cybersecurity Crossword Puzzles
Cybersecurity Crossword 2025-10-13
Across
- Turning a secret code back into a normal message.
- Keeping computers and information safe from unauthorized people online.
- The giant network that connects computers all over the world.
- A secret word used to log into an account.
- A fake message that tricks people into giving passwords.
- A message that’s been turned into secret code.
Down
- A normal message before it’s turned into code.
- A person who breaks into computers.
- The process of writing and solving secret codes.
- The process of changing a message so others can’t read it.
- A tiny program that spreads and messes up computers.
- Keeping your personal info to yourself.
12 Clues: A person who breaks into computers. • Keeping your personal info to yourself. • A secret word used to log into an account. • A normal message before it’s turned into code. • A message that’s been turned into secret code. • The process of writing and solving secret codes. • Turning a secret code back into a normal message. • ...
Cybersecurity by Hazel 2025-05-07
Across
- the process of identifying and fixing vulnerabilities on a system.
- The smallest unit of information storage.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers.
- A list of entities that are considered trustworthy and are granted access or privileges.
- Any unauthorized attempt to access, disrupt, steal, or damage computer systems, networks, or data.
- A part of a computer system or network with is designed to block unauthorized access while permitting outward communication.
- Whom someone or what something is.
- the process of protecting electrical devices and networks from attacks.
Down
- A part of a computer system or network which is designed to lock unauthorized access while permitting outward communication.
- A term to describe connecting multiple separate networks together.
- The process of storing a data file in several "chunks" or rather than in a single contiguous sequence of bits in one place on the storage medium.
- An unexpected and relatively small defect, fault, fault, or imperfection in an information system or device.
- A list of entities that are blocked or denied privileges.
- A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer Encryption the process of converting information or data into a code, especially to precent unauthorized access.
- A security incident in which sensitive, protected, or confidential information is accused, stolen, or disclosed without authorization.
- A cryptographic algorithm for encryption and decryption.
- A connection between two devices.
- A group of people authorized and organized to emulate a potential adversary's attack or exploitation capabilities against an enterprise's security posture.
19 Clues: A connection between two devices. • Whom someone or what something is. • The smallest unit of information storage. • A cryptographic algorithm for encryption and decryption. • A list of entities that are blocked or denied privileges. • the process of identifying and fixing vulnerabilities on a system. • ...
Tech, Trends, and Titans 2025-04-01
Across
- A celestial event where the moon blocks the sun, last seen in April 2024.
- A computing breakthrough that promises to revolutionize cybersecurity and problem-solving.
- The tech giant behind Facebook, Instagram, and its growing metaverse.
- OpenAI's 2025 AI tool that autonomously generates comprehensive reports by analyzing multiple online sources.
- A security essential that should be strong and frequently updated.
- Female country legend and philanthropist who helped fund the COVID-19 vaccine.
- Word used to describe viral topics on social media and news.
Down
- Essential for protecting businesses from modern digital threats.
- The rapidly evolving technology transforming industries through automation, deep learning, and generative models.
- Remote servers that store data online instead of locally.
- A critical software update that fixes security vulnerabilities.
- Celebrated on April 22 to promote environmental awareness.
- A cyber scam that tricks users into revealing sensitive information.
- Boxing champ turned entrepreneur, still known for his iconic grill.
- The season of new beginnings, blooming flowers, and warmer days.
- Month known for spring showers, tax deadlines, and pranks on the 1st.
16 Clues: Remote servers that store data online instead of locally. • Celebrated on April 22 to promote environmental awareness. • Word used to describe viral topics on social media and news. • A critical software update that fixes security vulnerabilities. • Essential for protecting businesses from modern digital threats. • ...
Cybersecurity Training Activity 2024-01-30
Across
- A software used to disable user access to their files until they pay the cybercriminal
- An extra layer of security on applications containing sensitive data
- A legislation that governs the handling of personal data(2 words and year)
- The field of encrypting information so only authorised people can access it
- When an individual or organisations private information is leaked(2 words)
- A framework outlining standards and best practices for cybersecurity
Down
- Where a cybercriminal gets access to your personal details and impersonates you to do malicious activities(2 words)
- A software used to harm computer systems or networks
- A regulatory body for cybersecurity
- A copy of sensitive data for redundancy to safeguard against cyber attacks
- Where cybercriminals trick you into giving them sensitive information.
11 Clues: A regulatory body for cybersecurity • A software used to harm computer systems or networks • An extra layer of security on applications containing sensitive data • A framework outlining standards and best practices for cybersecurity • Where cybercriminals trick you into giving them sensitive information. • ...
IELTS Writing Task 2 - Technology 2024-01-20
Cybersecurity Crossword 2020-09-25
Across
- a method that used to find out a password by monitoring traffic on a network to pull out information.
- Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
- A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage while asking for payment.
- An attack on targeted individuals to obtain sensitive, personal, and confidential data via email or fraudulent websites.
- A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.
- This allows users to connect the organization's protected network using multi-factor authentication.
- An individual or group posing a threat.
- A computer under the control of a remote attacker which has been infected with software or scripts to perform tasks on command.
Down
- A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- A technique used to manipulate and deceive people to gain sensitive and private information. These scams are built around how people think and act.
- The process of changing plaintext into ciphertext using a cryptographic algorithm and key.
- An audio or video clip that has been edited and manipulated to seem real or believable.
12 Clues: An individual or group posing a threat. • An audio or video clip that has been edited and manipulated to seem real or believable. • The process of changing plaintext into ciphertext using a cryptographic algorithm and key. • This allows users to connect the organization's protected network using multi-factor authentication. • ...
Cybersecurity Vocab 2021-12-09
Across
- any attack that takes advantage of vulnerabilities in applications, networks, operating systems, or hardware.
- an algebraic mathematical manipulation that attempts to reduce the complexity of the cryptographic algorithm.
- the attacker has access to pairs of known plaintexts and their corresponding ciphertexts.
Down
- a general term for when a perpetrator positions himself in a conversation between a user and an application
- tries to find two inputs producing the same hash value
- consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
- if we change a character of the plaintext, then several characters of the ciphertext should change
- convert (information or data) into a cipher or code, especially to prevent unauthorized access.
- each binary digit (bit) of the ciphertext should depend on several parts of the key, obscuring the connections between the two.
- a method in cryptography by which cryptographic keys are exchanged between two parties
- a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme.
- the art or process of deciphering coded messages without being told the key.
12 Clues: tries to find two inputs producing the same hash value • the art or process of deciphering coded messages without being told the key. • a method in cryptography by which cryptographic keys are exchanged between two parties • the attacker has access to pairs of known plaintexts and their corresponding ciphertexts. • ...
CYBERSECURITY CROSSWORD 2022-04-27
Across
- something in place to prevent an attack
- Data not modified
- a major weak link in security
- Record the identities and activities
- connect to a secure server
- study of techniques for secure communication
- Information kept private and secure
Down
- a weakness that can be exploited
- Systems available to those who need them
- packet capture tool
- Provide verification of identity
- tool used to scan for open ports
12 Clues: Data not modified • packet capture tool • connect to a secure server • a major weak link in security • a weakness that can be exploited • Provide verification of identity • tool used to scan for open ports • Information kept private and secure • Record the identities and activities • something in place to prevent an attack • Systems available to those who need them • ...
CyberSecurity Awareness. 2023-08-20
Across
- A combination of letters, numbers, and symbols used to access an account
- A type of malicious software that encrypts files and demands a ransom
- A set of rules and configurations that protect a computer system from unauthorized access
- A code that is generated by a mobile app and used for two-factor authentication
- Unauthorized access to computer systems
- A technique used to verify the identity of a user, often using a code sent to a phone
Down
- A computer security incident that occurs over a network
- Malicious email that appears to be from a legitimate source
- A program designed to replicate itself and spread to other computers
- The process of converting data into a secret code to prevent unauthorized access
- An attack that overwhelms a system with excessive traffic to make it unavailable
- The weakest link in cybersecurity, often targeted by attackers
12 Clues: Unauthorized access to computer systems • A computer security incident that occurs over a network • Malicious email that appears to be from a legitimate source • The weakest link in cybersecurity, often targeted by attackers • A program designed to replicate itself and spread to other computers • ...
Luca S game 2023-11-08
Unikum 2023-03-07
Across
- Unikum's regular arrangement
- equinox day and night
- activity for introduce people to each other
- image
- celebrating women's rights
- Unikums satire column
- animal with one horn on the nose
Down
- cabbage Norwegian National dish
- last edition front page
- IT study at UIA
- Tax haven
- daylight and night equally long
- webinar
13 Clues: image • webinar • Tax haven • IT study at UIA • equinox day and night • Unikums satire column • last edition front page • celebrating women's rights • Unikum's regular arrangement • daylight and night equally long • cabbage Norwegian National dish • animal with one horn on the nose • activity for introduce people to each other
Cyber ethics 2025-06-13
Across
- malicious hackers break system
- defending network and data
- fake email and information
- internet manner and behaviour
- coping without giving credit
- right and wrong online
- illegal activities using computer
- legal right to creation
Down
- protection against digital threat
- online harassment or threats
- right and wrong online
- traces left online
- contorl over personal data
- unauthorized system access
- sending unwanted bulk messeages
15 Clues: traces left online • right and wrong online • right and wrong online • legal right to creation • defending network and data • contorl over personal data • fake email and information • unauthorized system access • online harassment or threats • coping without giving credit • internet manner and behaviour • malicious hackers break system • sending unwanted bulk messeages • ...
Cyber Security 2024-02-20
Across
- Unsolicited bulk emails
- Deceptive email tactic
- Software for detecting and removing malware
- Harmful software
- Unauthorized access seeker
- Verification process
- Newly discovered vulnerability
- Secure data transmission protocol
- Secure network connection
- Network of infected computers controlled remotely
- Denial of Service attack
Down
- Malicious software demanding payment
- Weakness in a system's security
- Access code
- Network security barrier
- Identity verification using unique physical traits
- Protection of internet-connected systems and data
- Software update
- Data protection method
- Malware disguised as legitimate software
20 Clues: Access code • Software update • Harmful software • Verification process • Deceptive email tactic • Data protection method • Unsolicited bulk emails • Network security barrier • Denial of Service attack • Secure network connection • Unauthorized access seeker • Newly discovered vulnerability • Weakness in a system's security • Secure data transmission protocol • ...
Mateusz Suchocki Piotr Szabram 2023-05-29
Across
- - Online storage and computing
- -Secret phrase for authentication
- - Copy of data for safekeeping
- - Protection of computer systems
- - Wireless networking technology
- -Network security barrier
- - Connected group of devices
- - Identifying and fixing errors
- - Harmful software
- - Organized collection of information
Down
- -Set of rules or instructions
- - Data protection through coding
- - Device for forwarding data packets
- - Computer that provides services
- - Software for internet browsing
- - Self-replicating malicious code
- - Open-source operating system
- - Interaction between user and system
- - Language for building web pages
- - Object-oriented programming language
20 Clues: - Harmful software • -Network security barrier • - Connected group of devices • -Set of rules or instructions • - Online storage and computing • - Copy of data for safekeeping • - Open-source operating system • - Identifying and fixing errors • - Data protection through coding • - Software for internet browsing • - Protection of computer systems • - Wireless networking technology • ...
