cybersecurity Crossword Puzzles

Cybersecurity Awareness Month 2024-10-18

Cybersecurity Awareness Month crossword puzzle
Across
  1. Common type of cyberattack where the hacker encrypts your files and demands payment.
  2. A ____ test is performed to identify vulnerabilities in a system.
  3. This form of attack tries to trick you into giving personal information via fake websites or emails.
  4. A phishing attack done over the phone.
  5. The process of verifying someone's identity.
  6. A strong, complex one helps protect your accounts.
Down
  1. A person who attempts to gain unauthorized access to your system.
  2. A type of phishing attack done over text messages.
  3. A software that fights off malicious viruses and malware.
  4. The backbone of secure communication online, abbreviated as SSL.
  5. Protection against unauthorized changes to data.
  6. Multi-Factor Authentication is shortened to this.
  7. A harmful program disguised as legitimate software.
  8. A malicious code that spreads from computer to computer.

14 Clues: A phishing attack done over the phone.The process of verifying someone's identity.Protection against unauthorized changes to data.Multi-Factor Authentication is shortened to this.A type of phishing attack done over text messages.A strong, complex one helps protect your accounts.A harmful program disguised as legitimate software....

April Issue Highlights 2022-04-14

April Issue Highlights crossword puzzle
Across
  1. protects a user's data
  2. found behind the wall
  3. often used in food storage
Down
  1. ex. HEPA
  2. show, type of industry event
  3. down, slowing down usage
  4. what a doctor treats
  5. a special joint to prevent something from coming apart

8 Clues: ex. HEPAwhat a doctor treatsfound behind the wallprotects a user's datadown, slowing down usageoften used in food storageshow, type of industry eventa special joint to prevent something from coming apart

Department of Homeland Security Crossword 2024-03-17

Department of Homeland Security Crossword crossword puzzle
Across
  1. One weakness; complex rules
  2. One strength; quickly
  3. Why DOH was created
  4. Protecting critical infrastructure
Down
  1. One weakness; limits on funding
  2. Department which helps guards the USA from threats
  3. Identifying and mitigating terrorist threats
  4. One strength; brings together

8 Clues: Why DOH was createdOne strength; quicklyOne weakness; complex rulesOne strength; brings togetherOne weakness; limits on fundingProtecting critical infrastructureIdentifying and mitigating terrorist threatsDepartment which helps guards the USA from threats

Cybersecurity is Awesome 2019-11-28

Cybersecurity is Awesome crossword puzzle
Across
  1. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  2. An attack that tricks a user into clicking a webpage element which is invisible or disguised as another element, which may allow attackers to steal credentials or reveal other confidential information.
  3. Second component of the famous InfoSec triad.
  4. A function that can be used to map data of arbitrary size to fixed-size values.
  5. A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
  6. An attack that aims to access files and directories that are stored outside the web root folder.
  7. Third component of the famous InfoSec triad.
Down
  1. An attack where the attacker secretly relays and possibly alters the communications between two parties.
  2. The original name of AES, a specification used for the encryption of electronic data.
  3. A method of trying to gather personal information using deceptive e-mails and websites.
  4. First component of the famous InfoSec triad.
  5. An attack where the attacker submits many passwords / passphrases with the hope of eventually guessing it correctly.
  6. A web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database.
  7. _________ occurs when a program tries to store more data in a temporary storage area than it can hold.

14 Clues: First component of the famous InfoSec triad.Third component of the famous InfoSec triad.Second component of the famous InfoSec triad.A function that can be used to map data of arbitrary size to fixed-size values.The original name of AES, a specification used for the encryption of electronic data....

