cybersecurity Crossword Puzzles

Cybersecurity Crossword 2025-10-13

Cybersecurity Crossword crossword puzzle
Across
  1. Turning a secret code back into a normal message.
  2. Keeping computers and information safe from unauthorized people online.
  3. The giant network that connects computers all over the world.
  4. A secret word used to log into an account.
  5. A fake message that tricks people into giving passwords.
  6. A message that’s been turned into secret code.
Down
  1. A normal message before it’s turned into code.
  2. A person who breaks into computers.
  3. The process of writing and solving secret codes.
  4. The process of changing a message so others can’t read it.
  5. A tiny program that spreads and messes up computers.
  6. Keeping your personal info to yourself.

12 Clues: A person who breaks into computers.Keeping your personal info to yourself.A secret word used to log into an account.A normal message before it’s turned into code.A message that’s been turned into secret code.The process of writing and solving secret codes.Turning a secret code back into a normal message....

Cybersecurity by Hazel 2025-05-07

Cybersecurity by Hazel crossword puzzle
Across
  1. the process of identifying and fixing vulnerabilities on a system.
  2. The smallest unit of information storage.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers.
  5. A list of entities that are considered trustworthy and are granted access or privileges.
  6. Any unauthorized attempt to access, disrupt, steal, or damage computer systems, networks, or data.
  7. A part of a computer system or network with is designed to block unauthorized access while permitting outward communication.
  8. Whom someone or what something is.
  9. the process of protecting electrical devices and networks from attacks.
Down
  1. A part of a computer system or network which is designed to lock unauthorized access while permitting outward communication.
  2. A term to describe connecting multiple separate networks together.
  3. The process of storing a data file in several "chunks" or rather than in a single contiguous sequence of bits in one place on the storage medium.
  4. An unexpected and relatively small defect, fault, fault, or imperfection in an information system or device.
  5. A list of entities that are blocked or denied privileges.
  6. A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer Encryption the process of converting information or data into a code, especially to precent unauthorized access.
  7. A security incident in which sensitive, protected, or confidential information is accused, stolen, or disclosed without authorization.
  8. A cryptographic algorithm for encryption and decryption.
  9. A connection between two devices.
  10. A group of people authorized and organized to emulate a potential adversary's attack or exploitation capabilities against an enterprise's security posture.

19 Clues: A connection between two devices.Whom someone or what something is.The smallest unit of information storage.A cryptographic algorithm for encryption and decryption.A list of entities that are blocked or denied privileges.the process of identifying and fixing vulnerabilities on a system....

Tech, Trends, and Titans 2025-04-01

Tech, Trends, and Titans crossword puzzle
Across
  1. A celestial event where the moon blocks the sun, last seen in April 2024.
  2. A computing breakthrough that promises to revolutionize cybersecurity and problem-solving.
  3. The tech giant behind Facebook, Instagram, and its growing metaverse.
  4. OpenAI's 2025 AI tool that autonomously generates comprehensive reports by analyzing multiple online sources.
  5. A security essential that should be strong and frequently updated.
  6. Female country legend and philanthropist who helped fund the COVID-19 vaccine.
  7. Word used to describe viral topics on social media and news.
Down
  1. Essential for protecting businesses from modern digital threats.
  2. The rapidly evolving technology transforming industries through automation, deep learning, and generative models.
  3. Remote servers that store data online instead of locally.
  4. A critical software update that fixes security vulnerabilities.
  5. Celebrated on April 22 to promote environmental awareness.
  6. A cyber scam that tricks users into revealing sensitive information.
  7. Boxing champ turned entrepreneur, still known for his iconic grill.
  8. The season of new beginnings, blooming flowers, and warmer days.
  9. Month known for spring showers, tax deadlines, and pranks on the 1st.

16 Clues: Remote servers that store data online instead of locally.Celebrated on April 22 to promote environmental awareness.Word used to describe viral topics on social media and news.A critical software update that fixes security vulnerabilities.Essential for protecting businesses from modern digital threats....

Cybersecurity Training Activity 2024-01-30

Cybersecurity Training Activity crossword puzzle
Across
  1. A software used to disable user access to their files until they pay the cybercriminal
  2. An extra layer of security on applications containing sensitive data
  3. A legislation that governs the handling of personal data(2 words and year)
  4. The field of encrypting information so only authorised people can access it
  5. When an individual or organisations private information is leaked(2 words)
  6. A framework outlining standards and best practices for cybersecurity
Down
  1. Where a cybercriminal gets access to your personal details and impersonates you to do malicious activities(2 words)
  2. A software used to harm computer systems or networks
  3. A regulatory body for cybersecurity
  4. A copy of sensitive data for redundancy to safeguard against cyber attacks
  5. Where cybercriminals trick you into giving them sensitive information.

11 Clues: A regulatory body for cybersecurityA software used to harm computer systems or networksAn extra layer of security on applications containing sensitive dataA framework outlining standards and best practices for cybersecurityWhere cybercriminals trick you into giving them sensitive information....

IELTS Writing Task 2 - Technology 2024-01-20

IELTS Writing Task 2 - Technology crossword puzzle
Across
  1. 算法
  2. 网络犯罪
  3. 宽带
  4. 卫星
  5. 分心
Down
  1. 生物科技
  2. 网络安全
  3. 恶意软件
  4. 机器人技术
  5. 加密

10 Clues: 算法加密宽带卫星分心生物科技网络犯罪网络安全恶意软件机器人技术

Cybersecurity Crossword 2020-09-25

Cybersecurity Crossword crossword puzzle
Across
  1. a method that used to find out a password by monitoring traffic on a network to pull out information.
  2. Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
  3. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage while asking for payment.
  4. An attack on targeted individuals to obtain sensitive, personal, and confidential data via email or fraudulent websites.
  5. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
  6. This allows users to connect the organization's protected network using multi-factor authentication.
  7. An individual or group posing a threat.
  8. A computer under the control of a remote attacker which has been infected with software or scripts to perform tasks on command.
Down
  1. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
  2. A technique used to manipulate and deceive people to gain sensitive and private information. These scams are built around how people think and act.
  3. The process of changing plaintext into ciphertext using a cryptographic algorithm and key.
  4. An audio or video clip that has been edited and manipulated to seem real or believable.

12 Clues: An individual or group posing a threat.An audio or video clip that has been edited and manipulated to seem real or believable.The process of changing plaintext into ciphertext using a cryptographic algorithm and key.This allows users to connect the organization's protected network using multi-factor authentication....

Cybersecurity Vocab 2021-12-09

Cybersecurity Vocab crossword puzzle
Across
  1. any attack that takes advantage of vulnerabilities in applications, networks, operating systems, or hardware.
  2. an algebraic mathematical manipulation that attempts to reduce the complexity of the cryptographic algorithm.
  3. the attacker has access to pairs of known plaintexts and their corresponding ciphertexts.
Down
  1. a general term for when a perpetrator positions himself in a conversation between a user and an application
  2. tries to find two inputs producing the same hash value
  3. consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
  4. if we change a character of the plaintext, then several characters of the ciphertext should change
  5. convert (information or data) into a cipher or code, especially to prevent unauthorized access.
  6. each binary digit (bit) of the ciphertext should depend on several parts of the key, obscuring the connections between the two.
  7. a method in cryptography by which cryptographic keys are exchanged between two parties
  8. a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme.
  9. the art or process of deciphering coded messages without being told the key.

12 Clues: tries to find two inputs producing the same hash valuethe art or process of deciphering coded messages without being told the key.a method in cryptography by which cryptographic keys are exchanged between two partiesthe attacker has access to pairs of known plaintexts and their corresponding ciphertexts....

CYBERSECURITY CROSSWORD 2022-04-27

CYBERSECURITY CROSSWORD crossword puzzle
Across
  1. something in place to prevent an attack
  2. Data not modified
  3. a major weak link in security
  4. Record the identities and activities
  5. connect to a secure server
  6. study of techniques for secure communication
  7. Information kept private and secure
Down
  1. a weakness that can be exploited
  2. Systems available to those who need them
  3. packet capture tool
  4. Provide verification of identity
  5. tool used to scan for open ports

12 Clues: Data not modifiedpacket capture toolconnect to a secure servera major weak link in securitya weakness that can be exploitedProvide verification of identitytool used to scan for open portsInformation kept private and secureRecord the identities and activitiessomething in place to prevent an attackSystems available to those who need them...

CyberSecurity Awareness. 2023-08-20

CyberSecurity Awareness. crossword puzzle
Across
  1. A combination of letters, numbers, and symbols used to access an account
  2. A type of malicious software that encrypts files and demands a ransom
  3. A set of rules and configurations that protect a computer system from unauthorized access
  4. A code that is generated by a mobile app and used for two-factor authentication
  5. Unauthorized access to computer systems
  6. A technique used to verify the identity of a user, often using a code sent to a phone
Down
  1. A computer security incident that occurs over a network
  2. Malicious email that appears to be from a legitimate source
  3. A program designed to replicate itself and spread to other computers
  4. The process of converting data into a secret code to prevent unauthorized access
  5. An attack that overwhelms a system with excessive traffic to make it unavailable
  6. The weakest link in cybersecurity, often targeted by attackers

12 Clues: Unauthorized access to computer systemsA computer security incident that occurs over a networkMalicious email that appears to be from a legitimate sourceThe weakest link in cybersecurity, often targeted by attackersA program designed to replicate itself and spread to other computers...

Luca S game 2023-11-08

Luca S game crossword puzzle
Across
  1. alan
  2. hashing
  3. cybersecurity
Down
  1. martian
  2. enigma
  3. encryption
  4. binary

7 Clues: alanenigmabinarymartianhashingencryptioncybersecurity

Unikum 2023-03-07

Unikum crossword puzzle
Across
  1. Unikum's regular arrangement
  2. equinox day and night
  3. activity for introduce people to each other
  4. image
  5. celebrating women's rights
  6. Unikums satire column
  7. animal with one horn on the nose
Down
  1. cabbage Norwegian National dish
  2. last edition front page
  3. IT study at UIA
  4. Tax haven
  5. daylight and night equally long
  6. webinar

13 Clues: imagewebinarTax havenIT study at UIAequinox day and nightUnikums satire columnlast edition front pagecelebrating women's rightsUnikum's regular arrangementdaylight and night equally longcabbage Norwegian National dishanimal with one horn on the noseactivity for introduce people to each other

Cyber ethics 2025-06-13

Cyber ethics crossword puzzle
Across
  1. malicious hackers break system
  2. defending network and data
  3. fake email and information
  4. internet manner and behaviour
  5. coping without giving credit
  6. right and wrong online
  7. illegal activities using computer
  8. legal right to creation
Down
  1. protection against digital threat
  2. online harassment or threats
  3. right and wrong online
  4. traces left online
  5. contorl over personal data
  6. unauthorized system access
  7. sending unwanted bulk messeages

15 Clues: traces left onlineright and wrong onlineright and wrong onlinelegal right to creationdefending network and datacontorl over personal datafake email and informationunauthorized system accessonline harassment or threatscoping without giving creditinternet manner and behaviourmalicious hackers break systemsending unwanted bulk messeages...

Cyber Security 2024-02-20

Cyber Security crossword puzzle
Across
  1. Unsolicited bulk emails
  2. Deceptive email tactic
  3. Software for detecting and removing malware
  4. Harmful software
  5. Unauthorized access seeker
  6. Verification process
  7. Newly discovered vulnerability
  8. Secure data transmission protocol
  9. Secure network connection
  10. Network of infected computers controlled remotely
  11. Denial of Service attack
Down
  1. Malicious software demanding payment
  2. Weakness in a system's security
  3. Access code
  4. Network security barrier
  5. Identity verification using unique physical traits
  6. Protection of internet-connected systems and data
  7. Software update
  8. Data protection method
  9. Malware disguised as legitimate software

20 Clues: Access codeSoftware updateHarmful softwareVerification processDeceptive email tacticData protection methodUnsolicited bulk emailsNetwork security barrierDenial of Service attackSecure network connectionUnauthorized access seekerNewly discovered vulnerabilityWeakness in a system's securitySecure data transmission protocol...

