over the internet by encrypting data transmitted between a web server and a client browser.
- A security measure that requires users to provide two different forms of authentication, such as a password and a unique code sent to their mobile device, to access a system or account.
- It is the practice of safeguarding information from unauthorized access, use, or damage.
- Weaknesses or flaws in a system's design, implementation, or configuration that can be exploited by attackers to gain unauthorized access or compromise security.
- One of the three letters in the CIA Triad, and it involves making sure your data is trustworthy and free from tampering.
- The person who proposed the Parkerian Hexad in 1998.
- It is a popular Cybersecurity Company, and it delivers a high-performance network security solutions that protect your systems
- Cybersecurity and Information security have the same ______ security practices.
- It refers to the protection of computer systems, networks, and data from unauthorized access, attacks, and damage. It involves implementing measures to prevent, detect, and respond to cyber threats, such as hacking, malware, and data breaches.
Down
- An adverse event or occurrence that poses a risk to information security, such as a breach, unauthorized access, or system compromise.
- One of the words that was added in the CIA triad, The correct attribution of origin such as the authorship of an email message or the correct description of information such as a data field that is properly named.
- A network security device that monitors and controls incoming and outgoing network traffic based on predefined security rules.
- One of the three letters in the CIA Triad, it involves data is kept confidential and its integrity maintained, it is often useless unless it is available to those in the organization and the customers they serve.
- One of the words that was added in the CIA triad, The ownership or control of information, as distinct from confidentiality.
- An attack aimed at overwhelming a system, network, or service with a flood of traffic or requests, causing it to become unavailable to legitimate users.
- A form of cyber attack where attackers impersonate trustworthy entities through deceptive emails, messages, or websites to trick individuals into revealing sensitive information.
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data. Examples include viruses, worms, Trojans, and ransomware.
- A controlled process of simulating real-world attacks on a system or network to identify vulnerabilities and assess the effectiveness of security measures. ¬‿¬
- One of the three letters in the CIA Triad, and it involves the efforts of an organization to make sure data is kept secret or private.
- A documented set of guidelines, procedures, and rules that outline an organization's approach to information security, including roles and responsibilities, acceptable use policies, and incident response procedures.
- One of the common careers found in Information Security and that is Information Security ________.
- Unauthorized access, acquisition, or disclosure of sensitive or confidential information.
30 Clues: The person who proposed the Parkerian Hexad in 1998. • Cybersecurity and Information security have the same ______ security practices. • One of the common careers found in Cybersecurity and that is Cybersecurity ________. • It is the practice of safeguarding information from unauthorized access, use, or damage. • ...
Cybersecurity 2021 2021-10-18
Across
- use this where possible to protect valuable data and content
- creep around every corner
- do this over a link to ensure it is taking you to the site the email content says it will
- phishing via SMS
- hover over all of these before clicking on them to make sure they are legitimate
Down
- cybersecurity month
- don't allow your devices to do this with unfamiliar networks
- keep these updated to ensure they have the latest security
- involves scammers impersonating someone via email or phone to steal information
- every employee is one of these
- before you share
- Spotting these URLs is a bit of an art
12 Clues: before you share • phishing via SMS • cybersecurity month • creep around every corner • every employee is one of these • Spotting these URLs is a bit of an art • keep these updated to ensure they have the latest security • don't allow your devices to do this with unfamiliar networks • use this where possible to protect valuable data and content • ...
Cybersecurity Crossword 2021-10-14
Across
- Using advertisements to trick people into visiting malicious sites
- Accessing cookies from your web browser to steal personal data
- Files you download that contain malware
- converting data using an algorithm so it cannot be readable by third-parties
- the use of a computer program to record every keystroke to steal passwords
Down
- the practice of sending emails pretending to be from reputable companies in order to steal personal data
- an attack meant to shut down a machine or network by flooding it with traffic, making it inaccessible to its intended users
- Elements in the website that do not perform their designated task.
- the participants of the communication and negotiate an encryption algorithm
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- Same as DOS attack, except with multiple computers or machines
- a local or restricted communications network, especially a private network created using World Wide Web software.
12 Clues: Files you download that contain malware • Accessing cookies from your web browser to steal personal data • Same as DOS attack, except with multiple computers or machines • Elements in the website that do not perform their designated task. • Using advertisements to trick people into visiting malicious sites • ...
Guess Your Gamma Daughter's Interests 2021-10-27
11 Clues: Favorite band • favorite food • Favorite color • Favorite tv show • Born in this city • Favorite girl group • Likes to watch ______ • Doesn't like this food • Favorite female artist • Potential career after graduation • Favorite album by favorite girl group
Cybersecurity Word Search 2021-10-15
Across
- __ is everyone's responsibility
- cybercriminals use these to try to hook you!
- what you should do if you get a suspicious email!
Down
- settings make sure these are enabled on all your accounts!
- you can be one of these by protecting yourself and your family from cybercriminals!
- passwords protect your accounts with these!
- cybersecurity: this time, it's __
7 Clues: __ is everyone's responsibility • cybersecurity: this time, it's __ • passwords protect your accounts with these! • cybercriminals use these to try to hook you! • what you should do if you get a suspicious email! • settings make sure these are enabled on all your accounts! • you can be one of these by protecting yourself and your family from cybercriminals!
Cybersecurity Crossword Puzzle 2023-04-21
Across
- Hat Hackers Ethical computer experts
- Account Control Restricts unauthorized access
- Keys Used for secure communication
- Awareness Training Teaches safe online behavior
- Monitors and filters network traffic
- Breaches unauthorized access to data
- Attack Exploits unknown vulnerabilities
- Scrambles data to protect it
- Horse Malware disguised as a software
Down
- Deceptive email scam
- Malicious software
- Online harassment
- Software Protects against malware
- Extorts computer users
- Network of infected devices
- Tricking users into clicking
- Management Tools Password management helper
- Secretly collects information
- Secure remote connection
- Wi-fi Networks Unsecured wireless networks
20 Clues: Online harassment • Malicious software • Deceptive email scam • Extorts computer users • Secure remote connection • Network of infected devices • Tricking users into clicking • Scrambles data to protect it • Secretly collects information • Software Protects against malware • Keys Used for secure communication • Monitors and filters network traffic • ...
#SecureOurWorld Cybersecurity Week 2023-10-08
Across
- Should be constructed of upper and lower case letters, numbers, and special characters.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Verifying identity.
- The process of taking plain text and scrambling it into an unreadable format.
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer
- Unauthorized access to a network, information systems, or application.
- The “I” in the C-I-A Triad; protection from unauthorized changes.
- Threatening behavior facilitated through electronic means such as texting
- A wireless technology standard used over short distances using short-wavelength UHF radio waves.
Down
- Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- MEDIA Facebook, Twitter, Instagram, etc. (Two words)
- Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
- The address of a webpage. Check the validity of it before clicking on it.
- A fraudulent email purportedly from a reputable company attempting to get personal information.
- Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
- The “A” in the C-I-A Triad. It ensures authorized users have access.
- Hardware or software designed to prevent unauthorized access to or from a private network.
- A flaw or weakness in a computer system that could be exploited to violate the system’s security.
- A sequence of words or text used to control access to a computer.
