cybersecurity Crossword Puzzles
Transputec 2024-07-17
Across
- Dealing with audits as well as money-related issues
- The People team
- An thing that motivates you to work harder
- Brazil
- Where all deliveries come in and out
- Enlisting new people
- calculating salaries and payday
- personal holiday
Down
- Computer Department
- Communication method for calls in work
- CVMS
- climbing up the work ladder
- computer safety
- Company name
14 Clues: CVMS • Brazil • Company name • The People team • computer safety • personal holiday • Computer Department • Enlisting new people • climbing up the work ladder • calculating salaries and payday • Where all deliveries come in and out • Communication method for calls in work • An thing that motivates you to work harder • Dealing with audits as well as money-related issues
Cyber ethics 2025-06-13
Across
- malicious hackers break system
- defending network and data
- fake email and information
- internet manner and behaviour
- coping without giving credit
- right and wrong online
- illegal activities using computer
- legal right to creation
Down
- protection against digital threat
- online harassment or threats
- right and wrong online
- traces left online
- contorl over personal data
- unauthorized system access
- sending unwanted bulk messeages
15 Clues: traces left online • right and wrong online • right and wrong online • legal right to creation • defending network and data • contorl over personal data • fake email and information • unauthorized system access • online harassment or threats • coping without giving credit • internet manner and behaviour • malicious hackers break system • sending unwanted bulk messeages • ...
IEM Social Media Crossword Puzzle 2021-07-20
Across
- Focus FEMA’s newly released guidance
- IEM Senior Executive Advisor providing insight
- Connect with county leaders
- Hire a _____ Day
- rapidly spreading variant
- Celebrating Puerto Rico’s…
- MEDIA, Tool for public safety and emergency response
- IEM Spotlight
- July Heritage Month
- Practicing personal appreciation
Down
- The CISA, FBI, and the NSA published a Joint ____ Advisory
- Celebrating
- Conservation Day
- Summer heat brings increased risk
- Interns and System Administrator Day
- Beat the…
- Tropical Storm
- DAY, Holiday
- Have you made a family ____ plan?
- Hernando County, Florida
20 Clues: Beat the… • Celebrating • DAY, Holiday • IEM Spotlight • Tropical Storm • Conservation Day • Hire a _____ Day • July Heritage Month • Hernando County, Florida • rapidly spreading variant • Celebrating Puerto Rico’s… • Connect with county leaders • Practicing personal appreciation • Summer heat brings increased risk • Have you made a family ____ plan? • Focus FEMA’s newly released guidance • ...
IEM Social Media Crossword Puzzle 2021-07-20
Across
- Focus FEMA’s newly released guidance
- Beat the…
- Have you made a family ____ plan?
- MEDIA, Tool for public safety and emergency response
- Conservation Day
- Hernando County, Florida
- Tropical Storm
- Practicing personal appreciation
- Connect with county leaders
- July Heritage Month
- Give Something Away Day
- rapidly spreading variant
Down
- Celebrating Puerto Rico’s…
- DAY, Holiday
- Interns and System Administrator Day
- Summer heat brings increased risk
- The CISA, FBI, and the NSA published a Joint ____ Advisory
- Hire a _____ Day
- IEM Spotlight
- IEM Senior Executive Advisor providing insight
20 Clues: Beat the… • DAY, Holiday • IEM Spotlight • Tropical Storm • Conservation Day • Hire a _____ Day • July Heritage Month • Give Something Away Day • Hernando County, Florida • rapidly spreading variant • Celebrating Puerto Rico’s… • Connect with county leaders • Practicing personal appreciation • Summer heat brings increased risk • Have you made a family ____ plan? • ...
Wes Rich - CIS178 Week 3 Participation Cyber-Security Terms 2023-07-15
Across
- Protection against malicious programs.
- Malicious cyber attackers.
- Data protection through cryptography.
- Deceptive malicious software.
- Network of compromised computers.
- Deceptive online identity theft.
- Covert information-gathering software.
- Ethical cybersecurity professionals.
- Attack Network flooding disruption technique.
- Synthetic media manipulation technique.
Down
- Security breach exposes data.
- Tools Software for secure password storage.
- Secret codes for data protection.
- Harmful computer software.
- Unpatched software vulnerability exploitation.
- Network traffic filtering safeguard.
- Deceptive click manipulation technique.
- Online harassment and intimidation.
- Secure remote network access.
- Files held hostage for payment.
20 Clues: Malicious cyber attackers. • Harmful computer software. • Security breach exposes data. • Deceptive malicious software. • Secure remote network access. • Files held hostage for payment. • Deceptive online identity theft. • Secret codes for data protection. • Network of compromised computers. • Online harassment and intimidation. • Network traffic filtering safeguard. • ...
Chloe and Mick 2025-08-10
Across
- Location of proposal
- Number of Chloe's siblings
- Age Chloe and Mick met
- Number of apartments Chloe has lived in
- Where Chloe & Mick met
- Mick's favorite sport
- Month of proposal
- Mick's favorite flavor of Busch
- Chloe's middle name
- Mick's master degree
Down
- Mick's eye color
- Chloe's zodiac sign
- Favorite sport to play together
- What is their cats name?
- Their favorite food
- Their favorite place to eat
- Chloe's favorite color
- Location of their first date
- Mick's zodiac sign
- Star Wars droid on Chloe's keychain
20 Clues: Mick's eye color • Month of proposal • Mick's zodiac sign • Chloe's zodiac sign • Their favorite food • Chloe's middle name • Location of proposal • Mick's master degree • Mick's favorite sport • Age Chloe and Mick met • Where Chloe & Mick met • Chloe's favorite color • What is their cats name? • Number of Chloe's siblings • Their favorite place to eat • Location of their first date • ...
I + E 2024-01-23
Across
- Where Ingrid and Erik first met
- A country where Erik studied
- First concert
- Country they´ve visited the most
- Their first vacation together
- Erik´s job
- Their female cat
- Honeymoon destination
- Ingrid´s hobby
Down
- Where Erik grew up
- Number of countries they´ve visited together
- Their favourite trip together
- Where they got engaged
- Wedding venue
- Theo´s birthday month
- The street they used to live on
- Their male cat
- Where Ingrid studied abroad
- Ingrid´s first surname
- Their car
20 Clues: Their car • Erik´s job • Wedding venue • First concert • Their male cat • Ingrid´s hobby • Their female cat • Where Erik grew up • Theo´s birthday month • Honeymoon destination • Where they got engaged • Ingrid´s first surname • Where Ingrid studied abroad • A country where Erik studied • Their favourite trip together • Their first vacation together • Where Ingrid and Erik first met • ...
INFORMATIKA SEKARANG DAN MASA DEPAN 2025-08-26
Across
- Proses olah data jadi informasi
- Terjemahan Artificial Intelligence
- Data Kumpulan data sangat besar
- Perlindungan data digital
- Chatbot termasuk teknologi
- Terjemahan cloud computing
- Mobil pintar tanpa sopir
- Menggali pola dari data
- Algoritma belajar dari data
Down
- Cara sehat gunakan media digital
- Serangan pencuri data digital
- Mesin otomatis yang membantu manusia
- Dunia buatan imersif
- Jaringan global penghubung
- Kecerdasan buatan komputer
- Singkatan teknologi penghubung perangkat
- Kemampuan memahami dunia digital
- Teknologi yang bisa menyesuaikan
- Perangkat sensor terhubung jaringan
- Komunikasi antar mesin otomatis
20 Clues: Dunia buatan imersif • Menggali pola dari data • Mobil pintar tanpa sopir • Perlindungan data digital • Jaringan global penghubung • Kecerdasan buatan komputer • Chatbot termasuk teknologi • Terjemahan cloud computing • Algoritma belajar dari data • Serangan pencuri data digital • Proses olah data jadi informasi • Komunikasi antar mesin otomatis • Cara sehat gunakan media digital • ...
James Cyber safety crossword 2016-05-21
Across
- a small piece of information or chocolate chip
- computer villainy
- Search engine
- Request details
- group of friends
- this flickers in a fire
- Short cut to speed access
- email,junk mail you didn't ask for
Down
- Highlight your favourites
- keeping private information safe
- an on line talk with friends
- Unwanted advertising
- secret code
- burning bricks to protect you
- secret identity
- my up to date news
- a person who gains access without permission
- the flu is one of these
- Device that moves you curser
- unexpected ad
20 Clues: secret code • Search engine • unexpected ad • Request details • secret identity • group of friends • computer villainy • my up to date news • Unwanted advertising • this flickers in a fire • the flu is one of these • Highlight your favourites • Short cut to speed access • an on line talk with friends • Device that moves you curser • burning bricks to protect you • ...
Practice Cybersecurity Terminology Puzzle 2025-03-14
Across
- Data hostage for ransom
- Protection of networks from threats
- Update that fixes vulnerabilities
- Requires multiple identity proofs
- Information about cyber threats
- Malicious software that harms systems
- Encoding sensitive information
- Impersonation to obtain information
Down
- Vulnerability with no available patch
- Weakness in a system
- Distributed denial-of-service attack
- Verifying user identity
- Converting data into codes
- Longterm targeted cyberattack
- Secure internet connection
- Unauthorized access to systems
- Blocks unwanted traffic
- Software that detects malware
- Software that secretly monitors
- Continuous cybersecurity monitoring
20 Clues: Weakness in a system • Data hostage for ransom • Verifying user identity • Blocks unwanted traffic • Converting data into codes • Secure internet connection • Longterm targeted cyberattack • Software that detects malware • Unauthorized access to systems • Encoding sensitive information • Information about cyber threats • Software that secretly monitors • ...
Kaylie and Eli Sip and Solve 2025-08-31
Across
- The engagement location.
- Their high school mascot.
- Kaylie's favorite movie.
- Their favorite energy drink.
- Their favorite restaurant.
- Kaylie was Miss __ in 2023.
- Their first trip together.
- Eli's football number in high school.
- The name of Eli's childhood pet.
- Eli's middle name.
Down
- Kaylie's favorite singer
- Eli's favorite Christmas movie.
- Eli graduated in 2026 majoring in _.
- Eli's favorite cookie flavor.
- Eli's favorite sports team.
- Their first concert.
- First date location.
- Kaylie's favorite color.
- The month they started dating.
- The name of Kaylie's sorority.
20 Clues: Eli's middle name. • Their first concert. • First date location. • Kaylie's favorite singer • The engagement location. • Kaylie's favorite movie. • Kaylie's favorite color. • Their high school mascot. • Their favorite restaurant. • Their first trip together. • Eli's favorite sports team. • Kaylie was Miss __ in 2023. • Their favorite energy drink. • Eli's favorite cookie flavor. • ...
Cybersecurity Crossword Puzzle 2024-09-25
Across
- Fraudulent attempts to steal sensitive information
- A tool that uses large language models to create authentic-looking text, pictures, or video. Can be used to create deepfakes
- What you should do with any suspicious communication!
- Online harassment or bullying
- Malware disguised as legitimate software
- Multi-Factor Authentication
- Virtual Private Network for secure connections
- Using AI to create a likeness of someone in video, voice, or picture
- Software update to fix security vulnerabilities
Down
- Investment scam involving fake accounts
- A phish sent by text
- Software that collects data secretly
- Self-replicating malware that spreads across networks
- Investment currency usually preferred in pig butchering scams
- Malware that encrypts files demanding ransom
- Factor showing how likely an associate will report versus click a phishing email
- Securing data by converting it into code
- A group very concerned with cyberbullying
18 Clues: A phish sent by text • Multi-Factor Authentication • Online harassment or bullying • Software that collects data secretly • Investment scam involving fake accounts • Malware disguised as legitimate software • Securing data by converting it into code • A group very concerned with cyberbullying • Malware that encrypts files demanding ransom • ...