Mateusz Suchocki Piotr Szabram 2023-05-29

Mateusz Suchocki Piotr Szabram crossword puzzle
Across
  1. - Online storage and computing
  2. -Secret phrase for authentication
  3. - Copy of data for safekeeping
  4. - Protection of computer systems
  5. - Wireless networking technology
  6. -Network security barrier
  7. - Connected group of devices
  8. - Identifying and fixing errors
  9. - Harmful software
  10. - Organized collection of information
Down
  1. -Set of rules or instructions
  2. - Data protection through coding
  3. - Device for forwarding data packets
  4. - Computer that provides services
  5. - Software for internet browsing
  6. - Self-replicating malicious code
  7. - Open-source operating system
  8. - Interaction between user and system
  9. - Language for building web pages
  10. - Object-oriented programming language

20 Clues: - Harmful software-Network security barrier- Connected group of devices-Set of rules or instructions- Online storage and computing- Copy of data for safekeeping- Open-source operating system- Identifying and fixing errors- Data protection through coding- Software for internet browsing- Protection of computer systems- Wireless networking technology...

21 2025-02-08

21 crossword puzzle
Across
  1. Study of humans
  2. Machine that performs tasks
  3. Enhanced reality
  4. Organized data
  5. Study of language
  6. Study of government
  7. Physical computer parts
  8. Not physically existing
  9. Study of life
  10. Connected computers
  11. Study of Earth
  12. Set of instructions
  13. Study of ideas
  14. Intelligence in technology
  15. Study of space
Down
  1. Study of mind
  2. Study of technology
  3. Protecting digital systems
  4. Global network
  5. Programs for computers
  6. Imitation of real-world process
  7. Instructions for computers
  8. Study of society
  9. Write code
  10. Study of resources

25 Clues: Write codeStudy of mindStudy of lifeGlobal networkOrganized dataStudy of EarthStudy of ideasStudy of spaceStudy of humansEnhanced realityStudy of societyStudy of languageStudy of resourcesStudy of technologyStudy of governmentConnected computersSet of instructionsPrograms for computersPhysical computer partsNot physically existing...

What is AI 2024-04-02

What is AI crossword puzzle
Across
  1. AI benefit
  2. New solutions, ideas
  3. instructions that guide AI systems
  4. Netflix, Hulu
  5. Privacy concerns, bias
Down
  1. Protect data breaches
  2. Customized customer experience, efficiency
  3. improves algorithms
  4. Text and images
  5. Element that must always be a part of AI
  6. Siri, Alexa

11 Clues: AI benefitSiri, AlexaNetflix, HuluText and imagesimproves algorithmsNew solutions, ideasProtect data breachesPrivacy concerns, biasinstructions that guide AI systemsElement that must always be a part of AICustomized customer experience, efficiency

Teknologi Firza Insanudzaky 2023-07-28

Teknologi Firza Insanudzaky crossword puzzle
Across
  1. Teknologi keamanan siber
  2. Teknologi nanoskala
  3. Reality Teknologi realitas maya
  4. Intelligence Teknologi cerdas
  5. Reality Teknologi realitas tambahan
Down
  1. of Things Teknologi perangkat terhubung
  2. Teknologi terdistribusi
  3. mobil listrik terkenal dari amerika
  4. Data Teknologi data besar
  5. Computing Teknologi komputasi awan
  6. Printing Teknologi cetak 3D

11 Clues: Teknologi nanoskalaTeknologi terdistribusiTeknologi keamanan siberData Teknologi data besarPrinting Teknologi cetak 3DIntelligence Teknologi cerdasReality Teknologi realitas mayaComputing Teknologi komputasi awanmobil listrik terkenal dari amerikaReality Teknologi realitas tambahanof Things Teknologi perangkat terhubung

IT-bezogene Gegenstücke 2025-01-30

IT-bezogene Gegenstücke crossword puzzle
Across
  1. biometric authentication, similar to how unique fingerprints identify individuals
  2. in cybersecurity, unauthorized listening, similar to an ear picking up private conversations
  3. network - main connectivity infrastructure, like the spine supporting the body’s structure
  4. temporary storage to process data faster, like short-term memory for quick recall
  5. directs traffic, like veins carrying blood to different parts of the body
  6. tracking used in UX/UI analysis, akin to vision guiding movement and interaction
  7. a point of congestion in systems, comparable to a narrowed artery restricting blood flow
Down
  1. keeps the system standing and running, similar to a healthy body maintaining vitality
  2. for voice input and communication, like vocal cords enabling speech
  3. an exchange of standardized signals between devices in a computer network, like the mutual recognition of two individuals before a conversation
  4. a sequence of execution, like muscle fibers working together for coordinated action
  5. protective barrier, like skin in cybersecurity defending against external threats
  6. signal used in networking to check system status, like a pulse monitoring health
  7. stores session info, like taste memory helping us remember flavors
  8. rules for communication, like language facilitating understanding in conversations

15 Clues: stores session info, like taste memory helping us remember flavorsfor voice input and communication, like vocal cords enabling speechdirects traffic, like veins carrying blood to different parts of the bodysignal used in networking to check system status, like a pulse monitoring health...

IT-bezogene Gegenstücke 2025-01-30

IT-bezogene Gegenstücke crossword puzzle
Across
  1. biometric authentication, similar to how unique fingerprints identify individuals
  2. in cybersecurity, unauthorized listening, similar to an ear picking up private conversations
  3. network - main connectivity infrastructure, like the spine supporting the body’s structure
  4. temporary storage to process data faster, like short-term memory for quick recall
  5. directs traffic, like veins carrying blood to different parts of the body
  6. tracking used in UX/UI analysis, akin to vision guiding movement and interaction
  7. a point of congestion in systems, comparable to a narrowed artery restricting blood flow
Down
  1. keeps the system standing and running, similar to a healthy body maintaining vitality
  2. for voice input and communication, like vocal cords enabling speech
  3. an exchange of standardized signals between devices in a computer network, like the mutual recognition of two individuals before a conversation
  4. a sequence of execution, like muscle fibers working together for coordinated action
  5. protective barrier, like skin in cybersecurity defending against external threats
  6. signal used in networking to check system status, like a pulse monitoring health
  7. stores session info, like taste memory helping us remember flavors
  8. rules for communication, like language facilitating understanding in conversations

15 Clues: stores session info, like taste memory helping us remember flavorsfor voice input and communication, like vocal cords enabling speechdirects traffic, like veins carrying blood to different parts of the bodysignal used in networking to check system status, like a pulse monitoring health...

Corsework Crossword 2024-08-29

Corsework Crossword crossword puzzle
Across
  1. What is today's costume?
  2. Think, MIT Alumni
  3. Richard Rumelt
  4. Learning Ethics or bust!
  5. Money! Money! Money!
Down
  1. Reframe
  2. The rep from Green Peace has a question
  3. Pitchercize
  4. More money than God
  5. I object!

10 Clues: ReframeI object!PitchercizeRichard RumeltThink, MIT AlumniMore money than GodMoney! Money! Money!What is today's costume?Learning Ethics or bust!The rep from Green Peace has a question

Cyber ethics 2025-06-13

Cyber ethics crossword puzzle
Across
  1. malicious hackers break system
  2. defending network and data
  3. fake email and information
  4. internet manner and behaviour
  5. coping without giving credit
  6. right and wrong online
  7. illegal activities using computer
  8. legal right to creation
Down
  1. protection against digital threat
  2. online harassment or threats
  3. right and wrong online
  4. traces left online
  5. contorl over personal data
  6. unauthorized system access
  7. sending unwanted bulk messeages

15 Clues: traces left onlineright and wrong onlineright and wrong onlinelegal right to creationdefending network and datacontorl over personal datafake email and informationunauthorized system accessonline harassment or threatscoping without giving creditinternet manner and behaviourmalicious hackers break systemsending unwanted bulk messeages...

Transputec 2024-07-17

Transputec crossword puzzle
Across
  1. Dealing with audits as well as money-related issues
  2. The People team
  3. An thing that motivates you to work harder
  4. Brazil
  5. Where all deliveries come in and out
  6. Enlisting new people
  7. calculating salaries and payday
  8. personal holiday
Down
  1. Computer Department
  2. Communication method for calls in work
  3. CVMS
  4. climbing up the work ladder
  5. computer safety
  6. Company name

14 Clues: CVMSBrazilCompany nameThe People teamcomputer safetypersonal holidayComputer DepartmentEnlisting new peopleclimbing up the work laddercalculating salaries and paydayWhere all deliveries come in and outCommunication method for calls in workAn thing that motivates you to work harderDealing with audits as well as money-related issues

Cybersecurity Crossword Puzzle 2023-01-24

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. malware that makes you pay
  2. software to detect and destroy malware
  3. malware pretending to be useful
  4. software that tracks you
  5. tricking users to click links/images
  6. manipulated media
  7. criminals explpoiting network vulnerabilities
  8. scrambling data into unreadable text
Down
  1. software that checks for malware
  2. harmful software
  3. a shield for data
  4. malware that displays adverts
  5. attacks exploiting a vulnerability
  6. service that encrypts data while on WiFi
  7. multiple attackers preventing legitimate users
  8. attacks seeking out personal info
  9. a unique label for devices connected to the internet
  10. internet access at coffee shop
  11. network pro learning hacking techniques

19 Clues: harmful softwarea shield for datamanipulated mediasoftware that tracks youmalware that makes you paymalware that displays advertsinternet access at coffee shopmalware pretending to be usefulsoftware that checks for malwareattacks seeking out personal infoattacks exploiting a vulnerabilitytricking users to click links/images...

Cybersecurity Crossword Puzzle 2025-09-21

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. A type of malware that is designed to look like a legitimate program in order to trick users into downloading it.
  2. The process of simplifying complex systems by focusing on essential features, hiding unnecessary details.
  3. A malicious program that can self-replicate and attach itself to other files.
  4. A symbol, typically '=', used in programming to assign a value to a variable.
  5. The practice of protecting computers, servers, mobile devices, and networks from malicious attacks.
  6. A value or variable that is passed to a function or method when it is called.
  7. A software that generates revenue by automatically displaying online advertisements.
  8. To verify the identity of a user or system.
Down
  1. A program or set of rules that protects a network by controlling incoming and outgoing traffic.
  2. An additional component or feature that can be added to a software program.
  3. A software program used to prevent, detect, and remove malware.
  4. CONTROL - A security process that controls and manages who is authorized to access certain resources.
  5. A malicious program that is designed to damage or gain unauthorized access to a computer system.
  6. The act of sending fraudulent emails in order to trick people into revealing personal information.
  7. The sum of all possible points where an unauthorized user can try to enter or extract data from a system.
  8. POISONING - A type of cyber attack that involves sending false ARP messages to redirect network traffic.
  9. A character encoding standard used to represent text in computers.
  10. A protocol used to translate IP addresses into MAC addresses.
  11. A collection of IP-to-MAC address mappings used to speed up network communication.

19 Clues: To verify the identity of a user or system.A protocol used to translate IP addresses into MAC addresses.A software program used to prevent, detect, and remove malware.A character encoding standard used to represent text in computers.An additional component or feature that can be added to a software program....

Whats is Business Services? 2021-10-21

Whats is Business Services? crossword puzzle
Across
  1. attack
  2. rules
  3. validation
  4. examination
  5. yearly
Down
  1. share price
  2. yearly
  3. a tax

8 Clues: a taxrulesattackyearlyyearlyvalidationshare priceexamination

James Cyber safety crossword 2016-05-21

James Cyber safety crossword crossword puzzle
Across
  1. a small piece of information or chocolate chip
  2. computer villainy
  3. Search engine
  4. Request details
  5. group of friends
  6. this flickers in a fire
  7. Short cut to speed access
  8. email,junk mail you didn't ask for
Down
  1. Highlight your favourites
  2. keeping private information safe
  3. an on line talk with friends
  4. Unwanted advertising
  5. secret code
  6. burning bricks to protect you
  7. secret identity
  8. my up to date news
  9. a person who gains access without permission
  10. the flu is one of these
  11. Device that moves you curser
  12. unexpected ad

20 Clues: secret codeSearch engineunexpected adRequest detailssecret identitygroup of friendscomputer villainymy up to date newsUnwanted advertisingthis flickers in a firethe flu is one of theseHighlight your favouritesShort cut to speed accessan on line talk with friendsDevice that moves you curserburning bricks to protect you...

Practice Cybersecurity Terminology Puzzle 2025-03-14

Practice Cybersecurity Terminology Puzzle crossword puzzle
Across
  1. Data hostage for ransom
  2. Protection of networks from threats
  3. Update that fixes vulnerabilities
  4. Requires multiple identity proofs
  5. Information about cyber threats
  6. Malicious software that harms systems
  7. Encoding sensitive information
  8. Impersonation to obtain information
Down
  1. Vulnerability with no available patch
  2. Weakness in a system
  3. Distributed denial-of-service attack
  4. Verifying user identity
  5. Converting data into codes
  6. Longterm targeted cyberattack
  7. Secure internet connection
  8. Unauthorized access to systems
  9. Blocks unwanted traffic
  10. Software that detects malware
  11. Software that secretly monitors
  12. Continuous cybersecurity monitoring

20 Clues: Weakness in a systemData hostage for ransomVerifying user identityBlocks unwanted trafficConverting data into codesSecure internet connectionLongterm targeted cyberattackSoftware that detects malwareUnauthorized access to systemsEncoding sensitive informationInformation about cyber threatsSoftware that secretly monitors...