21 2025-02-08
Across
- Study of humans
- Machine that performs tasks
- Enhanced reality
- Organized data
- Study of language
- Study of government
- Physical computer parts
- Not physically existing
- Study of life
- Connected computers
- Study of Earth
- Set of instructions
- Study of ideas
- Intelligence in technology
- Study of space
Down
- Study of mind
- Study of technology
- Protecting digital systems
- Global network
- Programs for computers
- Imitation of real-world process
- Instructions for computers
- Study of society
- Write code
- Study of resources
25 Clues: Write code • Study of mind • Study of life • Global network • Organized data • Study of Earth • Study of ideas • Study of space • Study of humans • Enhanced reality • Study of society • Study of language • Study of resources • Study of technology • Study of government • Connected computers • Set of instructions • Programs for computers • Physical computer parts • Not physically existing • ...
What is AI 2024-04-02
11 Clues: AI benefit • Siri, Alexa • Netflix, Hulu • Text and images • improves algorithms • New solutions, ideas • Protect data breaches • Privacy concerns, bias • instructions that guide AI systems • Element that must always be a part of AI • Customized customer experience, efficiency
Teknologi Firza Insanudzaky 2023-07-28
Across
- Teknologi keamanan siber
- Teknologi nanoskala
- Reality Teknologi realitas maya
- Intelligence Teknologi cerdas
- Reality Teknologi realitas tambahan
Down
- of Things Teknologi perangkat terhubung
- Teknologi terdistribusi
- mobil listrik terkenal dari amerika
- Data Teknologi data besar
- Computing Teknologi komputasi awan
- Printing Teknologi cetak 3D
11 Clues: Teknologi nanoskala • Teknologi terdistribusi • Teknologi keamanan siber • Data Teknologi data besar • Printing Teknologi cetak 3D • Intelligence Teknologi cerdas • Reality Teknologi realitas maya • Computing Teknologi komputasi awan • mobil listrik terkenal dari amerika • Reality Teknologi realitas tambahan • of Things Teknologi perangkat terhubung
IT-bezogene Gegenstücke 2025-01-30
Across
- biometric authentication, similar to how unique fingerprints identify individuals
- in cybersecurity, unauthorized listening, similar to an ear picking up private conversations
- network - main connectivity infrastructure, like the spine supporting the body’s structure
- temporary storage to process data faster, like short-term memory for quick recall
- directs traffic, like veins carrying blood to different parts of the body
- tracking used in UX/UI analysis, akin to vision guiding movement and interaction
- a point of congestion in systems, comparable to a narrowed artery restricting blood flow
Down
- keeps the system standing and running, similar to a healthy body maintaining vitality
- for voice input and communication, like vocal cords enabling speech
- an exchange of standardized signals between devices in a computer network, like the mutual recognition of two individuals before a conversation
- a sequence of execution, like muscle fibers working together for coordinated action
- protective barrier, like skin in cybersecurity defending against external threats
- signal used in networking to check system status, like a pulse monitoring health
- stores session info, like taste memory helping us remember flavors
- rules for communication, like language facilitating understanding in conversations
15 Clues: stores session info, like taste memory helping us remember flavors • for voice input and communication, like vocal cords enabling speech • directs traffic, like veins carrying blood to different parts of the body • signal used in networking to check system status, like a pulse monitoring health • ...
IT-bezogene Gegenstücke 2025-01-30
Across
- biometric authentication, similar to how unique fingerprints identify individuals
- in cybersecurity, unauthorized listening, similar to an ear picking up private conversations
- network - main connectivity infrastructure, like the spine supporting the body’s structure
- temporary storage to process data faster, like short-term memory for quick recall
- directs traffic, like veins carrying blood to different parts of the body
- tracking used in UX/UI analysis, akin to vision guiding movement and interaction
- a point of congestion in systems, comparable to a narrowed artery restricting blood flow
Down
- keeps the system standing and running, similar to a healthy body maintaining vitality
- for voice input and communication, like vocal cords enabling speech
- an exchange of standardized signals between devices in a computer network, like the mutual recognition of two individuals before a conversation
- a sequence of execution, like muscle fibers working together for coordinated action
- protective barrier, like skin in cybersecurity defending against external threats
- signal used in networking to check system status, like a pulse monitoring health
- stores session info, like taste memory helping us remember flavors
- rules for communication, like language facilitating understanding in conversations
15 Clues: stores session info, like taste memory helping us remember flavors • for voice input and communication, like vocal cords enabling speech • directs traffic, like veins carrying blood to different parts of the body • signal used in networking to check system status, like a pulse monitoring health • ...
Corsework Crossword 2024-08-29
10 Clues: Reframe • I object! • Pitchercize • Richard Rumelt • Think, MIT Alumni • More money than God • Money! Money! Money! • What is today's costume? • Learning Ethics or bust! • The rep from Green Peace has a question
Cyber ethics 2025-06-13
Across
- malicious hackers break system
- defending network and data
- fake email and information
- internet manner and behaviour
- coping without giving credit
- right and wrong online
- illegal activities using computer
- legal right to creation
Down
- protection against digital threat
- online harassment or threats
- right and wrong online
- traces left online
- contorl over personal data
- unauthorized system access
- sending unwanted bulk messeages
15 Clues: traces left online • right and wrong online • right and wrong online • legal right to creation • defending network and data • contorl over personal data • fake email and information • unauthorized system access • online harassment or threats • coping without giving credit • internet manner and behaviour • malicious hackers break system • sending unwanted bulk messeages • ...
Transputec 2024-07-17
Across
- Dealing with audits as well as money-related issues
- The People team
- An thing that motivates you to work harder
- Brazil
- Where all deliveries come in and out
- Enlisting new people
- calculating salaries and payday
- personal holiday
Down
- Computer Department
- Communication method for calls in work
- CVMS
- climbing up the work ladder
- computer safety
- Company name
14 Clues: CVMS • Brazil • Company name • The People team • computer safety • personal holiday • Computer Department • Enlisting new people • climbing up the work ladder • calculating salaries and payday • Where all deliveries come in and out • Communication method for calls in work • An thing that motivates you to work harder • Dealing with audits as well as money-related issues
Cybersecurity Crossword Puzzle 2023-01-24
Across
- malware that makes you pay
- software to detect and destroy malware
- malware pretending to be useful
- software that tracks you
- tricking users to click links/images
- manipulated media
- criminals explpoiting network vulnerabilities
- scrambling data into unreadable text
Down
- software that checks for malware
- harmful software
- a shield for data
- malware that displays adverts
- attacks exploiting a vulnerability
- service that encrypts data while on WiFi
- multiple attackers preventing legitimate users
- attacks seeking out personal info
- a unique label for devices connected to the internet
- internet access at coffee shop
- network pro learning hacking techniques
19 Clues: harmful software • a shield for data • manipulated media • software that tracks you • malware that makes you pay • malware that displays adverts • internet access at coffee shop • malware pretending to be useful • software that checks for malware • attacks seeking out personal info • attacks exploiting a vulnerability • tricking users to click links/images • ...
Cybersecurity Crossword Puzzle 2025-09-21
Across
- A type of malware that is designed to look like a legitimate program in order to trick users into downloading it.
- The process of simplifying complex systems by focusing on essential features, hiding unnecessary details.
- A malicious program that can self-replicate and attach itself to other files.
- A symbol, typically '=', used in programming to assign a value to a variable.
- The practice of protecting computers, servers, mobile devices, and networks from malicious attacks.
- A value or variable that is passed to a function or method when it is called.
- A software that generates revenue by automatically displaying online advertisements.
- To verify the identity of a user or system.
Down
- A program or set of rules that protects a network by controlling incoming and outgoing traffic.
- An additional component or feature that can be added to a software program.
- A software program used to prevent, detect, and remove malware.
- CONTROL - A security process that controls and manages who is authorized to access certain resources.
- A malicious program that is designed to damage or gain unauthorized access to a computer system.
- The act of sending fraudulent emails in order to trick people into revealing personal information.
- The sum of all possible points where an unauthorized user can try to enter or extract data from a system.
- POISONING - A type of cyber attack that involves sending false ARP messages to redirect network traffic.
- A character encoding standard used to represent text in computers.
- A protocol used to translate IP addresses into MAC addresses.
- A collection of IP-to-MAC address mappings used to speed up network communication.
19 Clues: To verify the identity of a user or system. • A protocol used to translate IP addresses into MAC addresses. • A software program used to prevent, detect, and remove malware. • A character encoding standard used to represent text in computers. • An additional component or feature that can be added to a software program. • ...
Whats is Business Services? 2021-10-21
James Cyber safety crossword 2016-05-21
Across
- a small piece of information or chocolate chip
- computer villainy
- Search engine
- Request details
- group of friends
- this flickers in a fire
- Short cut to speed access
- email,junk mail you didn't ask for
Down
- Highlight your favourites
- keeping private information safe
- an on line talk with friends
- Unwanted advertising
- secret code
- burning bricks to protect you
- secret identity
- my up to date news
- a person who gains access without permission
- the flu is one of these
- Device that moves you curser
- unexpected ad
20 Clues: secret code • Search engine • unexpected ad • Request details • secret identity • group of friends • computer villainy • my up to date news • Unwanted advertising • this flickers in a fire • the flu is one of these • Highlight your favourites • Short cut to speed access • an on line talk with friends • Device that moves you curser • burning bricks to protect you • ...
Practice Cybersecurity Terminology Puzzle 2025-03-14
Across
- Data hostage for ransom
- Protection of networks from threats
- Update that fixes vulnerabilities
- Requires multiple identity proofs
- Information about cyber threats
- Malicious software that harms systems
- Encoding sensitive information
- Impersonation to obtain information
Down
- Vulnerability with no available patch
- Weakness in a system
- Distributed denial-of-service attack
- Verifying user identity
- Converting data into codes
- Longterm targeted cyberattack
- Secure internet connection
- Unauthorized access to systems
- Blocks unwanted traffic
- Software that detects malware
- Software that secretly monitors
- Continuous cybersecurity monitoring
20 Clues: Weakness in a system • Data hostage for ransom • Verifying user identity • Blocks unwanted traffic • Converting data into codes • Secure internet connection • Longterm targeted cyberattack • Software that detects malware • Unauthorized access to systems • Encoding sensitive information • Information about cyber threats • Software that secretly monitors • ...
Kaylie and Eli Sip and Solve 2025-08-31
Across
- The engagement location.