Cybersecurity Crossword Puzzle 2023-01-24
Across
- malware that makes you pay
- software to detect and destroy malware
- malware pretending to be useful
- software that tracks you
- tricking users to click links/images
- manipulated media
- criminals explpoiting network vulnerabilities
- scrambling data into unreadable text
Down
- software that checks for malware
- harmful software
- a shield for data
- malware that displays adverts
- attacks exploiting a vulnerability
- service that encrypts data while on WiFi
- multiple attackers preventing legitimate users
- attacks seeking out personal info
- a unique label for devices connected to the internet
- internet access at coffee shop
- network pro learning hacking techniques
19 Clues: harmful software • a shield for data • manipulated media • software that tracks you • malware that makes you pay • malware that displays adverts • internet access at coffee shop • malware pretending to be useful • software that checks for malware • attacks seeking out personal info • attacks exploiting a vulnerability • tricking users to click links/images • ...
Safe to Speed 2022-07-18
Across
- Without proper input _____, malicious actors can send a malicious input into your web application form to inject malicious code to extract sensitive data from your database.
- Performing threat _____ at the start of your project will give you insight into your system's risk profile.
- Systems infected by malicious actor can be used to partake in a _____. This allows the malicious actor to use your infected system to conduct attacks to achieve their goals.
Down
- _____ programs attempt to utilise your system's compute resource (Without your knowledge) to mine for cryptocurrencies.
- Regular review of _____ accounts ensures that no unauthorised users are misusing the accounts outside the bounds of the system owner's knowledge.
- Doing system _____ will ensure that your systems are protected from the most basic and common attacks.
- It's important to understand potential vendor's cybersecurity _____ to evaluate if they have both innovation and cybersecurity best practices in mind.
- Security _____ helps identify business logic flaws and bugs in your application code.
- This provides you with a simpler and balanced means of ensuring cybersecurity best practices during a proof of concept/value or minimum viable product stage.
- _____ are often leaked on public code repositories due to developers using loosely configured code repositories.
10 Clues: Security _____ helps identify business logic flaws and bugs in your application code. • Doing system _____ will ensure that your systems are protected from the most basic and common attacks. • Performing threat _____ at the start of your project will give you insight into your system's risk profile. • ...
CYBERSECURITY 2021-11-08
Across
- Hastag for 2021 Q4 Manila Thanksgiving Town Hall
- DE&I Champion for Philippines and Bulgaria
- Vaccine brand used in the IM PH Vaccination Program
- Where to get a digital copy of your Covid-19 Vaccination certificate
Down
- Helps in centralizing reports and dashboards in one location
- FAME 2021 Edition
- 2021 IM PH Virtual Year End Party
7 Clues: FAME 2021 Edition • 2021 IM PH Virtual Year End Party • DE&I Champion for Philippines and Bulgaria • Hastag for 2021 Q4 Manila Thanksgiving Town Hall • Vaccine brand used in the IM PH Vaccination Program • Helps in centralizing reports and dashboards in one location • Where to get a digital copy of your Covid-19 Vaccination certificate
Cybersecurity 2024-03-13
Across
- Online service that allows users to connect remotely to another network.
- Servers that are accessed over the Internet, and databases that run on those servers.
- The process of proving the claimed identity of an individual user.
- Software or application that displays advertisements on your computer
Down
- Various of malicious software that damages your computer.
- Software used by hackers to spy on you and your computer activities.
- A network of computers used to carry out cyberattacks on other systems.
7 Clues: Various of malicious software that damages your computer. • The process of proving the claimed identity of an individual user. • Software used by hackers to spy on you and your computer activities. • Software or application that displays advertisements on your computer • A network of computers used to carry out cyberattacks on other systems. • ...
Cybersecurity 2025-03-08
7 Clues: Scam emails that trick users • Malware locks files for money • machines learning and thinking • Access granted to perform actions • Software that monitors for malware • Facial recognition to access phone • Harmful software that damages computers
Cybersecurity 2025-12-02
Across
- A security incident where sensitive, confidential, or personal information is accessed, stolen, or disclosed without authorization.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- The practice of protecting your digital world from cyber threats.
- Hackers send fake emails pretending to be a trusted source (like your bank), hoping you’ll click on a link or give them your personal info.
Down
- Stops unwanted traffic (like hackers) from getting into your system.
- A type of malicious software (malware) that encrypts a victim's files or locks their computer system, preventing them from accessing their data.
- Scrambles your sensitive data so that even if someone intercepts it, they can’t read it without the key to unlock it.
7 Clues: The practice of protecting your digital world from cyber threats. • Stops unwanted traffic (like hackers) from getting into your system. • Software designed to disrupt, damage, or gain unauthorized access to computer systems. • Scrambles your sensitive data so that even if someone intercepts it, they can’t read it without the key to unlock it. • ...
Coding 2023-12-11
Across
- Identifying and fixing errors
- Step-by-step problem solving procedures
- Building apps for mobile devices
- Tracking changes and versions
- Writing clear explanations of code
- Learning new things continuously
Down
- Languages for human-computer communication
- Blocks of reusable code
- Unified coding environment
- Organizes code into objects
- Instructing the computer
- Basis of machine learning
- Making dynamic websites
- Principles for secure programs
- Managing the flow of a program
15 Clues: Blocks of reusable code • Instructing the computer • Making dynamic websites • Identifying and fixing errors • Organizes code into objects • Unified coding environment • Basis of machine learning • Principles for secure programs • Tracking changes and versions • Managing the flow of a program • Building apps for mobile devices • ...
Lance and Ally 2025-07-20
Across
- Location of their first date
- Song Ally walked down the aisle to
- Lance's major in college
- Flavor of the wedding cake
- Ally's maiden name
- Name of the best man
- Ally's hometown
- Name of the maid of honor
- Lance's favorite color
- Number of years Ally and Lance have been together
Down
- Total number of siblings
- Their dog's name
- Name of the ring bearer
- Name of the flower girl
- Lance's favorite sports team
- Lance's hometown
- Lance's middle name
- Ally's profession
- Month Lance proposed
19 Clues: Ally's hometown • Their dog's name • Lance's hometown • Ally's profession • Ally's maiden name • Lance's middle name • Name of the best man • Month Lance proposed • Lance's favorite color • Name of the ring bearer • Name of the flower girl • Total number of siblings • Lance's major in college • Name of the maid of honor • Flavor of the wedding cake • Location of their first date • ...
CYBERSECURITY 2022-03-01
Across
- transforming plaintext or cleartext into ciphertext
- Planning and maintaining organization safe in cyberspace
- used to prove one's identity, or authorize access to a resource
- malicious or ethical person who has knowledge and skill in analyzing program code or a computer system
Down
- practice of sending fraudulent messages that appear to come from a reputable source
- attaches itself with host file and replicates
- unwanted or unsolicited communications typically received via e-mail
7 Clues: attaches itself with host file and replicates • transforming plaintext or cleartext into ciphertext • Planning and maintaining organization safe in cyberspace • used to prove one's identity, or authorize access to a resource • unwanted or unsolicited communications typically received via e-mail • ...
Cybersecurity 2024-02-15
Across
- A technique used to trick individuals into revealing sensitive information
- The process of protecting computer systems, networks, and data from theft or damage
- A type of attack that floods a system or network with excessive traffic, causing it to become unavailable
Down
- The practice of verifying the identity of a user or system before granting access
- A program or device used to detect and prevent unauthorized access to a computer or network
- A secret code used to gain access to a computer system, network, or account
- A malicious program that self-replicates and spreads to other computers
7 Clues: A malicious program that self-replicates and spreads to other computers • A technique used to trick individuals into revealing sensitive information • A secret code used to gain access to a computer system, network, or account • The practice of verifying the identity of a user or system before granting access • ...
Cybersecurity 2024-11-28
Across
- device or node that connects to a network, such as a computer, smartphone, or IoT device, often targeted in cybersecurity attacks.
- secret or undocumented way of gaining access to a system or network, typically used for malicious purposes or as a debugging feature.
- the act of making something known or the fact that is made known
- (Movement)cybersecurity term referring to the act of moving through a network from one system to another after gaining initial access.
Down
- modify or adapt something (e.g., a device or software) for a different, often unintended, use—frequently associated with malicious intent in cybersecurity contexts.
- to avoid something by going around it
- type of attack that makes a system, service, or network unavailable by overwhelming it with a flood of requests or traffic.
7 Clues: to avoid something by going around it • the act of making something known or the fact that is made known • type of attack that makes a system, service, or network unavailable by overwhelming it with a flood of requests or traffic. • ...
Cybersecurity 2025-07-01
Across
- a computer data storage on servers in off-site locations
- protection of networks and programs from digital attacks
- a type of social engineering to steal data
- the use of numbers
- an intrusive software developed by criminals
Down
- weak places in the security system
- an unauthorized person trying to gain access
7 Clues: the use of numbers • weak places in the security system • a type of social engineering to steal data • an unauthorized person trying to gain access • an intrusive software developed by criminals • a computer data storage on servers in off-site locations • protection of networks and programs from digital attacks
CYBERSECURITY 2015-03-25
Across
- ... device forensics roots began when mobile devices started to become popular, about 2000.
- Digital ... is used to capture volatile information from random access memory (RAM) and other running processes, including networks.
- ...are fast moving and increasing in number and severity.
Down
- ISACA publication Transforming ...
- Digital forensics scientific process: ...of custody.
- ...reasoning uses a series of specific pieces of information to extrapolate a broad conclusion.
- Implementing the NIST Cybersecurity Framework guide implements the CSF using ISACA’s ... 5 processes.
7 Clues: ISACA publication Transforming ... • Digital forensics scientific process: ...of custody. • ...are fast moving and increasing in number and severity. • ... device forensics roots began when mobile devices started to become popular, about 2000. • ...reasoning uses a series of specific pieces of information to extrapolate a broad conclusion. • ...
CYBERSECURITY 2025-04-06
Across
- a type of social engineering to steal user data
- protection of systems, networks, and programs from digital attacks
- an intrusive software developed by cybercriminals
Down
- weak places in the security system
- an unauthorized person who tries to gain access
- a computer data storage on servers in off-site locations is called … storage
- the use of numbers
7 Clues: the use of numbers • weak places in the security system • a type of social engineering to steal user data • an unauthorized person who tries to gain access • an intrusive software developed by cybercriminals • protection of systems, networks, and programs from digital attacks • a computer data storage on servers in off-site locations is called … storage
Cybersecurity 2021-12-30
CyberSecurity 2023-02-05
Across
- Spread through a network and use system resources for example to slow the network speed down.
- Malicious form of self-replicating software that can spread quickly on a computer network.
- Infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- Unwanted software that monitors and gathers information on a person and how they use their computer.
- A piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions. Name derives from the story of the Horse.
Down
- Locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- Malicious software is software that is designed to gain access to your computer with malicious intent.
7 Clues: Malicious form of self-replicating software that can spread quickly on a computer network. • Spread through a network and use system resources for example to slow the network speed down. • Unwanted software that monitors and gathers information on a person and how they use their computer. • ...
Cybersecurity 2025-08-19
7 Clues: The brain of the computer. • Harmful software programs. • A code used to lock or unlock accounts. • A person who breaks into computer systems. • Software that protects against online threats. • A harmful program that spreads and damages files. • Fake emails that trick you into giving personal information.