Kaylie and Eli Sip and Solve 2025-08-31

Kaylie and Eli Sip and Solve crossword puzzle
Across
  1. The engagement location.
  2. Their high school mascot.
  3. Kaylie's favorite movie.
  4. Their favorite energy drink.
  5. Their favorite restaurant.
  6. Kaylie was Miss __ in 2023.
  7. Their first trip together.
  8. Eli's football number in high school.
  9. The name of Eli's childhood pet.
  10. Eli's middle name.
Down
  1. Kaylie's favorite singer
  2. Eli's favorite Christmas movie.
  3. Eli graduated in 2026 majoring in _.
  4. Eli's favorite cookie flavor.
  5. Eli's favorite sports team.
  6. Their first concert.
  7. First date location.
  8. Kaylie's favorite color.
  9. The month they started dating.
  10. The name of Kaylie's sorority.

20 Clues: Eli's middle name.Their first concert.First date location.Kaylie's favorite singerThe engagement location.Kaylie's favorite movie.Kaylie's favorite color.Their high school mascot.Their favorite restaurant.Their first trip together.Eli's favorite sports team.Kaylie was Miss __ in 2023.Their favorite energy drink.Eli's favorite cookie flavor....

IEM Social Media Crossword Puzzle 2021-07-20

IEM Social Media Crossword Puzzle crossword puzzle
Across
  1. Focus FEMA’s newly released guidance
  2. IEM Senior Executive Advisor providing insight
  3. Connect with county leaders
  4. Hire a _____ Day
  5. rapidly spreading variant
  6. Celebrating Puerto Rico’s…
  7. MEDIA, Tool for public safety and emergency response
  8. IEM Spotlight
  9. July Heritage Month
  10. Practicing personal appreciation
Down
  1. The CISA, FBI, and the NSA published a Joint ____ Advisory
  2. Celebrating
  3. Conservation Day
  4. Summer heat brings increased risk
  5. Interns and System Administrator Day
  6. Beat the…
  7. Tropical Storm
  8. DAY, Holiday
  9. Have you made a family ____ plan?
  10. Hernando County, Florida

20 Clues: Beat the…CelebratingDAY, HolidayIEM SpotlightTropical StormConservation DayHire a _____ DayJuly Heritage MonthHernando County, Floridarapidly spreading variantCelebrating Puerto Rico’s…Connect with county leadersPracticing personal appreciationSummer heat brings increased riskHave you made a family ____ plan?Focus FEMA’s newly released guidance...

IEM Social Media Crossword Puzzle 2021-07-20

IEM Social Media Crossword Puzzle crossword puzzle
Across
  1. Focus FEMA’s newly released guidance
  2. Beat the…
  3. Have you made a family ____ plan?
  4. MEDIA, Tool for public safety and emergency response
  5. Conservation Day
  6. Hernando County, Florida
  7. Tropical Storm
  8. Practicing personal appreciation
  9. Connect with county leaders
  10. July Heritage Month
  11. Give Something Away Day
  12. rapidly spreading variant
Down
  1. Celebrating Puerto Rico’s…
  2. DAY, Holiday
  3. Interns and System Administrator Day
  4. Summer heat brings increased risk
  5. The CISA, FBI, and the NSA published a Joint ____ Advisory
  6. Hire a _____ Day
  7. IEM Spotlight
  8. IEM Senior Executive Advisor providing insight

20 Clues: Beat the…DAY, HolidayIEM SpotlightTropical StormConservation DayHire a _____ DayJuly Heritage MonthGive Something Away DayHernando County, Floridarapidly spreading variantCelebrating Puerto Rico’s…Connect with county leadersPracticing personal appreciationSummer heat brings increased riskHave you made a family ____ plan?...

Wes Rich - CIS178 Week 3 Participation Cyber-Security Terms 2023-07-15

Wes Rich - CIS178 Week 3 Participation Cyber-Security Terms crossword puzzle
Across
  1. Protection against malicious programs.
  2. Malicious cyber attackers.
  3. Data protection through cryptography.
  4. Deceptive malicious software.
  5. Network of compromised computers.
  6. Deceptive online identity theft.
  7. Covert information-gathering software.
  8. Ethical cybersecurity professionals.
  9. Attack Network flooding disruption technique.
  10. Synthetic media manipulation technique.
Down
  1. Security breach exposes data.
  2. Tools Software for secure password storage.
  3. Secret codes for data protection.
  4. Harmful computer software.
  5. Unpatched software vulnerability exploitation.
  6. Network traffic filtering safeguard.
  7. Deceptive click manipulation technique.
  8. Online harassment and intimidation.
  9. Secure remote network access.
  10. Files held hostage for payment.

20 Clues: Malicious cyber attackers.Harmful computer software.Security breach exposes data.Deceptive malicious software.Secure remote network access.Files held hostage for payment.Deceptive online identity theft.Secret codes for data protection.Network of compromised computers.Online harassment and intimidation.Network traffic filtering safeguard....

Chloe and Mick 2025-08-10

Chloe and Mick crossword puzzle
Across
  1. Location of proposal
  2. Number of Chloe's siblings
  3. Age Chloe and Mick met
  4. Number of apartments Chloe has lived in
  5. Where Chloe & Mick met
  6. Mick's favorite sport
  7. Month of proposal
  8. Mick's favorite flavor of Busch
  9. Chloe's middle name
  10. Mick's master degree
Down
  1. Mick's eye color
  2. Chloe's zodiac sign
  3. Favorite sport to play together
  4. What is their cats name?
  5. Their favorite food
  6. Their favorite place to eat
  7. Chloe's favorite color
  8. Location of their first date
  9. Mick's zodiac sign
  10. Star Wars droid on Chloe's keychain

20 Clues: Mick's eye colorMonth of proposalMick's zodiac signChloe's zodiac signTheir favorite foodChloe's middle nameLocation of proposalMick's master degreeMick's favorite sportAge Chloe and Mick metWhere Chloe & Mick metChloe's favorite colorWhat is their cats name?Number of Chloe's siblingsTheir favorite place to eatLocation of their first date...

I + E 2024-01-23

I + E crossword puzzle
Across
  1. Where Ingrid and Erik first met
  2. A country where Erik studied
  3. First concert
  4. Country they´ve visited the most
  5. Their first vacation together
  6. Erik´s job
  7. Their female cat
  8. Honeymoon destination
  9. Ingrid´s hobby
Down
  1. Where Erik grew up
  2. Number of countries they´ve visited together
  3. Their favourite trip together
  4. Where they got engaged
  5. Wedding venue
  6. Theo´s birthday month
  7. The street they used to live on
  8. Their male cat
  9. Where Ingrid studied abroad
  10. Ingrid´s first surname
  11. Their car

20 Clues: Their carErik´s jobWedding venueFirst concertTheir male catIngrid´s hobbyTheir female catWhere Erik grew upTheo´s birthday monthHoneymoon destinationWhere they got engagedIngrid´s first surnameWhere Ingrid studied abroadA country where Erik studiedTheir favourite trip togetherTheir first vacation togetherWhere Ingrid and Erik first met...

INFORMATIKA SEKARANG DAN MASA DEPAN 2025-08-26

INFORMATIKA SEKARANG DAN MASA DEPAN crossword puzzle
Across
  1. Proses olah data jadi informasi
  2. Terjemahan Artificial Intelligence
  3. Data Kumpulan data sangat besar
  4. Perlindungan data digital
  5. Chatbot termasuk teknologi
  6. Terjemahan cloud computing
  7. Mobil pintar tanpa sopir
  8. Menggali pola dari data
  9. Algoritma belajar dari data
Down
  1. Cara sehat gunakan media digital
  2. Serangan pencuri data digital
  3. Mesin otomatis yang membantu manusia
  4. Dunia buatan imersif
  5. Jaringan global penghubung
  6. Kecerdasan buatan komputer
  7. Singkatan teknologi penghubung perangkat
  8. Kemampuan memahami dunia digital
  9. Teknologi yang bisa menyesuaikan
  10. Perangkat sensor terhubung jaringan
  11. Komunikasi antar mesin otomatis

20 Clues: Dunia buatan imersifMenggali pola dari dataMobil pintar tanpa sopirPerlindungan data digitalJaringan global penghubungKecerdasan buatan komputerChatbot termasuk teknologiTerjemahan cloud computingAlgoritma belajar dari dataSerangan pencuri data digitalProses olah data jadi informasiKomunikasi antar mesin otomatisCara sehat gunakan media digital...

Lance and Ally 2025-07-20

Lance and Ally crossword puzzle
Across
  1. Location of their first date
  2. Song Ally walked down the aisle to
  3. Lance's major in college
  4. Flavor of the wedding cake
  5. Ally's maiden name
  6. Name of the best man
  7. Ally's hometown
  8. Name of the maid of honor
  9. Lance's favorite color
  10. Number of years Ally and Lance have been together
Down
  1. Total number of siblings
  2. Their dog's name
  3. Name of the ring bearer
  4. Name of the flower girl
  5. Lance's favorite sports team
  6. Lance's hometown
  7. Lance's middle name
  8. Ally's profession
  9. Month Lance proposed

19 Clues: Ally's hometownTheir dog's nameLance's hometownAlly's professionAlly's maiden nameLance's middle nameName of the best manMonth Lance proposedLance's favorite colorName of the ring bearerName of the flower girlTotal number of siblingsLance's major in collegeName of the maid of honorFlavor of the wedding cakeLocation of their first date...

Safe to Speed 2022-07-18

Safe to Speed crossword puzzle
Across
  1. Without proper input _____, malicious actors can send a malicious input into your web application form to inject malicious code to extract sensitive data from your database.
  2. Performing threat _____ at the start of your project will give you insight into your system's risk profile.
  3. Systems infected by malicious actor can be used to partake in a _____. This allows the malicious actor to use your infected system to conduct attacks to achieve their goals.
Down
  1. _____ programs attempt to utilise your system's compute resource (Without your knowledge) to mine for cryptocurrencies.
  2. Regular review of _____ accounts ensures that no unauthorised users are misusing the accounts outside the bounds of the system owner's knowledge.
  3. Doing system _____ will ensure that your systems are protected from the most basic and common attacks.
  4. It's important to understand potential vendor's cybersecurity _____ to evaluate if they have both innovation and cybersecurity best practices in mind.
  5. Security _____ helps identify business logic flaws and bugs in your application code.
  6. This provides you with a simpler and balanced means of ensuring cybersecurity best practices during a proof of concept/value or minimum viable product stage.
  7. _____ are often leaked on public code repositories due to developers using loosely configured code repositories.

10 Clues: Security _____ helps identify business logic flaws and bugs in your application code.Doing system _____ will ensure that your systems are protected from the most basic and common attacks.Performing threat _____ at the start of your project will give you insight into your system's risk profile....

Coding 2023-12-11

Coding crossword puzzle
Across
  1. Identifying and fixing errors
  2. Step-by-step problem solving procedures
  3. Building apps for mobile devices
  4. Tracking changes and versions
  5. Writing clear explanations of code
  6. Learning new things continuously
Down
  1. Languages for human-computer communication
  2. Blocks of reusable code
  3. Unified coding environment
  4. Organizes code into objects
  5. Instructing the computer
  6. Basis of machine learning
  7. Making dynamic websites
  8. Principles for secure programs
  9. Managing the flow of a program

15 Clues: Blocks of reusable codeInstructing the computerMaking dynamic websitesIdentifying and fixing errorsOrganizes code into objectsUnified coding environmentBasis of machine learningPrinciples for secure programsTracking changes and versionsManaging the flow of a programBuilding apps for mobile devices...