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
20 Clues: Verifying identity. • MEDIA Facebook, Twitter, Instagram, etc. (Two words) • A sequence of words or text used to control access to a computer. • The “I” in the C-I-A Triad; protection from unauthorized changes. • The “A” in the C-I-A Triad. It ensures authorized users have access. • Unauthorized access to a network, information systems, or application. • ...
Cybersecurity and You 2025-09-03
Across
- A security process that verifies a person's identity based on their unique physical or behavioral characteristics.
- The process of gathering and measuring information from various sources.
- Software that secretly gathers information about a person or organization without their knowledge.
- A type of malware that self-replicates and spreads to other files and systems.
- Prejudice in favor of or against one thing, person, or group compared with another, usually in an unfair way.
- Deliberate malicious attempts to breach an organization's or individual's information system.
- Information that can be used to identify, contact, or locate a single person.
- A security method requiring a user to provide two or more verification factors to gain access.
Down
- A subset of MFA that requires exactly two different authentication factors.
- The practice of protecting systems, networks, and programs from digital attacks.
- The fraudulent practice of sending emails or other messages to deceive individuals into revealing personal information.
- The trail of data you create while using the internet.
- The process of verifying the identity of a user or system.
- The process of reviewing a person's social media accounts as part of a background check.
- A trial-and-error method used to guess a password or login information.
- Bias Systematic errors in an AI's output due to flawed assumptions in the machine learning process.
- A set of rules or instructions a computer follows to solve a problem or complete a task.
- A type of malware that locks a user's files and demands a ransom for their release.
- Software designed to cause damage or gain unauthorized access to a computer system.
19 Clues: The trail of data you create while using the internet. • The process of verifying the identity of a user or system. • A trial-and-error method used to guess a password or login information. • The process of gathering and measuring information from various sources. • A subset of MFA that requires exactly two different authentication factors. • ...
Cybersecurity Notables 2021-01-17
Across
- She wrote “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon”
- This astronomer caught the first advanced persistent threat and wrote about it in the 1989 book “The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage”
- He gained unauthorized access to dozens of computer networks. Arrested by the FBI in 1995, he pleaded guilty to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication, resulting in five years in prison. Now he runs a computer security consultancy and is part owner of KnowBe4, provider of an integrated platform for security awareness training and simulated phishing testing.
- He exposed some of the biggest data breaches ever, including the ones at Target and Home Depot. He has also written several books chronicling his extensive work investigating cyber-criminal gangs in Russia and elsewhere. But he is not related to the recently fired CISA director.
- Best known for his work involving DNS cache poisoning, he is one of just seven people with the authority to restore the DNS root keys on the Internet in the event of an emergency.
- He founded the Stanford Internet Observatory and led the security teams at Facebook and Yahoo.
- This Cornell University graduate student created in 1988 the very first internet worm and denial-of-service (DoS) attack.
Down
- She invented the Spanning Tree Protocol (STP) that builds a loop-free logical topology for Ethernet networks.
- She created Microsoft’s Bug Bounty Program and the Hacker One Bug Bounty Program, where she helped create the Department of Defense's "Hack the Pentagon" pilot program.
- As a researcher at BBN technologies, he realized in 1970 the possibilities of creating a program capable of moving in a network and leaving behind a trail.
- Exploited a security flaw in MySpace that allowed him to gain 1 million friends in a 20-hour period.
- Created the haveibeenpwned.com website that allows anyone to check to see if their email or username has been compromised in major breaches.
12 Clues: She wrote “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon” • He founded the Stanford Internet Observatory and led the security teams at Facebook and Yahoo. • Exploited a security flaw in MySpace that allowed him to gain 1 million friends in a 20-hour period. • ...
Cybersecurity Awareness 2021-10-28
Across
- A wireless technology standard using radio waves to communicate over short distances.
- Sending of a fraudulent email attempting to get personal information.
- Fraudulent text message designed to trick people into giving up personal information.
- Used to create a secure, encrypted connection between your computer and the Internet.
- Fraudulent phone calls or voice messages purporting to be from a reputable company in order to trick individuals into revealing personal information.
- Malicious software designed to block access to a computer system and/or files until a sum of money is paid.
- Harmful computer programs such as viruses, worms, or trojans used by cybercriminals to gain access to your computer.
Down
- A flaw or weakness in a computer system or software application that could be exploited to compromise security of the system or application.
- Verification of identity.
- A sequence of words or text used to control access to a computer; similar to a password.
- Before clicking on this, you should hover over it to verify it actually goes where it claims it does.
- Should be as long as possible and constructed from a variety of character sets.
12 Clues: Verification of identity. • Sending of a fraudulent email attempting to get personal information. • Should be as long as possible and constructed from a variety of character sets. • A wireless technology standard using radio waves to communicate over short distances. • Fraudulent text message designed to trick people into giving up personal information. • ...
Cybersecurity Crossword 2025-10-13
Across
- Turning a secret code back into a normal message.
- Keeping computers and information safe from unauthorized people online.
- The giant network that connects computers all over the world.
- A secret word used to log into an account.
- A fake message that tricks people into giving passwords.
- A message that’s been turned into secret code.
Down
- A normal message before it’s turned into code.
- A person who breaks into computers.
- The process of writing and solving secret codes.
- The process of changing a message so others can’t read it.
- A tiny program that spreads and messes up computers.
- Keeping your personal info to yourself.
12 Clues: A person who breaks into computers. • Keeping your personal info to yourself. • A secret word used to log into an account. • A normal message before it’s turned into code. • A message that’s been turned into secret code. • The process of writing and solving secret codes. • Turning a secret code back into a normal message. • ...
Cybersecurity Vocabulary 2021-12-14
Across
- Force attack a cryptographic hack that relies on guessing possible combinations of a targeted password until the correct password is discovered.
- exchange a method in cryptography by which cryptographic keys are exchanged between two parties
- Attack an algebraic mathematical manipulation that attempts to reduce the complexity of the cryptographic algorithm.
- Attack is an attack model for cryptanalysis where the attacker has access to both the plaintext and its encrypted
- Middle Attack is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties
- is cyberwarfare that bypasses or sabotages a victim's strengths while targeting their vulnerabilities Confusion increases the ambiguity of ciphertext
- two properties of the operation of a secure cipher identified by Claude Shannon in his 1945 classified report A Mathematical Theory of Cryptography
Down
- a process of finding weaknesses in cryptographic algorithms and using these weaknesses to decipher the ciphertext without knowing the secret key
- the process of encoding information.
- a collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision.
- Attack a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme
- Exploitation Attack any attack that takes advantage of vulnerabilities in applications, networks, operating systems, or hardware.
12 Clues: the process of encoding information. • exchange a method in cryptography by which cryptographic keys are exchanged between two parties • Attack is an attack model for cryptanalysis where the attacker has access to both the plaintext and its encrypted • ...
Cybersecurity Vocab 2022-11-01
Across
- program designed to breach the security of a computer system.
- verifying identity.
- info is stolen without knowledge or authorization.
- attempt by hackers to damage or destroy a computer network or system.
- self replicating and infects other computers while remaining active on other infected systems.
Down
- preventing and mitigating attacks on computer systems.
- software that enables a user to obtain covert information from one's computer activities.
- software that blocks access to a computer until a sum of money is paid.
- fake e-mails to gain access to credit cards or personal information.