Cyber Security Crossword 2021-10-14
Across
- Do not accept trade orders via _____ or voicemail
- Require _______ confirmation for trade orders sent via email.
- Always use _______________ for all sensitive data on computers and removable media.
- Report Security Incidents to the ___________ Service Center x74357.
- “Do Your Part. #____________________.”
- Don't click on _________ links
- Report ___________ emails to the Cyber Threat Center (cyberthreat@raymondjames.com).
Down
- As part of the STOP.THINK.CONNECT.™ national public awareness ___________, CISA is also sharing Cybersecurity Awareness Month Resources to reduce cybersecurity risks and protect you online.
- ______________ is Cyber Security Awareness month.
- Type [_______] in the subject line of emails with sensitive data.
- PII stands for personally ____________ information
- Use a password of PIN to protect your mobile device. Have the device require a password after _________ minutes of inactivity.
- If you are unsure of the legitimacy of an email do not click on any links or open any _______________.
- Connect directly to the Raymond James ___________ only through wireless access points managed and configured by the ___________ Engineering Department.
- If you plan to enter a contract with a third-party or are changing your contract, please request a ______ assessment.
15 Clues: Don't click on _________ links • “Do Your Part. #____________________.” • ______________ is Cyber Security Awareness month. • Do not accept trade orders via _____ or voicemail • PII stands for personally ____________ information • Require _______ confirmation for trade orders sent via email. • Type [_______] in the subject line of emails with sensitive data. • ...
IT-bezogene Gegenstücke 2025-01-30
Across
- biometric authentication, similar to how unique fingerprints identify individuals
- in cybersecurity, unauthorized listening, similar to an ear picking up private conversations
- network - main connectivity infrastructure, like the spine supporting the body’s structure
- temporary storage to process data faster, like short-term memory for quick recall
- directs traffic, like veins carrying blood to different parts of the body
- tracking used in UX/UI analysis, akin to vision guiding movement and interaction
- a point of congestion in systems, comparable to a narrowed artery restricting blood flow
Down
- keeps the system standing and running, similar to a healthy body maintaining vitality
- for voice input and communication, like vocal cords enabling speech
- an exchange of standardized signals between devices in a computer network, like the mutual recognition of two individuals before a conversation
- a sequence of execution, like muscle fibers working together for coordinated action
- protective barrier, like skin in cybersecurity defending against external threats
- signal used in networking to check system status, like a pulse monitoring health
- stores session info, like taste memory helping us remember flavors
- rules for communication, like language facilitating understanding in conversations
15 Clues: stores session info, like taste memory helping us remember flavors • for voice input and communication, like vocal cords enabling speech • directs traffic, like veins carrying blood to different parts of the body • signal used in networking to check system status, like a pulse monitoring health • ...
IT-bezogene Gegenstücke 2025-01-30
Across
- biometric authentication, similar to how unique fingerprints identify individuals
- in cybersecurity, unauthorized listening, similar to an ear picking up private conversations
- network - main connectivity infrastructure, like the spine supporting the body’s structure
- temporary storage to process data faster, like short-term memory for quick recall
- directs traffic, like veins carrying blood to different parts of the body
- tracking used in UX/UI analysis, akin to vision guiding movement and interaction
- a point of congestion in systems, comparable to a narrowed artery restricting blood flow
Down
- keeps the system standing and running, similar to a healthy body maintaining vitality
- for voice input and communication, like vocal cords enabling speech
- an exchange of standardized signals between devices in a computer network, like the mutual recognition of two individuals before a conversation
- a sequence of execution, like muscle fibers working together for coordinated action
- protective barrier, like skin in cybersecurity defending against external threats
- signal used in networking to check system status, like a pulse monitoring health
- stores session info, like taste memory helping us remember flavors
- rules for communication, like language facilitating understanding in conversations
15 Clues: stores session info, like taste memory helping us remember flavors • for voice input and communication, like vocal cords enabling speech • directs traffic, like veins carrying blood to different parts of the body • signal used in networking to check system status, like a pulse monitoring health • ...
Coursework Crossword 2024-08-21
10 Clues: Reframe • Pitchercize • Richard Rumelt • Ethics or bust! • Think, MTI Alumni • More money than God • Money! Money! Money! • What? Like its hard? • What is today's costume? • The rep from Green Peace has a question
GoCIT Famous People in Cybersecurity 2025-04-10
Across
- The 'S' in RSA encryption and co-inventor of Shamir's Secret Sharing.
- The 'A' in RSA encryption; cryptography pioneer.
- Former Chief Security Officer at Facebook and vocal advocate for digital privacy.
- Pioneer of public key cryptography and co-creator of the Diffie-Hellman algorithm.
- The 'R' in RSA encryption; helped develop one of the most widely used encryption algorithms.
Down
- Discovered a major DNS vulnerability in 2008 that shook the internet.
- Real name of Mudge, testified to Congress about cybersecurity vulnerabilities.
- Cryptographer and author of "Applied Cryptography"; widely known security expert.
- Father of modern computing; his work laid the groundwork for cryptography and codebreaking.
- Once the world's most wanted hacker, later became a cybersecurity consultant.
10 Clues: The 'A' in RSA encryption; cryptography pioneer. • Discovered a major DNS vulnerability in 2008 that shook the internet. • The 'S' in RSA encryption and co-inventor of Shamir's Secret Sharing. • Once the world's most wanted hacker, later became a cybersecurity consultant. • Real name of Mudge, testified to Congress about cybersecurity vulnerabilities. • ...
Cybersecurity 2022-11-24
Across
- is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle
- software to defend the computer
- is a method of exchanging messages ("mail") between people using electronic devices.
- protection of computer systems and networks
Down
- data .....
- any software intentionally designed to cause disruption to a computer, server, client, or computer network
- synonym for nasty
7 Clues: data ..... • synonym for nasty • software to defend the computer • protection of computer systems and networks • is a method of exchanging messages ("mail") between people using electronic devices. • any software intentionally designed to cause disruption to a computer, server, client, or computer network • ...
Cybersecurity 2024-03-09
7 Clues: Scrambles data securely. • Protects systems from attacks. • Weakness that can be exploited • Verifies user or system identity. • Malicious software that disrupts. • Fraudulent emails to steal information. • Network security system that controls traffic.
Cybersecurity 2024-07-05
Across
- Threatens to publish or blocks access to data or a computer system
- Short for malicious software
- The practice of tricking Internet users through the use of deceptive email messages or websites
Down
- A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- A malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.
- A type of malicious software, or malware, that spreads between computers and causes damage to data and software.
- A way of scrambling data so that only authorized parties can understand the information.
7 Clues: Short for malicious software • Threatens to publish or blocks access to data or a computer system • A way of scrambling data so that only authorized parties can understand the information. • The practice of tricking Internet users through the use of deceptive email messages or websites • ...
CyberSecurity 2023-02-05
Across
- Spread through a network and use system resources for example to slow the network speed down.
- Malicious form of self-replicating software that can spread quickly on a computer network.
- Infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- Unwanted software that monitors and gathers information on a person and how they use their computer.
- A piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions. Name derives from the story of the Horse.
Down
- Locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- Malicious software is software that is designed to gain access to your computer with malicious intent.
7 Clues: Malicious form of self-replicating software that can spread quickly on a computer network. • Spread through a network and use system resources for example to slow the network speed down. • Unwanted software that monitors and gathers information on a person and how they use their computer. • ...
Cybersecurity Cr0$$w0rd Puzz|3 2024-06-05
Across
- Horse
- Unsolicited emails
- Taking advantage of vulnerability
- Capture of data being transmitted
- Malicious software
- Challenge-response verification test
- Process that safeguards online assets
- Virtual perimeter around network
- Malicious code to harm victims
- Virtual secure corridor
- Deletion of all or part
- Dark web
Down
- Infectious malware that spreads
- Process to verify identity
- Bypasses security steps to gain access
- False or misleading information
- Malware that uses scare tactics
- Breach
- Fraudulent acquisition of user credentials
- Plain text into secret code
- Malicious program to extort money
21 Clues: Horse • Breach • Dark web • Unsolicited emails • Malicious software • Virtual secure corridor • Deletion of all or part • Process to verify identity • Plain text into secret code • Malicious code to harm victims • Infectious malware that spreads • False or misleading information • Malware that uses scare tactics • Virtual perimeter around network • Taking advantage of vulnerability • ...
Dandy & Nicole Wedding 2024-10-16
Across
- City where the couple had their 1st date
- Engagement Ring cut
- Dandy's fave K-pop group
- Nicole specialization as a Doctor
- 1st out of country
- Number of Graduation Attended
- The month Nicole officially became Dandy's Girlfriend
Down
- Dandy's Profession
- Favorite color of Dandy
- Number of mutual friend
- Name of their coffee shop
- Nicole's Profession
- 1st business together
- How long they are together
- Favorite concert attended
- 2nd TV appearance
16 Clues: 2nd TV appearance • Dandy's Profession • 1st out of country • Engagement Ring cut • Nicole's Profession • 1st business together • Favorite color of Dandy • Number of mutual friend • Dandy's fave K-pop group • Name of their coffee shop • Favorite concert attended • How long they are together • Number of Graduation Attended • Nicole specialization as a Doctor • ...
ICT Crossword - Daniyarov Daniyar 2023-04-25
10 Clues: What is AI? • What is VR? • What is IoT? • What is ICT? • What is Wi-Fi? • What is cloud? • What is Internet? • What is programming? • What is cybersecurity? • What are examples of ICT tools?
Chapter 5&6 2025-11-22
Across
- USED IN CFAA CRITICISM (CATALYST) - ACTIVIST WHOSE PROSECUTION HIGHLIGHTED ARGUMENTS THAT CFAA IS OVERLY PUNITIVE
- VOLUNTARY FRAMEWORK FOR CRITICAL INFRASTRUCTURE CYBERSECURITY RISK MANAGEMENT
- INCENTIVIZED VULNERABILITY REPORTING THROUGH STRUCTURED COMPANY PROGRAMS
- INFORMATION PROTECTED UNDER THE EEA AND DTSA THAT MUST HAVE VALUE AND BE KEPT CONFIDENTIAL
- REQUIRED LEGAL CONNECTION BETWEEN ACCESS CIRCUMVENTION AND POSSIBLE INFRINGEMENT
- ONE OF ORIN KERR'S THEORIES - VIOLATES GENERAL SOCIETAL EXPECTATIONS OF COMPUTER USE
- LEAD AGENCY FOR ASSET RESPONSE, WHICH INCLUDES HELPING COMPANIES AND GOVERNMENTS PROTECT ASSETS AND MITIGATE HARMS
- ACTION PROHIBITED UNDER CFAA AND CENTRAL TO THE MORRIS WORM CASE
- INTERNATIONAL TREATY FOR CYBERCRIME INVESTIGATIONS
- ONE OF ORIN KERR'S THEORIES - VIOLATIONS VIA BYPASSING TECHNICAL CONTROLS
- 2015 FEDERAL LAW CREATING A LEGISLATIVE FRAMEWORK FOR IMPROVING U.S. CYBERSECURITY
Down
- LAW PREVENTING DOMAIN NAME SQUATTING
- PRIMARY FEDERAL STATUTE GOVERNING UNAUTHORIZED ACCESS
- MOST LITIGATED CFAA ISSUE - REQUIRES ACTIVE ACCESS, NOT PASSIVE RECEIPT
- ONE OF THE SEVEN PROHIBITED ACTS UNDER THE CFAA - USE OF HACKING TO OBTAIN CLASSIFIED/NATIONAL SECURITY INFORMATION
- 2016 LAW ENABLING COMPANIES TO SUE PRIVATELY FOR STOLEN TRADE SECRETS
- CFAA AND ESPIONAGE ACT CASE INVOLVING THEFT OF AEROSPACE TRADE SECRETS FOR CHINA (FORMAT: EXAMPLEVEXAMPLE
- ONE OF ORIN KERR'S THEORIES - VIOLATION ARISING FROM BREACHING AN AGREEMENT, POLICY, OR TERMS OF SERVICE
- RESTRICTS THE ABILITY OF INDIVIDUALS TO CIRCUMVENT ACCESS CONTROLS THAT PROTECT COPYRIGHTED MATERIAL.