IT-bezogene Gegenstücke 2025-01-30

IT-bezogene Gegenstücke crossword puzzle
Across
  1. biometric authentication, similar to how unique fingerprints identify individuals
  2. in cybersecurity, unauthorized listening, similar to an ear picking up private conversations
  3. network - main connectivity infrastructure, like the spine supporting the body’s structure
  4. temporary storage to process data faster, like short-term memory for quick recall
  5. directs traffic, like veins carrying blood to different parts of the body
  6. tracking used in UX/UI analysis, akin to vision guiding movement and interaction
  7. a point of congestion in systems, comparable to a narrowed artery restricting blood flow
Down
  1. keeps the system standing and running, similar to a healthy body maintaining vitality
  2. for voice input and communication, like vocal cords enabling speech
  3. an exchange of standardized signals between devices in a computer network, like the mutual recognition of two individuals before a conversation
  4. a sequence of execution, like muscle fibers working together for coordinated action
  5. protective barrier, like skin in cybersecurity defending against external threats
  6. signal used in networking to check system status, like a pulse monitoring health
  7. stores session info, like taste memory helping us remember flavors
  8. rules for communication, like language facilitating understanding in conversations

15 Clues: stores session info, like taste memory helping us remember flavorsfor voice input and communication, like vocal cords enabling speechdirects traffic, like veins carrying blood to different parts of the bodysignal used in networking to check system status, like a pulse monitoring health...

Cyber Security Crossword 2021-10-14

Cyber Security Crossword crossword puzzle
Across
  1. Do not accept trade orders via _____ or voicemail
  2. Require _______ confirmation for trade orders sent via email.
  3. Always use _______________ for all sensitive data on computers and removable media.
  4. Report Security Incidents to the ___________ Service Center x74357.
  5. “Do Your Part. #____________________.”
  6. Don't click on _________ links
  7. Report ___________ emails to the Cyber Threat Center (cyberthreat@raymondjames.com).
Down
  1. As part of the STOP.THINK.CONNECT.™ national public awareness ___________, CISA is also sharing Cybersecurity Awareness Month Resources to reduce cybersecurity risks and protect you online.
  2. ______________ is Cyber Security Awareness month.
  3. Type [_______] in the subject line of emails with sensitive data.
  4. PII stands for personally ____________ information
  5. Use a password of PIN to protect your mobile device. Have the device require a password after _________ minutes of inactivity.
  6. If you are unsure of the legitimacy of an email do not click on any links or open any _______________.
  7. Connect directly to the Raymond James ___________ only through wireless access points managed and configured by the ___________ Engineering Department.
  8. If you plan to enter a contract with a third-party or are changing your contract, please request a ______ assessment.

15 Clues: Don't click on _________ links“Do Your Part. #____________________.”______________ is Cyber Security Awareness month.Do not accept trade orders via _____ or voicemailPII stands for personally ____________ informationRequire _______ confirmation for trade orders sent via email.Type [_______] in the subject line of emails with sensitive data....

IT-bezogene Gegenstücke 2025-01-30

IT-bezogene Gegenstücke crossword puzzle
Across
  1. biometric authentication, similar to how unique fingerprints identify individuals
  2. in cybersecurity, unauthorized listening, similar to an ear picking up private conversations
  3. network - main connectivity infrastructure, like the spine supporting the body’s structure
  4. temporary storage to process data faster, like short-term memory for quick recall
  5. directs traffic, like veins carrying blood to different parts of the body
  6. tracking used in UX/UI analysis, akin to vision guiding movement and interaction
  7. a point of congestion in systems, comparable to a narrowed artery restricting blood flow
Down
  1. keeps the system standing and running, similar to a healthy body maintaining vitality
  2. for voice input and communication, like vocal cords enabling speech
  3. an exchange of standardized signals between devices in a computer network, like the mutual recognition of two individuals before a conversation
  4. a sequence of execution, like muscle fibers working together for coordinated action
  5. protective barrier, like skin in cybersecurity defending against external threats
  6. signal used in networking to check system status, like a pulse monitoring health
  7. stores session info, like taste memory helping us remember flavors
  8. rules for communication, like language facilitating understanding in conversations

15 Clues: stores session info, like taste memory helping us remember flavorsfor voice input and communication, like vocal cords enabling speechdirects traffic, like veins carrying blood to different parts of the bodysignal used in networking to check system status, like a pulse monitoring health...

Cybersecurity Crossword Puzzle 2024-09-25

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Fraudulent attempts to steal sensitive information
  2. A tool that uses large language models to create authentic-looking text, pictures, or video. Can be used to create deepfakes
  3. What you should do with any suspicious communication!
  4. Online harassment or bullying
  5. Malware disguised as legitimate software
  6. Multi-Factor Authentication
  7. Virtual Private Network for secure connections
  8. Using AI to create a likeness of someone in video, voice, or picture
  9. Software update to fix security vulnerabilities
Down
  1. Investment scam involving fake accounts
  2. A phish sent by text
  3. Software that collects data secretly
  4. Self-replicating malware that spreads across networks
  5. Investment currency usually preferred in pig butchering scams
  6. Malware that encrypts files demanding ransom
  7. Factor showing how likely an associate will report versus click a phishing email
  8. Securing data by converting it into code
  9. A group very concerned with cyberbullying

18 Clues: A phish sent by textMulti-Factor AuthenticationOnline harassment or bullyingSoftware that collects data secretlyInvestment scam involving fake accountsMalware disguised as legitimate softwareSecuring data by converting it into codeA group very concerned with cyberbullyingMalware that encrypts files demanding ransom...

Cybersecurity Crossword Puzzle 2023-01-24

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. malware that makes you pay
  2. software to detect and destroy malware
  3. malware pretending to be useful
  4. software that tracks you
  5. tricking users to click links/images
  6. manipulated media
  7. criminals explpoiting network vulnerabilities
  8. scrambling data into unreadable text
Down
  1. software that checks for malware
  2. harmful software
  3. a shield for data
  4. malware that displays adverts
  5. attacks exploiting a vulnerability
  6. service that encrypts data while on WiFi
  7. multiple attackers preventing legitimate users
  8. attacks seeking out personal info
  9. a unique label for devices connected to the internet
  10. internet access at coffee shop
  11. network pro learning hacking techniques

19 Clues: harmful softwarea shield for datamanipulated mediasoftware that tracks youmalware that makes you paymalware that displays advertsinternet access at coffee shopmalware pretending to be usefulsoftware that checks for malwareattacks seeking out personal infoattacks exploiting a vulnerabilitytricking users to click links/images...

CYBERSECURITY 2021-11-08

CYBERSECURITY crossword puzzle
Across
  1. Hastag for 2021 Q4 Manila Thanksgiving Town Hall
  2. DE&I Champion for Philippines and Bulgaria
  3. Vaccine brand used in the IM PH Vaccination Program
  4. Where to get a digital copy of your Covid-19 Vaccination certificate
Down
  1. Helps in centralizing reports and dashboards in one location
  2. FAME 2021 Edition
  3. 2021 IM PH Virtual Year End Party

7 Clues: FAME 2021 Edition2021 IM PH Virtual Year End PartyDE&I Champion for Philippines and BulgariaHastag for 2021 Q4 Manila Thanksgiving Town HallVaccine brand used in the IM PH Vaccination ProgramHelps in centralizing reports and dashboards in one locationWhere to get a digital copy of your Covid-19 Vaccination certificate

Cybersecurity 2024-03-13

Cybersecurity crossword puzzle
Across
  1. Online service that allows users to connect remotely to another network.
  2. Servers that are accessed over the Internet, and databases that run on those servers.
  3. The process of proving the claimed identity of an individual user.
  4. Software or application that displays advertisements on your computer
Down
  1. Various of malicious software that damages your computer.
  2. Software used by hackers to spy on you and your computer activities.
  3. A network of computers used to carry out cyberattacks on other systems.

7 Clues: Various of malicious software that damages your computer.The process of proving the claimed identity of an individual user.Software used by hackers to spy on you and your computer activities.Software or application that displays advertisements on your computerA network of computers used to carry out cyberattacks on other systems....

Cybersecurity 2025-03-08

Cybersecurity crossword puzzle
Across
  1. Software that monitors for malware
  2. Scam emails that trick users
  3. Harmful software that damages computers
  4. Facial recognition to access phone
Down
  1. machines learning and thinking
  2. Access granted to perform actions
  3. Malware locks files for money

7 Clues: Scam emails that trick usersMalware locks files for moneymachines learning and thinkingAccess granted to perform actionsSoftware that monitors for malwareFacial recognition to access phoneHarmful software that damages computers

Cybersecurity 2025-12-02

Cybersecurity crossword puzzle
Across
  1. A security incident where sensitive, confidential, or personal information is accessed, stolen, or disclosed without authorization.
  2. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
  3. The practice of protecting your digital world from cyber threats.
  4. Hackers send fake emails pretending to be a trusted source (like your bank), hoping you’ll click on a link or give them your personal info.
Down
  1. Stops unwanted traffic (like hackers) from getting into your system.
  2. A type of malicious software (malware) that encrypts a victim's files or locks their computer system, preventing them from accessing their data.
  3. Scrambles your sensitive data so that even if someone intercepts it, they can’t read it without the key to unlock it.

7 Clues: The practice of protecting your digital world from cyber threats.Stops unwanted traffic (like hackers) from getting into your system.Software designed to disrupt, damage, or gain unauthorized access to computer systems.Scrambles your sensitive data so that even if someone intercepts it, they can’t read it without the key to unlock it....

CYBERSECURITY 2015-03-25

CYBERSECURITY crossword puzzle
Across
  1. ... device forensics roots began when mobile devices started to become popular, about 2000.
  2. Digital ... is used to capture volatile information from random access memory (RAM) and other running processes, including networks.
  3. ...are fast moving and increasing in number and severity.
Down
  1. ISACA publication Transforming ...
  2. Digital forensics scientific process: ...of custody.
  3. ...reasoning uses a series of specific pieces of information to extrapolate a broad conclusion.
  4. Implementing the NIST Cybersecurity Framework guide implements the CSF using ISACA’s ... 5 processes.

7 Clues: ISACA publication Transforming ...Digital forensics scientific process: ...of custody....are fast moving and increasing in number and severity.... device forensics roots began when mobile devices started to become popular, about 2000....reasoning uses a series of specific pieces of information to extrapolate a broad conclusion....

CYBERSECURITY 2025-04-06

CYBERSECURITY crossword puzzle
Across
  1. a type of social engineering to steal user data
  2. protection of systems, networks, and programs from digital attacks
  3. an intrusive software developed by cybercriminals
Down
  1. weak places in the security system
  2. an unauthorized person who tries to gain access
  3. a computer data storage on servers in off-site locations is called … storage
  4. the use of numbers

7 Clues: the use of numbersweak places in the security systema type of social engineering to steal user dataan unauthorized person who tries to gain accessan intrusive software developed by cybercriminalsprotection of systems, networks, and programs from digital attacksa computer data storage on servers in off-site locations is called … storage

Cybersecurity 2021-12-30

Cybersecurity crossword puzzle
Across
  1. Portable Computer
  2. Type of Code
  3. Intrusion
Down
  1. Hand Held Device
  2. Private Communications Device
  3. Security Access Code
  4. Loss of

7 Clues: Loss ofIntrusionType of CodeHand Held DevicePortable ComputerSecurity Access CodePrivate Communications Device

CyberSecurity 2023-02-05

CyberSecurity crossword puzzle
Across
  1. Spread through a network and use system resources for example to slow the network speed down.
  2. Malicious form of self-replicating software that can spread quickly on a computer network.
  3. Infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
  4. Unwanted software that monitors and gathers information on a person and how they use their computer.
  5. A piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions. Name derives from the story of the Horse.
Down
  1. Locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
  2. Malicious software is software that is designed to gain access to your computer with malicious intent.

7 Clues: Malicious form of self-replicating software that can spread quickly on a computer network.Spread through a network and use system resources for example to slow the network speed down.Unwanted software that monitors and gathers information on a person and how they use their computer....

Cybersecurity 2025-08-19

Cybersecurity crossword puzzle
Across
  1. Harmful software programs.
  2. Fake emails that trick you into giving personal information.
  3. A code used to lock or unlock accounts.
Down
  1. A person who breaks into computer systems.
  2. The brain of the computer.
  3. A harmful program that spreads and damages files.
  4. Software that protects against online threats.

7 Clues: The brain of the computer.Harmful software programs.A code used to lock or unlock accounts.A person who breaks into computer systems.Software that protects against online threats.A harmful program that spreads and damages files.Fake emails that trick you into giving personal information.