Product Cybersecurity Awareness 2023-10-09

Product Cybersecurity Awareness crossword puzzle
Across
  1. - weakness of an asset or control that can be exploited by one or more threats
  2. - property that information is not made available or disclosed to unauthorized individuals, entities, or processes
  3. part that is logically and technically separable
  4. - object that has value, or contributes to value
  5. - the process of encoding information to protect information from unauthorized access
  6. - property of being accessible and usable on demand by an authorized entity
  7. - provision of assurance that a claimed characteristic of an entity is correct
  8. - property of accuracy and completeness
Down
  1. - a segment of code or a program designed to take advantage of a flaw in a computer system
  2. - security process that determines a user or service's level of access
  3. - the assurance that someone cannot deny the validity of something
  4. - occurrence or change of a particular set of circumstances
  5. - estimate of magnitude of damage or physical harm from a damage scenario
  6. - person, group, or organization that carries out an attack path

14 Clues: - property of accuracy and completenesspart that is logically and technically separable- object that has value, or contributes to value- occurrence or change of a particular set of circumstances- person, group, or organization that carries out an attack path- the assurance that someone cannot deny the validity of something...

Lilly and Shehan 2024-08-16

Lilly and Shehan crossword puzzle
Across
  1. Couples' Favorite country
  2. Groom's favorite video game
  3. The groom was the captain of this sport in school
  4. Brides first workplace
  5. What field does the groom work in
  6. Where they first met
Down
  1. Brides Favorite Food
  2. Groom's best friend
  3. Something the bride loves to do
  4. What did the bride give for the grooms friends to win their approval
  5. The groom killed this animal out of cute aggression
  6. where the bride works
  7. Brides favorite dance move

13 Clues: Groom's best friendBrides Favorite FoodWhere they first metwhere the bride worksBrides first workplaceCouples' Favorite countryBrides favorite dance moveGroom's favorite video gameSomething the bride loves to doWhat field does the groom work inThe groom was the captain of this sport in schoolThe groom killed this animal out of cute aggression...

Cybersecurity Fundamental Chapter 7 2024-06-05

Cybersecurity Fundamental Chapter 7 crossword puzzle
Across
  1. A model used in cybersecurity to describe the stages of an information systems attack.
  2. Enhancing the security of an individual computer system by securing the operating system, implementing antivirus solutions, and using host-based security tools like firewalls and intrusion detection systems.
  3. The first stage in the Kill Chain where the attacker gathers information about the target to find vulnerabilities that can be exploited later.
  4. The process of securing network devices by implementing proven methods such as securing administrative access, maintaining strong passwords, and using secure communication protocols to protect against vulnerabilities and attacks.
  5. A technology used for tracking and identifying objects using radio waves.
  6. The fifth stage in the Kill Chain where malware and backdoors are installed on the target system, allowing the attacker to maintain access.
  7. The second stage in the Kill Chain where the attacker creates an exploit and malicious payload to use against the target.
  8. The fourth stage in the Kill Chain where the attacker executes the exploit to take advantage of a vulnerability in the target system.
Down
  1. The process of improving the security of servers by managing remote access, securing privileged accounts, and monitoring services to prevent unauthorized access and attacks.
  2. The sixth stage in the Kill Chain where the attacker establishes remote control over the compromised target through a command and control channel or server.
  3. Measures taken to protect physical assets such as network devices, servers, and other infrastructure components from physical threats like theft, vandalism, and natural disasters.
  4. Implementing security measures to ensure the confidentiality, integrity, and availability of data. This includes file access control and other techniques to protect data from unauthorized access and corruption.
  5. The final stage in the Kill Chain where the attacker performs malicious actions such as information theft or launching additional attacks from within the network.
  6. The third stage in the Kill Chain where the attacker sends the exploit and malicious payload to the target, typically through email or other methods.
  7. Refers to the area or scope of cybersecurity activities and responsibilities, encompassing the protection of systems, networks, and data from cyber threats.
  8. Measures and practices used to secure end devices such as workstations, servers, IP phones, and access points within a network.

16 Clues: A technology used for tracking and identifying objects using radio waves.A model used in cybersecurity to describe the stages of an information systems attack.The second stage in the Kill Chain where the attacker creates an exploit and malicious payload to use against the target....