- ONE OF THE FIVE PRINCIPLES IN THE NIST FRAMEWORK - IMPLEMENT SAFEGUARDS TO DELIVER SERVICES
20 Clues: LAW PREVENTING DOMAIN NAME SQUATTING • INTERNATIONAL TREATY FOR CYBERCRIME INVESTIGATIONS • PRIMARY FEDERAL STATUTE GOVERNING UNAUTHORIZED ACCESS • ACTION PROHIBITED UNDER CFAA AND CENTRAL TO THE MORRIS WORM CASE • 2016 LAW ENABLING COMPANIES TO SUE PRIVATELY FOR STOLEN TRADE SECRETS • MOST LITIGATED CFAA ISSUE - REQUIRES ACTIVE ACCESS, NOT PASSIVE RECEIPT • ...
TTS EDISI: CODING 2025 2025-03-23
10 Clues: Tanah airku • Jenis durian • Jurusan Aldo • Tales of ... • Divisi paling rame • Jarak/massa, Sunway • Tongkrongan anak APU • "Bos! Teh ais ... satu" • Ungu berkaki 2, cedera rate 70% • Kelakuan tikus, "Semoga bendahara tidak melakukan ini"
O‘zbekistonda axborot kommunikatsiya sohasini rivojlantirish yo‘nalishlari va qonunlar 2025-12-22
Across
- Elektron hukumat tizimi
- Yuqori tezlikdagi internet tarmog‘i
- Mahalliy IT kompaniyalar klasteri
- Innovatsion loyihalar va dasturlar
- Axborot xavfsizligini ta’minlash
Down
- Onlayn davlat xizmatlari
- Qonun va me’yoriy hujjatlar
- Telekommunikatsiya sohasini rivojlantirish
- Raqamli siyosat va strategiyalar
- Ma’lumotlarni himoya qilish
10 Clues: Elektron hukumat tizimi • Onlayn davlat xizmatlari • Qonun va me’yoriy hujjatlar • Ma’lumotlarni himoya qilish • Raqamli siyosat va strategiyalar • Axborot xavfsizligini ta’minlash • Mahalliy IT kompaniyalar klasteri • Innovatsion loyihalar va dasturlar • Yuqori tezlikdagi internet tarmog‘i • Telekommunikatsiya sohasini rivojlantirish
Puzzle 2 2024-08-28
Across
- A method in project management that focuses on time-boxed sprints
- A secure way of verifying user identity, often using fingerprint or facial recognition
- The type of banking that exists entirely online, without physical branches
- Capgemini's exclusive global initiative for leveraging applied innovation?
- The interest rate that central banks charge commercial banks for short-term loans
- A significant global regulatory framework in banking, introduced post-2008 financial crisis
- The practice of protecting sensitive information from unauthorized access
- A common technique used in cybersecurity to disguise and protect information
Down
- A key regulatory compliance requirement for banks handling EU citizens' data
- A data-driven approach for managing customer relations
- A loan granted for the purchase of real estate, typically paid back with interest over time
- The approach used by Barclays to integrate sustainability into its operations
- The practice of transferring money between accounts, either manually or automatically
- The term for integrating AI into customer service to provide instant responses
- The global system for financial messaging used by banks to communicate securely
15 Clues: A data-driven approach for managing customer relations • A method in project management that focuses on time-boxed sprints • The practice of protecting sensitive information from unauthorized access • The type of banking that exists entirely online, without physical branches • Capgemini's exclusive global initiative for leveraging applied innovation? • ...
Herts Experience 2023-11-07
9 Clues: Tagline • storytellers • How many schools? • medicine innovator • UH-UK campus location • Work in ethical hacking • Globally accredited degree • Work in rehabilitation centres • UH-GAF's latest programme additions in LMS
Cybersecurity 2020-08-21
Across
- It protects systems, networks, and programs from digital attacks.
- They are small files that some websites save on your computer. They store information about you, but they don't spy.
- A fraud that obtains users' private data from the Internet, especially to access their bank accounts.
- Someone who, with their technical knowledge, uses cyber attacks to break into computer systems.
Down
- They infect other files on the system with the intention of altering the functioning of your computer, without you noticing.
- An electronic device to store and process data; we use it a lot in quarantine.
- Unwanted email that you recieve, they are usually advertisements.
7 Clues: It protects systems, networks, and programs from digital attacks. • Unwanted email that you recieve, they are usually advertisements. • An electronic device to store and process data; we use it a lot in quarantine. • Someone who, with their technical knowledge, uses cyber attacks to break into computer systems. • ...
CYBERSECURITY 2022-03-01
Across
- transforming plaintext or cleartext into ciphertext.
- planning and maintaining organization safe in cyberspace.
- used to prove one's identity, or authorize access to a resource.
- malicious or ethical person who has knowledge and skill in analyzing program code or a computer system.
Down
- practice of sending fraudulent messages that appear to come from a reputable source.
- attaches itself with host file and replicates.
- unwanted or unsolicited communications typically received via e-mail.
7 Clues: attaches itself with host file and replicates. • transforming plaintext or cleartext into ciphertext. • planning and maintaining organization safe in cyberspace. • used to prove one's identity, or authorize access to a resource. • unwanted or unsolicited communications typically received via e-mail. • ...
Cybersecurity 2025-10-31
Across
- Strukturierter Aufbau von IT-Systemen mit Fokus auf Sicherheitsmaßnahmen.
- Welcher Begriff beschreibt die Verbindung von technischen und organisatorischen Sicherheitsmaßnahmen während des gesamten Fahrzeuglebenszyklus?
Down
- Simulierter Angriff zur Identifikation von Schwachstellen.
- Sicherheitsvorfall mit Auswirkungen auf Verfügbarkeit etc.
- Wie nennt sich die geplante Einführung von Updates während des Fahrzeugbetriebs?
- Schutz beim Systemstart vor Manipulationen (englisches Wort)
- Wird regelmäßig aktualisiert zur Bewertung neuer Gefahren
7 Clues: Wird regelmäßig aktualisiert zur Bewertung neuer Gefahren • Simulierter Angriff zur Identifikation von Schwachstellen. • Sicherheitsvorfall mit Auswirkungen auf Verfügbarkeit etc. • Schutz beim Systemstart vor Manipulationen (englisches Wort) • Strukturierter Aufbau von IT-Systemen mit Fokus auf Sicherheitsmaßnahmen. • ...
CyberSecurity 2025-09-17
7 Clues: Security Officer • MFA is Multi-Factor _ • social engineering scam • strong key word to access computers • The process of converting information into a code • Software designed to detect, prevent and remove malicious software • A type of malware that encrypts files, demanding a ransom for their decryption
Cybersecurity Phishing 2023-06-14
Across
- type of phishing targeting a group or individual
- links, BLANK, or other attachments
- type of phishing over text
- a false sense of
- this plus misspellings indicates phishing
- most common way to phish
Down
- check for these
- type of phishing over phone/voice call
- most common social engineering attack
- type of phishing targeting C-suite
- never give this or your password
11 Clues: check for these • a false sense of • most common way to phish • type of phishing over text • never give this or your password • links, BLANK, or other attachments • type of phishing targeting C-suite • most common social engineering attack • type of phishing over phone/voice call • this plus misspellings indicates phishing • type of phishing targeting a group or individual
Cybersecurity Crossword 2021-12-07
Across
- __ safeguards intended for the actual users
- IT firm that was subject of a Russian cyberattack
- always practice ____ password management to prevent against cyberattacks
- another work for SMS-based phishing
- __ safeguards intended for software and hardware
- process of preventing unauthorized access to IT systems
Down
- you can download ____ software to protect your devices
- cyberattack that demands a ransom payment
- name of criminal organization that hacked into the IT network of Colonial Pipeline
- this country was the subject of a Russian cyberattack in 2007
- most common form of cyberattack
11 Clues: most common form of cyberattack • another work for SMS-based phishing • cyberattack that demands a ransom payment • __ safeguards intended for the actual users • __ safeguards intended for software and hardware • IT firm that was subject of a Russian cyberattack • you can download ____ software to protect your devices • ...
cybersecurity 3 2024-05-07
Across
- raw facts
- taking data out of a computer
- device operating controlled instructions
- use mechanical operations to perform calculations
- a series of related
Down
- your history
- instructions waiting to be executed
- a notebook computer
- entering data into a computer
- the most powerful computer that performs trillions of calculations per second
- a stationary location with a computer on top
11 Clues: raw facts • your history • a notebook computer • a series of related • taking data out of a computer • entering data into a computer • instructions waiting to be executed • device operating controlled instructions • a stationary location with a computer on top • use mechanical operations to perform calculations • ...
Cybersecurity Awareness 2023-09-14
Across
- A piece of data from a website that is saved within a web browser and can be retrieved by the website at a later time
- Virtual Private Network
- A type of malicious software
- Fraudulent email that demands urgent action
- The manipulation of facial appearance through deep generative methods.
- The use of electronics to bully someone
Down
- Artificial intelligence
- The conversion of information or data into a code
- A part of the internet that isn't indexed by search engines
- An error, fault in a computer system
- Network security system
11 Clues: Artificial intelligence • Virtual Private Network • Network security system • A type of malicious software • An error, fault in a computer system • The use of electronics to bully someone • Fraudulent email that demands urgent action • The conversion of information or data into a code • A part of the internet that isn't indexed by search engines • ...
Cybersecurity Week! 2023-10-11
Across
- Software used to prevent, scan, detect and delete viruses from a computer.
- A type of cyber attack that exploits a vulnerability in software that no one is aware of yet.
- A piece of audio or video that has been altered and changed to make it seem authentic or credible.
- A type of malware designed to give hackers access to and control over a target device.
- A cyber-attack that targets individuals through SMS or text messages.
- Tools that can record every keystroke that you type into a computer or mobile keyboard.
Down
- A type of malware that disguises itself as legitimate code or software.
- Any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission.
- Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
- A technique through which a cybercriminal disguises themselves as a known or trusted source.
- A network of compromised computers used to carry out cyberattacks on other systems.
11 Clues: A cyber-attack that targets individuals through SMS or text messages. • A type of malware that disguises itself as legitimate code or software. • Software used to prevent, scan, detect and delete viruses from a computer. • A network of compromised computers used to carry out cyberattacks on other systems. • ...
Computer Puzzle game 2025-05-27
Across
- misusing personal information
- grooming online child abuse
- hoaxing or misleading
- illegal entry into computer
- deliberate manner of harassing
- frau illegal method to get money
- number consists of 8 digits
- disrupt normal function of computer
Down
- code only understand by computer
- process to protect network
- act of sen misleading email
- blocking unauthorised access
- criminal activity using internet
- adding binary numbers
- protect computer from virus
15 Clues: adding binary numbers • hoaxing or misleading • process to protect network • act of sen misleading email • grooming online child abuse • illegal entry into computer • protect computer from virus • number consists of 8 digits • blocking unauthorised access • misusing personal information • deliberate manner of harassing • code only understand by computer • ...