GoCIT Famous People in Cybersecurity 2025-04-10

GoCIT Famous People in Cybersecurity crossword puzzle
Across
  1. The 'S' in RSA encryption and co-inventor of Shamir's Secret Sharing.
  2. The 'A' in RSA encryption; cryptography pioneer.
  3. Former Chief Security Officer at Facebook and vocal advocate for digital privacy.
  4. Pioneer of public key cryptography and co-creator of the Diffie-Hellman algorithm.
  5. The 'R' in RSA encryption; helped develop one of the most widely used encryption algorithms.
Down
  1. Discovered a major DNS vulnerability in 2008 that shook the internet.
  2. Real name of Mudge, testified to Congress about cybersecurity vulnerabilities.
  3. Cryptographer and author of "Applied Cryptography"; widely known security expert.
  4. Father of modern computing; his work laid the groundwork for cryptography and codebreaking.
  5. Once the world's most wanted hacker, later became a cybersecurity consultant.

10 Clues: The 'A' in RSA encryption; cryptography pioneer.Discovered a major DNS vulnerability in 2008 that shook the internet.The 'S' in RSA encryption and co-inventor of Shamir's Secret Sharing.Once the world's most wanted hacker, later became a cybersecurity consultant.Real name of Mudge, testified to Congress about cybersecurity vulnerabilities....

Coursework Crossword 2024-08-21

Coursework Crossword crossword puzzle
Across
  1. Think, MTI Alumni
  2. Richard Rumelt
  3. The rep from Green Peace has a question
  4. Reframe
  5. What? Like its hard?
Down
  1. Ethics or bust!
  2. Pitchercize
  3. What is today's costume?
  4. More money than God
  5. Money! Money! Money!

10 Clues: ReframePitchercizeRichard RumeltEthics or bust!Think, MTI AlumniMore money than GodMoney! Money! Money!What? Like its hard?What is today's costume?The rep from Green Peace has a question

Cybersecurity 2022-11-24

Cybersecurity crossword puzzle
Across
  1. is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle
  2. software to defend the computer
  3. is a method of exchanging messages ("mail") between people using electronic devices.
  4. protection of computer systems and networks
Down
  1. data .....
  2. any software intentionally designed to cause disruption to a computer, server, client, or computer network
  3. synonym for nasty

7 Clues: data .....synonym for nastysoftware to defend the computerprotection of computer systems and networksis a method of exchanging messages ("mail") between people using electronic devices.any software intentionally designed to cause disruption to a computer, server, client, or computer network...

Cybersecurity 2024-03-09

Cybersecurity crossword puzzle
Across
  1. Weakness that can be exploited
  2. Verifies user or system identity.
  3. Scrambles data securely.
Down
  1. Network security system that controls traffic.
  2. Protects systems from attacks.
  3. Fraudulent emails to steal information.
  4. Malicious software that disrupts.

7 Clues: Scrambles data securely.Protects systems from attacks.Weakness that can be exploitedVerifies user or system identity.Malicious software that disrupts.Fraudulent emails to steal information.Network security system that controls traffic.

Cybersecurity 2024-07-05

Cybersecurity crossword puzzle
Across
  1. Threatens to publish or blocks access to data or a computer system
  2. Short for malicious software
  3. The practice of tricking Internet users through the use of deceptive email messages or websites
Down
  1. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
  2. A malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
  3. A type of malicious software, or malware, that spreads between computers and causes damage to data and software.
  4. A way of scrambling data so that only authorized parties can understand the information.

7 Clues: Short for malicious softwareThreatens to publish or blocks access to data or a computer systemA way of scrambling data so that only authorized parties can understand the information.The practice of tricking Internet users through the use of deceptive email messages or websites...

CyberSecurity 2023-02-05

CyberSecurity crossword puzzle
Across
  1. Spread through a network and use system resources for example to slow the network speed down.
  2. Malicious form of self-replicating software that can spread quickly on a computer network.
  3. Infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
  4. Unwanted software that monitors and gathers information on a person and how they use their computer.
  5. A piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions. Name derives from the story of the Horse.
Down
  1. Locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
  2. Malicious software is software that is designed to gain access to your computer with malicious intent.

7 Clues: Malicious form of self-replicating software that can spread quickly on a computer network.Spread through a network and use system resources for example to slow the network speed down.Unwanted software that monitors and gathers information on a person and how they use their computer....

Cybersecurity Cr0$$w0rd Puzz|3 2024-06-05

Cybersecurity Cr0$$w0rd Puzz|3 crossword puzzle
Across
  1. Horse
  2. Unsolicited emails
  3. Taking advantage of vulnerability
  4. Capture of data being transmitted
  5. Malicious software
  6. Challenge-response verification test
  7. Process that safeguards online assets
  8. Virtual perimeter around network
  9. Malicious code to harm victims
  10. Virtual secure corridor
  11. Deletion of all or part
  12. Dark web
Down
  1. Infectious malware that spreads
  2. Process to verify identity
  3. Bypasses security steps to gain access
  4. False or misleading information
  5. Malware that uses scare tactics
  6. Breach
  7. Fraudulent acquisition of user credentials
  8. Plain text into secret code
  9. Malicious program to extort money

21 Clues: HorseBreachDark webUnsolicited emailsMalicious softwareVirtual secure corridorDeletion of all or partProcess to verify identityPlain text into secret codeMalicious code to harm victimsInfectious malware that spreadsFalse or misleading informationMalware that uses scare tacticsVirtual perimeter around networkTaking advantage of vulnerability...

Dandy & Nicole Wedding 2024-10-16

Dandy & Nicole Wedding crossword puzzle
Across
  1. City where the couple had their 1st date
  2. Engagement Ring cut
  3. Dandy's fave K-pop group
  4. Nicole specialization as a Doctor
  5. 1st out of country
  6. Number of Graduation Attended
  7. The month Nicole officially became Dandy's Girlfriend
Down
  1. Dandy's Profession
  2. Favorite color of Dandy
  3. Number of mutual friend
  4. Name of their coffee shop
  5. Nicole's Profession
  6. 1st business together
  7. How long they are together
  8. Favorite concert attended
  9. 2nd TV appearance

16 Clues: 2nd TV appearanceDandy's Profession1st out of countryEngagement Ring cutNicole's Profession1st business togetherFavorite color of DandyNumber of mutual friendDandy's fave K-pop groupName of their coffee shopFavorite concert attendedHow long they are togetherNumber of Graduation AttendedNicole specialization as a Doctor...

CYBERSECURITY 2022-03-01

CYBERSECURITY crossword puzzle
Across
  1. transforming plaintext or cleartext into ciphertext
  2. Planning and maintaining organization safe in cyberspace
  3. used to prove one's identity, or authorize access to a resource
  4. malicious or ethical person who has knowledge and skill in analyzing program code or a computer system
Down
  1. practice of sending fraudulent messages that appear to come from a reputable source
  2. attaches itself with host file and replicates
  3. unwanted or unsolicited communications typically received via e-mail

7 Clues: attaches itself with host file and replicatestransforming plaintext or cleartext into ciphertextPlanning and maintaining organization safe in cyberspaceused to prove one's identity, or authorize access to a resourceunwanted or unsolicited communications typically received via e-mail...

Cybersecurity 2024-02-15

Cybersecurity crossword puzzle
Across
  1. A technique used to trick individuals into revealing sensitive information
  2. The process of protecting computer systems, networks, and data from theft or damage
  3. A type of attack that floods a system or network with excessive traffic, causing it to become unavailable
Down
  1. The practice of verifying the identity of a user or system before granting access
  2. A program or device used to detect and prevent unauthorized access to a computer or network
  3. A secret code used to gain access to a computer system, network, or account
  4. A malicious program that self-replicates and spreads to other computers

7 Clues: A malicious program that self-replicates and spreads to other computersA technique used to trick individuals into revealing sensitive informationA secret code used to gain access to a computer system, network, or accountThe practice of verifying the identity of a user or system before granting access...

Cybersecurity 2024-11-28

Cybersecurity crossword puzzle
Across
  1. device or node that connects to a network, such as a computer, smartphone, or IoT device, often targeted in cybersecurity attacks.
  2. secret or undocumented way of gaining access to a system or network, typically used for malicious purposes or as a debugging feature.
  3. the act of making something known or the fact that is made known
  4. (Movement)cybersecurity term referring to the act of moving through a network from one system to another after gaining initial access.
Down
  1. modify or adapt something (e.g., a device or software) for a different, often unintended, use—frequently associated with malicious intent in cybersecurity contexts.
  2. to avoid something by going around it
  3. type of attack that makes a system, service, or network unavailable by overwhelming it with a flood of requests or traffic.

7 Clues: to avoid something by going around itthe act of making something known or the fact that is made knowntype of attack that makes a system, service, or network unavailable by overwhelming it with a flood of requests or traffic....

Cybersecurity 2025-07-01

Cybersecurity crossword puzzle
Across
  1. a computer data storage on servers in off-site locations
  2. protection of networks and programs from digital attacks
  3. a type of social engineering to steal data
  4. the use of numbers
  5. an intrusive software developed by criminals
Down
  1. weak places in the security system
  2. an unauthorized person trying to gain access

7 Clues: the use of numbersweak places in the security systema type of social engineering to steal dataan unauthorized person trying to gain accessan intrusive software developed by criminalsa computer data storage on servers in off-site locationsprotection of networks and programs from digital attacks

Healthcare Cybersecurity & Technology 2025-06-04

Healthcare Cybersecurity & Technology crossword puzzle
Across
  1. Where the encryption keyword must be placed
  2. Attack technique where the sender pretends to be someone you trust
  3. Regulation that requires protection of patient information
  4. Protected Health Information that must be safeguarded
  5. Something that deviates from typical email behavior
  6. Beginning of the legitimate URL used for encrypted email messages
  7. Manipulation tactic used to trick users rather than exploit technology
  8. Automated handling step that helps analyze reported suspicious emails
Down
  1. Type of AI approach that focuses on how people normally communicate
  2. Legitimate but unwanted email that can be filtered out of your inbox
  3. Email encryption service used to protect sensitive information
  4. The action taken after a malicious email is identified
  5. A recipient outside the organization that triggers encryption requirements
  6. Keyword added to the subject line to send a secure email
  7. Common email-based attack that tries to steal information or credentials
  8. Email security platform that learns normal communication patterns to detect unusual messages
  9. Secure location where recipients may view encrypted messages
  10. The “normal” reference point used to spot suspicious email activity

18 Clues: Where the encryption keyword must be placedSomething that deviates from typical email behaviorProtected Health Information that must be safeguardedThe action taken after a malicious email is identifiedKeyword added to the subject line to send a secure emailRegulation that requires protection of patient information...

Chapter 5&6 2025-11-22

Chapter 5&6 crossword puzzle
Across
  1. USED IN CFAA CRITICISM (CATALYST) - ACTIVIST WHOSE PROSECUTION HIGHLIGHTED ARGUMENTS THAT CFAA IS OVERLY PUNITIVE
  2. VOLUNTARY FRAMEWORK FOR CRITICAL INFRASTRUCTURE CYBERSECURITY RISK MANAGEMENT
  3. INCENTIVIZED VULNERABILITY REPORTING THROUGH STRUCTURED COMPANY PROGRAMS
  4. INFORMATION PROTECTED UNDER THE EEA AND DTSA THAT MUST HAVE VALUE AND BE KEPT CONFIDENTIAL
  5. REQUIRED LEGAL CONNECTION BETWEEN ACCESS CIRCUMVENTION AND POSSIBLE INFRINGEMENT
  6. ONE OF ORIN KERR'S THEORIES - VIOLATES GENERAL SOCIETAL EXPECTATIONS OF COMPUTER USE
  7. LEAD AGENCY FOR ASSET RESPONSE, WHICH INCLUDES HELPING COMPANIES AND GOVERNMENTS PROTECT ASSETS AND MITIGATE HARMS
  8. ACTION PROHIBITED UNDER CFAA AND CENTRAL TO THE MORRIS WORM CASE
  9. INTERNATIONAL TREATY FOR CYBERCRIME INVESTIGATIONS
  10. ONE OF ORIN KERR'S THEORIES - VIOLATIONS VIA BYPASSING TECHNICAL CONTROLS
  11. 2015 FEDERAL LAW CREATING A LEGISLATIVE FRAMEWORK FOR IMPROVING U.S. CYBERSECURITY
Down
  1. LAW PREVENTING DOMAIN NAME SQUATTING
  2. PRIMARY FEDERAL STATUTE GOVERNING UNAUTHORIZED ACCESS
  3. MOST LITIGATED CFAA ISSUE - REQUIRES ACTIVE ACCESS, NOT PASSIVE RECEIPT
  4. ONE OF THE SEVEN PROHIBITED ACTS UNDER THE CFAA - USE OF HACKING TO OBTAIN CLASSIFIED/NATIONAL SECURITY INFORMATION
  5. 2016 LAW ENABLING COMPANIES TO SUE PRIVATELY FOR STOLEN TRADE SECRETS
  6. CFAA AND ESPIONAGE ACT CASE INVOLVING THEFT OF AEROSPACE TRADE SECRETS FOR CHINA (FORMAT: EXAMPLEVEXAMPLE
  7. ONE OF ORIN KERR'S THEORIES - VIOLATION ARISING FROM BREACHING AN AGREEMENT, POLICY, OR TERMS OF SERVICE
  8. RESTRICTS THE ABILITY OF INDIVIDUALS TO CIRCUMVENT ACCESS CONTROLS THAT PROTECT COPYRIGHTED MATERIAL.
  9. ONE OF THE FIVE PRINCIPLES IN THE NIST FRAMEWORK - IMPLEMENT SAFEGUARDS TO DELIVER SERVICES

20 Clues: LAW PREVENTING DOMAIN NAME SQUATTINGINTERNATIONAL TREATY FOR CYBERCRIME INVESTIGATIONSPRIMARY FEDERAL STATUTE GOVERNING UNAUTHORIZED ACCESSACTION PROHIBITED UNDER CFAA AND CENTRAL TO THE MORRIS WORM CASE2016 LAW ENABLING COMPANIES TO SUE PRIVATELY FOR STOLEN TRADE SECRETSMOST LITIGATED CFAA ISSUE - REQUIRES ACTIVE ACCESS, NOT PASSIVE RECEIPT...