Cybersecurity Awareness 2023-10-12

Cybersecurity Awareness crossword puzzle
Across
  1. Tool that helps users create, save, and manage passwords
  2. Fraudulent practice of sending emails or other messages pretending to be from a legitimate source trying to convince you to click on a link
  3. A phishing attack conducted by phone
  4. A person who engages in criminal activity by means of computers or the internet
Down
  1. Being protected against criminal or unauthorized use of electronic data, or the measures taken to achieve this
  2. Multifactor Authentication
  3. A secret word or phrase that must be used to gain access to something
  4. Use of deception to manipulate individuals into divulging confidential or personal information
  5. Malicious software designed to block access to a computer system until a sum of money is paid

9 Clues: Multifactor AuthenticationA phishing attack conducted by phoneTool that helps users create, save, and manage passwordsA secret word or phrase that must be used to gain access to somethingA person who engages in criminal activity by means of computers or the internet...

Cybersecurity Puzzle 2024-10-14

Cybersecurity Puzzle crossword puzzle
Across
  1. using historical data and advanced predictive algorithms
  2. AI- driven systems demonstrate this against evolving threats
  3. One of the databases used in the study
  4. a form of network intrusion
  5. pose an ever-growing challenge to security
Down
  1. researchers argue that this approach will simplify cybersecurity
  2. A form of cyber applications of AI bas
  3. A critical concern against AI systems
  4. one of the various facets of cyber security

9 Clues: a form of network intrusionA critical concern against AI systemsA form of cyber applications of AI basOne of the databases used in the studypose an ever-growing challenge to securityone of the various facets of cyber securityusing historical data and advanced predictive algorithmsAI- driven systems demonstrate this against evolving threats...

Cybersecurity crossword 2024-11-07

Cybersecurity crossword crossword puzzle
Across
  1. A secure network that hides your IP address and encrypts your internet connection to protect privacy.
  2. An affordable mini-computer for learning.
  3. A security method that requires two forms of verification
Down
  1. A software that lets you run different operating systems on the same computer.
  2. The process of converting information into a code to stop unauthorized access.
  3. A weakness in a system that can be exploited to gain unauthorized access.
  4. Software that secretly monitors and collects data without the user's consent.
  5. Attack where an intruder intercepts to spy on or alter an exchange.
  6. An attack method that tries all possible combinations to guess a password or encryption key.

9 Clues: An affordable mini-computer for learning.A security method that requires two forms of verificationAttack where an intruder intercepts to spy on or alter an exchange.A weakness in a system that can be exploited to gain unauthorized access.Software that secretly monitors and collects data without the user's consent....

Black Hat Crossword 2020-07-27

Black Hat Crossword crossword puzzle
Across
  1. Where computers can fly
  2. Distant labor
  3. Not your Grandmother's Tuna
Down
  1. Defensive computing
  2. For Loops
  3. Troy's Downfall

6 Clues: For LoopsDistant laborTroy's DownfallDefensive computingWhere computers can flyNot your Grandmother's Tuna

Cybersecurity Month 2022-07-29

Cybersecurity Month crossword puzzle
Across
  1. A specifically configured server, also known as decoy server, designed to attract and monitor intruders in a manner such that their actions do not affect production systems
  2. A malware software that seems legitimate enough that users voluntarily install them onto their computers, allowing the malware to infect their systems.
  3. a form of cyberattack that infect and spread through computer systems without an action from the user; they can operate on their own and spread by exploiting vulnerabilities within the victim's operating system
  4. A large number of compromised computers that are used to create and send spam or viruses or flood a network with messages such as a denial-of-service attack
  5. Finding and exploiting vulnerabilities in a system or on a website
Down
  1. The process of taking an unencrypted message (plaintext), applying a mathematical function to it (encryption algorithm with a key) and producing an encrypted message (ciphertext)
  2. This is a type of electronic mail (email) attack that attempts to convince a user that the originator is genuine, by with the intention of obtaining information for use in social engineering
  3. A highly sophisticated cyber threat as criminals work hard to make spoofed emails and websites appear as realistic and possible
  4. disrupts computer operations, gathers sensitive information or gains access to private computer systems through the use of code, scripts, active content and other forms of software; abbreviation for malicious software

9 Clues: Finding and exploiting vulnerabilities in a system or on a websiteA highly sophisticated cyber threat as criminals work hard to make spoofed emails and websites appear as realistic and possibleA malware software that seems legitimate enough that users voluntarily install them onto their computers, allowing the malware to infect their systems....