- Their high school mascot.
- Kaylie's favorite movie.
- Their favorite energy drink.
- Their favorite restaurant.
- Kaylie was Miss __ in 2023.
- Their first trip together.
- Eli's football number in high school.
- The name of Eli's childhood pet.
- Eli's middle name.
Down
- Kaylie's favorite singer
- Eli's favorite Christmas movie.
- Eli graduated in 2026 majoring in _.
- Eli's favorite cookie flavor.
- Eli's favorite sports team.
- Their first concert.
- First date location.
- Kaylie's favorite color.
- The month they started dating.
- The name of Kaylie's sorority.
20 Clues: Eli's middle name. • Their first concert. • First date location. • Kaylie's favorite singer • The engagement location. • Kaylie's favorite movie. • Kaylie's favorite color. • Their high school mascot. • Their favorite restaurant. • Their first trip together. • Eli's favorite sports team. • Kaylie was Miss __ in 2023. • Their favorite energy drink. • Eli's favorite cookie flavor. • ...
IEM Social Media Crossword Puzzle 2021-07-20
Across
- Focus FEMA’s newly released guidance
- IEM Senior Executive Advisor providing insight
- Connect with county leaders
- Hire a _____ Day
- rapidly spreading variant
- Celebrating Puerto Rico’s…
- MEDIA, Tool for public safety and emergency response
- IEM Spotlight
- July Heritage Month
- Practicing personal appreciation
Down
- The CISA, FBI, and the NSA published a Joint ____ Advisory
- Celebrating
- Conservation Day
- Summer heat brings increased risk
- Interns and System Administrator Day
- Beat the…
- Tropical Storm
- DAY, Holiday
- Have you made a family ____ plan?
- Hernando County, Florida
20 Clues: Beat the… • Celebrating • DAY, Holiday • IEM Spotlight • Tropical Storm • Conservation Day • Hire a _____ Day • July Heritage Month • Hernando County, Florida • rapidly spreading variant • Celebrating Puerto Rico’s… • Connect with county leaders • Practicing personal appreciation • Summer heat brings increased risk • Have you made a family ____ plan? • Focus FEMA’s newly released guidance • ...
IEM Social Media Crossword Puzzle 2021-07-20
Across
- Focus FEMA’s newly released guidance
- Beat the…
- Have you made a family ____ plan?
- MEDIA, Tool for public safety and emergency response
- Conservation Day
- Hernando County, Florida
- Tropical Storm
- Practicing personal appreciation
- Connect with county leaders
- July Heritage Month
- Give Something Away Day
- rapidly spreading variant
Down
- Celebrating Puerto Rico’s…
- DAY, Holiday
- Interns and System Administrator Day
- Summer heat brings increased risk
- The CISA, FBI, and the NSA published a Joint ____ Advisory
- Hire a _____ Day
- IEM Spotlight
- IEM Senior Executive Advisor providing insight
20 Clues: Beat the… • DAY, Holiday • IEM Spotlight • Tropical Storm • Conservation Day • Hire a _____ Day • July Heritage Month • Give Something Away Day • Hernando County, Florida • rapidly spreading variant • Celebrating Puerto Rico’s… • Connect with county leaders • Practicing personal appreciation • Summer heat brings increased risk • Have you made a family ____ plan? • ...
Wes Rich - CIS178 Week 3 Participation Cyber-Security Terms 2023-07-15
Across
- Protection against malicious programs.
- Malicious cyber attackers.
- Data protection through cryptography.
- Deceptive malicious software.
- Network of compromised computers.
- Deceptive online identity theft.
- Covert information-gathering software.
- Ethical cybersecurity professionals.
- Attack Network flooding disruption technique.
- Synthetic media manipulation technique.
Down
- Security breach exposes data.
- Tools Software for secure password storage.
- Secret codes for data protection.
- Harmful computer software.
- Unpatched software vulnerability exploitation.
- Network traffic filtering safeguard.
- Deceptive click manipulation technique.
- Online harassment and intimidation.
- Secure remote network access.
- Files held hostage for payment.
20 Clues: Malicious cyber attackers. • Harmful computer software. • Security breach exposes data. • Deceptive malicious software. • Secure remote network access. • Files held hostage for payment. • Deceptive online identity theft. • Secret codes for data protection. • Network of compromised computers. • Online harassment and intimidation. • Network traffic filtering safeguard. • ...
Chloe and Mick 2025-08-10
Across
- Location of proposal
- Number of Chloe's siblings
- Age Chloe and Mick met
- Number of apartments Chloe has lived in
- Where Chloe & Mick met
- Mick's favorite sport
- Month of proposal
- Mick's favorite flavor of Busch
- Chloe's middle name
- Mick's master degree
Down
- Mick's eye color
- Chloe's zodiac sign
- Favorite sport to play together
- What is their cats name?
- Their favorite food
- Their favorite place to eat
- Chloe's favorite color
- Location of their first date
- Mick's zodiac sign
- Star Wars droid on Chloe's keychain
20 Clues: Mick's eye color • Month of proposal • Mick's zodiac sign • Chloe's zodiac sign • Their favorite food • Chloe's middle name • Location of proposal • Mick's master degree • Mick's favorite sport • Age Chloe and Mick met • Where Chloe & Mick met • Chloe's favorite color • What is their cats name? • Number of Chloe's siblings • Their favorite place to eat • Location of their first date • ...
I + E 2024-01-23
Across
- Where Ingrid and Erik first met
- A country where Erik studied
- First concert
- Country they´ve visited the most
- Their first vacation together
- Erik´s job
- Their female cat
- Honeymoon destination
- Ingrid´s hobby
Down
- Where Erik grew up
- Number of countries they´ve visited together
- Their favourite trip together
- Where they got engaged
- Wedding venue
- Theo´s birthday month
- The street they used to live on
- Their male cat
- Where Ingrid studied abroad
- Ingrid´s first surname
- Their car
20 Clues: Their car • Erik´s job • Wedding venue • First concert • Their male cat • Ingrid´s hobby • Their female cat • Where Erik grew up • Theo´s birthday month • Honeymoon destination • Where they got engaged • Ingrid´s first surname • Where Ingrid studied abroad • A country where Erik studied • Their favourite trip together • Their first vacation together • Where Ingrid and Erik first met • ...
INFORMATIKA SEKARANG DAN MASA DEPAN 2025-08-26
Across
- Proses olah data jadi informasi
- Terjemahan Artificial Intelligence
- Data Kumpulan data sangat besar
- Perlindungan data digital
- Chatbot termasuk teknologi
- Terjemahan cloud computing
- Mobil pintar tanpa sopir
- Menggali pola dari data
- Algoritma belajar dari data
Down
- Cara sehat gunakan media digital
- Serangan pencuri data digital
- Mesin otomatis yang membantu manusia
- Dunia buatan imersif
- Jaringan global penghubung
- Kecerdasan buatan komputer
- Singkatan teknologi penghubung perangkat
- Kemampuan memahami dunia digital
- Teknologi yang bisa menyesuaikan
- Perangkat sensor terhubung jaringan
- Komunikasi antar mesin otomatis
20 Clues: Dunia buatan imersif • Menggali pola dari data • Mobil pintar tanpa sopir • Perlindungan data digital • Jaringan global penghubung • Kecerdasan buatan komputer • Chatbot termasuk teknologi • Terjemahan cloud computing • Algoritma belajar dari data • Serangan pencuri data digital • Proses olah data jadi informasi • Komunikasi antar mesin otomatis • Cara sehat gunakan media digital • ...
Lance and Ally 2025-07-20
Across
- Location of their first date
- Song Ally walked down the aisle to
- Lance's major in college
- Flavor of the wedding cake
- Ally's maiden name
- Name of the best man
- Ally's hometown
- Name of the maid of honor
- Lance's favorite color
- Number of years Ally and Lance have been together
Down
- Total number of siblings
- Their dog's name
- Name of the ring bearer
- Name of the flower girl
- Lance's favorite sports team
- Lance's hometown
- Lance's middle name
- Ally's profession
- Month Lance proposed
19 Clues: Ally's hometown • Their dog's name • Lance's hometown • Ally's profession • Ally's maiden name • Lance's middle name • Name of the best man • Month Lance proposed • Lance's favorite color • Name of the ring bearer • Name of the flower girl • Total number of siblings • Lance's major in college • Name of the maid of honor • Flavor of the wedding cake • Location of their first date • ...
Safe to Speed 2022-07-18
Across
- Without proper input _____, malicious actors can send a malicious input into your web application form to inject malicious code to extract sensitive data from your database.
- Performing threat _____ at the start of your project will give you insight into your system's risk profile.
- Systems infected by malicious actor can be used to partake in a _____. This allows the malicious actor to use your infected system to conduct attacks to achieve their goals.
Down
- _____ programs attempt to utilise your system's compute resource (Without your knowledge) to mine for cryptocurrencies.
- Regular review of _____ accounts ensures that no unauthorised users are misusing the accounts outside the bounds of the system owner's knowledge.
- Doing system _____ will ensure that your systems are protected from the most basic and common attacks.
- It's important to understand potential vendor's cybersecurity _____ to evaluate if they have both innovation and cybersecurity best practices in mind.
- Security _____ helps identify business logic flaws and bugs in your application code.
- This provides you with a simpler and balanced means of ensuring cybersecurity best practices during a proof of concept/value or minimum viable product stage.
- _____ are often leaked on public code repositories due to developers using loosely configured code repositories.
10 Clues: Security _____ helps identify business logic flaws and bugs in your application code. • Doing system _____ will ensure that your systems are protected from the most basic and common attacks. • Performing threat _____ at the start of your project will give you insight into your system's risk profile. • ...
Coding 2023-12-11
Across
- Identifying and fixing errors
- Step-by-step problem solving procedures
- Building apps for mobile devices
- Tracking changes and versions
- Writing clear explanations of code
- Learning new things continuously
Down
- Languages for human-computer communication
- Blocks of reusable code
- Unified coding environment
- Organizes code into objects
- Instructing the computer
- Basis of machine learning
- Making dynamic websites
- Principles for secure programs
- Managing the flow of a program
15 Clues: Blocks of reusable code • Instructing the computer • Making dynamic websites • Identifying and fixing errors • Organizes code into objects • Unified coding environment • Basis of machine learning • Principles for secure programs • Tracking changes and versions • Managing the flow of a program • Building apps for mobile devices • ...