ICT Crossword - Daniyarov Daniyar 2023-04-25

ICT Crossword - Daniyarov Daniyar crossword puzzle
Across
  1. What is programming?
  2. What is Wi-Fi?
  3. What is ICT?
  4. What is Internet?
Down
  1. What is AI?
  2. What is VR?
  3. What is cloud?
  4. What are examples of ICT tools?
  5. What is IoT?
  6. What is cybersecurity?

10 Clues: What is AI?What is VR?What is IoT?What is ICT?What is Wi-Fi?What is cloud?What is Internet?What is programming?What is cybersecurity?What are examples of ICT tools?

Puzzle 2 2024-08-28

Puzzle 2 crossword puzzle
Across
  1. A method in project management that focuses on time-boxed sprints
  2. A secure way of verifying user identity, often using fingerprint or facial recognition
  3. The type of banking that exists entirely online, without physical branches
  4. Capgemini's exclusive global initiative for leveraging applied innovation?
  5. The interest rate that central banks charge commercial banks for short-term loans
  6. A significant global regulatory framework in banking, introduced post-2008 financial crisis
  7. The practice of protecting sensitive information from unauthorized access
  8. A common technique used in cybersecurity to disguise and protect information
Down
  1. A key regulatory compliance requirement for banks handling EU citizens' data
  2. A data-driven approach for managing customer relations
  3. A loan granted for the purchase of real estate, typically paid back with interest over time
  4. The approach used by Barclays to integrate sustainability into its operations
  5. The practice of transferring money between accounts, either manually or automatically
  6. The term for integrating AI into customer service to provide instant responses
  7. The global system for financial messaging used by banks to communicate securely

15 Clues: A data-driven approach for managing customer relationsA method in project management that focuses on time-boxed sprintsThe practice of protecting sensitive information from unauthorized accessThe type of banking that exists entirely online, without physical branchesCapgemini's exclusive global initiative for leveraging applied innovation?...

O‘zbekistonda axborot kommunikatsiya sohasini rivojlantirish yo‘nalishlari va qonunlar 2025-12-22

O‘zbekistonda axborot kommunikatsiya sohasini rivojlantirish yo‘nalishlari va qonunlar crossword puzzle
Across
  1. Elektron hukumat tizimi
  2. Yuqori tezlikdagi internet tarmog‘i
  3. Mahalliy IT kompaniyalar klasteri
  4. Innovatsion loyihalar va dasturlar
  5. Axborot xavfsizligini ta’minlash
Down
  1. Onlayn davlat xizmatlari
  2. Qonun va me’yoriy hujjatlar
  3. Telekommunikatsiya sohasini rivojlantirish
  4. Raqamli siyosat va strategiyalar
  5. Ma’lumotlarni himoya qilish

10 Clues: Elektron hukumat tizimiOnlayn davlat xizmatlariQonun va me’yoriy hujjatlarMa’lumotlarni himoya qilishRaqamli siyosat va strategiyalarAxborot xavfsizligini ta’minlashMahalliy IT kompaniyalar klasteriInnovatsion loyihalar va dasturlarYuqori tezlikdagi internet tarmog‘iTelekommunikatsiya sohasini rivojlantirish

TTS EDISI: CODING 2025 2025-03-23

TTS EDISI: CODING 2025 crossword puzzle
Across
  1. Jenis durian
  2. Jurusan Aldo
  3. Tales of ...
  4. Ungu berkaki 2, cedera rate 70%
  5. Tanah airku
Down
  1. Kelakuan tikus, "Semoga bendahara tidak melakukan ini"
  2. Jarak/massa, Sunway
  3. "Bos! Teh ais ... satu"
  4. Divisi paling rame
  5. Tongkrongan anak APU

10 Clues: Tanah airkuJenis durianJurusan AldoTales of ...Divisi paling rameJarak/massa, SunwayTongkrongan anak APU"Bos! Teh ais ... satu"Ungu berkaki 2, cedera rate 70%Kelakuan tikus, "Semoga bendahara tidak melakukan ini"

Herts Experience 2023-11-07

Herts Experience crossword puzzle
Across
  1. Work in rehabilitation centres
  2. UH-GAF's latest programme additions in LMS
  3. Work in ethical hacking
  4. Globally accredited degree
Down
  1. medicine innovator
  2. Tagline
  3. How many schools?
  4. storytellers
  5. UH-UK campus location

9 Clues: TaglinestorytellersHow many schools?medicine innovatorUH-UK campus locationWork in ethical hackingGlobally accredited degreeWork in rehabilitation centresUH-GAF's latest programme additions in LMS

Cybersecurity 2020-08-21

Cybersecurity crossword puzzle
Across
  1. It protects systems, networks, and programs from digital attacks.
  2. They are small files that some websites save on your computer. They store information about you, but they don't spy.
  3. A fraud that obtains users' private data from the Internet, especially to access their bank accounts.
  4. Someone who, with their technical knowledge, uses cyber attacks to break into computer systems.
Down
  1. They infect other files on the system with the intention of altering the functioning of your computer, without you noticing.
  2. An electronic device to store and process data; we use it a lot in quarantine.
  3. Unwanted email that you recieve, they are usually advertisements.

7 Clues: It protects systems, networks, and programs from digital attacks.Unwanted email that you recieve, they are usually advertisements.An electronic device to store and process data; we use it a lot in quarantine.Someone who, with their technical knowledge, uses cyber attacks to break into computer systems....

CYBERSECURITY 2022-03-01

CYBERSECURITY crossword puzzle
Across
  1. transforming plaintext or cleartext into ciphertext.
  2. planning and maintaining organization safe in cyberspace.
  3. used to prove one's identity, or authorize access to a resource.
  4. malicious or ethical person who has knowledge and skill in analyzing program code or a computer system.
Down
  1. practice of sending fraudulent messages that appear to come from a reputable source.
  2. attaches itself with host file and replicates.
  3. unwanted or unsolicited communications typically received via e-mail.

7 Clues: attaches itself with host file and replicates.transforming plaintext or cleartext into ciphertext.planning and maintaining organization safe in cyberspace.used to prove one's identity, or authorize access to a resource.unwanted or unsolicited communications typically received via e-mail....

Cybersecurity 2025-10-31

Cybersecurity crossword puzzle
Across
  1. Strukturierter Aufbau von IT-Systemen mit Fokus auf Sicherheitsmaßnahmen.
  2. Welcher Begriff beschreibt die Verbindung von technischen und organisatorischen Sicherheitsmaßnahmen während des gesamten Fahrzeuglebenszyklus?
Down
  1. Simulierter Angriff zur Identifikation von Schwachstellen.
  2. Sicherheitsvorfall mit Auswirkungen auf Verfügbarkeit etc.
  3. Wie nennt sich die geplante Einführung von Updates während des Fahrzeugbetriebs?
  4. Schutz beim Systemstart vor Manipulationen (englisches Wort)
  5. Wird regelmäßig aktualisiert zur Bewertung neuer Gefahren

7 Clues: Wird regelmäßig aktualisiert zur Bewertung neuer GefahrenSimulierter Angriff zur Identifikation von Schwachstellen.Sicherheitsvorfall mit Auswirkungen auf Verfügbarkeit etc.Schutz beim Systemstart vor Manipulationen (englisches Wort)Strukturierter Aufbau von IT-Systemen mit Fokus auf Sicherheitsmaßnahmen....

CyberSecurity 2025-09-17

CyberSecurity crossword puzzle
Across
  1. strong key word to access computers
  2. Software designed to detect, prevent and remove malicious software
  3. social engineering scam
  4. MFA is Multi-Factor _
  5. Security Officer
Down
  1. The process of converting information into a code
  2. A type of malware that encrypts files, demanding a ransom for their decryption

7 Clues: Security OfficerMFA is Multi-Factor _social engineering scamstrong key word to access computersThe process of converting information into a codeSoftware designed to detect, prevent and remove malicious softwareA type of malware that encrypts files, demanding a ransom for their decryption

Computer Puzzle game 2025-05-27

Computer Puzzle game crossword puzzle
Across
  1. misusing personal information
  2. grooming online child abuse
  3. hoaxing or misleading
  4. illegal entry into computer
  5. deliberate manner of harassing
  6. frau illegal method to get money
  7. number consists of 8 digits
  8. disrupt normal function of computer
Down
  1. code only understand by computer
  2. process to protect network
  3. act of sen misleading email
  4. blocking unauthorised access
  5. criminal activity using internet
  6. adding binary numbers
  7. protect computer from virus

15 Clues: adding binary numbershoaxing or misleadingprocess to protect networkact of sen misleading emailgrooming online child abuseillegal entry into computerprotect computer from virusnumber consists of 8 digitsblocking unauthorised accessmisusing personal informationdeliberate manner of harassingcode only understand by computer...

Cybersecurity Phishing 2023-06-14

Cybersecurity Phishing crossword puzzle
Across
  1. type of phishing targeting a group or individual
  2. links, BLANK, or other attachments
  3. type of phishing over text
  4. a false sense of
  5. this plus misspellings indicates phishing
  6. most common way to phish
Down
  1. check for these
  2. type of phishing over phone/voice call
  3. most common social engineering attack
  4. type of phishing targeting C-suite
  5. never give this or your password

11 Clues: check for thesea false sense ofmost common way to phishtype of phishing over textnever give this or your passwordlinks, BLANK, or other attachmentstype of phishing targeting C-suitemost common social engineering attacktype of phishing over phone/voice callthis plus misspellings indicates phishingtype of phishing targeting a group or individual

CyberSecurity-battaglia 2021-03-22

CyberSecurity-battaglia crossword puzzle
Across
  1. an electronic machine that calculates data very quickly, used for storing, writing, organizing, and sharing information
  2. the quality of being able to be trusted or believed
  3. the condition or state of being kept safe, damage, or loss
  4. used to describe websites that are safe and will not cause problems for your computer
Down
  1. the possibility of harm or death, or of something unpleasant happening
  2. a choice that you make about something after thinking about several possibilities
  3. not enjoyable or pleasant
  4. physical harm or damage to someone's body caused by an accident or an attack
  5. to try to hurt or defeat using violence
  6. an amount of something that is being kept for future use
  7. information in an electronic form that can be stored and processed by a computer

11 Clues: not enjoyable or pleasantto try to hurt or defeat using violencethe quality of being able to be trusted or believedan amount of something that is being kept for future usethe condition or state of being kept safe, damage, or lossthe possibility of harm or death, or of something unpleasant happening...

CyberSecurity-battaglia 2021-03-22

CyberSecurity-battaglia crossword puzzle
Across
  1. information in an electronic form that can be stored and processed by a computer
  2. an electronic machine that calculates data very quickly, used for storing, writing, organizing, and sharing information
  3. the quality of being able to be trusted or believed
  4. an amount of something that is being kept for future use
  5. the condition or state of being kept safe, damage, or loss
  6. the possibility of harm or death, or of something unpleasant happening
Down
  1. a choice that you make about something after thinking about several possibilities
  2. not enjoyable or pleasant
  3. used to describe websites that are safe and will not cause problems for your computer
  4. physical harm or damage to someone's body caused by an accident or an attack
  5. to try to hurt or defeat using violence

11 Clues: not enjoyable or pleasantto try to hurt or defeat using violencethe quality of being able to be trusted or believedan amount of something that is being kept for future usethe condition or state of being kept safe, damage, or lossthe possibility of harm or death, or of something unpleasant happening...