- area of control or sphere of knowledge.
- the process of converting info or date into a code.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer.
12 Clues: verifying identity. • area of control or sphere of knowledge. • info is stolen without knowledge or authorization. • the process of converting info or date into a code. • preventing and mitigating attacks on computer systems. • program designed to breach the security of a computer system. • fake e-mails to gain access to credit cards or personal information. • ...
Cybersecurity Crossword 2025-08-18
Across
- A weakness in a system that can be exploited by attackers.
- A broad term encompassing any malicious software designed to damage or disable computer systems.
- The process of verifying the identity of a user or system
- Engineering The art of manipulating people into divulging confidential information.
- A type of malware that encrypts a victim's files and demands a ransom for their release.
- A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising oneself as a trustworthy entity in electronic communication
Down
- The process of converting data into a code to prevent unauthorized access.
- authentication An extra layer of security requiring users to provide two or more verification factors.
- A type of malware that secretly gathers information about a user's activities
- An attempt to damage or disrupt computer systems or networks.
- A security system that controls network traffic based on predetermined security rules.
- Detection System (IDS) A system that monitors network traffic for suspicious activity.
12 Clues: The process of verifying the identity of a user or system • A weakness in a system that can be exploited by attackers. • An attempt to damage or disrupt computer systems or networks. • The process of converting data into a code to prevent unauthorized access. • A type of malware that secretly gathers information about a user's activities • ...
Cyber Crossword 2023 2023-10-06
Across
- A technique where an attacker moves from one compromised system to the next.
- A cyber attack that makes a system unavailable to its intended users.
- The group responsible for defending the organization's information systems during a cybersecurity test.
- A cyber attack where the victim's data is held hostage and the attacker demands a payment.
Down
- Type of authentication that requires users to enter more than just a password.
- An exhaustive method for cracking passwords.
- In this attack, the attacker intercepts communication to eavesdrop or impersonate.
- Triad of cybersecurity tenets.
- Ancient cipher used by the Greeks.
- A group of penetration testers used to simulate the actions of those who are malicious.
10 Clues: Triad of cybersecurity tenets. • Ancient cipher used by the Greeks. • An exhaustive method for cracking passwords. • A cyber attack that makes a system unavailable to its intended users. • A technique where an attacker moves from one compromised system to the next. • Type of authentication that requires users to enter more than just a password. • ...
Cybersecurity Awareness Month 2023-10-02
Across
- Fraudulent phone calls or voice messages purporting to be from reputable companies or a department in your own company in order to trick individuals into revealing personal information.
- A sequence of words or text used to control access to a computer; similar to a password
- Widely used in-home network technology that allows for wireless connection in interfacing with the internet.
- The process of taking plain text and scrambling it into an unreadable format.
- Hardware or software designed to prevent unauthorized access to or from a private network
- Fraudulent text messages pretending to be from reputable companies in order to trick individuals into revealing personal information.
- A means to verify identity
- The address of a webpage. Check the validity of it before clicking it.
- Should be constructed of upper case and lower case letters, numbers, special characters, and at least 16 characters long.
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer.
- The protection, restoration, and prevention of damage to a computer and the information contained therein to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.
Down
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- A flaw or weakness in a computer system, network, application, or software that could be exploited to violate the system’s security.
- A fraudulent email pretending to be from a reputable person or company attempting to get your information.
- Software created specifically to help detect, prevent, and remove malware (malicious software).
- Security tool that creates a secure, encrypted connection between you and the internet (three letter acronym)
- Facebook, Twitter, Instagram, etc. (Two words, no spaces)
- A person who uses computers to gain unauthorized access to data. AKA “bad actor”
- Unauthorized Access to a network, information systems, or application.
19 Clues: A means to verify identity • Facebook, Twitter, Instagram, etc. (Two words, no spaces) • The address of a webpage. Check the validity of it before clicking it. • Unauthorized Access to a network, information systems, or application. • The process of taking plain text and scrambling it into an unreadable format. • ...
Cybersecurity Crossword Puzzle 2024-03-15
Across
- Kiddies / attack computers without knowledge of computers
- Citizen / citizen that's familiar with technology.
- /Malicious software, such as viruses
- /wireless data network technology
- /internet of things (abbreviation)
- Strain / eye pain from looking at device.
- Footprint /records from everything done online.
- addiction / person addicted to technology.
- device /device that is smart.
- / malicious computer code that reproduces
- /web announcement that falsely claims.
- /Collection of harmful computer code
- /unlocking encrypted information
Down
- / repetitive strain injuries (abbreviation)
- /Taking someone else’s work.
- / rules of Internet etiquette.
- /Website edited by public
- /Electronic waste from discarded digital devices.
- /method of “scrambling” information
- / Unwanted and unknown repeated messages.
20 Clues: /Website edited by public • device /device that is smart. • / rules of Internet etiquette. • /Taking someone else’s work. • /unlocking encrypted information • /wireless data network technology • /internet of things (abbreviation) • /method of “scrambling” information • /Malicious software, such as viruses • /Collection of harmful computer code • ...
Cybersecurity by Hazel 2025-05-07
Across
- the process of identifying and fixing vulnerabilities on a system.
- The smallest unit of information storage.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers.
- A list of entities that are considered trustworthy and are granted access or privileges.
- Any unauthorized attempt to access, disrupt, steal, or damage computer systems, networks, or data.
- A part of a computer system or network with is designed to block unauthorized access while permitting outward communication.
- Whom someone or what something is.
- the process of protecting electrical devices and networks from attacks.
Down
- A part of a computer system or network which is designed to lock unauthorized access while permitting outward communication.
- A term to describe connecting multiple separate networks together.
- The process of storing a data file in several "chunks" or rather than in a single contiguous sequence of bits in one place on the storage medium.
- An unexpected and relatively small defect, fault, fault, or imperfection in an information system or device.
- A list of entities that are blocked or denied privileges.
- A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer Encryption the process of converting information or data into a code, especially to precent unauthorized access.
- A security incident in which sensitive, protected, or confidential information is accused, stolen, or disclosed without authorization.
- A cryptographic algorithm for encryption and decryption.
- A connection between two devices.
- A group of people authorized and organized to emulate a potential adversary's attack or exploitation capabilities against an enterprise's security posture.
19 Clues: A connection between two devices. • Whom someone or what something is. • The smallest unit of information storage. • A cryptographic algorithm for encryption and decryption. • A list of entities that are blocked or denied privileges. • the process of identifying and fixing vulnerabilities on a system. • ...
Tech, Trends, and Titans 2025-04-01
Across
- A celestial event where the moon blocks the sun, last seen in April 2024.
- A computing breakthrough that promises to revolutionize cybersecurity and problem-solving.
- The tech giant behind Facebook, Instagram, and its growing metaverse.
- OpenAI's 2025 AI tool that autonomously generates comprehensive reports by analyzing multiple online sources.
- A security essential that should be strong and frequently updated.
- Female country legend and philanthropist who helped fund the COVID-19 vaccine.
- Word used to describe viral topics on social media and news.
Down
- Essential for protecting businesses from modern digital threats.
- The rapidly evolving technology transforming industries through automation, deep learning, and generative models.
- Remote servers that store data online instead of locally.
- A critical software update that fixes security vulnerabilities.