Cybersecurity Ylan 2024-11-07

Cybersecurity Ylan crossword puzzle
Across
  1. A test used to verify if a user is human and not a robot.
  2. A program that protects your computer from viruses.
  3. Network of devices connected to the internet to exchange data.
  4. A company that makes equipment and software to help connect and protect computer networks.
  5. A secret part of the internet, often used for anonymous activities.
Down
  1. A unique number that identifies a computer or device on the internet or a network.
  2. A protocol used to connect and control a remote computer.
  3. A secret word or code to log in.
  4. A person who tries to break into computers illegally.

9 Clues: A secret word or code to log in.A program that protects your computer from viruses.A person who tries to break into computers illegally.A protocol used to connect and control a remote computer.A test used to verify if a user is human and not a robot.Network of devices connected to the internet to exchange data....

it work 2023-03-24

it work crossword puzzle
Across
  1. pocket sized computer
  2. information
  3. data entered into and received by a computer
  4. practice of protecting a system from digital attacks
  5. gaining unauthorized access to a system or account
Down
  1. a programming language
  2. how a computer displays data
  3. data that sits outside of the trend
  4. fraudulent emails sent to obtain personal information
  5. method of data depiction

10 Clues: informationpocket sized computera programming languagemethod of data depictionhow a computer displays datadata that sits outside of the trenddata entered into and received by a computergaining unauthorized access to a system or accountpractice of protecting a system from digital attacksfraudulent emails sent to obtain personal information

SANS CyberSecurity Crossword 2021-01-11

SANS CyberSecurity Crossword crossword puzzle
Across
  1. A network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
  2. An attempt by hackers to damage or destroy a computer network or system.
  3. Computational Procedure
  4. Conceals the data’s original meaning to prevent it from being known or used.
  5. A software exploit that involves a combination of attacks against different vulnerabilities (7,6)
  6. A standalone malware computer program that replicates itself in order to spread to other computers
  7. Used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. (9,4)
  8. Text files with small pieces of data
  9. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Down
  1. Designed to detect and destroy computer viruses
  2. Any malicious computer program which is used to hack into a computer by misleading users of its true intent.(6,5)
  3. A large number of compromised computers
  4. The activity of defrauding an online account holder of financial information by posing as a legitimate company.
  5. Often installed after a compromise happens (4,4)

14 Clues: Computational ProcedureText files with small pieces of dataA large number of compromised computersDesigned to detect and destroy computer virusesOften installed after a compromise happens (4,4)An attempt by hackers to damage or destroy a computer network or system.Conceals the data’s original meaning to prevent it from being known or used....

Cybersecurity Awareness Month 2024-10-16

Cybersecurity Awareness Month crossword puzzle
Across
  1. A type of malware that demands payment in exchange for restoring access to data
  2. A type of malicious software that replicates itself by attaching to other programs or files, potentially causing harm to computer systems, networks, or data.
  3. Creating a copy of data to prevent its loss in case of a disaster or data breach
  4. A type of software that is designed to damage or exploit a computer system
  5. The process of converting data into a secure format to prevent unauthorized access and ensure confidentiality.
  6. The potential for loss or damage when a threat exploits a vulnerability, often assessed in terms of likelihood and impact on organizational assets.
  7. The process of verifying the identity of a user, device, or system
Down
  1. A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
  2. Type of malware that allows an attacker to remotely control a system or network
  3. A network that encrypts internet connections and helps secure remote access to a network
  4. Adhering to regulatory requirements and industry standards for data protection and privacy in cloud environments
  5. Unsolicited, unwanted, and often malicious messages sent in bulk.
  6. Attack where an attacker gains unauthorized access to a system or network
  7. The act of revising software or systems to fix vulnerabilities and enhance security against emerging threats.