CyberSecurity-battaglia 2021-03-22
Across
- an electronic machine that calculates data very quickly, used for storing, writing, organizing, and sharing information
- the quality of being able to be trusted or believed
- the condition or state of being kept safe, damage, or loss
- used to describe websites that are safe and will not cause problems for your computer
Down
- the possibility of harm or death, or of something unpleasant happening
- a choice that you make about something after thinking about several possibilities
- not enjoyable or pleasant
- physical harm or damage to someone's body caused by an accident or an attack
- to try to hurt or defeat using violence
- an amount of something that is being kept for future use
- information in an electronic form that can be stored and processed by a computer
11 Clues: not enjoyable or pleasant • to try to hurt or defeat using violence • the quality of being able to be trusted or believed • an amount of something that is being kept for future use • the condition or state of being kept safe, damage, or loss • the possibility of harm or death, or of something unpleasant happening • ...
CyberSecurity-battaglia 2021-03-22
Across
- information in an electronic form that can be stored and processed by a computer
- an electronic machine that calculates data very quickly, used for storing, writing, organizing, and sharing information
- the quality of being able to be trusted or believed
- an amount of something that is being kept for future use
- the condition or state of being kept safe, damage, or loss
- the possibility of harm or death, or of something unpleasant happening
Down
- a choice that you make about something after thinking about several possibilities
- not enjoyable or pleasant
- used to describe websites that are safe and will not cause problems for your computer
- physical harm or damage to someone's body caused by an accident or an attack
- to try to hurt or defeat using violence
11 Clues: not enjoyable or pleasant • to try to hurt or defeat using violence • the quality of being able to be trusted or believed • an amount of something that is being kept for future use • the condition or state of being kept safe, damage, or loss • the possibility of harm or death, or of something unpleasant happening • ...
Cybersecurity Newsletter 2023-02-03
Across
- a malicious program that records the strokes on the keyboard to capture sensitive information
- Faith Healthcare's EHR solution for the clinics
- any malware that misleads users of its true intent
- any software intentionally designed to cause disruption to a computer.
- the psychological manipulation of people into performing actions or divulging confidential information
Down
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
- a type of malicious software designed to block access to a computer system until a sum of money is paid.
- an internal website used for sharing resources and information. In other words, FHC uses SharePoint as its ___.
- Time & attendance, payroll, and soon-to-be education is managed with this system
- a form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
- 4-letter abbreviation for protected health information (PHI) that is produced, saved, transferred or received in an electronic form.
11 Clues: Faith Healthcare's EHR solution for the clinics • any malware that misleads users of its true intent • any software intentionally designed to cause disruption to a computer. • Time & attendance, payroll, and soon-to-be education is managed with this system • a malicious program that records the strokes on the keyboard to capture sensitive information • ...
Cybersecurity Terms 2024-09-20
Across
- Unsolicited commercial email, junk mail.
- Small program that is timed to perform an operation on a system.
- A place where commands can be entered in Linux.
- Takes advantage of code flaws that have very recently been discovered.
- A program that blocks access until a ransom is paid.
Down
- Appears to be legitimate but really contains malicious code.
- Proving who you are so trust can be established.
- Software that installs advertisements on the PC in the form of toolbars or popups.
- Software that gathers data and forwards it without consent.
- Something you have.
- Files that appear to be legitimate programs, but really contain malicious code.
11 Clues: Something you have. • Unsolicited commercial email, junk mail. • A place where commands can be entered in Linux. • Proving who you are so trust can be established. • A program that blocks access until a ransom is paid. • Software that gathers data and forwards it without consent. • Appears to be legitimate but really contains malicious code. • ...
cybersecurity Crossword 2024-09-27
Across
- A person who tries to break into computers to find information or cause trouble.
- A special tool that helps keep your computer safe by blocking bad stuff from getting in
- A secret word or code you use to protect your accounts and keep them safe.
- A new version of software that makes it better or fixes problems, helping to keep your computer safe
- A type of software that secretly watches what you do on your computer without your permission.
- A harmful program that can make your computer sick, just like a virus can make you sick
- A way to change your information into a secret code so only the right people can read it.
Down
- Guess the word
- Short for "malicious software," it's a type of bad program that can hurt your computer or steal your information
- A trick where someone pretends to be someone else to steal your personal information, usually through fake emails.
- A process to check if you are who you say you are, often by using a password or a special code.
11 Clues: Guess the word • A secret word or code you use to protect your accounts and keep them safe. • A person who tries to break into computers to find information or cause trouble. • A special tool that helps keep your computer safe by blocking bad stuff from getting in • A harmful program that can make your computer sick, just like a virus can make you sick • ...
CyberSecurity Terms 2025-04-04
Across
- A great free password manager
- These emails try to get your credentials by creating a sense of urgency
- One of the top cybersecurity companies you can trust
- Regularly check for _______ on your computer or device
- Detects and removes harmful materials on your device
Down
- A great way to store your credentials would be using a ________ manager
- It's good to have a password length of at least ______
- Malware that can harm your computer
- Secures account through text/email/etc. (abbreviation)
- It's a good idea to ____ phishing or spam emails
- Good to empty every so often or recover deleted files in
11 Clues: A great free password manager • Malware that can harm your computer • It's a good idea to ____ phishing or spam emails • One of the top cybersecurity companies you can trust • Detects and removes harmful materials on your device • It's good to have a password length of at least ______ • Secures account through text/email/etc. (abbreviation) • ...
Cybersecurity Terms 2022-05-13
Across
- The practice of securing systems, networks, and technologies from attacks and unauthorized access
- A type of network security that filters incoming and outgoing traffic
- When a legitimate website’s traffic is redirected to a fake site for malicious purposes
- Disguising data so it’s impossible to decipher without authorization
Down
- Using a device to mine cryptocurrency, without the device owner’s knowledge or permission
- Sending emails with a forged sender address is called email...
- Malicious software designed to disrupt a computer, server, or network
- A chain of Internet-connected devices centrally controlled by a hacker
- Email that you’ve technically solicited but it may serve little to no purpose to you
- A tool that allows you to maintain online anonymity while using the Internet
- DKIM and DMARC are both examples of a standard email authentication...
11 Clues: Sending emails with a forged sender address is called email... • Disguising data so it’s impossible to decipher without authorization • Malicious software designed to disrupt a computer, server, or network • A type of network security that filters incoming and outgoing traffic • A chain of Internet-connected devices centrally controlled by a hacker • ...
How well do you know Afia? 2024-04-15
Across
- volunteer's every sunday
- OG Co-admin for this Big WhatsApp groupchat
- Birth month
- Master's degree
- volunteer vest color that she wore everyday during Ramadan
- Age
Down
- Number of siblings she has (including herself)
- Frequently visits this Masjid
- Fiance's name
- Eldest sister's name
- Her cat's name
- Birth state
- Admin for this Big WhatsApp groupchat
13 Clues: Age • Birth state • Birth month • Fiance's name • Her cat's name • Master's degree • Eldest sister's name • volunteer's every sunday • Frequently visits this Masjid • Admin for this Big WhatsApp groupchat • OG Co-admin for this Big WhatsApp groupchat • Number of siblings she has (including herself) • volunteer vest color that she wore everyday during Ramadan
Pink October 2019-10-16
Across
- color for october
- Health Examination
- Data leak
- Celebration of years a significant event occurred
- Tissue cells hyper-proliferation
- ISO-certified
- Security measure to protect your data
- Evidence of authentication
- No Bra Day
Down
- File or program used to harm computers
- An example of CyberCrime
- Files/ data safety
- Day to promote Breast cancer Awareness
- Principle for measure of quality
- Associated with malicious attacks
- Breast cancer awareness period
- Symbol for breast cancer support
- Responsible for standard accreditation
- Breast cancer Victims
19 Clues: Data leak • No Bra Day • ISO-certified • color for october • Health Examination • Files/ data safety • Breast cancer Victims • An example of CyberCrime • Evidence of authentication • Breast cancer awareness period • Principle for measure of quality • Tissue cells hyper-proliferation • Symbol for breast cancer support • Associated with malicious attacks • ...
Guilfordian Print Issue 18 2023-05-02
Across
- A popular short-form social media platform under scrutiny by the US government
- an acronym used to describe a wide range of queer and trans individuals
- The name of a firelord and main antagonist of Avatar: The Last Airbender
- A cybersecurity company that released data on cybersecurity insurance for colleges
- The namesake character of a TV show that has been running since 1999 and has around 280 episodes
- A youtuber who gained popularity through his FNAF playthroughs
- The month with a nickname of “madness” that is famous for basketball
- The person that Miles Kirkpatrick didn’t want to anger when talking about philosophy
Down
- The name of the most hated social media platform of Guilford College (by poll)
- Guilford College’s rival during the Soup Bowl
- A sport played by throwing a disc, usually plastic, to another person
- The country that Studio Ghibli is based in
- The name of the closest black hole to earth, also the name of the Primordial Greek Goddess of the Earth
- The sport played by Portia Star Jones, and in which Guilford College is part of the NCAA Emerging Pathway
14 Clues: The country that Studio Ghibli is based in • Guilford College’s rival during the Soup Bowl • A youtuber who gained popularity through his FNAF playthroughs • The month with a nickname of “madness” that is famous for basketball • A sport played by throwing a disc, usually plastic, to another person • ...
TTS TIK Neysha 8D 2025-10-11
Across
- program yang ada di komputer
- perangkat lunak yang merusak sistem
- perlindungan terhadap ancaman digital yang ada
- menyalakan ulang komputer
- proses mematikan komputer
- memasukkan akun ke sistem
- otak komputer yang memproses data
- jalan pintas menuju program/file
Down
- kondisi dimana perangkat tidak merespon secara permanen
- tempat penyimpanan data
- Malware yang bisa menyebar dan merusak data
- pengguna komputer/perangkat
- salinan data
- tempat penyimpanan file
- alamat web
15 Clues: alamat web • salinan data • tempat penyimpanan data • tempat penyimpanan file • menyalakan ulang komputer • proses mematikan komputer • memasukkan akun ke sistem • pengguna komputer/perangkat • program yang ada di komputer • jalan pintas menuju program/file • otak komputer yang memproses data • perangkat lunak yang merusak sistem • Malware yang bisa menyebar dan merusak data • ...
TTS TIK Neysha 8D 2025-10-11
Across
- program yang ada di komputer
- perangkat lunak yang merusak sistem
- perlindungan terhadap ancaman digital yang ada
- menyalakan ulang komputer
- proses mematikan komputer
- memasukkan akun ke sistem
- otak komputer yang memproses data
- jalan pintas menuju program/file
Down
- kondisi dimana perangkat tidak merespon secara permanen
- tempat penyimpanan data
- Malware yang bisa menyebar dan merusak data
- pengguna komputer/perangkat
- salinan data
- tempat penyimpanan file
- alamat web
15 Clues: alamat web • salinan data • tempat penyimpanan data • tempat penyimpanan file • menyalakan ulang komputer • proses mematikan komputer • memasukkan akun ke sistem • pengguna komputer/perangkat • program yang ada di komputer • jalan pintas menuju program/file • otak komputer yang memproses data • perangkat lunak yang merusak sistem • Malware yang bisa menyebar dan merusak data • ...
Save Our Systems!!! 2020-11-28
Across
- Yes, it’s you alright!