- Celebrated on April 22 to promote environmental awareness.
- A cyber scam that tricks users into revealing sensitive information.
- Boxing champ turned entrepreneur, still known for his iconic grill.
- The season of new beginnings, blooming flowers, and warmer days.
- Month known for spring showers, tax deadlines, and pranks on the 1st.
16 Clues: Remote servers that store data online instead of locally. • Celebrated on April 22 to promote environmental awareness. • Word used to describe viral topics on social media and news. • A critical software update that fixes security vulnerabilities. • Essential for protecting businesses from modern digital threats. • ...
Luca S game 2023-11-08
IELTS Writing Task 2 - Technology 2024-01-20
Cybersecurity Training Activity 2024-01-30
Across
- A software used to disable user access to their files until they pay the cybercriminal
- An extra layer of security on applications containing sensitive data
- A legislation that governs the handling of personal data(2 words and year)
- The field of encrypting information so only authorised people can access it
- When an individual or organisations private information is leaked(2 words)
- A framework outlining standards and best practices for cybersecurity
Down
- Where a cybercriminal gets access to your personal details and impersonates you to do malicious activities(2 words)
- A software used to harm computer systems or networks
- A regulatory body for cybersecurity
- A copy of sensitive data for redundancy to safeguard against cyber attacks
- Where cybercriminals trick you into giving them sensitive information.
11 Clues: A regulatory body for cybersecurity • A software used to harm computer systems or networks • An extra layer of security on applications containing sensitive data • A framework outlining standards and best practices for cybersecurity • Where cybercriminals trick you into giving them sensitive information. • ...
Unikum 2023-03-07
Across
- Unikum's regular arrangement
- equinox day and night
- activity for introduce people to each other
- image
- celebrating women's rights
- Unikums satire column
- animal with one horn on the nose
Down
- cabbage Norwegian National dish
- last edition front page
- IT study at UIA
- Tax haven
- daylight and night equally long
- webinar
13 Clues: image • webinar • Tax haven • IT study at UIA • equinox day and night • Unikums satire column • last edition front page • celebrating women's rights • Unikum's regular arrangement • daylight and night equally long • cabbage Norwegian National dish • animal with one horn on the nose • activity for introduce people to each other
Cyber ethics 2025-06-13
Across
- malicious hackers break system
- defending network and data
- fake email and information
- internet manner and behaviour
- coping without giving credit
- right and wrong online
- illegal activities using computer
- legal right to creation
Down
- protection against digital threat
- online harassment or threats
- right and wrong online
- traces left online
- contorl over personal data
- unauthorized system access
- sending unwanted bulk messeages
15 Clues: traces left online • right and wrong online • right and wrong online • legal right to creation • defending network and data • contorl over personal data • fake email and information • unauthorized system access • online harassment or threats • coping without giving credit • internet manner and behaviour • malicious hackers break system • sending unwanted bulk messeages • ...
Cybersecurity Crossword 2020-09-25
Across
- a method that used to find out a password by monitoring traffic on a network to pull out information.
- Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
- A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage while asking for payment.
- An attack on targeted individuals to obtain sensitive, personal, and confidential data via email or fraudulent websites.
- A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
- This allows users to connect the organization's protected network using multi-factor authentication.
- An individual or group posing a threat.
- A computer under the control of a remote attacker which has been infected with software or scripts to perform tasks on command.
Down
- A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- A technique used to manipulate and deceive people to gain sensitive and private information. These scams are built around how people think and act.
- The process of changing plaintext into ciphertext using a cryptographic algorithm and key.
- An audio or video clip that has been edited and manipulated to seem real or believable.
12 Clues: An individual or group posing a threat. • An audio or video clip that has been edited and manipulated to seem real or believable. • The process of changing plaintext into ciphertext using a cryptographic algorithm and key. • This allows users to connect the organization's protected network using multi-factor authentication. • ...
Cybersecurity Vocab 2021-12-09
Across
- any attack that takes advantage of vulnerabilities in applications, networks, operating systems, or hardware.
- an algebraic mathematical manipulation that attempts to reduce the complexity of the cryptographic algorithm.
- the attacker has access to pairs of known plaintexts and their corresponding ciphertexts.
Down
- a general term for when a perpetrator positions himself in a conversation between a user and an application
- tries to find two inputs producing the same hash value
- consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
- if we change a character of the plaintext, then several characters of the ciphertext should change
- convert (information or data) into a cipher or code, especially to prevent unauthorized access.
- each binary digit (bit) of the ciphertext should depend on several parts of the key, obscuring the connections between the two.
- a method in cryptography by which cryptographic keys are exchanged between two parties
- a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme.
- the art or process of deciphering coded messages without being told the key.
12 Clues: tries to find two inputs producing the same hash value • the art or process of deciphering coded messages without being told the key. • a method in cryptography by which cryptographic keys are exchanged between two parties • the attacker has access to pairs of known plaintexts and their corresponding ciphertexts. • ...
CYBERSECURITY CROSSWORD 2022-04-27
Across
- something in place to prevent an attack
- Data not modified
- a major weak link in security
- Record the identities and activities
- connect to a secure server
- study of techniques for secure communication
- Information kept private and secure
Down
- a weakness that can be exploited
- Systems available to those who need them
- packet capture tool
- Provide verification of identity
- tool used to scan for open ports
12 Clues: Data not modified • packet capture tool • connect to a secure server • a major weak link in security • a weakness that can be exploited • Provide verification of identity • tool used to scan for open ports • Information kept private and secure • Record the identities and activities • something in place to prevent an attack • Systems available to those who need them • ...
CyberSecurity Awareness. 2023-08-20
Across
- A combination of letters, numbers, and symbols used to access an account
- A type of malicious software that encrypts files and demands a ransom
- A set of rules and configurations that protect a computer system from unauthorized access
- A code that is generated by a mobile app and used for two-factor authentication
- Unauthorized access to computer systems
- A technique used to verify the identity of a user, often using a code sent to a phone
Down
- A computer security incident that occurs over a network
- Malicious email that appears to be from a legitimate source
- A program designed to replicate itself and spread to other computers
- The process of converting data into a secret code to prevent unauthorized access
- An attack that overwhelms a system with excessive traffic to make it unavailable
- The weakest link in cybersecurity, often targeted by attackers
12 Clues: Unauthorized access to computer systems • A computer security incident that occurs over a network • Malicious email that appears to be from a legitimate source • The weakest link in cybersecurity, often targeted by attackers • A program designed to replicate itself and spread to other computers • ...
What is AI 2024-04-02
11 Clues: AI benefit • Siri, Alexa • Netflix, Hulu • Text and images • improves algorithms • New solutions, ideas • Protect data breaches • Privacy concerns, bias • instructions that guide AI systems • Element that must always be a part of AI • Customized customer experience, efficiency
Cyber Security 2024-02-20
Across
- Unsolicited bulk emails
- Deceptive email tactic
- Software for detecting and removing malware
- Harmful software
- Unauthorized access seeker
- Verification process
- Newly discovered vulnerability
- Secure data transmission protocol
- Secure network connection
- Network of infected computers controlled remotely
- Denial of Service attack
Down
- Malicious software demanding payment
- Weakness in a system's security
- Access code
- Network security barrier
- Identity verification using unique physical traits
- Protection of internet-connected systems and data
- Software update
- Data protection method
- Malware disguised as legitimate software
20 Clues: Access code • Software update • Harmful software • Verification process • Deceptive email tactic • Data protection method • Unsolicited bulk emails • Network security barrier • Denial of Service attack • Secure network connection • Unauthorized access seeker • Newly discovered vulnerability • Weakness in a system's security • Secure data transmission protocol • ...