Cybersecurity Newsletter 2023-02-03

Cybersecurity Newsletter crossword puzzle
Across
  1. a malicious program that records the strokes on the keyboard to capture sensitive information
  2. Faith Healthcare's EHR solution for the clinics
  3. any malware that misleads users of its true intent
  4. any software intentionally designed to cause disruption to a computer.
  5. the psychological manipulation of people into performing actions or divulging confidential information
Down
  1. a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
  2. a type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. an internal website used for sharing resources and information. In other words, FHC uses SharePoint as its ___.
  4. Time & attendance, payroll, and soon-to-be education is managed with this system
  5. a form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
  6. 4-letter abbreviation for protected health information (PHI) that is produced, saved, transferred or received in an electronic form.

11 Clues: Faith Healthcare's EHR solution for the clinicsany malware that misleads users of its true intentany software intentionally designed to cause disruption to a computer.Time & attendance, payroll, and soon-to-be education is managed with this systema malicious program that records the strokes on the keyboard to capture sensitive information...

Cybersecurity Terms 2024-09-20

Cybersecurity Terms crossword puzzle
Across
  1. Unsolicited commercial email, junk mail.
  2. Small program that is timed to perform an operation on a system.
  3. A place where commands can be entered in Linux.
  4. Takes advantage of code flaws that have very recently been discovered.
  5. A program that blocks access until a ransom is paid.
Down
  1. Appears to be legitimate but really contains malicious code.
  2. Proving who you are so trust can be established.
  3. Software that installs advertisements on the PC in the form of toolbars or popups.
  4. Software that gathers data and forwards it without consent.
  5. Something you have.
  6. Files that appear to be legitimate programs, but really contain malicious code.

11 Clues: Something you have.Unsolicited commercial email, junk mail.A place where commands can be entered in Linux.Proving who you are so trust can be established.A program that blocks access until a ransom is paid.Software that gathers data and forwards it without consent.Appears to be legitimate but really contains malicious code....

cybersecurity Crossword 2024-09-27

cybersecurity Crossword crossword puzzle
Across
  1. A person who tries to break into computers to find information or cause trouble.
  2. A special tool that helps keep your computer safe by blocking bad stuff from getting in
  3. A secret word or code you use to protect your accounts and keep them safe.
  4. A new version of software that makes it better or fixes problems, helping to keep your computer safe
  5. A type of software that secretly watches what you do on your computer without your permission.
  6. A harmful program that can make your computer sick, just like a virus can make you sick
  7. A way to change your information into a secret code so only the right people can read it.
Down
  1. Guess the word
  2. Short for "malicious software," it's a type of bad program that can hurt your computer or steal your information
  3. A trick where someone pretends to be someone else to steal your personal information, usually through fake emails.
  4. A process to check if you are who you say you are, often by using a password or a special code.

11 Clues: Guess the wordA secret word or code you use to protect your accounts and keep them safe.A person who tries to break into computers to find information or cause trouble.A special tool that helps keep your computer safe by blocking bad stuff from getting inA harmful program that can make your computer sick, just like a virus can make you sick...

CyberSecurity Terms 2025-04-04

CyberSecurity Terms crossword puzzle
Across
  1. A great free password manager
  2. These emails try to get your credentials by creating a sense of urgency
  3. One of the top cybersecurity companies you can trust
  4. Regularly check for _______ on your computer or device
  5. Detects and removes harmful materials on your device
Down
  1. A great way to store your credentials would be using a ________ manager
  2. It's good to have a password length of at least ______
  3. Malware that can harm your computer
  4. Secures account through text/email/etc. (abbreviation)
  5. It's a good idea to ____ phishing or spam emails
  6. Good to empty every so often or recover deleted files in

11 Clues: A great free password managerMalware that can harm your computerIt's a good idea to ____ phishing or spam emailsOne of the top cybersecurity companies you can trustDetects and removes harmful materials on your deviceIt's good to have a password length of at least ______Secures account through text/email/etc. (abbreviation)...

How well do you know Afia? 2024-04-15

How well do you know Afia? crossword puzzle
Across
  1. volunteer's every sunday
  2. OG Co-admin for this Big WhatsApp groupchat
  3. Birth month
  4. Master's degree
  5. volunteer vest color that she wore everyday during Ramadan
  6. Age
Down
  1. Number of siblings she has (including herself)
  2. Frequently visits this Masjid
  3. Fiance's name
  4. Eldest sister's name
  5. Her cat's name
  6. Birth state
  7. Admin for this Big WhatsApp groupchat

13 Clues: AgeBirth stateBirth monthFiance's nameHer cat's nameMaster's degreeEldest sister's namevolunteer's every sundayFrequently visits this MasjidAdmin for this Big WhatsApp groupchatOG Co-admin for this Big WhatsApp groupchatNumber of siblings she has (including herself)volunteer vest color that she wore everyday during Ramadan

Cybersecurity Terms 2022-05-13

Cybersecurity Terms crossword puzzle
Across
  1. The practice of securing systems, networks, and technologies from attacks and unauthorized access
  2. A type of network security that filters incoming and outgoing traffic
  3. When a legitimate website’s traffic is redirected to a fake site for malicious purposes
  4. Disguising data so it’s impossible to decipher without authorization
Down
  1. Using a device to mine cryptocurrency, without the device owner’s knowledge or permission
  2. Sending emails with a forged sender address is called email...
  3. Malicious software designed to disrupt a computer, server, or network
  4. A chain of Internet-connected devices centrally controlled by a hacker
  5. Email that you’ve technically solicited but it may serve little to no purpose to you
  6. A tool that allows you to maintain online anonymity while using the Internet
  7. DKIM and DMARC are both examples of a standard email authentication...

11 Clues: Sending emails with a forged sender address is called email...Disguising data so it’s impossible to decipher without authorizationMalicious software designed to disrupt a computer, server, or networkA type of network security that filters incoming and outgoing trafficA chain of Internet-connected devices centrally controlled by a hacker...

Cybersecurity Crossword 2021-12-07

Cybersecurity Crossword crossword puzzle
Across
  1. __ safeguards intended for the actual users
  2. IT firm that was subject of a Russian cyberattack
  3. always practice ____ password management to prevent against cyberattacks
  4. another work for SMS-based phishing
  5. __ safeguards intended for software and hardware
  6. process of preventing unauthorized access to IT systems
Down
  1. you can download ____ software to protect your devices
  2. cyberattack that demands a ransom payment
  3. name of criminal organization that hacked into the IT network of Colonial Pipeline
  4. this country was the subject of a Russian cyberattack in 2007
  5. most common form of cyberattack

11 Clues: most common form of cyberattackanother work for SMS-based phishingcyberattack that demands a ransom payment__ safeguards intended for the actual users__ safeguards intended for software and hardwareIT firm that was subject of a Russian cyberattackyou can download ____ software to protect your devices...

cybersecurity 3 2024-05-07

cybersecurity 3 crossword puzzle
Across
  1. raw facts
  2. taking data out of a computer
  3. device operating controlled instructions
  4. use mechanical operations to perform calculations
  5. a series of related
Down
  1. your history
  2. instructions waiting to be executed
  3. a notebook computer
  4. entering data into a computer
  5. the most powerful computer that performs trillions of calculations per second
  6. a stationary location with a computer on top

11 Clues: raw factsyour historya notebook computera series of relatedtaking data out of a computerentering data into a computerinstructions waiting to be executeddevice operating controlled instructionsa stationary location with a computer on topuse mechanical operations to perform calculations...

Cybersecurity Awareness 2023-09-14

Cybersecurity Awareness crossword puzzle
Across
  1. A piece of data from a website that is saved within a web browser and can be retrieved by the website at a later time
  2. Virtual Private Network
  3. A type of malicious software
  4. Fraudulent email that demands urgent action
  5. The manipulation of facial appearance through deep generative methods.
  6. The use of electronics to bully someone
Down
  1. Artificial intelligence
  2. The conversion of information or data into a code
  3. A part of the internet that isn't indexed by search engines
  4. An error, fault in a computer system
  5. Network security system

11 Clues: Artificial intelligenceVirtual Private NetworkNetwork security systemA type of malicious softwareAn error, fault in a computer systemThe use of electronics to bully someoneFraudulent email that demands urgent actionThe conversion of information or data into a codeA part of the internet that isn't indexed by search engines...

Cybersecurity Week! 2023-10-11

Cybersecurity Week! crossword puzzle
Across
  1. Software used to prevent, scan, detect and delete viruses from a computer.
  2. A type of cyber attack that exploits a vulnerability in software that no one is aware of yet.
  3. A piece of audio or video that has been altered and changed to make it seem authentic or credible.
  4. A type of malware designed to give hackers access to and control over a target device.
  5. A cyber-attack that targets individuals through SMS or text messages.
  6. Tools that can record every keystroke that you type into a computer or mobile keyboard.
Down
  1. A type of malware that disguises itself as legitimate code or software.
  2. Any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission.
  3. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
  4. A technique through which a cybercriminal disguises themselves as a known or trusted source.
  5. A network of compromised computers used to carry out cyberattacks on other systems.

11 Clues: A cyber-attack that targets individuals through SMS or text messages.A type of malware that disguises itself as legitimate code or software.Software used to prevent, scan, detect and delete viruses from a computer.A network of compromised computers used to carry out cyberattacks on other systems....

Pink October 2019-10-16

Pink October crossword puzzle
Across
  1. color for october
  2. Health Examination
  3. Data leak
  4. Celebration of years a significant event occurred
  5. Tissue cells hyper-proliferation
  6. ISO-certified
  7. Security measure to protect your data
  8. Evidence of authentication
  9. No Bra Day
Down
  1. File or program used to harm computers
  2. An example of CyberCrime
  3. Files/ data safety
  4. Day to promote Breast cancer Awareness
  5. Principle for measure of quality
  6. Associated with malicious attacks
  7. Breast cancer awareness period
  8. Symbol for breast cancer support
  9. Responsible for standard accreditation
  10. Breast cancer Victims

19 Clues: Data leakNo Bra DayISO-certifiedcolor for octoberHealth ExaminationFiles/ data safetyBreast cancer VictimsAn example of CyberCrimeEvidence of authenticationBreast cancer awareness periodPrinciple for measure of qualityTissue cells hyper-proliferationSymbol for breast cancer supportAssociated with malicious attacks...

Guilfordian Print Issue 18 2023-05-02

Guilfordian Print Issue 18 crossword puzzle
Across
  1. A popular short-form social media platform under scrutiny by the US government
  2. an acronym used to describe a wide range of queer and trans individuals
  3. The name of a firelord and main antagonist of Avatar: The Last Airbender
  4. A cybersecurity company that released data on cybersecurity insurance for colleges
  5. The namesake character of a TV show that has been running since 1999 and has around 280 episodes
  6. A youtuber who gained popularity through his FNAF playthroughs
  7. The month with a nickname of “madness” that is famous for basketball
  8. The person that Miles Kirkpatrick didn’t want to anger when talking about philosophy
Down
  1. The name of the most hated social media platform of Guilford College (by poll)
  2. Guilford College’s rival during the Soup Bowl
  3. A sport played by throwing a disc, usually plastic, to another person
  4. The country that Studio Ghibli is based in
  5. The name of the closest black hole to earth, also the name of the Primordial Greek Goddess of the Earth
  6. The sport played by Portia Star Jones, and in which Guilford College is part of the NCAA Emerging Pathway

14 Clues: The country that Studio Ghibli is based inGuilford College’s rival during the Soup BowlA youtuber who gained popularity through his FNAF playthroughsThe month with a nickname of “madness” that is famous for basketballA sport played by throwing a disc, usually plastic, to another person...

TTS TIK Neysha 8D 2025-10-11

TTS TIK Neysha 8D crossword puzzle
Across
  1. program yang ada di komputer
  2. perangkat lunak yang merusak sistem
  3. perlindungan terhadap ancaman digital yang ada
  4. menyalakan ulang komputer
  5. proses mematikan komputer
  6. memasukkan akun ke sistem
  7. otak komputer yang memproses data
  8. jalan pintas menuju program/file
Down
  1. kondisi dimana perangkat tidak merespon secara permanen
  2. tempat penyimpanan data
  3. Malware yang bisa menyebar dan merusak data
  4. pengguna komputer/perangkat
  5. salinan data
  6. tempat penyimpanan file
  7. alamat web

15 Clues: alamat websalinan datatempat penyimpanan datatempat penyimpanan filemenyalakan ulang komputerproses mematikan komputermemasukkan akun ke sistempengguna komputer/perangkatprogram yang ada di komputerjalan pintas menuju program/fileotak komputer yang memproses dataperangkat lunak yang merusak sistemMalware yang bisa menyebar dan merusak data...