14 Clues: Unsolicited, unwanted, and often malicious messages sent in bulk.The process of verifying the identity of a user, device, or systemAttack where an attacker gains unauthorized access to a system or networkA type of software that is designed to damage or exploit a computer system...

Draeko Cybersecurity Crossword 2024-10-26

Draeko Cybersecurity Crossword crossword puzzle
Across
  1. A form of malware that encrypts a user’s data and demands payment to unlock it.
  2. Malware that gathers information about a person or organization without their knowledge.
  3. Malware that gathers information about a person or organization without their knowledge.
  4. A network security device or software that monitors and controls incoming and outgoing traffic.
  5. A simulated cyberattack to evaluate the security of a system.
  6. An extra layer of security requiring two forms of identification for access.
Down
  1. The psychological manipulation of people to disclose confidential information.
  2. Software intentionally designed to cause damage, such as viruses, worms, and Trojans.
  3. The process of converting information into a code to prevent unauthorized access.
  4. A type of social engineering attack where attackers trick users into revealing personal information.
  5. A trial-and-error method used to guess passwords or encryption keys.
  6. An attack where multiple systems flood a target, causing denial of service.
  7. A tool that encrypts internet traffic and hides a user’s IP address.
  8. A flaw in software that is unknown to the vendor and, therefore, unpatched.
  9. A network of infected devices controlled remotely by a hacker, typically to launch large-scale attacks.

15 Clues: A simulated cyberattack to evaluate the security of a system.A trial-and-error method used to guess passwords or encryption keys.A tool that encrypts internet traffic and hides a user’s IP address.An attack where multiple systems flood a target, causing denial of service.A flaw in software that is unknown to the vendor and, therefore, unpatched....

Internet Safety Crossword 2021-02-11

Internet Safety Crossword crossword puzzle
Across
  1. someone who witnesses but doesn't participate
  2. a person who stands up for someone else
  3. footprint information about a person found online
  4. if something makes you feel sad or uncomfortable tell a _______ adult trusted
  5. bullying using technology
  6. information information that can identify someone
Down
  1. securing information on the internet
  2. good manners online
  3. can be trusted
  4. software intended to do damage to computers
  5. too much information

11 Clues: can be trustedgood manners onlinetoo much informationbullying using technologysecuring information on the interneta person who stands up for someone elsesoftware intended to do damage to computerssomeone who witnesses but doesn't participatefootprint information about a person found onlineinformation information that can identify someone...

Topic 7 - Development of Computer Industry and Law 2024-05-02

Topic 7 - Development of Computer Industry and Law crossword puzzle
Across
  1. In Malaysia, a core legislation in governing the communications and multimedia industry is called
  2. What vendor is ranked first for the semiconductor industry in 2018
  3. Sector that handles communication on a global scale and create infrastructure that allows any type of data sending
  4. Computer system resources and services that can be accessed over the cloud
  5. Cyber law exists to handle cybersecurity and…
  6. Digital form of value that can be used as a token for transaction electronically
  7. The act of analyzing data, create conclusion about that information, and make a future prediction out of it is called
  8. Devices of information-age products are called
  9. Law that cover all internet-related technologies and provide a legal system for controlling it is called
  10. Hardware component that acts as the “brain” of a desktop computer, that could performs both arithmetic and operations, is called
Down
  1. Institution that is responsible for the abuse of telecommunicating services done by the industries in that certain sector is called
  2. In telecommunication industry, who manufacture and sell telecommunications equipment
  3. Design/infrastructure of information resource that can be navigated efficiently
  4. The process of protecting systems, data, and networks from cyber attacks is called
  5. In telecommunication industry, who operate and provide access to deliver services via internet
  6. Major segments of telecommunication industry besides equipment vendors and service providers
  7. The most important legislation that applies to telecoms (including internet)
  8. What is the leading computer manufacturing company that based in Taiwan
  9. What institution that serve as the telecommunications regulator in Malaysia
  10. Two of the most leading countries that controlled more than 80% of the semiconductor industry are U.S. and…

20 Clues: Cyber law exists to handle cybersecurity and…Devices of information-age products are calledWhat vendor is ranked first for the semiconductor industry in 2018What is the leading computer manufacturing company that based in TaiwanComputer system resources and services that can be accessed over the cloud...