Mateusz Suchocki Piotr Szabram 2023-05-29
Across
- - Online storage and computing
- -Secret phrase for authentication
- - Copy of data for safekeeping
- - Protection of computer systems
- - Wireless networking technology
- -Network security barrier
- - Connected group of devices
- - Identifying and fixing errors
- - Harmful software
- - Organized collection of information
Down
- -Set of rules or instructions
- - Data protection through coding
- - Device for forwarding data packets
- - Computer that provides services
- - Software for internet browsing
- - Self-replicating malicious code
- - Open-source operating system
- - Interaction between user and system
- - Language for building web pages
- - Object-oriented programming language
20 Clues: - Harmful software • -Network security barrier • - Connected group of devices • -Set of rules or instructions • - Online storage and computing • - Copy of data for safekeeping • - Open-source operating system • - Identifying and fixing errors • - Data protection through coding • - Software for internet browsing • - Protection of computer systems • - Wireless networking technology • ...
21 2025-02-08
Across
- Study of humans
- Machine that performs tasks
- Enhanced reality
- Organized data
- Study of language
- Study of government
- Physical computer parts
- Not physically existing
- Study of life
- Connected computers
- Study of Earth
- Set of instructions
- Study of ideas
- Intelligence in technology
- Study of space
Down
- Study of mind
- Study of technology
- Protecting digital systems
- Global network
- Programs for computers
- Imitation of real-world process
- Instructions for computers
- Study of society
- Write code
- Study of resources
25 Clues: Write code • Study of mind • Study of life • Global network • Organized data • Study of Earth • Study of ideas • Study of space • Study of humans • Enhanced reality • Study of society • Study of language • Study of resources • Study of technology • Study of government • Connected computers • Set of instructions • Programs for computers • Physical computer parts • Not physically existing • ...
Teknologi Firza Insanudzaky 2023-07-28
Across
- Teknologi keamanan siber
- Teknologi nanoskala
- Reality Teknologi realitas maya
- Intelligence Teknologi cerdas
- Reality Teknologi realitas tambahan
Down
- of Things Teknologi perangkat terhubung
- Teknologi terdistribusi
- mobil listrik terkenal dari amerika
- Data Teknologi data besar
- Computing Teknologi komputasi awan
- Printing Teknologi cetak 3D
11 Clues: Teknologi nanoskala • Teknologi terdistribusi • Teknologi keamanan siber • Data Teknologi data besar • Printing Teknologi cetak 3D • Intelligence Teknologi cerdas • Reality Teknologi realitas maya • Computing Teknologi komputasi awan • mobil listrik terkenal dari amerika • Reality Teknologi realitas tambahan • of Things Teknologi perangkat terhubung
IT-bezogene Gegenstücke 2025-01-30
Across
- biometric authentication, similar to how unique fingerprints identify individuals
- in cybersecurity, unauthorized listening, similar to an ear picking up private conversations
- network - main connectivity infrastructure, like the spine supporting the body’s structure
- temporary storage to process data faster, like short-term memory for quick recall
- directs traffic, like veins carrying blood to different parts of the body
- tracking used in UX/UI analysis, akin to vision guiding movement and interaction
- a point of congestion in systems, comparable to a narrowed artery restricting blood flow
Down
- keeps the system standing and running, similar to a healthy body maintaining vitality
- for voice input and communication, like vocal cords enabling speech
- an exchange of standardized signals between devices in a computer network, like the mutual recognition of two individuals before a conversation
- a sequence of execution, like muscle fibers working together for coordinated action
- protective barrier, like skin in cybersecurity defending against external threats
- signal used in networking to check system status, like a pulse monitoring health
- stores session info, like taste memory helping us remember flavors
- rules for communication, like language facilitating understanding in conversations
15 Clues: stores session info, like taste memory helping us remember flavors • for voice input and communication, like vocal cords enabling speech • directs traffic, like veins carrying blood to different parts of the body • signal used in networking to check system status, like a pulse monitoring health • ...
IT-bezogene Gegenstücke 2025-01-30
Across
- biometric authentication, similar to how unique fingerprints identify individuals
- in cybersecurity, unauthorized listening, similar to an ear picking up private conversations
- network - main connectivity infrastructure, like the spine supporting the body’s structure
- temporary storage to process data faster, like short-term memory for quick recall
- directs traffic, like veins carrying blood to different parts of the body
- tracking used in UX/UI analysis, akin to vision guiding movement and interaction
- a point of congestion in systems, comparable to a narrowed artery restricting blood flow
Down
- keeps the system standing and running, similar to a healthy body maintaining vitality
- for voice input and communication, like vocal cords enabling speech
- an exchange of standardized signals between devices in a computer network, like the mutual recognition of two individuals before a conversation
- a sequence of execution, like muscle fibers working together for coordinated action
- protective barrier, like skin in cybersecurity defending against external threats
- signal used in networking to check system status, like a pulse monitoring health
- stores session info, like taste memory helping us remember flavors
- rules for communication, like language facilitating understanding in conversations
15 Clues: stores session info, like taste memory helping us remember flavors • for voice input and communication, like vocal cords enabling speech • directs traffic, like veins carrying blood to different parts of the body • signal used in networking to check system status, like a pulse monitoring health • ...
Corsework Crossword 2024-08-29
10 Clues: Reframe • I object! • Pitchercize • Richard Rumelt • Think, MIT Alumni • More money than God • Money! Money! Money! • What is today's costume? • Learning Ethics or bust! • The rep from Green Peace has a question
Whats is Business Services? 2021-10-21
James Cyber safety crossword 2016-05-21
Across
- a small piece of information or chocolate chip
- computer villainy
- Search engine
- Request details
- group of friends
- this flickers in a fire
- Short cut to speed access
- email,junk mail you didn't ask for
Down
- Highlight your favourites
- keeping private information safe
- an on line talk with friends
- Unwanted advertising
- secret code
- burning bricks to protect you
- secret identity
- my up to date news
- a person who gains access without permission
- the flu is one of these
- Device that moves you curser
- unexpected ad
20 Clues: secret code • Search engine • unexpected ad • Request details • secret identity • group of friends • computer villainy • my up to date news • Unwanted advertising • this flickers in a fire • the flu is one of these • Highlight your favourites • Short cut to speed access • an on line talk with friends • Device that moves you curser • burning bricks to protect you • ...
Practice Cybersecurity Terminology Puzzle 2025-03-14
Across
- Data hostage for ransom
- Protection of networks from threats
- Update that fixes vulnerabilities
- Requires multiple identity proofs
- Information about cyber threats
- Malicious software that harms systems
- Encoding sensitive information
- Impersonation to obtain information
Down
- Vulnerability with no available patch
- Weakness in a system
- Distributed denial-of-service attack
- Verifying user identity
- Converting data into codes
- Longterm targeted cyberattack
- Secure internet connection
- Unauthorized access to systems
- Blocks unwanted traffic
- Software that detects malware
- Software that secretly monitors
- Continuous cybersecurity monitoring
20 Clues: Weakness in a system • Data hostage for ransom • Verifying user identity • Blocks unwanted traffic • Converting data into codes • Secure internet connection • Longterm targeted cyberattack • Software that detects malware • Unauthorized access to systems • Encoding sensitive information • Information about cyber threats • Software that secretly monitors • ...