- Cyberworld vaccine
- Trust me, I’ll ruin you!
- Internet’s most wanted
- A web assault?
- Alphanumeric, symbols & 8 spaces long
- Help, Support, Copy
- Flaming barrier
Down
- You are the bait here!
- A scary lot of viruses, worms, trojan horses, wipers
- For my eyes only/What’s mine stays mine
- Data protection and privacy law
- Scrambled data
- Online Safety
14 Clues: Online Safety • Scrambled data • A web assault? • Flaming barrier • Cyberworld vaccine • Help, Support, Copy • You are the bait here! • Yes, it’s you alright! • Internet’s most wanted • Trust me, I’ll ruin you! • Data protection and privacy law • Alphanumeric, symbols & 8 spaces long • For my eyes only/What’s mine stays mine • A scary lot of viruses, worms, trojan horses, wipers
Technology Through Time 2025-02-13
11 Clues: Banned. • Creative. • Fake Brain. • New technology. • How we access Google. • The unit we are doing. • Protects people online. • Spider's home and a place. • A device used to carry out a function. • Something you bring to school everyday. • Something that uses resources effectively.
Harper Cybersecurity Review 2024-03-05
Across
- software we use to protect your laptop
- phishing attack thorough voice or phone call
- our email filter system
- #1 threat to our security
- usual media that a phish comes to
- type of request that is weird
- tactic that a phisher uses
- social media site where phisher researches
- phishing attack through text message
- used in phishing attack called Quishing
Down
- where people write the Wifi password
- public charging station stealing your info
- used for remote access
- authentication for VPN access
- Information Security is everyone's
- 12 or more characters
- site where you can scan your own attachments
17 Clues: 12 or more characters • used for remote access • our email filter system • #1 threat to our security • tactic that a phisher uses • authentication for VPN access • type of request that is weird • usual media that a phish comes to • Information Security is everyone's • where people write the Wifi password • phishing attack through text message • ...
Envision Crossword 3 2023-12-05
Across
- - Structured data collection.
- - Technology at molecular scale.
- - Translates code to machine language.
- - Network security barrier.
Down
- - Protecting digital systems.
- - Physical computer parts.
- - Open-source OS.
- - Securing data through algorithms.
- - Language for web page creation.
- - Function calling itself.
10 Clues: - Open-source OS. • - Physical computer parts. • - Function calling itself. • - Network security barrier. • - Protecting digital systems. • - Structured data collection. • - Technology at molecular scale. • - Language for web page creation. • - Securing data through algorithms. • - Translates code to machine language.
tzrtzrt 2023-07-11
Cybersecurity Awareness (Refresher) 2022-08-08
Across
- Malicious software that is inserted into a system with the intention of compromising victim's data
- It is commonly given by banks for use at ATMs
- It is an internet scam that targets unsuspecting users via email
- Lock your __ when not in use
- Cybersecurity is our shared __
- Creating a strong __ is the top priority in keeping your online world safe
- you should not post private and confidential __ such as credit card number or CVC code
- This the best action to take if you receive a suspicious email
- It refers to a copy of an e-record, kept to protect information loss
Down
- It is a software program to protect computer from internet viruses
- Unwanted advertising in email addresses
- An unauthorized person who maliciously disrupt or damage a computer
- It is a type of malware designed to block access to a computer system until monies are paid
- __ engineering refers to the method attackers use to manipulate people into sharing sensitive information
- Not to be clicked in emails from unknown sources
- A malicious program that spreads by inserting copies of itself into other programs
- Hardware or software mechanism to prevent unauthorized users from accessing a computer network
17 Clues: Lock your __ when not in use • Cybersecurity is our shared __ • Unwanted advertising in email addresses • It is commonly given by banks for use at ATMs • Not to be clicked in emails from unknown sources • This the best action to take if you receive a suspicious email • It is an internet scam that targets unsuspecting users via email • ...
CYBER AND DIGITAL LITERALLY 2024-04-30
Across
- Principles and guidelines governing the ethical use and behavior in the digital realm, including respect for privacy, intellectual property, and online communities.
- Measures and precautions taken to protect digital devices, networks, and data from unauthorized access, use, or exploitation.
- Knowledge and understanding of information security risks, policies, and best practices among individuals and organizations.
- Deceptive schemes or frauds conducted through the internet, often aimed at tricking individuals into providing money or sensitive information.
- The unauthorized access, disclosure, or acquisition of sensitive or confidential information, often resulting in potential harm or exploitation.
- Practices and measures taken to protect sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction.
- The process of converting data into a code to prevent unauthorized access, ensuring confidentiality and privacy.
- Best practices and habits for maintaining good cybersecurity posture, including updating software, using strong passwords, and being cautious online.
- The rights and freedoms individuals have in the digital world, including privacy, freedom of expression, and access to information.
- The protection of personal information and data from unauthorized access, use, or disclosure, ensuring individuals' control over their own information.
- The protection of personal information and data shared on the internet from unauthorized access, use, or exploitation.
- Forms of media content that are created, distributed, and consumed digitally, including text, images, audio, and video.
- Malicious software that replicates itself and infects computer systems, causing harm to files, programs, and overall system performance.
- Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks.
- Deceptive attempts to obtain sensitive information, such as usernames, passwords, or financial details, by posing as a trustworthy entity in electronic communication.
- A type of cyber attack where fraudulent emails, messages, or websites are used to trick individuals into providing sensitive information such as passwords or financial details.
- The ability to effectively navigate, evaluate, and use digital technologies and information sources for communication, learning, and productivity.
- The representation of an individual's identity in an online or digital context, including personal information, preferences, and interactions.
- The responsible and ethical use of technology, including understanding one's rights and responsibilities in the digital world.
- Psychological manipulation techniques used by attackers to deceive individuals or employees into divulging confidential information or performing actions that compromise security.
- Strategies, technologies, and practices employed to protect computer systems, networks, and data from cyber threats and attacks.
- Habits, behaviors, and routines aimed at maintaining good cybersecurity posture and minimizing risks, such as updating software, using strong passwords, and being cautious online.
- Practices and tools used to protect against threats and maintain privacy while accessing websites and online content.
- Proficiencies and abilities required to effectively navigate, evaluate, and utilize digital technologies, tools, and information.
Down
- Programs, courses, and initiatives aimed at raising awareness and educating individuals and communities about cybersecurity risks, best practices, and skills.
- Practices and precautions taken to protect oneself from potential risks and dangers encountered on the internet.
- The global network of interconnected computers that allows for the exchange of data and communication.
- Online platforms and websites that enable users to create, share, and interact with content and connect with others.
- The ability of individuals, organizations, and systems to withstand, adapt to, and recover from cyber threats, attacks, and disruptions.
- Deceptive or dishonest activities conducted over the internet with the intention of gaining financial or personal benefit at the expense of others.
- Legal frameworks and regulations governing activities, behavior, and transactions conducted in cyberspace, including privacy, intellectual property, and cybersecurity laws.
- The ability to identify, evaluate, and effectively use information from various sources, including digital and online resources.
- The fraudulent acquisition and use of someone else's personal information for financial gain or other malicious purposes.
- Criminal activities carried out using computers, networks, or digital devices, such as hacking, fraud, or identity theft.
- Valuable resources and properties stored or represented in digital form, including data, documents, media files, and virtual currencies.
- Authentication A security process that requires users to provide two different forms of identification to verify their identity, typically a password and a temporary code sent to a mobile device.
- Potential dangers and risks posed by malicious actors, vulnerabilities, and security weaknesses in computer systems and networks.
- The perception and impression that individuals or entities have based on their activities, behavior, and interactions conducted online.
- The exchange of information, ideas, and messages using digital technologies and platforms, such as email, social media, and instant messaging.
- Measures and practices implemented to protect computer systems, networks, and data from cyber threats, attacks, and vulnerabilities.
- Information and analysis about potential and emerging cyber threats, vulnerabilities, and actors, used to inform cybersecurity decision-making and defenses.
- Unsolicited or unwanted electronic messages, typically sent in bulk, often for commercial or fraudulent purposes.
- Secret codes or phrases used to authenticate a user's identity and grant access to a computer system, network, or online account.
- Measures and safeguards implemented to secure sensitive or confidential data from unauthorized access, use, or disclosure.
- The trail of data left behind by interactions in a digital environment, including online activities, communications, and transactions.
- Bullying behavior that occurs online or through digital devices, such as harassment, threats, or spreading rumors.
- Malicious actions or operations launched against computer systems, networks, or digital infrastructure with the intent of causing harm, disruption, or damage.
- Knowledge and understanding of cybersecurity risks, threats, and best practices among individuals and organizations.
- Competencies and abilities required to effectively navigate, utilize, and create digital technologies and resources for various purposes.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, protecting against unauthorized access and threats.
50 Clues: The global network of interconnected computers that allows for the exchange of data and communication. • Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems or networks. • Practices and precautions taken to protect oneself from potential risks and dangers encountered on the internet. • ...
GC-CYBERSECURITY 2022-05-19
Across
- A piece of malicious code that encrypts files so the user can not access them until they pay.
- A piece of malicious code that is downloaded by pretending to be a useful piece of code
- Malicious code can be transferred from one computer to another using physical devices such as a _ _ _ _ _ _ _ _
- Old software and hardware may contain vulnerabilities that a hacker can e _ _ _ _ _ _ to gain access to a device.
- A piece of malicious code used to damage computers or steal data
- A hacker intercepts and steals data.
- Emails sent that appear to come from a legitimate organisation but links within the mail may install malicious code.
Down
- hackers attempt every posiible combination of characters to find a password
- A piece of malicious code. It infects computers by being downloaded within files.
- social ____________. Manipulating users into sharing their data.
- A common way to infect a computer with malicious code is to _ _ _ _ _ _ it from the internet or by clicking on suspicious links in mail.
11 Clues: A hacker intercepts and steals data. • A piece of malicious code used to damage computers or steal data • social ____________. Manipulating users into sharing their data. • hackers attempt every posiible combination of characters to find a password • A piece of malicious code. It infects computers by being downloaded within files. • ...
Cybersecurity Week 2022-10-14
Across
- a service that creates a secure tunnel between your device and the internet
- a malicious software that spreads from one computer to another
- the process of verifying a users identity
- malicious code or software
Down
- taking readable plaintext, and converting it into ciphertext
- when attackers send malicious emails to trick people into a scam
- a software update that fixes bugs or updates security
- a security technique that requires multiple methods of authentication
- a malware that encrypts user data, and requires payment to get back
- a secret word or phrase that must be used to gain access to something
- a network security device that monitors traffic to or from your network
11 Clues: malicious code or software • the process of verifying a users identity • a software update that fixes bugs or updates security • taking readable plaintext, and converting it into ciphertext • a malicious software that spreads from one computer to another • when attackers send malicious emails to trick people into a scam • ...
CyberSecurity-battaglia 2021-03-22
Across
- to try to hurt or defeat using violence
- an electronic machine that calculates data very quickly, used for storing, writing, organizing, and sharing information
- the possibility of harm or death, or of something unpleasant happening
- the quality of being able to be trusted or believed
- used to describe websites that are safe and will not cause problems for your computer
Down
- not enjoyable or pleasant
- information in an electronic form that can be stored and processed by a computer
- the condition or state of being kept safe, damage, or loss
- a choice that you make about something after thinking about several possibilities
- an amount of something that is being kept for future use
- physical harm or damage to someone's body caused by an accident or an attack
11 Clues: not enjoyable or pleasant • to try to hurt or defeat using violence • the quality of being able to be trusted or believed • an amount of something that is being kept for future use • the condition or state of being kept safe, damage, or loss • the possibility of harm or death, or of something unpleasant happening • ...