IT-bezogene Gegenstücke 2025-01-30
Across
- biometric authentication, similar to how unique fingerprints identify individuals
- in cybersecurity, unauthorized listening, similar to an ear picking up private conversations
- network - main connectivity infrastructure, like the spine supporting the body’s structure
- temporary storage to process data faster, like short-term memory for quick recall
- directs traffic, like veins carrying blood to different parts of the body
- tracking used in UX/UI analysis, akin to vision guiding movement and interaction
- a point of congestion in systems, comparable to a narrowed artery restricting blood flow
Down
- keeps the system standing and running, similar to a healthy body maintaining vitality
- for voice input and communication, like vocal cords enabling speech
- an exchange of standardized signals between devices in a computer network, like the mutual recognition of two individuals before a conversation
- a sequence of execution, like muscle fibers working together for coordinated action
- protective barrier, like skin in cybersecurity defending against external threats
- signal used in networking to check system status, like a pulse monitoring health
- stores session info, like taste memory helping us remember flavors
- rules for communication, like language facilitating understanding in conversations
15 Clues: stores session info, like taste memory helping us remember flavors • for voice input and communication, like vocal cords enabling speech • directs traffic, like veins carrying blood to different parts of the body • signal used in networking to check system status, like a pulse monitoring health • ...
Cyber Security Crossword 2021-10-14
Across
- Do not accept trade orders via _____ or voicemail
- Require _______ confirmation for trade orders sent via email.
- Always use _______________ for all sensitive data on computers and removable media.
- Report Security Incidents to the ___________ Service Center x74357.
- “Do Your Part. #____________________.”
- Don't click on _________ links
- Report ___________ emails to the Cyber Threat Center (cyberthreat@raymondjames.com).
Down
- As part of the STOP.THINK.CONNECT.™ national public awareness ___________, CISA is also sharing Cybersecurity Awareness Month Resources to reduce cybersecurity risks and protect you online.
- ______________ is Cyber Security Awareness month.
- Type [_______] in the subject line of emails with sensitive data.
- PII stands for personally ____________ information
- Use a password of PIN to protect your mobile device. Have the device require a password after _________ minutes of inactivity.
- If you are unsure of the legitimacy of an email do not click on any links or open any _______________.
- Connect directly to the Raymond James ___________ only through wireless access points managed and configured by the ___________ Engineering Department.
- If you plan to enter a contract with a third-party or are changing your contract, please request a ______ assessment.
15 Clues: Don't click on _________ links • “Do Your Part. #____________________.” • ______________ is Cyber Security Awareness month. • Do not accept trade orders via _____ or voicemail • PII stands for personally ____________ information • Require _______ confirmation for trade orders sent via email. • Type [_______] in the subject line of emails with sensitive data. • ...
IT-bezogene Gegenstücke 2025-01-30
Across
- biometric authentication, similar to how unique fingerprints identify individuals
- in cybersecurity, unauthorized listening, similar to an ear picking up private conversations
- network - main connectivity infrastructure, like the spine supporting the body’s structure
- temporary storage to process data faster, like short-term memory for quick recall
- directs traffic, like veins carrying blood to different parts of the body
- tracking used in UX/UI analysis, akin to vision guiding movement and interaction
- a point of congestion in systems, comparable to a narrowed artery restricting blood flow
Down
- keeps the system standing and running, similar to a healthy body maintaining vitality
- for voice input and communication, like vocal cords enabling speech
- an exchange of standardized signals between devices in a computer network, like the mutual recognition of two individuals before a conversation
- a sequence of execution, like muscle fibers working together for coordinated action
- protective barrier, like skin in cybersecurity defending against external threats
- signal used in networking to check system status, like a pulse monitoring health
- stores session info, like taste memory helping us remember flavors
- rules for communication, like language facilitating understanding in conversations
15 Clues: stores session info, like taste memory helping us remember flavors • for voice input and communication, like vocal cords enabling speech • directs traffic, like veins carrying blood to different parts of the body • signal used in networking to check system status, like a pulse monitoring health • ...
Cybersecurity Crossword Puzzle 2024-09-25
Across
- Fraudulent attempts to steal sensitive information
- A tool that uses large language models to create authentic-looking text, pictures, or video. Can be used to create deepfakes
- What you should do with any suspicious communication!
- Online harassment or bullying
- Malware disguised as legitimate software
- Multi-Factor Authentication
- Virtual Private Network for secure connections
- Using AI to create a likeness of someone in video, voice, or picture
- Software update to fix security vulnerabilities
Down
- Investment scam involving fake accounts
- A phish sent by text
- Software that collects data secretly
- Self-replicating malware that spreads across networks
- Investment currency usually preferred in pig butchering scams
- Malware that encrypts files demanding ransom
- Factor showing how likely an associate will report versus click a phishing email
- Securing data by converting it into code
- A group very concerned with cyberbullying
18 Clues: A phish sent by text • Multi-Factor Authentication • Online harassment or bullying • Software that collects data secretly • Investment scam involving fake accounts • Malware disguised as legitimate software • Securing data by converting it into code • A group very concerned with cyberbullying • Malware that encrypts files demanding ransom • ...
Cybersecurity Crossword Puzzle 2023-01-24
Across
- malware that makes you pay
- software to detect and destroy malware
- malware pretending to be useful
- software that tracks you
- tricking users to click links/images
- manipulated media
- criminals explpoiting network vulnerabilities
- scrambling data into unreadable text
Down
- software that checks for malware
- harmful software
- a shield for data
- malware that displays adverts
- attacks exploiting a vulnerability
- service that encrypts data while on WiFi
- multiple attackers preventing legitimate users
- attacks seeking out personal info
- a unique label for devices connected to the internet
- internet access at coffee shop
- network pro learning hacking techniques
19 Clues: harmful software • a shield for data • manipulated media • software that tracks you • malware that makes you pay • malware that displays adverts • internet access at coffee shop • malware pretending to be useful • software that checks for malware • attacks seeking out personal info • attacks exploiting a vulnerability • tricking users to click links/images • ...
CYBERSECURITY 2021-11-08
Across
- Hastag for 2021 Q4 Manila Thanksgiving Town Hall
- DE&I Champion for Philippines and Bulgaria
- Vaccine brand used in the IM PH Vaccination Program
- Where to get a digital copy of your Covid-19 Vaccination certificate
Down
- Helps in centralizing reports and dashboards in one location
- FAME 2021 Edition
- 2021 IM PH Virtual Year End Party
7 Clues: FAME 2021 Edition • 2021 IM PH Virtual Year End Party • DE&I Champion for Philippines and Bulgaria • Hastag for 2021 Q4 Manila Thanksgiving Town Hall • Vaccine brand used in the IM PH Vaccination Program • Helps in centralizing reports and dashboards in one location • Where to get a digital copy of your Covid-19 Vaccination certificate
Cybersecurity 2024-03-13
Across
- Online service that allows users to connect remotely to another network.
- Servers that are accessed over the Internet, and databases that run on those servers.
- The process of proving the claimed identity of an individual user.
- Software or application that displays advertisements on your computer
Down
- Various of malicious software that damages your computer.
- Software used by hackers to spy on you and your computer activities.
- A network of computers used to carry out cyberattacks on other systems.
7 Clues: Various of malicious software that damages your computer. • The process of proving the claimed identity of an individual user. • Software used by hackers to spy on you and your computer activities. • Software or application that displays advertisements on your computer • A network of computers used to carry out cyberattacks on other systems. • ...
Cybersecurity 2025-03-08
7 Clues: Scam emails that trick users • Malware locks files for money • machines learning and thinking • Access granted to perform actions • Software that monitors for malware • Facial recognition to access phone • Harmful software that damages computers
Cybersecurity 2025-12-02
Across
- A security incident where sensitive, confidential, or personal information is accessed, stolen, or disclosed without authorization.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- The practice of protecting your digital world from cyber threats.
- Hackers send fake emails pretending to be a trusted source (like your bank), hoping you’ll click on a link or give them your personal info.
Down
- Stops unwanted traffic (like hackers) from getting into your system.
- A type of malicious software (malware) that encrypts a victim's files or locks their computer system, preventing them from accessing their data.
- Scrambles your sensitive data so that even if someone intercepts it, they can’t read it without the key to unlock it.
7 Clues: The practice of protecting your digital world from cyber threats. • Stops unwanted traffic (like hackers) from getting into your system. • Software designed to disrupt, damage, or gain unauthorized access to computer systems. • Scrambles your sensitive data so that even if someone intercepts it, they can’t read it without the key to unlock it. • ...
CYBERSECURITY 2015-03-25
Across
- ... device forensics roots began when mobile devices started to become popular, about 2000.
- Digital ... is used to capture volatile information from random access memory (RAM) and other running processes, including networks.
- ...are fast moving and increasing in number and severity.
Down
- ISACA publication Transforming ...
- Digital forensics scientific process: ...of custody.
- ...reasoning uses a series of specific pieces of information to extrapolate a broad conclusion.
- Implementing the NIST Cybersecurity Framework guide implements the CSF using ISACA’s ... 5 processes.
7 Clues: ISACA publication Transforming ... • Digital forensics scientific process: ...of custody. • ...are fast moving and increasing in number and severity. • ... device forensics roots began when mobile devices started to become popular, about 2000. • ...reasoning uses a series of specific pieces of information to extrapolate a broad conclusion. • ...
CYBERSECURITY 2025-04-06
Across
- a type of social engineering to steal user data
- protection of systems, networks, and programs from digital attacks
- an intrusive software developed by cybercriminals
Down
- weak places in the security system
- an unauthorized person who tries to gain access
- a computer data storage on servers in off-site locations is called … storage
- the use of numbers
7 Clues: the use of numbers • weak places in the security system • a type of social engineering to steal user data • an unauthorized person who tries to gain access • an intrusive software developed by cybercriminals • protection of systems, networks, and programs from digital attacks • a computer data storage on servers in off-site locations is called … storage
Cybersecurity 2021-12-30
CyberSecurity 2023-02-05
Across
- Spread through a network and use system resources for example to slow the network speed down.
- Malicious form of self-replicating software that can spread quickly on a computer network.
- Infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- Unwanted software that monitors and gathers information on a person and how they use their computer.
- A piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions. Name derives from the story of the Horse.
Down
- Locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- Malicious software is software that is designed to gain access to your computer with malicious intent.
7 Clues: Malicious form of self-replicating software that can spread quickly on a computer network. • Spread through a network and use system resources for example to slow the network speed down. • Unwanted software that monitors and gathers information on a person and how they use their computer. • ...
Cybersecurity 2025-08-19
7 Clues: The brain of the computer. • Harmful software programs. • A code used to lock or unlock accounts. • A person who breaks into computer systems. • Software that protects against online threats. • A harmful program that spreads and damages files. • Fake emails that trick you into giving personal information.
GoCIT Famous People in Cybersecurity 2025-04-10
Across
- The 'S' in RSA encryption and co-inventor of Shamir's Secret Sharing.
- The 'A' in RSA encryption; cryptography pioneer.
- Former Chief Security Officer at Facebook and vocal advocate for digital privacy.
- Pioneer of public key cryptography and co-creator of the Diffie-Hellman algorithm.
- The 'R' in RSA encryption; helped develop one of the most widely used encryption algorithms.
Down
- Discovered a major DNS vulnerability in 2008 that shook the internet.