Kaylie and Eli Sip and Solve 2025-08-31
Across
- The engagement location.
- Their high school mascot.
- Kaylie's favorite movie.
- Their favorite energy drink.
- Their favorite restaurant.
- Kaylie was Miss __ in 2023.
- Their first trip together.
- Eli's football number in high school.
- The name of Eli's childhood pet.
- Eli's middle name.
Down
- Kaylie's favorite singer
- Eli's favorite Christmas movie.
- Eli graduated in 2026 majoring in _.
- Eli's favorite cookie flavor.
- Eli's favorite sports team.
- Their first concert.
- First date location.
- Kaylie's favorite color.
- The month they started dating.
- The name of Kaylie's sorority.
20 Clues: Eli's middle name. • Their first concert. • First date location. • Kaylie's favorite singer • The engagement location. • Kaylie's favorite movie. • Kaylie's favorite color. • Their high school mascot. • Their favorite restaurant. • Their first trip together. • Eli's favorite sports team. • Kaylie was Miss __ in 2023. • Their favorite energy drink. • Eli's favorite cookie flavor. • ...
Transputec 2024-07-17
Across
- Dealing with audits as well as money-related issues
- The People team
- An thing that motivates you to work harder
- Brazil
- Where all deliveries come in and out
- Enlisting new people
- calculating salaries and payday
- personal holiday
Down
- Computer Department
- Communication method for calls in work
- CVMS
- climbing up the work ladder
- computer safety
- Company name
14 Clues: CVMS • Brazil • Company name • The People team • computer safety • personal holiday • Computer Department • Enlisting new people • climbing up the work ladder • calculating salaries and payday • Where all deliveries come in and out • Communication method for calls in work • An thing that motivates you to work harder • Dealing with audits as well as money-related issues
Cyber ethics 2025-06-13
Across
- malicious hackers break system
- defending network and data
- fake email and information
- internet manner and behaviour
- coping without giving credit
- right and wrong online
- illegal activities using computer
- legal right to creation
Down
- protection against digital threat
- online harassment or threats
- right and wrong online
- traces left online
- contorl over personal data
- unauthorized system access
- sending unwanted bulk messeages
15 Clues: traces left online • right and wrong online • right and wrong online • legal right to creation • defending network and data • contorl over personal data • fake email and information • unauthorized system access • online harassment or threats • coping without giving credit • internet manner and behaviour • malicious hackers break system • sending unwanted bulk messeages • ...
IEM Social Media Crossword Puzzle 2021-07-20
Across
- Focus FEMA’s newly released guidance
- IEM Senior Executive Advisor providing insight
- Connect with county leaders
- Hire a _____ Day
- rapidly spreading variant
- Celebrating Puerto Rico’s…
- MEDIA, Tool for public safety and emergency response
- IEM Spotlight
- July Heritage Month
- Practicing personal appreciation
Down
- The CISA, FBI, and the NSA published a Joint ____ Advisory
- Celebrating
- Conservation Day
- Summer heat brings increased risk
- Interns and System Administrator Day
- Beat the…
- Tropical Storm
- DAY, Holiday
- Have you made a family ____ plan?
- Hernando County, Florida
20 Clues: Beat the… • Celebrating • DAY, Holiday • IEM Spotlight • Tropical Storm • Conservation Day • Hire a _____ Day • July Heritage Month • Hernando County, Florida • rapidly spreading variant • Celebrating Puerto Rico’s… • Connect with county leaders • Practicing personal appreciation • Summer heat brings increased risk • Have you made a family ____ plan? • Focus FEMA’s newly released guidance • ...
IEM Social Media Crossword Puzzle 2021-07-20
Across
- Focus FEMA’s newly released guidance
- Beat the…
- Have you made a family ____ plan?
- MEDIA, Tool for public safety and emergency response
- Conservation Day
- Hernando County, Florida
- Tropical Storm
- Practicing personal appreciation
- Connect with county leaders
- July Heritage Month
- Give Something Away Day
- rapidly spreading variant
Down
- Celebrating Puerto Rico’s…
- DAY, Holiday
- Interns and System Administrator Day
- Summer heat brings increased risk
- The CISA, FBI, and the NSA published a Joint ____ Advisory
- Hire a _____ Day
- IEM Spotlight
- IEM Senior Executive Advisor providing insight
20 Clues: Beat the… • DAY, Holiday • IEM Spotlight • Tropical Storm • Conservation Day • Hire a _____ Day • July Heritage Month • Give Something Away Day • Hernando County, Florida • rapidly spreading variant • Celebrating Puerto Rico’s… • Connect with county leaders • Practicing personal appreciation • Summer heat brings increased risk • Have you made a family ____ plan? • ...
Wes Rich - CIS178 Week 3 Participation Cyber-Security Terms 2023-07-15
Across
- Protection against malicious programs.
- Malicious cyber attackers.
- Data protection through cryptography.
- Deceptive malicious software.
- Network of compromised computers.
- Deceptive online identity theft.
- Covert information-gathering software.
- Ethical cybersecurity professionals.
- Attack Network flooding disruption technique.
- Synthetic media manipulation technique.
Down
- Security breach exposes data.
- Tools Software for secure password storage.
- Secret codes for data protection.
- Harmful computer software.
- Unpatched software vulnerability exploitation.
- Network traffic filtering safeguard.
- Deceptive click manipulation technique.
- Online harassment and intimidation.
- Secure remote network access.
- Files held hostage for payment.
20 Clues: Malicious cyber attackers. • Harmful computer software. • Security breach exposes data. • Deceptive malicious software. • Secure remote network access. • Files held hostage for payment. • Deceptive online identity theft. • Secret codes for data protection. • Network of compromised computers. • Online harassment and intimidation. • Network traffic filtering safeguard. • ...
Chloe and Mick 2025-08-10
Across
- Location of proposal
- Number of Chloe's siblings
- Age Chloe and Mick met
- Number of apartments Chloe has lived in
- Where Chloe & Mick met
- Mick's favorite sport
- Month of proposal
- Mick's favorite flavor of Busch
- Chloe's middle name
- Mick's master degree
Down
- Mick's eye color
- Chloe's zodiac sign
- Favorite sport to play together
- What is their cats name?
- Their favorite food
- Their favorite place to eat
- Chloe's favorite color
- Location of their first date
- Mick's zodiac sign
- Star Wars droid on Chloe's keychain
20 Clues: Mick's eye color • Month of proposal • Mick's zodiac sign • Chloe's zodiac sign • Their favorite food • Chloe's middle name • Location of proposal • Mick's master degree • Mick's favorite sport • Age Chloe and Mick met • Where Chloe & Mick met • Chloe's favorite color • What is their cats name? • Number of Chloe's siblings • Their favorite place to eat • Location of their first date • ...