TTS TIK Neysha 8D 2025-10-11

TTS TIK Neysha 8D crossword puzzle
Across
  1. program yang ada di komputer
  2. perangkat lunak yang merusak sistem
  3. perlindungan terhadap ancaman digital yang ada
  4. menyalakan ulang komputer
  5. proses mematikan komputer
  6. memasukkan akun ke sistem
  7. otak komputer yang memproses data
  8. jalan pintas menuju program/file
Down
  1. kondisi dimana perangkat tidak merespon secara permanen
  2. tempat penyimpanan data
  3. Malware yang bisa menyebar dan merusak data
  4. pengguna komputer/perangkat
  5. salinan data
  6. tempat penyimpanan file
  7. alamat web

15 Clues: alamat websalinan datatempat penyimpanan datatempat penyimpanan filemenyalakan ulang komputerproses mematikan komputermemasukkan akun ke sistempengguna komputer/perangkatprogram yang ada di komputerjalan pintas menuju program/fileotak komputer yang memproses dataperangkat lunak yang merusak sistemMalware yang bisa menyebar dan merusak data...

Technology Through Time 2025-02-13

Technology Through Time crossword puzzle
Across
  1. New technology.
  2. Creative.
  3. How we access Google.
  4. Protects people online.
  5. A device used to carry out a function.
  6. Fake Brain.
Down
  1. Something that uses resources effectively.
  2. Spider's home and a place.
  3. The unit we are doing.
  4. Something you bring to school everyday.
  5. Banned.

11 Clues: Banned.Creative.Fake Brain.New technology.How we access Google.The unit we are doing.Protects people online.Spider's home and a place.A device used to carry out a function.Something you bring to school everyday.Something that uses resources effectively.

Save Our Systems!!! 2020-11-28

Save Our Systems!!! crossword puzzle
Across
  1. Yes, it’s you alright!
  2. Cyberworld vaccine
  3. Trust me, I’ll ruin you!
  4. Internet’s most wanted
  5. A web assault?
  6. Alphanumeric, symbols & 8 spaces long
  7. Help, Support, Copy
  8. Flaming barrier
Down
  1. You are the bait here!
  2. A scary lot of viruses, worms, trojan horses, wipers
  3. For my eyes only/What’s mine stays mine
  4. Data protection and privacy law
  5. Scrambled data
  6. Online Safety

14 Clues: Online SafetyScrambled dataA web assault?Flaming barrierCyberworld vaccineHelp, Support, CopyYou are the bait here!Yes, it’s you alright!Internet’s most wantedTrust me, I’ll ruin you!Data protection and privacy lawAlphanumeric, symbols & 8 spaces longFor my eyes only/What’s mine stays mineA scary lot of viruses, worms, trojan horses, wipers

tzrtzrt 2023-07-11

tzrtzrt crossword puzzle
Across
  1. dkjdfköj
  2. marsupial
  3. ccccc
Down
  1. Has a trunk
  2. Likes to chase mice
  3. sdas
  4. an immersive and persistent three-dimensional virtual realm
  5. Flying mammal

8 Clues: sdascccccdkjdfköjmarsupialHas a trunkFlying mammalLikes to chase micean immersive and persistent three-dimensional virtual realm

CYBER AND DIGITAL LITERALLY 2024-04-30

CYBER AND DIGITAL LITERALLY crossword puzzle
Across
  1. Principles and guidelines governing the ethical use and behavior in the digital realm, including respect for privacy, intellectual property, and online communities.
  2. Measures and precautions taken to protect digital devices, networks, and data from unauthorized access, use, or exploitation.
  3. Knowledge and understanding of information security risks, policies, and best practices among individuals and organizations.
  4. Deceptive schemes or frauds conducted through the internet, often aimed at tricking individuals into providing money or sensitive information.
  5. The unauthorized access, disclosure, or acquisition of sensitive or confidential information, often resulting in potential harm or exploitation.
  6. Practices and measures taken to protect sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction.
  7. The process of converting data into a code to prevent unauthorized access, ensuring confidentiality and privacy.
  8. Best practices and habits for maintaining good cybersecurity posture, including updating software, using strong passwords, and being cautious online.
  9. The rights and freedoms individuals have in the digital world, including privacy, freedom of expression, and access to information.
  10. The protection of personal information and data from unauthorized access, use, or disclosure, ensuring individuals' control over their own information.
  11. The protection of personal information and data shared on the internet from unauthorized access, use, or exploitation.
  12. Forms of media content that are created, distributed, and consumed digitally, including text, images, audio, and video.
  13. Malicious software that replicates itself and infects computer systems, causing harm to files, programs, and overall system performance.
  14. Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks.
  15. Deceptive attempts to obtain sensitive information, such as usernames, passwords, or financial details, by posing as a trustworthy entity in electronic communication.
  16. A type of cyber attack where fraudulent emails, messages, or websites are used to trick individuals into providing sensitive information such as passwords or financial details.
  17. The ability to effectively navigate, evaluate, and use digital technologies and information sources for communication, learning, and productivity.
  18. The representation of an individual's identity in an online or digital context, including personal information, preferences, and interactions.
  19. The responsible and ethical use of technology, including understanding one's rights and responsibilities in the digital world.
  20. Psychological manipulation techniques used by attackers to deceive individuals or employees into divulging confidential information or performing actions that compromise security.
  21. Strategies, technologies, and practices employed to protect computer systems, networks, and data from cyber threats and attacks.
  22. Habits, behaviors, and routines aimed at maintaining good cybersecurity posture and minimizing risks, such as updating software, using strong passwords, and being cautious online.
  23. Practices and tools used to protect against threats and maintain privacy while accessing websites and online content.
  24. Proficiencies and abilities required to effectively navigate, evaluate, and utilize digital technologies, tools, and information.
Down
  1. Programs, courses, and initiatives aimed at raising awareness and educating individuals and communities about cybersecurity risks, best practices, and skills.
  2. Practices and precautions taken to protect oneself from potential risks and dangers encountered on the internet.
  3. The global network of interconnected computers that allows for the exchange of data and communication.
  4. Online platforms and websites that enable users to create, share, and interact with content and connect with others.
  5. The ability of individuals, organizations, and systems to withstand, adapt to, and recover from cyber threats, attacks, and disruptions.
  6. Deceptive or dishonest activities conducted over the internet with the intention of gaining financial or personal benefit at the expense of others.
  7. Legal frameworks and regulations governing activities, behavior, and transactions conducted in cyberspace, including privacy, intellectual property, and cybersecurity laws.
  8. The ability to identify, evaluate, and effectively use information from various sources, including digital and online resources.
  9. The fraudulent acquisition and use of someone else's personal information for financial gain or other malicious purposes.
  10. Criminal activities carried out using computers, networks, or digital devices, such as hacking, fraud, or identity theft.
  11. Valuable resources and properties stored or represented in digital form, including data, documents, media files, and virtual currencies.
  12. Authentication A security process that requires users to provide two different forms of identification to verify their identity, typically a password and a temporary code sent to a mobile device.
  13. Potential dangers and risks posed by malicious actors, vulnerabilities, and security weaknesses in computer systems and networks.
  14. The perception and impression that individuals or entities have based on their activities, behavior, and interactions conducted online.
  15. The exchange of information, ideas, and messages using digital technologies and platforms, such as email, social media, and instant messaging.
  16. Measures and practices implemented to protect computer systems, networks, and data from cyber threats, attacks, and vulnerabilities.
  17. Information and analysis about potential and emerging cyber threats, vulnerabilities, and actors, used to inform cybersecurity decision-making and defenses.
  18. Unsolicited or unwanted electronic messages, typically sent in bulk, often for commercial or fraudulent purposes.
  19. Secret codes or phrases used to authenticate a user's identity and grant access to a computer system, network, or online account.
  20. Measures and safeguards implemented to secure sensitive or confidential data from unauthorized access, use, or disclosure.
  21. The trail of data left behind by interactions in a digital environment, including online activities, communications, and transactions.
  22. Bullying behavior that occurs online or through digital devices, such as harassment, threats, or spreading rumors.
  23. Malicious actions or operations launched against computer systems, networks, or digital infrastructure with the intent of causing harm, disruption, or damage.
  24. Knowledge and understanding of cybersecurity risks, threats, and best practices among individuals and organizations.
  25. Competencies and abilities required to effectively navigate, utilize, and create digital technologies and resources for various purposes.
  26. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, protecting against unauthorized access and threats.

50 Clues: The global network of interconnected computers that allows for the exchange of data and communication.Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks.Practices and precautions taken to protect oneself from potential risks and dangers encountered on the internet....

Envision Crossword 3 2023-12-05

Envision Crossword 3 crossword puzzle
Across
  1. - Structured data collection.
  2. - Technology at molecular scale.
  3. - Translates code to machine language.
  4. - Network security barrier.
Down
  1. - Protecting digital systems.
  2. - Physical computer parts.
  3. - Open-source OS.
  4. - Securing data through algorithms.
  5. - Language for web page creation.
  6. - Function calling itself.

10 Clues: - Open-source OS.- Physical computer parts.- Function calling itself.- Network security barrier.- Protecting digital systems.- Structured data collection.- Technology at molecular scale.- Language for web page creation.- Securing data through algorithms.- Translates code to machine language.

Harper Cybersecurity Review 2024-03-05

Harper Cybersecurity Review crossword puzzle
Across
  1. software we use to protect your laptop
  2. phishing attack thorough voice or phone call
  3. our email filter system
  4. #1 threat to our security
  5. usual media that a phish comes to
  6. type of request that is weird
  7. tactic that a phisher uses
  8. social media site where phisher researches
  9. phishing attack through text message
  10. used in phishing attack called Quishing
Down
  1. where people write the Wifi password
  2. public charging station stealing your info
  3. used for remote access
  4. authentication for VPN access
  5. Information Security is everyone's
  6. 12 or more characters
  7. site where you can scan your own attachments

17 Clues: 12 or more charactersused for remote accessour email filter system#1 threat to our securitytactic that a phisher usesauthentication for VPN accesstype of request that is weirdusual media that a phish comes toInformation Security is everyone'swhere people write the Wifi passwordphishing attack through text message...

GC-CYBERSECURITY 2022-05-19

GC-CYBERSECURITY crossword puzzle
Across
  1. A piece of malicious code that encrypts files so the user can not access them until they pay.
  2. A piece of malicious code that is downloaded by pretending to be a useful piece of code
  3. Malicious code can be transferred from one computer to another using physical devices such as a _ _ _ _ _ _ _ _
  4. Old software and hardware may contain vulnerabilities that a hacker can e _ _ _ _ _ _ to gain access to a device.
  5. A piece of malicious code used to damage computers or steal data
  6. A hacker intercepts and steals data.
  7. Emails sent that appear to come from a legitimate organisation but links within the mail may install malicious code.
Down
  1. hackers attempt every posiible combination of characters to find a password
  2. A piece of malicious code. It infects computers by being downloaded within files.
  3. social ____________. Manipulating users into sharing their data.
  4. A common way to infect a computer with malicious code is to _ _ _ _ _ _ it from the internet or by clicking on suspicious links in mail.

11 Clues: A hacker intercepts and steals data.A piece of malicious code used to damage computers or steal datasocial ____________. Manipulating users into sharing their data.hackers attempt every posiible combination of characters to find a passwordA piece of malicious code. It infects computers by being downloaded within files....

Cybersecurity Week 2022-10-14

Cybersecurity Week crossword puzzle
Across
  1. a service that creates a secure tunnel between your device and the internet
  2. a malicious software that spreads from one computer to another
  3. the process of verifying a users identity
  4. malicious code or software
Down
  1. taking readable plaintext, and converting it into ciphertext
  2. when attackers send malicious emails to trick people into a scam
  3. a software update that fixes bugs or updates security
  4. a security technique that requires multiple methods of authentication
  5. a malware that encrypts user data, and requires payment to get back
  6. a secret word or phrase that must be used to gain access to something
  7. a network security device that monitors traffic to or from your network

11 Clues: malicious code or softwarethe process of verifying a users identitya software update that fixes bugs or updates securitytaking readable plaintext, and converting it into ciphertexta malicious software that spreads from one computer to anotherwhen attackers send malicious emails to trick people into a scam...