- Real name of Mudge, testified to Congress about cybersecurity vulnerabilities.
- Cryptographer and author of "Applied Cryptography"; widely known security expert.
- Father of modern computing; his work laid the groundwork for cryptography and codebreaking.
- Once the world's most wanted hacker, later became a cybersecurity consultant.
10 Clues: The 'A' in RSA encryption; cryptography pioneer. • Discovered a major DNS vulnerability in 2008 that shook the internet. • The 'S' in RSA encryption and co-inventor of Shamir's Secret Sharing. • Once the world's most wanted hacker, later became a cybersecurity consultant. • Real name of Mudge, testified to Congress about cybersecurity vulnerabilities. • ...
Coursework Crossword 2024-08-21
10 Clues: Reframe • Pitchercize • Richard Rumelt • Ethics or bust! • Think, MTI Alumni • More money than God • Money! Money! Money! • What? Like its hard? • What is today's costume? • The rep from Green Peace has a question
Cybersecurity 2022-11-24
Across
- is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle
- software to defend the computer
- is a method of exchanging messages ("mail") between people using electronic devices.
- protection of computer systems and networks
Down
- data .....
- any software intentionally designed to cause disruption to a computer, server, client, or computer network
- synonym for nasty
7 Clues: data ..... • synonym for nasty • software to defend the computer • protection of computer systems and networks • is a method of exchanging messages ("mail") between people using electronic devices. • any software intentionally designed to cause disruption to a computer, server, client, or computer network • ...
Cybersecurity 2024-03-09
7 Clues: Scrambles data securely. • Protects systems from attacks. • Weakness that can be exploited • Verifies user or system identity. • Malicious software that disrupts. • Fraudulent emails to steal information. • Network security system that controls traffic.
Cybersecurity 2024-07-05
Across
- Threatens to publish or blocks access to data or a computer system
- Short for malicious software
- The practice of tricking Internet users through the use of deceptive email messages or websites
Down
- A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- A malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
- A type of malicious software, or malware, that spreads between computers and causes damage to data and software.
- A way of scrambling data so that only authorized parties can understand the information.
7 Clues: Short for malicious software • Threatens to publish or blocks access to data or a computer system • A way of scrambling data so that only authorized parties can understand the information. • The practice of tricking Internet users through the use of deceptive email messages or websites • ...
CyberSecurity 2023-02-05
Across
- Spread through a network and use system resources for example to slow the network speed down.
- Malicious form of self-replicating software that can spread quickly on a computer network.
- Infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- Unwanted software that monitors and gathers information on a person and how they use their computer.
- A piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions. Name derives from the story of the Horse.
Down
- Locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- Malicious software is software that is designed to gain access to your computer with malicious intent.
7 Clues: Malicious form of self-replicating software that can spread quickly on a computer network. • Spread through a network and use system resources for example to slow the network speed down. • Unwanted software that monitors and gathers information on a person and how they use their computer. • ...
Cybersecurity Cr0$$w0rd Puzz|3 2024-06-05
Across
- Horse
- Unsolicited emails
- Taking advantage of vulnerability
- Capture of data being transmitted
- Malicious software
- Challenge-response verification test
- Process that safeguards online assets
- Virtual perimeter around network
- Malicious code to harm victims
- Virtual secure corridor
- Deletion of all or part
- Dark web
Down
- Infectious malware that spreads
- Process to verify identity
- Bypasses security steps to gain access
- False or misleading information
- Malware that uses scare tactics
- Breach
- Fraudulent acquisition of user credentials
- Plain text into secret code
- Malicious program to extort money
21 Clues: Horse • Breach • Dark web • Unsolicited emails • Malicious software • Virtual secure corridor • Deletion of all or part • Process to verify identity • Plain text into secret code • Malicious code to harm victims • Infectious malware that spreads • False or misleading information • Malware that uses scare tactics • Virtual perimeter around network • Taking advantage of vulnerability • ...
Dandy & Nicole Wedding 2024-10-16
Across
- City where the couple had their 1st date
- Engagement Ring cut
- Dandy's fave K-pop group
- Nicole specialization as a Doctor
- 1st out of country
- Number of Graduation Attended
- The month Nicole officially became Dandy's Girlfriend
Down
- Dandy's Profession
- Favorite color of Dandy
- Number of mutual friend
- Name of their coffee shop
- Nicole's Profession
- 1st business together
- How long they are together
- Favorite concert attended
- 2nd TV appearance
16 Clues: 2nd TV appearance • Dandy's Profession • 1st out of country • Engagement Ring cut • Nicole's Profession • 1st business together • Favorite color of Dandy • Number of mutual friend • Dandy's fave K-pop group • Name of their coffee shop • Favorite concert attended • How long they are together • Number of Graduation Attended • Nicole specialization as a Doctor • ...
CYBERSECURITY 2022-03-01
Across
- transforming plaintext or cleartext into ciphertext
- Planning and maintaining organization safe in cyberspace
- used to prove one's identity, or authorize access to a resource
- malicious or ethical person who has knowledge and skill in analyzing program code or a computer system
Down
- practice of sending fraudulent messages that appear to come from a reputable source
- attaches itself with host file and replicates
- unwanted or unsolicited communications typically received via e-mail
7 Clues: attaches itself with host file and replicates • transforming plaintext or cleartext into ciphertext • Planning and maintaining organization safe in cyberspace • used to prove one's identity, or authorize access to a resource • unwanted or unsolicited communications typically received via e-mail • ...
Cybersecurity 2024-02-15
Across
- A technique used to trick individuals into revealing sensitive information
- The process of protecting computer systems, networks, and data from theft or damage
- A type of attack that floods a system or network with excessive traffic, causing it to become unavailable
Down
- The practice of verifying the identity of a user or system before granting access
- A program or device used to detect and prevent unauthorized access to a computer or network
- A secret code used to gain access to a computer system, network, or account
- A malicious program that self-replicates and spreads to other computers
7 Clues: A malicious program that self-replicates and spreads to other computers • A technique used to trick individuals into revealing sensitive information • A secret code used to gain access to a computer system, network, or account • The practice of verifying the identity of a user or system before granting access • ...
Cybersecurity 2024-11-28
Across
- device or node that connects to a network, such as a computer, smartphone, or IoT device, often targeted in cybersecurity attacks.
- secret or undocumented way of gaining access to a system or network, typically used for malicious purposes or as a debugging feature.
- the act of making something known or the fact that is made known
- (Movement)cybersecurity term referring to the act of moving through a network from one system to another after gaining initial access.
Down
- modify or adapt something (e.g., a device or software) for a different, often unintended, use—frequently associated with malicious intent in cybersecurity contexts.
- to avoid something by going around it
- type of attack that makes a system, service, or network unavailable by overwhelming it with a flood of requests or traffic.
7 Clues: to avoid something by going around it • the act of making something known or the fact that is made known • type of attack that makes a system, service, or network unavailable by overwhelming it with a flood of requests or traffic. • ...
Cybersecurity 2025-07-01
Across
- a computer data storage on servers in off-site locations
- protection of networks and programs from digital attacks
- a type of social engineering to steal data
- the use of numbers
- an intrusive software developed by criminals
Down
- weak places in the security system
- an unauthorized person trying to gain access
7 Clues: the use of numbers • weak places in the security system • a type of social engineering to steal data • an unauthorized person trying to gain access • an intrusive software developed by criminals • a computer data storage on servers in off-site locations • protection of networks and programs from digital attacks
Healthcare Cybersecurity & Technology 2025-06-04
Across
- Where the encryption keyword must be placed
- Attack technique where the sender pretends to be someone you trust
- Regulation that requires protection of patient information
- Protected Health Information that must be safeguarded
- Something that deviates from typical email behavior
- Beginning of the legitimate URL used for encrypted email messages
- Manipulation tactic used to trick users rather than exploit technology
- Automated handling step that helps analyze reported suspicious emails
Down
- Type of AI approach that focuses on how people normally communicate
- Legitimate but unwanted email that can be filtered out of your inbox
- Email encryption service used to protect sensitive information
- The action taken after a malicious email is identified
- A recipient outside the organization that triggers encryption requirements
- Keyword added to the subject line to send a secure email
- Common email-based attack that tries to steal information or credentials
- Email security platform that learns normal communication patterns to detect unusual messages
- Secure location where recipients may view encrypted messages
- The “normal” reference point used to spot suspicious email activity
18 Clues: Where the encryption keyword must be placed • Something that deviates from typical email behavior • Protected Health Information that must be safeguarded • The action taken after a malicious email is identified • Keyword added to the subject line to send a secure email • Regulation that requires protection of patient information • ...
Chapter 5&6 2025-11-22
Across
- USED IN CFAA CRITICISM (CATALYST) - ACTIVIST WHOSE PROSECUTION HIGHLIGHTED ARGUMENTS THAT CFAA IS OVERLY PUNITIVE
- VOLUNTARY FRAMEWORK FOR CRITICAL INFRASTRUCTURE CYBERSECURITY RISK MANAGEMENT
- INCENTIVIZED VULNERABILITY REPORTING THROUGH STRUCTURED COMPANY PROGRAMS
- INFORMATION PROTECTED UNDER THE EEA AND DTSA THAT MUST HAVE VALUE AND BE KEPT CONFIDENTIAL
- REQUIRED LEGAL CONNECTION BETWEEN ACCESS CIRCUMVENTION AND POSSIBLE INFRINGEMENT
- ONE OF ORIN KERR'S THEORIES - VIOLATES GENERAL SOCIETAL EXPECTATIONS OF COMPUTER USE
- LEAD AGENCY FOR ASSET RESPONSE, WHICH INCLUDES HELPING COMPANIES AND GOVERNMENTS PROTECT ASSETS AND MITIGATE HARMS
- ACTION PROHIBITED UNDER CFAA AND CENTRAL TO THE MORRIS WORM CASE
- INTERNATIONAL TREATY FOR CYBERCRIME INVESTIGATIONS
- ONE OF ORIN KERR'S THEORIES - VIOLATIONS VIA BYPASSING TECHNICAL CONTROLS
- 2015 FEDERAL LAW CREATING A LEGISLATIVE FRAMEWORK FOR IMPROVING U.S. CYBERSECURITY
Down
- LAW PREVENTING DOMAIN NAME SQUATTING
- PRIMARY FEDERAL STATUTE GOVERNING UNAUTHORIZED ACCESS
- MOST LITIGATED CFAA ISSUE - REQUIRES ACTIVE ACCESS, NOT PASSIVE RECEIPT
- ONE OF THE SEVEN PROHIBITED ACTS UNDER THE CFAA - USE OF HACKING TO OBTAIN CLASSIFIED/NATIONAL SECURITY INFORMATION
- 2016 LAW ENABLING COMPANIES TO SUE PRIVATELY FOR STOLEN TRADE SECRETS
- CFAA AND ESPIONAGE ACT CASE INVOLVING THEFT OF AEROSPACE TRADE SECRETS FOR CHINA (FORMAT: EXAMPLEVEXAMPLE
- ONE OF ORIN KERR'S THEORIES - VIOLATION ARISING FROM BREACHING AN AGREEMENT, POLICY, OR TERMS OF SERVICE
- RESTRICTS THE ABILITY OF INDIVIDUALS TO CIRCUMVENT ACCESS CONTROLS THAT PROTECT COPYRIGHTED MATERIAL.