I + E 2024-01-23
Across
- Where Ingrid and Erik first met
- A country where Erik studied
- First concert
- Country they´ve visited the most
- Their first vacation together
- Erik´s job
- Their female cat
- Honeymoon destination
- Ingrid´s hobby
Down
- Where Erik grew up
- Number of countries they´ve visited together
- Their favourite trip together
- Where they got engaged
- Wedding venue
- Theo´s birthday month
- The street they used to live on
- Their male cat
- Where Ingrid studied abroad
- Ingrid´s first surname
- Their car
20 Clues: Their car • Erik´s job • Wedding venue • First concert • Their male cat • Ingrid´s hobby • Their female cat • Where Erik grew up • Theo´s birthday month • Honeymoon destination • Where they got engaged • Ingrid´s first surname • Where Ingrid studied abroad • A country where Erik studied • Their favourite trip together • Their first vacation together • Where Ingrid and Erik first met • ...
INFORMATIKA SEKARANG DAN MASA DEPAN 2025-08-26
Across
- Proses olah data jadi informasi
- Terjemahan Artificial Intelligence
- Data Kumpulan data sangat besar
- Perlindungan data digital
- Chatbot termasuk teknologi
- Terjemahan cloud computing
- Mobil pintar tanpa sopir
- Menggali pola dari data
- Algoritma belajar dari data
Down
- Cara sehat gunakan media digital
- Serangan pencuri data digital
- Mesin otomatis yang membantu manusia
- Dunia buatan imersif
- Jaringan global penghubung
- Kecerdasan buatan komputer
- Singkatan teknologi penghubung perangkat
- Kemampuan memahami dunia digital
- Teknologi yang bisa menyesuaikan
- Perangkat sensor terhubung jaringan
- Komunikasi antar mesin otomatis
20 Clues: Dunia buatan imersif • Menggali pola dari data • Mobil pintar tanpa sopir • Perlindungan data digital • Jaringan global penghubung • Kecerdasan buatan komputer • Chatbot termasuk teknologi • Terjemahan cloud computing • Algoritma belajar dari data • Serangan pencuri data digital • Proses olah data jadi informasi • Komunikasi antar mesin otomatis • Cara sehat gunakan media digital • ...
Cybersecurity Crossword Puzzle 2023-01-24
Across
- malware that makes you pay
- software to detect and destroy malware
- malware pretending to be useful
- software that tracks you
- tricking users to click links/images
- manipulated media
- criminals explpoiting network vulnerabilities
- scrambling data into unreadable text
Down
- software that checks for malware
- harmful software
- a shield for data
- malware that displays adverts
- attacks exploiting a vulnerability
- service that encrypts data while on WiFi
- multiple attackers preventing legitimate users
- attacks seeking out personal info
- a unique label for devices connected to the internet
- internet access at coffee shop
- network pro learning hacking techniques
19 Clues: harmful software • a shield for data • manipulated media • software that tracks you • malware that makes you pay • malware that displays adverts • internet access at coffee shop • malware pretending to be useful • software that checks for malware • attacks seeking out personal info • attacks exploiting a vulnerability • tricking users to click links/images • ...
Cybersecurity Crossword Puzzle 2025-09-21
Across
- A type of malware that is designed to look like a legitimate program in order to trick users into downloading it.
- The process of simplifying complex systems by focusing on essential features, hiding unnecessary details.
- A malicious program that can self-replicate and attach itself to other files.
- A symbol, typically '=', used in programming to assign a value to a variable.
- The practice of protecting computers, servers, mobile devices, and networks from malicious attacks.
- A value or variable that is passed to a function or method when it is called.
- A software that generates revenue by automatically displaying online advertisements.
- To verify the identity of a user or system.
Down
- A program or set of rules that protects a network by controlling incoming and outgoing traffic.
- An additional component or feature that can be added to a software program.
- A software program used to prevent, detect, and remove malware.
- CONTROL - A security process that controls and manages who is authorized to access certain resources.
- A malicious program that is designed to damage or gain unauthorized access to a computer system.
- The act of sending fraudulent emails in order to trick people into revealing personal information.
- The sum of all possible points where an unauthorized user can try to enter or extract data from a system.
- POISONING - A type of cyber attack that involves sending false ARP messages to redirect network traffic.
- A character encoding standard used to represent text in computers.
- A protocol used to translate IP addresses into MAC addresses.
- A collection of IP-to-MAC address mappings used to speed up network communication.
19 Clues: To verify the identity of a user or system. • A protocol used to translate IP addresses into MAC addresses. • A software program used to prevent, detect, and remove malware. • A character encoding standard used to represent text in computers. • An additional component or feature that can be added to a software program. • ...
Lance and Ally 2025-07-20
Across
- Location of their first date
- Song Ally walked down the aisle to
- Lance's major in college
- Flavor of the wedding cake
- Ally's maiden name
- Name of the best man
- Ally's hometown
- Name of the maid of honor
- Lance's favorite color
- Number of years Ally and Lance have been together
Down
- Total number of siblings
- Their dog's name
- Name of the ring bearer
- Name of the flower girl
- Lance's favorite sports team
- Lance's hometown
- Lance's middle name
- Ally's profession
- Month Lance proposed
19 Clues: Ally's hometown • Their dog's name • Lance's hometown • Ally's profession • Ally's maiden name • Lance's middle name • Name of the best man • Month Lance proposed • Lance's favorite color • Name of the ring bearer • Name of the flower girl • Total number of siblings • Lance's major in college • Name of the maid of honor • Flavor of the wedding cake • Location of their first date • ...
Safe to Speed 2022-07-18
Across
- Without proper input _____, malicious actors can send a malicious input into your web application form to inject malicious code to extract sensitive data from your database.
- Performing threat _____ at the start of your project will give you insight into your system's risk profile.
- Systems infected by malicious actor can be used to partake in a _____. This allows the malicious actor to use your infected system to conduct attacks to achieve their goals.
Down
- _____ programs attempt to utilise your system's compute resource (Without your knowledge) to mine for cryptocurrencies.
- Regular review of _____ accounts ensures that no unauthorised users are misusing the accounts outside the bounds of the system owner's knowledge.
- Doing system _____ will ensure that your systems are protected from the most basic and common attacks.
- It's important to understand potential vendor's cybersecurity _____ to evaluate if they have both innovation and cybersecurity best practices in mind.
- Security _____ helps identify business logic flaws and bugs in your application code.
- This provides you with a simpler and balanced means of ensuring cybersecurity best practices during a proof of concept/value or minimum viable product stage.
- _____ are often leaked on public code repositories due to developers using loosely configured code repositories.
10 Clues: Security _____ helps identify business logic flaws and bugs in your application code. • Doing system _____ will ensure that your systems are protected from the most basic and common attacks. • Performing threat _____ at the start of your project will give you insight into your system's risk profile. • ...
CYBERSECURITY 2015-03-25
Across
- ... device forensics roots began when mobile devices started to become popular, about 2000.
- Digital ... is used to capture volatile information from random access memory (RAM) and other running processes, including networks.
- ...are fast moving and increasing in number and severity.
Down
- ISACA publication Transforming ...
- Digital forensics scientific process: ...of custody.
- ...reasoning uses a series of specific pieces of information to extrapolate a broad conclusion.
- Implementing the NIST Cybersecurity Framework guide implements the CSF using ISACA’s ... 5 processes.