Cybersecurity Crossword 2025-04-14
Across
- Scrambles data to protect it
- Code flaw that can be exploited
- Secret string used to access a system
- Unauthorized access to data
Down
- Frequent advice: keep this updated
- software – Malware
- Type of scam email
- ____ engineer, manipulates people to gain access
- Type of attack that overwhelms servers
- A ____ firewall protects networks
- A person who breaks into systems
11 Clues: software – Malware • Type of scam email • Unauthorized access to data • Scrambles data to protect it • Code flaw that can be exploited • A person who breaks into systems • A ____ firewall protects networks • Frequent advice: keep this updated • Secret string used to access a system • Type of attack that overwhelms servers • ____ engineer, manipulates people to gain access
Cybersecurity Terminology 2025-06-25
Across
- The process of encoding information in such a way that only authorized parties can access it
- The practice of protecting systems, networks, and programs from digital attacks
- A person who uses computers to gain unauthorized access to data.
- The state of being exposed to the possibility of being attacked or harmed, either physically or emotionally. In cybersecurity, a weakness that can be exploited.
- Short for "malicious software," it's any software intentionally designed to cause damage to a computer, server, client, or computer network
Down
- A type of malicious software designed to block access to a computer system until a sum of money is paid
- Software used to prevent, detect, and remove malicious software
- The process of decoding
- An attempt by hackers to damage or destroy a computer network or system
- This is perhaps the most ubiquitous prefix in the field, indicating anything related to computers, networks, or the internet.
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
11 Clues: The process of decoding • Software used to prevent, detect, and remove malicious software • A person who uses computers to gain unauthorized access to data. • An attempt by hackers to damage or destroy a computer network or system • The practice of protecting systems, networks, and programs from digital attacks • ...
Spam Nation 2024-10-30
Across
- Popular tool used to filter out spam emails.
- To make information unclear, often to hide malicious code.
- Country where many major spam and cybercrime networks originate.
- A popular blog by the author covering cybersecurity.
- Fraudulent emails pretending to be legitimate to steal data.
- Process of moving a suspect from one country to face trial.
- Describes servers resistant to being shut down, popular with criminals.
- Malware that locks a computer until a ransom is paid.
- A targeted form of phishing aimed at specific individuals.
- First name of author
- To take control of someone else’s computer or online account.
- Leader of a significant Russian spam network.
- An affiliate program used to promote prescription drugs online.
- Attack that overloads a website to shut it down.
- The primary motivation behind spamming and cybercrime.
- A term describing a command signal used to connect to a botnet.
- Name of Book
- Faking information to deceive, often used in phishing.
- Another spam affiliate network similar to Glavmed.
Down
- An organized criminal scheme for profit, like illegal spamming.
- Criminal who deals in stolen credit card information.
- A cybersecurity expert mentioned in the book.
- A hacker with malicious intentions.
- Author and cybersecurity expert.
- People who transfer stolen money on behalf of criminals.
- A nickname for a notorious Russian spammer in the book.
- A network of hacked computers controlled by cybercriminals for sending spam.
- A member of a spam network who promotes illegal products.
- Crime committed through computers and the internet.
- Software that automatically displays or downloads ads on your computer.
- The main leader of a criminal organization.
- A major Russian spam organization mentioned in *Spam Nation*.
- A Russian organization that facilitated illegal online drug sales.
- Software tools that hide malware on a hacked computer.
- Harmful software used by spammers to control computers.
- Encoding data to keep it secure.
- A large botnet used in major spam and malware campaigns.
- Spam emails often advertise these for selling unregulated drugs online.
- A type of malware that hides in legitimate-looking software.
- Device or software that captures credit card info illegally.
- A known figure involved in the illegal spam trade.
- Organization that fights against spam globally.
- Unwanted and unsolicited email, often advertising shady products.
43 Clues: Name of Book • First name of author • Author and cybersecurity expert. • Encoding data to keep it secure. • A hacker with malicious intentions. • The main leader of a criminal organization. • Popular tool used to filter out spam emails. • A cybersecurity expert mentioned in the book. • Leader of a significant Russian spam network. • ...
Spam Nation 2024-10-30
Across
- A major Russian spam organization mentioned in *Spam Nation*.
- Spam emails often advertise these for selling unregulated drugs online.
- Popular tool used to filter out spam emails.
- A term describing a command signal used to connect to a botnet.
- Attack that overloads a website to shut it down.
- To make information unclear, often to hide malicious code.
- An affiliate program used to promote prescription drugs online.
- Harmful software used by spammers to control computers.
- Malware that locks a computer until a ransom is paid.
- A popular blog by the author covering cybersecurity.
- A Russian organization that facilitated illegal online drug sales.
- Crime committed through computers and the internet.
- Author and cybersecurity expert.
- A type of malware that hides in legitimate-looking software.
- Another spam affiliate network similar to Glavmed.
- Process of moving a suspect from one country to face trial.
- Faking information to deceive, often used in phishing.
- Criminal who deals in stolen credit card information.
- People who transfer stolen money on behalf of criminals.
- A cybersecurity expert mentioned in the book.
- A member of a spam network who promotes illegal products.
Down
- Organization that fights against spam globally.
- A known figure involved in the illegal spam trade.
- A large botnet used in major spam and malware campaigns.
- A hacker with malicious intentions.
- Fraudulent emails pretending to be legitimate to steal data.
- Software that automatically displays or downloads ads on your computer.
- Device or software that captures credit card info illegally.
- A targeted form of phishing aimed at specific individuals.
- The primary motivation behind spamming and cybercrime.
- Describes servers resistant to being shut down, popular with criminals.
- Unwanted and unsolicited email, often advertising shady products.
- Software tools that hide malware on a hacked computer.
- To take control of someone else’s computer or online account.
- Encoding data to keep it secure.
- A network of hacked computers controlled by cybercriminals for sending spam.
- An organized criminal scheme for profit, like illegal spamming.
- Leader of a significant Russian spam network.
- Country where many major spam and cybercrime networks originate.
- A nickname for a notorious Russian spammer in the book.
- The main leader of a criminal organization.
41 Clues: Encoding data to keep it secure. • Author and cybersecurity expert. • A hacker with malicious intentions. • The main leader of a criminal organization. • Popular tool used to filter out spam emails. • Leader of a significant Russian spam network. • A cybersecurity expert mentioned in the book. • Organization that fights against spam globally. • ...
Technology Crossword 2025-02-20
Across
- - Digital or virtual currency.
- - Gadgets you can wear.
- - Algorithms that improve over time.
- - Fifth generation mobile network.
- - Identification using physical traits.
- - Enhanced view of the real world.
- - Manipulation of matter on an atomic scale.
- - Network of connected devices.
- - Protection against digital threats.
- - Advanced subset of machine learning.
Down
- - Advanced computing using quantum bits.
- - Secure digital ledger technology.
- - Large sets of complex data.
- - Machines that mimic human thinking.
- - Extracting useful information from data.
- - Automated household devices.
- - Processing data near the source.
- - Technology dealing with robots.
- - Immersive digital environment.
- - Storing data on remote servers.
20 Clues: - Gadgets you can wear. • - Large sets of complex data. • - Digital or virtual currency. • - Automated household devices. • - Network of connected devices. • - Immersive digital environment. • - Technology dealing with robots. • - Storing data on remote servers. • - Fifth generation mobile network. • - Enhanced view of the real world. • - Processing data near the source. • ...
Summer Leigh Duchow #1 2025-09-03
Across
- Ready, Set?
- My ultimate plan with you
- Our red light activity
- My biggest physical fear
- My name in Stardew
- The color of my eyes
- Arms and?
- My major
- the noun end to all my letters
- Type of flora in my favorite movie
Down
- Pinky
- My favorite of your physical features
- Our Cat in Stardew
- Time period of our first LD Movie
- Your Major
- Favorite Color
- Our first date
- how bigI love you
- My roommate's name
- The dessert from our picnic
- End of sentance nickname
21 Clues: Pinky • My major • Arms and? • Your Major • Ready, Set? • Favorite Color • Our first date • how bigI love you • Our Cat in Stardew • My name in Stardew • My roommate's name • The color of my eyes • Our red light activity • My biggest physical fear • End of sentance nickname • My ultimate plan with you • The dessert from our picnic • the noun end to all my letters • Time period of our first LD Movie • ...
DSI 2026-02-10
Across
- Penyebaran kebencian di internet.
- Hak seseorang untuk melindungi data pribadinya.
- Kejahatan yang dilakukan melalui internet.
- Jejak data yang ditinggalkan saat menggunakan internet.
- Aturan hukum dalam penggunaan teknologi.
- Kesenjangan akses teknologi.
- Penggunaan software tanpa izin.
- Pencemaran nama baik di internet.
- Penyebaran berita palsu di media digital.
- Perundungan melalui media digital.
- Kemampuan menggunakan teknologi secara bijak.
Down
- Virus yang merusak sistem.
- Ketergantungan berlebihan pada teknologi.
- Penyalahgunaan teknologi untuk menipu.
- Pencurian identitas digital.
- Perilaku sopan di dunia maya.
- Upaya melindungi sistem dari serangan.
- Penyalahgunaan data pribadi.
- Perlindungan data pribadi.
- Tindakan melanggar hak cipta.
20 Clues: Virus yang merusak sistem. • Perlindungan data pribadi. • Pencurian identitas digital. • Kesenjangan akses teknologi. • Penyalahgunaan data pribadi. • Perilaku sopan di dunia maya. • Tindakan melanggar hak cipta. • Penggunaan software tanpa izin. • Penyebaran kebencian di internet. • Pencemaran nama baik di internet. • Perundungan melalui media digital. • ...
Clue #3 2024-11-03
Across
- A digital object used in security processes, such as authentication tokens for user verification.
- The science of securing information by transforming it into unreadable formats.
Down
- Ensuring data is accurate and untampered, a core principle of cybersecurity.
- A software update to fix vulnerabilities or bugs.
- A U.S. agency that develops cybersecurity standards and guidelines.
- The process of encoding data to prevent unauthorized access.
- Unwanted or unsolicited messages, often containing malicious content
7 Clues: A software update to fix vulnerabilities or bugs. • The process of encoding data to prevent unauthorized access. • A U.S. agency that develops cybersecurity standards and guidelines. • Unwanted or unsolicited messages, often containing malicious content • The science of securing information by transforming it into unreadable formats. • ...
Steven Barrow 2025-01-28
10 Clues: First Masters Degree? • High School attended? • Second Masters Degree? • Where parents are from? • Experienced in 20 years • Favorite Football team? • First Degree in College? • Born in __________ Canada? • Engineering School attended? • State that he moved to first?
Password Security 2024-09-26
Across
- What is recommended to use instead of a password for better security?
- What term describes nearly flawless simulations of people and voices created by scammers?
- What technology has enhanced hackers’ abilities to create realistic phishing, voice, and video scams?
Down
- What button in Outlook helps report suspicious emails?
- During which month is Cybersecurity Awareness Month celebrated?
- What is the name of the Cybersecurity Awareness Viva Engage community (3 words)?
- What type of authentication is abbreviated as MFA?
- What is the term for fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity?
- How many minutes can it take for hackers to discover a six-character password?
- What is the name of the company-approved, secure password manager mentioned?
10 Clues: What type of authentication is abbreviated as MFA? • What button in Outlook helps report suspicious emails? • During which month is Cybersecurity Awareness Month celebrated? • What is recommended to use instead of a password for better security? • What is the name of the company-approved, secure password manager mentioned? • ...