- ONE OF THE FIVE PRINCIPLES IN THE NIST FRAMEWORK - IMPLEMENT SAFEGUARDS TO DELIVER SERVICES
20 Clues: LAW PREVENTING DOMAIN NAME SQUATTING • INTERNATIONAL TREATY FOR CYBERCRIME INVESTIGATIONS • PRIMARY FEDERAL STATUTE GOVERNING UNAUTHORIZED ACCESS • ACTION PROHIBITED UNDER CFAA AND CENTRAL TO THE MORRIS WORM CASE • 2016 LAW ENABLING COMPANIES TO SUE PRIVATELY FOR STOLEN TRADE SECRETS • MOST LITIGATED CFAA ISSUE - REQUIRES ACTIVE ACCESS, NOT PASSIVE RECEIPT • ...
ICT Crossword - Daniyarov Daniyar 2023-04-25
10 Clues: What is AI? • What is VR? • What is IoT? • What is ICT? • What is Wi-Fi? • What is cloud? • What is Internet? • What is programming? • What is cybersecurity? • What are examples of ICT tools?
Puzzle 2 2024-08-28
Across
- A method in project management that focuses on time-boxed sprints
- A secure way of verifying user identity, often using fingerprint or facial recognition
- The type of banking that exists entirely online, without physical branches
- Capgemini's exclusive global initiative for leveraging applied innovation?
- The interest rate that central banks charge commercial banks for short-term loans
- A significant global regulatory framework in banking, introduced post-2008 financial crisis
- The practice of protecting sensitive information from unauthorized access
- A common technique used in cybersecurity to disguise and protect information
Down
- A key regulatory compliance requirement for banks handling EU citizens' data
- A data-driven approach for managing customer relations
- A loan granted for the purchase of real estate, typically paid back with interest over time
- The approach used by Barclays to integrate sustainability into its operations
- The practice of transferring money between accounts, either manually or automatically
- The term for integrating AI into customer service to provide instant responses
- The global system for financial messaging used by banks to communicate securely
15 Clues: A data-driven approach for managing customer relations • A method in project management that focuses on time-boxed sprints • The practice of protecting sensitive information from unauthorized access • The type of banking that exists entirely online, without physical branches • Capgemini's exclusive global initiative for leveraging applied innovation? • ...
O‘zbekistonda axborot kommunikatsiya sohasini rivojlantirish yo‘nalishlari va qonunlar 2025-12-22
Across
- Elektron hukumat tizimi
- Yuqori tezlikdagi internet tarmog‘i
- Mahalliy IT kompaniyalar klasteri
- Innovatsion loyihalar va dasturlar
- Axborot xavfsizligini ta’minlash
Down
- Onlayn davlat xizmatlari
- Qonun va me’yoriy hujjatlar
- Telekommunikatsiya sohasini rivojlantirish
- Raqamli siyosat va strategiyalar
- Ma’lumotlarni himoya qilish
10 Clues: Elektron hukumat tizimi • Onlayn davlat xizmatlari • Qonun va me’yoriy hujjatlar • Ma’lumotlarni himoya qilish • Raqamli siyosat va strategiyalar • Axborot xavfsizligini ta’minlash • Mahalliy IT kompaniyalar klasteri • Innovatsion loyihalar va dasturlar • Yuqori tezlikdagi internet tarmog‘i • Telekommunikatsiya sohasini rivojlantirish
TTS EDISI: CODING 2025 2025-03-23
10 Clues: Tanah airku • Jenis durian • Jurusan Aldo • Tales of ... • Divisi paling rame • Jarak/massa, Sunway • Tongkrongan anak APU • "Bos! Teh ais ... satu" • Ungu berkaki 2, cedera rate 70% • Kelakuan tikus, "Semoga bendahara tidak melakukan ini"
Herts Experience 2023-11-07
9 Clues: Tagline • storytellers • How many schools? • medicine innovator • UH-UK campus location • Work in ethical hacking • Globally accredited degree • Work in rehabilitation centres • UH-GAF's latest programme additions in LMS
Cybersecurity 2020-08-21
Across
- It protects systems, networks, and programs from digital attacks.
- They are small files that some websites save on your computer. They store information about you, but they don't spy.
- A fraud that obtains users' private data from the Internet, especially to access their bank accounts.
- Someone who, with their technical knowledge, uses cyber attacks to break into computer systems.
Down
- They infect other files on the system with the intention of altering the functioning of your computer, without you noticing.
- An electronic device to store and process data; we use it a lot in quarantine.
- Unwanted email that you recieve, they are usually advertisements.
7 Clues: It protects systems, networks, and programs from digital attacks. • Unwanted email that you recieve, they are usually advertisements. • An electronic device to store and process data; we use it a lot in quarantine. • Someone who, with their technical knowledge, uses cyber attacks to break into computer systems. • ...
CYBERSECURITY 2022-03-01
Across
- transforming plaintext or cleartext into ciphertext.
- planning and maintaining organization safe in cyberspace.
- used to prove one's identity, or authorize access to a resource.
- malicious or ethical person who has knowledge and skill in analyzing program code or a computer system.
Down
- practice of sending fraudulent messages that appear to come from a reputable source.
- attaches itself with host file and replicates.
- unwanted or unsolicited communications typically received via e-mail.
7 Clues: attaches itself with host file and replicates. • transforming plaintext or cleartext into ciphertext. • planning and maintaining organization safe in cyberspace. • used to prove one's identity, or authorize access to a resource. • unwanted or unsolicited communications typically received via e-mail. • ...
Cybersecurity 2025-10-31
Across
- Strukturierter Aufbau von IT-Systemen mit Fokus auf Sicherheitsmaßnahmen.
- Welcher Begriff beschreibt die Verbindung von technischen und organisatorischen Sicherheitsmaßnahmen während des gesamten Fahrzeuglebenszyklus?
Down
- Simulierter Angriff zur Identifikation von Schwachstellen.
- Sicherheitsvorfall mit Auswirkungen auf Verfügbarkeit etc.
- Wie nennt sich die geplante Einführung von Updates während des Fahrzeugbetriebs?
- Schutz beim Systemstart vor Manipulationen (englisches Wort)
- Wird regelmäßig aktualisiert zur Bewertung neuer Gefahren
7 Clues: Wird regelmäßig aktualisiert zur Bewertung neuer Gefahren • Simulierter Angriff zur Identifikation von Schwachstellen. • Sicherheitsvorfall mit Auswirkungen auf Verfügbarkeit etc. • Schutz beim Systemstart vor Manipulationen (englisches Wort) • Strukturierter Aufbau von IT-Systemen mit Fokus auf Sicherheitsmaßnahmen. • ...
CyberSecurity 2025-09-17
7 Clues: Security Officer • MFA is Multi-Factor _ • social engineering scam • strong key word to access computers • The process of converting information into a code • Software designed to detect, prevent and remove malicious software • A type of malware that encrypts files, demanding a ransom for their decryption
Computer Puzzle game 2025-05-27
Across
- misusing personal information
- grooming online child abuse
- hoaxing or misleading
- illegal entry into computer
- deliberate manner of harassing
- frau illegal method to get money
- number consists of 8 digits
- disrupt normal function of computer
Down
- code only understand by computer
- process to protect network
- act of sen misleading email
- blocking unauthorised access
- criminal activity using internet
- adding binary numbers
- protect computer from virus
15 Clues: adding binary numbers • hoaxing or misleading • process to protect network • act of sen misleading email • grooming online child abuse • illegal entry into computer • protect computer from virus • number consists of 8 digits • blocking unauthorised access • misusing personal information • deliberate manner of harassing • code only understand by computer • ...
Cybersecurity Phishing 2023-06-14
Across
- type of phishing targeting a group or individual
- links, BLANK, or other attachments
- type of phishing over text
- a false sense of
- this plus misspellings indicates phishing
- most common way to phish
Down
- check for these
- type of phishing over phone/voice call
- most common social engineering attack
- type of phishing targeting C-suite
- never give this or your password
11 Clues: check for these • a false sense of • most common way to phish • type of phishing over text • never give this or your password • links, BLANK, or other attachments • type of phishing targeting C-suite • most common social engineering attack • type of phishing over phone/voice call • this plus misspellings indicates phishing • type of phishing targeting a group or individual
CyberSecurity-battaglia 2021-03-22
Across
- an electronic machine that calculates data very quickly, used for storing, writing, organizing, and sharing information
- the quality of being able to be trusted or believed
- the condition or state of being kept safe, damage, or loss
- used to describe websites that are safe and will not cause problems for your computer
Down
- the possibility of harm or death, or of something unpleasant happening
- a choice that you make about something after thinking about several possibilities
- not enjoyable or pleasant
- physical harm or damage to someone's body caused by an accident or an attack
- to try to hurt or defeat using violence
- an amount of something that is being kept for future use
- information in an electronic form that can be stored and processed by a computer
11 Clues: not enjoyable or pleasant • to try to hurt or defeat using violence • the quality of being able to be trusted or believed • an amount of something that is being kept for future use • the condition or state of being kept safe, damage, or loss • the possibility of harm or death, or of something unpleasant happening • ...
CyberSecurity-battaglia 2021-03-22
Across
- information in an electronic form that can be stored and processed by a computer
- an electronic machine that calculates data very quickly, used for storing, writing, organizing, and sharing information
- the quality of being able to be trusted or believed
- an amount of something that is being kept for future use
- the condition or state of being kept safe, damage, or loss
- the possibility of harm or death, or of something unpleasant happening
Down
- a choice that you make about something after thinking about several possibilities
- not enjoyable or pleasant
- used to describe websites that are safe and will not cause problems for your computer
- physical harm or damage to someone's body caused by an accident or an attack
- to try to hurt or defeat using violence
11 Clues: not enjoyable or pleasant • to try to hurt or defeat using violence • the quality of being able to be trusted or believed • an amount of something that is being kept for future use • the condition or state of being kept safe, damage, or loss • the possibility of harm or death, or of something unpleasant happening • ...
Cybersecurity Newsletter 2023-02-03
Across
- a malicious program that records the strokes on the keyboard to capture sensitive information
- Faith Healthcare's EHR solution for the clinics
- any malware that misleads users of its true intent
- any software intentionally designed to cause disruption to a computer.
- the psychological manipulation of people into performing actions or divulging confidential information
Down
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- an internal website used for sharing resources and information. In other words, FHC uses SharePoint as its ___.