7 Clues: ISACA publication Transforming ... • Digital forensics scientific process: ...of custody. • ...are fast moving and increasing in number and severity. • ... device forensics roots began when mobile devices started to become popular, about 2000. • ...reasoning uses a series of specific pieces of information to extrapolate a broad conclusion. • ...
CYBERSECURITY 2025-04-06
Across
- a type of social engineering to steal user data
- protection of systems, networks, and programs from digital attacks
- an intrusive software developed by cybercriminals
Down
- weak places in the security system
- an unauthorized person who tries to gain access
- a computer data storage on servers in off-site locations is called … storage
- the use of numbers
7 Clues: the use of numbers • weak places in the security system • a type of social engineering to steal user data • an unauthorized person who tries to gain access • an intrusive software developed by cybercriminals • protection of systems, networks, and programs from digital attacks • a computer data storage on servers in off-site locations is called … storage
Cybersecurity 2021-12-30
CyberSecurity 2023-02-05
Across
- Spread through a network and use system resources for example to slow the network speed down.
- Malicious form of self-replicating software that can spread quickly on a computer network.
- Infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- Unwanted software that monitors and gathers information on a person and how they use their computer.
- A piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions. Name derives from the story of the Horse.
Down
- Locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- Malicious software is software that is designed to gain access to your computer with malicious intent.
7 Clues: Malicious form of self-replicating software that can spread quickly on a computer network. • Spread through a network and use system resources for example to slow the network speed down. • Unwanted software that monitors and gathers information on a person and how they use their computer. • ...
Cybersecurity 2025-08-19
7 Clues: The brain of the computer. • Harmful software programs. • A code used to lock or unlock accounts. • A person who breaks into computer systems. • Software that protects against online threats. • A harmful program that spreads and damages files. • Fake emails that trick you into giving personal information.
IT-bezogene Gegenstücke 2025-01-30
Across
- biometric authentication, similar to how unique fingerprints identify individuals
- in cybersecurity, unauthorized listening, similar to an ear picking up private conversations
- network - main connectivity infrastructure, like the spine supporting the body’s structure
- temporary storage to process data faster, like short-term memory for quick recall
- directs traffic, like veins carrying blood to different parts of the body
- tracking used in UX/UI analysis, akin to vision guiding movement and interaction
- a point of congestion in systems, comparable to a narrowed artery restricting blood flow
Down
- keeps the system standing and running, similar to a healthy body maintaining vitality
- for voice input and communication, like vocal cords enabling speech
- an exchange of standardized signals between devices in a computer network, like the mutual recognition of two individuals before a conversation
- a sequence of execution, like muscle fibers working together for coordinated action
- protective barrier, like skin in cybersecurity defending against external threats
- signal used in networking to check system status, like a pulse monitoring health
- stores session info, like taste memory helping us remember flavors
- rules for communication, like language facilitating understanding in conversations
15 Clues: stores session info, like taste memory helping us remember flavors • for voice input and communication, like vocal cords enabling speech • directs traffic, like veins carrying blood to different parts of the body • signal used in networking to check system status, like a pulse monitoring health • ...
Coding 2023-12-11
Across
- Identifying and fixing errors
- Step-by-step problem solving procedures
- Building apps for mobile devices
- Tracking changes and versions
- Writing clear explanations of code
- Learning new things continuously
Down
- Languages for human-computer communication
- Blocks of reusable code
- Unified coding environment
- Organizes code into objects
- Instructing the computer
- Basis of machine learning
- Making dynamic websites
- Principles for secure programs
- Managing the flow of a program
15 Clues: Blocks of reusable code • Instructing the computer • Making dynamic websites • Identifying and fixing errors • Organizes code into objects • Unified coding environment • Basis of machine learning • Principles for secure programs • Tracking changes and versions • Managing the flow of a program • Building apps for mobile devices • ...
Cybersecurity Crossword Puzzle 2024-09-25
Across
- Fraudulent attempts to steal sensitive information
- A tool that uses large language models to create authentic-looking text, pictures, or video. Can be used to create deepfakes
- What you should do with any suspicious communication!
- Online harassment or bullying
- Malware disguised as legitimate software
- Multi-Factor Authentication
- Virtual Private Network for secure connections
- Using AI to create a likeness of someone in video, voice, or picture
- Software update to fix security vulnerabilities
Down
- Investment scam involving fake accounts
- A phish sent by text
- Software that collects data secretly
- Self-replicating malware that spreads across networks
- Investment currency usually preferred in pig butchering scams
- Malware that encrypts files demanding ransom
- Factor showing how likely an associate will report versus click a phishing email
- Securing data by converting it into code
- A group very concerned with cyberbullying
18 Clues: A phish sent by text • Multi-Factor Authentication • Online harassment or bullying • Software that collects data secretly • Investment scam involving fake accounts • Malware disguised as legitimate software • Securing data by converting it into code • A group very concerned with cyberbullying • Malware that encrypts files demanding ransom • ...
Cybersecurity Crossword Puzzle 2023-01-24
Across
- malware that makes you pay
- software to detect and destroy malware
- malware pretending to be useful
- software that tracks you
- tricking users to click links/images
- manipulated media
- criminals explpoiting network vulnerabilities
- scrambling data into unreadable text
Down
- software that checks for malware
- harmful software
- a shield for data
- malware that displays adverts
- attacks exploiting a vulnerability
- service that encrypts data while on WiFi
- multiple attackers preventing legitimate users
- attacks seeking out personal info
- a unique label for devices connected to the internet
- internet access at coffee shop
- network pro learning hacking techniques
19 Clues: harmful software • a shield for data • manipulated media • software that tracks you • malware that makes you pay • malware that displays adverts • internet access at coffee shop • malware pretending to be useful • software that checks for malware • attacks seeking out personal info • attacks exploiting a vulnerability • tricking users to click links/images • ...
Cyber Security Crossword 2021-10-14
Across
- Do not accept trade orders via _____ or voicemail
- Require _______ confirmation for trade orders sent via email.
- Always use _______________ for all sensitive data on computers and removable media.
- Report Security Incidents to the ___________ Service Center x74357.
- “Do Your Part. #____________________.”
- Don't click on _________ links
- Report ___________ emails to the Cyber Threat Center (cyberthreat@raymondjames.com).
Down
- As part of the STOP.THINK.CONNECT.™ national public awareness ___________, CISA is also sharing Cybersecurity Awareness Month Resources to reduce cybersecurity risks and protect you online.
- ______________ is Cyber Security Awareness month.
- Type [_______] in the subject line of emails with sensitive data.
- PII stands for personally ____________ information
- Use a password of PIN to protect your mobile device. Have the device require a password after _________ minutes of inactivity.
- If you are unsure of the legitimacy of an email do not click on any links or open any _______________.
- Connect directly to the Raymond James ___________ only through wireless access points managed and configured by the ___________ Engineering Department.
- If you plan to enter a contract with a third-party or are changing your contract, please request a ______ assessment.
15 Clues: Don't click on _________ links • “Do Your Part. #____________________.” • ______________ is Cyber Security Awareness month. • Do not accept trade orders via _____ or voicemail • PII stands for personally ____________ information • Require _______ confirmation for trade orders sent via email. • Type [_______] in the subject line of emails with sensitive data. • ...