Cybersecurity Awareness Crossword 2024-10-17
Across
- A piece of data about your online history that creates a trail of crumbs
- A file or program that appears legitimate but is actually malicious
- Manipulating individuals to divulge confidential information
- An authentication method of verifying a user’s identity using two or more different methods
- A network security system that monitors and controls incoming and outgoing network traffic
- Software that secretly monitors and collects information from a computer
- A method of securing data by converting it into a code
- When bad actors create a fake identity to send phishing emails
Down
- A decoy system set up to attract and analyze cyber attackers
- Protects your computer from viruses
- Unauthorized access by following someone into a secure area
- A type of malware that demands payment to restore access to data
- A software update that fixes security vulnerabilities
- A secret word or phrase used to access a computer system
- Unauthorized access to data in a system
- A method of securing data by converting it into a code
- Software designed to harm or exploit any programmable device
- A scam where a person is tricked into giving personal information
18 Clues: Protects your computer from viruses • Unauthorized access to data in a system • A software update that fixes security vulnerabilities • A method of securing data by converting it into a code • A method of securing data by converting it into a code • A secret word or phrase used to access a computer system • Unauthorized access by following someone into a secure area • ...
Cybersecurity Week Crossword 2025-08-28
Across
- A person who uses computers to gain unauthorized access to data
- Sofware that automatically displays advertisements
- A small file from a website that tracks your actions
- Publishing someone's personal information online without their consent
- Practice of granting required access to authorized persons based on job requirements
- Occurs when an unauthorised person bypasses access control measures for a restricted area by being granted access through an authorised user, who subjects themselves to the access control measures
- Bulk or unwanted emails
- A combination of username, password or biometrics to authenticate access a system
- Type of attack that overwhelms a system or network with excessive requests, making it unusable to legitimate users
- A technique used to disguise the sender's identity to gain sensitive information
- A person that has the potential to or causes actual damage to an organisation through using their authorized access to systems
- Method of exploiting social interactions that trick users to reveal sensitive information to gain access to a system
Down
- Software to disrupt, damage or gain unauthorised access to a computer system
- A website used to attract hackers, without risking corporate data
- Area of study where machines are programmed to reason, learn and act similar to human intelligence
- Malicious software that prevents access to a system until a ransom is paid
- A form of social engineering that is done via email or other messages
17 Clues: Bulk or unwanted emails • Sofware that automatically displays advertisements • A small file from a website that tracks your actions • A person who uses computers to gain unauthorized access to data • A website used to attract hackers, without risking corporate data • A form of social engineering that is done via email or other messages • ...
CyberSecurity Awareness - Cyber Knowledge 2024-09-24
Across
- is a cybersecurity threat in which attackers use QR codes to redirect victims to malicious websites or prompt them to download harmful content.
- email that is not wanted, email that is sent to large numbers of people and that consists mostly of advertising
- a weakness that can be accidentally triggered or intentionally exploited
- a software update inserted (or patched) into the code of an executable program that fixes bugs, installs new drivers
- computer software that is provided usually for free but contains advertisements
- a type of malicious software—or malware—that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return. Ransomware attacks can cause costly disruptions to operations and the loss of critical information and data.
- a program that is designed to harm a computer by deleting data,
- a string of words and characters that you type in to authenticate yourself
- preventive cybersecurity action
- a scam by which an email user is duped into revealing personal or confidential information which the scammer can use illicitly
- A tailgating attack is a breach of security where an unauthorized actor gains access to a controlled area by closely following someone with legitimate access credentials.
- a usually small self-contained and self-replicating computer program that invades computers on a network and usually performs a destructive action
Down
- the act of obtaining or attempting to obtain sensitive information by manipulating an individual into revealing secure information
- measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack
- having or showing realization, perception, or knowledge
- Employs deceptive text messages (SMS) to lure victims into sharing personal information or clicking malicious links.
- software designed to interfere with a computer's normal functioning
- computer software that secretly records information about the way you use your computer
- a potential circumstance, entity or event capable of exploiting a vulnerability and causing harm
- a secret series of numbers or letters that allows you to use a computer system
- Personal Identifiable Information (PII) is defined as: Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect mean
21 Clues: preventive cybersecurity action • having or showing realization, perception, or knowledge • a program that is designed to harm a computer by deleting data, • software designed to interfere with a computer's normal functioning • a weakness that can be accidentally triggered or intentionally exploited • ...
1-mavzu: Kiberxavfsizlik (xalqaro hujjatlar va chet el tajribasi) 2025-12-18
Across
- : Yevropa ma’lumotlarni himoyalash qonuni
- : Axborot xavfsizligi standarti
- : Axborot va tizimlarni himoyalash sohasi
- : Kiberxavfsizlik strategiyasiga ega xalqaro tashkilot
- : Zararli dasturiy ta’minot
- : Ma’lumotlarni shifrlash jarayoni
Down
- : Tizimlarga qilingan raqamli hujum
- : Aldov orqali ma’lumot o‘g‘irlash usuli
- : Tarmoqni himoyalovchi dastur yoki qurilma
- : Yevropa kiberxavfsizlik agentligi
10 Clues: : Zararli dasturiy ta’minot • : Axborot xavfsizligi standarti • : Ma’lumotlarni shifrlash jarayoni • : Tizimlarga qilingan raqamli hujum • : Yevropa kiberxavfsizlik agentligi • : Aldov orqali ma’lumot o‘g‘irlash usuli • : Yevropa ma’lumotlarni himoyalash qonuni • : Axborot va tizimlarni himoyalash sohasi • : Tarmoqni himoyalovchi dastur yoki qurilma • ...
inglês técnico 2025-07-29
Across
- Rede de computadores
- Protege redes contra acessos não autorizados
- Rede global de comunicação
- Técnica de codificação de informações
- Sequência de passos para resolver um problema
- Partes físicas do computador
- Correção de erros em programas
- Dispositivo que direciona dados na rede
Down
- Computador
- Programas de computador
- Banco de dados
- Ponto de interação entre usuário e sistema
- Segurança cibernética
- Armazenamento e processamento remoto
- Servidor que armazena e gerencia dados
15 Clues: Computador • Banco de dados • Rede de computadores • Segurança cibernética • Programas de computador • Rede global de comunicação • Partes físicas do computador • Correção de erros em programas • Armazenamento e processamento remoto • Técnica de codificação de informações • Servidor que armazena e gerencia dados • Dispositivo que direciona dados na rede • ...
TIMPANOGOS NIST VPN FULTON COMPASSIONATE CLOUD 4 FORENSICS CYBERSECURITY AMBASSADORS 2024-11-30
10 Clues: elective: Forensics • standards body: NIST • work connection: VPN • for IT&C Home: Fulton • of unofficial emphases: 4 • BYU give back: Ambassadors • of the Wasatch 7: Timpanogos • Domain, Different Era: Cloud • honors at NIATEC: CyberSecurity • opportunity (good person): Compassionate
BUSINESS -SET E 2026-02-09
10 Clues: Using time well • Total cost per unit • Money earned by business • Protecting computer systems • Productivity improves living • Cost of producing everything • Department that handles money • Using machines to reduce work • Department that sells products • Teaching workers at the workplace
CSec 2023-11-01
Across
- Cybersecurity work result that gives a conclusive statement about the status of the cybersecurity-related quotation, concept, implementation, verification and validation activities within a project.
Down
- Role responsible to create the cybersecurity concept.
- Abbreviation used for Cybersecurity Engineering process.
- The international standard for the automotive industry, addressing cybersecurity risks within modern road vehicles.
4 Clues: Role responsible to create the cybersecurity concept. • Abbreviation used for Cybersecurity Engineering process. • The international standard for the automotive industry, addressing cybersecurity risks within modern road vehicles. • ...
Cybercryptics: A Crossword for the IT Detective 2023-10-31
Across
- Protection against malware
- Intelligence The wizard behind the curtain
- The superhero of software integration
- Data recovery
- A magical land of digital storage in the sky
- Online scam
- Analytics The detective of the data world
- Interconnected computers
- Website address
- The defender of the digital realm
- Computer programs
- Network Security Barrier
Down
- A code-scrambling lock for your data
- Digital ledger
- Wreaks havoc on your computer
- Network traffic controller
- Malicious Software
- Central data host
- of Things The tech spider web connecting all the things
- Information storage
20 Clues: Online scam • Data recovery • Digital ledger • Website address • Central data host • Computer programs • Malicious Software • Information storage • Interconnected computers • Network Security Barrier • Protection against malware • Network traffic controller • Wreaks havoc on your computer • The defender of the digital realm • A code-scrambling lock for your data • ...
Trade school vs 4-year college 2024-02-26
Across
- provide health care info
- works with customers
- program systems that work with info
- works with money
- justices for criminals
- Bills medicine
- could be describes as beauty worker
- combination vehicle driver
- cheaper and takes less time
Down
- therapist that messages
- Air vehicle maintenance
- administrate healthcare
- culinary trade
- Heating, ventilation, and air conditioning
- program info tech
- Longer and more expensive
- protecting online platforms
- works with hair
- diagnose and fix cars
- work with different metals
20 Clues: culinary trade • Bills medicine • works with hair • works with money • program info tech • works with customers • diagnose and fix cars • justices for criminals • therapist that messages • Air vehicle maintenance • administrate healthcare • provide health care info • Longer and more expensive • combination vehicle driver • work with different metals • protecting online platforms • ...
Digital Citizenship Vocabulary 2022-05-09
Across
- digital data.
- Legal protection of intellectual
- Data and files are available to
- goods or services.
- Responsible use of technology
- unlawful or criminal use
- Using the intellectual property of
- Equal access to the Internet.
- A benchmark model for website
Down
- Everything you leave behind on the
- Privacy of data.
- Privacy of data.
- Unauthorized access to data or a
- The state of being protected
- A word, phrase, or symbol
- as your own.
- Data has not been tampered with.
- Online behavior
- using, or selling an
- Digital etiquette
- A right to prevent others from
- Internet Service Provider
22 Clues: as your own. • digital data. • Online behavior • Privacy of data. • Privacy of data. • Digital etiquette • goods or services. • using, or selling an • unlawful or criminal use • A word, phrase, or symbol • Internet Service Provider • The state of being protected • Responsible use of technology • Equal access to the Internet. • A benchmark model for website • A right to prevent others from • ...
How well do you know the Gagnon Family? 2023-12-03
Across
- Christina's career field
- Travis's nemesis
- Travis's career field
- Corbin's favorite band
- Best weather in the world
- Savior of the world
- Edmond's hobby horse
- Welcome to ________, I love you
- Travis and Christina's shared heritage
- Where Edmond met Eugene
- Edmond's overlord
- Where Travis met Christina
Down
- Former cult leader
- Best grocery store outside of Texas
- Edmond's career field
- Edmond's roommate
- Corbin's roommate
- Best burger chain
- Corbin's birthplace
- Christina's obsession
- Travis's favorite vacation
- Favorite car maker
- Where Corbin met Philip
- Best grocery store in Texas
- Christina's favorite band
25 Clues: Travis's nemesis • Edmond's roommate • Corbin's roommate • Best burger chain • Edmond's overlord • Former cult leader • Favorite car maker • Corbin's birthplace • Savior of the world • Edmond's hobby horse • Edmond's career field • Travis's career field • Christina's obsession • Corbin's favorite band • Where Corbin met Philip • Where Edmond met Eugene • Christina's career field • ...