- Time & attendance, payroll, and soon-to-be education is managed with this system
- a form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
- 4-letter abbreviation for protected health information (PHI) that is produced, saved, transferred or received in an electronic form.
11 Clues: Faith Healthcare's EHR solution for the clinics • any malware that misleads users of its true intent • any software intentionally designed to cause disruption to a computer. • Time & attendance, payroll, and soon-to-be education is managed with this system • a malicious program that records the strokes on the keyboard to capture sensitive information • ...
Cybersecurity Terms 2024-09-20
Across
- Unsolicited commercial email, junk mail.
- Small program that is timed to perform an operation on a system.
- A place where commands can be entered in Linux.
- Takes advantage of code flaws that have very recently been discovered.
- A program that blocks access until a ransom is paid.
Down
- Appears to be legitimate but really contains malicious code.
- Proving who you are so trust can be established.
- Software that installs advertisements on the PC in the form of toolbars or popups.
- Software that gathers data and forwards it without consent.
- Something you have.
- Files that appear to be legitimate programs, but really contain malicious code.
11 Clues: Something you have. • Unsolicited commercial email, junk mail. • A place where commands can be entered in Linux. • Proving who you are so trust can be established. • A program that blocks access until a ransom is paid. • Software that gathers data and forwards it without consent. • Appears to be legitimate but really contains malicious code. • ...
cybersecurity Crossword 2024-09-27
Across
- A person who tries to break into computers to find information or cause trouble.
- A special tool that helps keep your computer safe by blocking bad stuff from getting in
- A secret word or code you use to protect your accounts and keep them safe.
- A new version of software that makes it better or fixes problems, helping to keep your computer safe
- A type of software that secretly watches what you do on your computer without your permission.
- A harmful program that can make your computer sick, just like a virus can make you sick
- A way to change your information into a secret code so only the right people can read it.
Down
- Guess the word
- Short for "malicious software," it's a type of bad program that can hurt your computer or steal your information
- A trick where someone pretends to be someone else to steal your personal information, usually through fake emails.
- A process to check if you are who you say you are, often by using a password or a special code.
11 Clues: Guess the word • A secret word or code you use to protect your accounts and keep them safe. • A person who tries to break into computers to find information or cause trouble. • A special tool that helps keep your computer safe by blocking bad stuff from getting in • A harmful program that can make your computer sick, just like a virus can make you sick • ...
CyberSecurity Terms 2025-04-04
Across
- A great free password manager
- These emails try to get your credentials by creating a sense of urgency
- One of the top cybersecurity companies you can trust
- Regularly check for _______ on your computer or device
- Detects and removes harmful materials on your device
Down
- A great way to store your credentials would be using a ________ manager
- It's good to have a password length of at least ______
- Malware that can harm your computer
- Secures account through text/email/etc. (abbreviation)
- It's a good idea to ____ phishing or spam emails
- Good to empty every so often or recover deleted files in
11 Clues: A great free password manager • Malware that can harm your computer • It's a good idea to ____ phishing or spam emails • One of the top cybersecurity companies you can trust • Detects and removes harmful materials on your device • It's good to have a password length of at least ______ • Secures account through text/email/etc. (abbreviation) • ...
How well do you know Afia? 2024-04-15
Across
- volunteer's every sunday
- OG Co-admin for this Big WhatsApp groupchat
- Birth month
- Master's degree
- volunteer vest color that she wore everyday during Ramadan
- Age
Down
- Number of siblings she has (including herself)
- Frequently visits this Masjid
- Fiance's name
- Eldest sister's name
- Her cat's name
- Birth state
- Admin for this Big WhatsApp groupchat
13 Clues: Age • Birth state • Birth month • Fiance's name • Her cat's name • Master's degree • Eldest sister's name • volunteer's every sunday • Frequently visits this Masjid • Admin for this Big WhatsApp groupchat • OG Co-admin for this Big WhatsApp groupchat • Number of siblings she has (including herself) • volunteer vest color that she wore everyday during Ramadan
Cybersecurity Terms 2022-05-13
Across
- The practice of securing systems, networks, and technologies from attacks and unauthorized access
- A type of network security that filters incoming and outgoing traffic
- When a legitimate website’s traffic is redirected to a fake site for malicious purposes
- Disguising data so it’s impossible to decipher without authorization
Down
- Using a device to mine cryptocurrency, without the device owner’s knowledge or permission
- Sending emails with a forged sender address is called email...
- Malicious software designed to disrupt a computer, server, or network
- A chain of Internet-connected devices centrally controlled by a hacker
- Email that you’ve technically solicited but it may serve little to no purpose to you
- A tool that allows you to maintain online anonymity while using the Internet
- DKIM and DMARC are both examples of a standard email authentication...
11 Clues: Sending emails with a forged sender address is called email... • Disguising data so it’s impossible to decipher without authorization • Malicious software designed to disrupt a computer, server, or network • A type of network security that filters incoming and outgoing traffic • A chain of Internet-connected devices centrally controlled by a hacker • ...
Cybersecurity Crossword 2021-12-07
Across
- __ safeguards intended for the actual users
- IT firm that was subject of a Russian cyberattack
- always practice ____ password management to prevent against cyberattacks
- another work for SMS-based phishing
- __ safeguards intended for software and hardware
- process of preventing unauthorized access to IT systems
Down
- you can download ____ software to protect your devices
- cyberattack that demands a ransom payment
- name of criminal organization that hacked into the IT network of Colonial Pipeline
- this country was the subject of a Russian cyberattack in 2007
- most common form of cyberattack
11 Clues: most common form of cyberattack • another work for SMS-based phishing • cyberattack that demands a ransom payment • __ safeguards intended for the actual users • __ safeguards intended for software and hardware • IT firm that was subject of a Russian cyberattack • you can download ____ software to protect your devices • ...
cybersecurity 3 2024-05-07
Across
- raw facts
- taking data out of a computer
- device operating controlled instructions
- use mechanical operations to perform calculations
- a series of related
Down
- your history
- instructions waiting to be executed
- a notebook computer
- entering data into a computer
- the most powerful computer that performs trillions of calculations per second
- a stationary location with a computer on top
11 Clues: raw facts • your history • a notebook computer • a series of related • taking data out of a computer • entering data into a computer • instructions waiting to be executed • device operating controlled instructions • a stationary location with a computer on top • use mechanical operations to perform calculations • ...
Cybersecurity Awareness 2023-09-14
Across
- A piece of data from a website that is saved within a web browser and can be retrieved by the website at a later time
- Virtual Private Network
- A type of malicious software
- Fraudulent email that demands urgent action
- The manipulation of facial appearance through deep generative methods.
- The use of electronics to bully someone
Down
- Artificial intelligence
- The conversion of information or data into a code
- A part of the internet that isn't indexed by search engines
- An error, fault in a computer system
- Network security system
11 Clues: Artificial intelligence • Virtual Private Network • Network security system • A type of malicious software • An error, fault in a computer system • The use of electronics to bully someone • Fraudulent email that demands urgent action • The conversion of information or data into a code • A part of the internet that isn't indexed by search engines • ...
Cybersecurity Week! 2023-10-11
Across
- Software used to prevent, scan, detect and delete viruses from a computer.
- A type of cyber attack that exploits a vulnerability in software that no one is aware of yet.
- A piece of audio or video that has been altered and changed to make it seem authentic or credible.
- A type of malware designed to give hackers access to and control over a target device.
- A cyber-attack that targets individuals through SMS or text messages.
- Tools that can record every keystroke that you type into a computer or mobile keyboard.
Down
- A type of malware that disguises itself as legitimate code or software.
- Any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission.
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
- A technique through which a cybercriminal disguises themselves as a known or trusted source.
- A network of compromised computers used to carry out cyberattacks on other systems.
11 Clues: A cyber-attack that targets individuals through SMS or text messages. • A type of malware that disguises itself as legitimate code or software. • Software used to prevent, scan, detect and delete viruses from a computer. • A network of compromised computers used to carry out cyberattacks on other systems. • ...
Pink October 2019-10-16
Across
- color for october
- Health Examination
- Data leak
- Celebration of years a significant event occurred
- Tissue cells hyper-proliferation
- ISO-certified
- Security measure to protect your data
- Evidence of authentication
- No Bra Day
Down
- File or program used to harm computers
- An example of CyberCrime
- Files/ data safety
- Day to promote Breast cancer Awareness
- Principle for measure of quality
- Associated with malicious attacks
- Breast cancer awareness period
- Symbol for breast cancer support
- Responsible for standard accreditation
- Breast cancer Victims
19 Clues: Data leak • No Bra Day • ISO-certified • color for october • Health Examination • Files/ data safety • Breast cancer Victims • An example of CyberCrime • Evidence of authentication • Breast cancer awareness period • Principle for measure of quality • Tissue cells hyper-proliferation • Symbol for breast cancer support • Associated with malicious attacks • ...
Guilfordian Print Issue 18 2023-05-02
Across
- A popular short-form social media platform under scrutiny by the US government
- an acronym used to describe a wide range of queer and trans individuals
- The name of a firelord and main antagonist of Avatar: The Last Airbender
- A cybersecurity company that released data on cybersecurity insurance for colleges
- The namesake character of a TV show that has been running since 1999 and has around 280 episodes
- A youtuber who gained popularity through his FNAF playthroughs
- The month with a nickname of “madness” that is famous for basketball
- The person that Miles Kirkpatrick didn’t want to anger when talking about philosophy
Down
- The name of the most hated social media platform of Guilford College (by poll)
- Guilford College’s rival during the Soup Bowl
- A sport played by throwing a disc, usually plastic, to another person
- The country that Studio Ghibli is based in
- The name of the closest black hole to earth, also the name of the Primordial Greek Goddess of the Earth
- The sport played by Portia Star Jones, and in which Guilford College is part of the NCAA Emerging Pathway
14 Clues: The country that Studio Ghibli is based in • Guilford College’s rival during the Soup Bowl • A youtuber who gained popularity through his FNAF playthroughs • The month with a nickname of “madness” that is famous for basketball • A sport played by throwing a disc, usually plastic, to another person • ...
TTS TIK Neysha 8D 2025-10-11
Across
- program yang ada di komputer
- perangkat lunak yang merusak sistem
- perlindungan terhadap ancaman digital yang ada
- menyalakan ulang komputer
- proses mematikan komputer
- memasukkan akun ke sistem
- otak komputer yang memproses data
- jalan pintas menuju program/file
Down
- kondisi dimana perangkat tidak merespon secara permanen
- tempat penyimpanan data
- Malware yang bisa menyebar dan merusak data
- pengguna komputer/perangkat
- salinan data
- tempat penyimpanan file
- alamat web
15 Clues: alamat web • salinan data • tempat penyimpanan data • tempat penyimpanan file • menyalakan ulang komputer • proses mematikan komputer • memasukkan akun ke sistem • pengguna komputer/perangkat • program yang ada di komputer • jalan pintas menuju program/file • otak komputer yang memproses data • perangkat lunak yang merusak sistem • Malware yang bisa menyebar dan merusak data • ...
TTS TIK Neysha 8D 2025-10-11
Across
- program yang ada di komputer
- perangkat lunak yang merusak sistem
- perlindungan terhadap ancaman digital yang ada
- menyalakan ulang komputer
- proses mematikan komputer
- memasukkan akun ke sistem
- otak komputer yang memproses data
- jalan pintas menuju program/file
Down
- kondisi dimana perangkat tidak merespon secara permanen
- tempat penyimpanan data
- Malware yang bisa menyebar dan merusak data
- pengguna komputer/perangkat
- salinan data
- tempat penyimpanan file
- alamat web
15 Clues: alamat web • salinan data • tempat penyimpanan data • tempat penyimpanan file • menyalakan ulang komputer • proses mematikan komputer • memasukkan akun ke sistem • pengguna komputer/perangkat • program yang ada di komputer • jalan pintas menuju program/file • otak komputer yang memproses data • perangkat lunak yang merusak sistem • Malware yang bisa menyebar dan merusak data • ...
Technology Through Time 2025-02-13
11 Clues: Banned. • Creative. • Fake Brain. • New technology. • How we access Google. • The unit we are doing. • Protects people online. • Spider's home and a place. • A device used to carry out a function. • Something you bring to school everyday. • Something that uses resources effectively.
Save Our Systems!!! 2020-11-28
Across
- Yes, it’s you alright!
- Cyberworld vaccine
- Trust me, I’ll ruin you!
- Internet’s most wanted
- A web assault?
- Alphanumeric, symbols & 8 spaces long
- Help, Support, Copy
- Flaming barrier
Down
- You are the bait here!
- A scary lot of viruses, worms, trojan horses, wipers
- For my eyes only/What’s mine stays mine
- Data protection and privacy law
- Scrambled data
- Online Safety
14 Clues: Online Safety • Scrambled data • A web assault? • Flaming barrier • Cyberworld vaccine • Help, Support, Copy • You are the bait here! • Yes, it’s you alright! • Internet’s most wanted • Trust me, I’ll ruin you! • Data protection and privacy law • Alphanumeric, symbols & 8 spaces long • For my eyes only/What’s mine stays mine • A scary lot of viruses, worms, trojan horses, wipers
tzrtzrt 2023-07-11
CYBER AND DIGITAL LITERALLY 2024-04-30
Across
- Principles and guidelines governing the ethical use and behavior in the digital realm, including respect for privacy, intellectual property, and online communities.
- Measures and precautions taken to protect digital devices, networks, and data from unauthorized access, use, or exploitation.
- Knowledge and understanding of information security risks, policies, and best practices among individuals and organizations.
- Deceptive schemes or frauds conducted through the internet, often aimed at tricking individuals into providing money or sensitive information.
- The unauthorized access, disclosure, or acquisition of sensitive or confidential information, often resulting in potential harm or exploitation.
- Practices and measures taken to protect sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction.
- The process of converting data into a code to prevent unauthorized access, ensuring confidentiality and privacy.
- Best practices and habits for maintaining good cybersecurity posture, including updating software, using strong passwords, and being cautious online.
- The rights and freedoms individuals have in the digital world, including privacy, freedom of expression, and access to information.
- The protection of personal information and data from unauthorized access, use, or disclosure, ensuring individuals' control over their own information.
- The protection of personal information and data shared on the internet from unauthorized access, use, or exploitation.
- Forms of media content that are created, distributed, and consumed digitally, including text, images, audio, and video.
- Malicious software that replicates itself and infects computer systems, causing harm to files, programs, and overall system performance.
- Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks.
- Deceptive attempts to obtain sensitive information, such as usernames, passwords, or financial details, by posing as a trustworthy entity in electronic communication.
- A type of cyber attack where fraudulent emails, messages, or websites are used to trick individuals into providing sensitive information such as passwords or financial details.
- The ability to effectively navigate, evaluate, and use digital technologies and information sources for communication, learning, and productivity.
- The representation of an individual's identity in an online or digital context, including personal information, preferences, and interactions.
- The responsible and ethical use of technology, including understanding one's rights and responsibilities in the digital world.
- Psychological manipulation techniques used by attackers to deceive individuals or employees into divulging confidential information or performing actions that compromise security.
- Strategies, technologies, and practices employed to protect computer systems, networks, and data from cyber threats and attacks.
- Habits, behaviors, and routines aimed at maintaining good cybersecurity posture and minimizing risks, such as updating software, using strong passwords, and being cautious online.
- Practices and tools used to protect against threats and maintain privacy while accessing websites and online content.
- Proficiencies and abilities required to effectively navigate, evaluate, and utilize digital technologies, tools, and information.
Down
- Programs, courses, and initiatives aimed at raising awareness and educating individuals and communities about cybersecurity risks, best practices, and skills.
- Practices and precautions taken to protect oneself from potential risks and dangers encountered on the internet.
- The global network of interconnected computers that allows for the exchange of data and communication.
- Online platforms and websites that enable users to create, share, and interact with content and connect with others.
- The ability of individuals, organizations, and systems to withstand, adapt to, and recover from cyber threats, attacks, and disruptions.
- Deceptive or dishonest activities conducted over the internet with the intention of gaining financial or personal benefit at the expense of others.
- Legal frameworks and regulations governing activities, behavior, and transactions conducted in cyberspace, including privacy, intellectual property, and cybersecurity laws.
- The ability to identify, evaluate, and effectively use information from various sources, including digital and online resources.
- The fraudulent acquisition and use of someone else's personal information for financial gain or other malicious purposes.
- Criminal activities carried out using computers, networks, or digital devices, such as hacking, fraud, or identity theft.
- Valuable resources and properties stored or represented in digital form, including data, documents, media files, and virtual currencies.
- Authentication A security process that requires users to provide two different forms of identification to verify their identity, typically a password and a temporary code sent to a mobile device.
- Potential dangers and risks posed by malicious actors, vulnerabilities, and security weaknesses in computer systems and networks.
- The perception and impression that individuals or entities have based on their activities, behavior, and interactions conducted online.
- The exchange of information, ideas, and messages using digital technologies and platforms, such as email, social media, and instant messaging.
- Measures and practices implemented to protect computer systems, networks, and data from cyber threats, attacks, and vulnerabilities.
- Information and analysis about potential and emerging cyber threats, vulnerabilities, and actors, used to inform cybersecurity decision-making and defenses.
- Unsolicited or unwanted electronic messages, typically sent in bulk, often for commercial or fraudulent purposes.
- Secret codes or phrases used to authenticate a user's identity and grant access to a computer system, network, or online account.
- Measures and safeguards implemented to secure sensitive or confidential data from unauthorized access, use, or disclosure.
- The trail of data left behind by interactions in a digital environment, including online activities, communications, and transactions.
- Bullying behavior that occurs online or through digital devices, such as harassment, threats, or spreading rumors.
- Malicious actions or operations launched against computer systems, networks, or digital infrastructure with the intent of causing harm, disruption, or damage.
- Knowledge and understanding of cybersecurity risks, threats, and best practices among individuals and organizations.
- Competencies and abilities required to effectively navigate, utilize, and create digital technologies and resources for various purposes.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, protecting against unauthorized access and threats.
50 Clues: The global network of interconnected computers that allows for the exchange of data and communication. • Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks. • Practices and precautions taken to protect oneself from potential risks and dangers encountered on the internet. • ...
Envision Crossword 3 2023-12-05
Across
- - Structured data collection.
- - Technology at molecular scale.
- - Translates code to machine language.
- - Network security barrier.
Down
- - Protecting digital systems.
- - Physical computer parts.
- - Open-source OS.
- - Securing data through algorithms.
- - Language for web page creation.
- - Function calling itself.
10 Clues: - Open-source OS. • - Physical computer parts. • - Function calling itself. • - Network security barrier. • - Protecting digital systems. • - Structured data collection. • - Technology at molecular scale. • - Language for web page creation. • - Securing data through algorithms. • - Translates code to machine language.
Harper Cybersecurity Review 2024-03-05
Across
- software we use to protect your laptop
- phishing attack thorough voice or phone call
- our email filter system
- #1 threat to our security
- usual media that a phish comes to
- type of request that is weird
- tactic that a phisher uses
- social media site where phisher researches
- phishing attack through text message
- used in phishing attack called Quishing
Down
- where people write the Wifi password
- public charging station stealing your info
- used for remote access
- authentication for VPN access
- Information Security is everyone's
- 12 or more characters
- site where you can scan your own attachments
17 Clues: 12 or more characters • used for remote access • our email filter system • #1 threat to our security • tactic that a phisher uses • authentication for VPN access • type of request that is weird • usual media that a phish comes to • Information Security is everyone's • where people write the Wifi password • phishing attack through text message • ...
GC-CYBERSECURITY 2022-05-19
Across
- A piece of malicious code that encrypts files so the user can not access them until they pay.
- A piece of malicious code that is downloaded by pretending to be a useful piece of code
- Malicious code can be transferred from one computer to another using physical devices such as a _ _ _ _ _ _ _ _
- Old software and hardware may contain vulnerabilities that a hacker can e _ _ _ _ _ _ to gain access to a device.
- A piece of malicious code used to damage computers or steal data
- A hacker intercepts and steals data.
- Emails sent that appear to come from a legitimate organisation but links within the mail may install malicious code.
Down
- hackers attempt every posiible combination of characters to find a password
- A piece of malicious code. It infects computers by being downloaded within files.
- social ____________. Manipulating users into sharing their data.
- A common way to infect a computer with malicious code is to _ _ _ _ _ _ it from the internet or by clicking on suspicious links in mail.
11 Clues: A hacker intercepts and steals data. • A piece of malicious code used to damage computers or steal data • social ____________. Manipulating users into sharing their data. • hackers attempt every posiible combination of characters to find a password • A piece of malicious code. It infects computers by being downloaded within files. • ...
Cybersecurity Week 2022-10-14
Across
- a service that creates a secure tunnel between your device and the internet
- a malicious software that spreads from one computer to another
- the process of verifying a users identity
- malicious code or software
Down
- taking readable plaintext, and converting it into ciphertext
- when attackers send malicious emails to trick people into a scam
- a software update that fixes bugs or updates security
- a security technique that requires multiple methods of authentication
- a malware that encrypts user data, and requires payment to get back
- a secret word or phrase that must be used to gain access to something
- a network security device that monitors traffic to or from your network
11 Clues: malicious code or software • the process of verifying a users identity • a software update that fixes bugs or updates security • taking readable plaintext, and converting it into ciphertext • a malicious software that spreads from one computer to another • when attackers send malicious emails to trick people into a scam • ...