IO LA SO 2023-05-31

IO LA SO crossword puzzle
Across
  1. Truffa informatica via e-mail
  2. Programma di videoscrittura creato da Microsoft
  3. Il foglio di Excel è fatto di righe e ....
  4. Icona da cliccare per segnalare un sospetto phishing
  5. Non lasciare mai il tuo dispositivo aziendale....
  6. Programma di social networking aziendale
  7. Programma per fogli di calcolo
Down
  1. Sicurezza informatica (ingl.)
  2. Riunione organizzata attraverso la piattaforma Zoom
  3. Teams permette di lavorare e modificare ......files condivisi
  4. Strumento per realizzare presentazioni illustrate
  5. Programma di posta elettronica

12 Clues: Sicurezza informatica (ingl.)Truffa informatica via e-mailProgramma di posta elettronicaProgramma per fogli di calcoloProgramma di social networking aziendaleIl foglio di Excel è fatto di righe e ....Programma di videoscrittura creato da MicrosoftStrumento per realizzare presentazioni illustrateNon lasciare mai il tuo dispositivo aziendale.......

Cybersecurity 2.2 2022-02-22

Cybersecurity 2.2 crossword puzzle
Across
  1. Software running with elevated privileges to control a computer or to gain access to restricted accounts and data
  2. Problems, faults, and bugs in the program that are exploitable, allowing attackers access to the computer on which the program is running
  3. A file that contains an official record of activities that occur on a computer
  4. software that replicates and infects many computers, turning the computer into a "zombie"
  5. Reverse the encryption process, making the data human-readable again
Down
  1. A human-based attack in which the malicious user intercepts communication between the victim's computer and the internet
  2. Software and hardware that track all keyboard clicks, including back spaces, to discover usernames, passwords, credit card numbers, and other sensitive information
  3. Small units of data, transmitted on a network. Collected together, they compose some larger data, such as a document, a website, a movie, etc
  4. Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it

9 Clues: Reverse the encryption process, making the data human-readable againA file that contains an official record of activities that occur on a computersoftware that replicates and infects many computers, turning the computer into a "zombie"Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it...

Cybersecurity Month 2022-10-13

Cybersecurity Month crossword puzzle
Across
  1. ________ Information must be protected from leaks or accidental exposure.
  2. Button in Outlook to report suspicious email or phishing in one click.
  3. _______ Period is the length of time information assets are maintained for an authorized person.
  4. Security _______ is a single or series of unwanted or unexpected information Security Events
Down
  1. What is celebrated in October?
  2. Information is accessible to authorized users.
  3. Information is accurate, complete, and reliable.
  4. Mail that seeks to offer services, products, or advertisements but it could be from either a genuine company or a cybercriminal trying to trick you.
  5. A Security ______ is an identified occurrence within a system, service, or network that may be security relevant.

9 Clues: What is celebrated in October?Information is accessible to authorized users.Information is accurate, complete, and reliable.Button in Outlook to report suspicious email or phishing in one click.________ Information must be protected from leaks or accidental exposure....

Cybersecurity Attacks 2023-04-15

Cybersecurity Attacks crossword puzzle
Across
  1. With _____, the victim’s system is held hostage until they agree to pay money to the attacker.
  2. A _____ attack occurs when a malicious actor sends emails that seem to be coming from trusted, legitimate sources in an attempt to grab sensitive information from the target.
  3. In a _____ attack, a hacker embeds malicious code into an insecure website.
  4. A _____ attack gets its name from the “brutish” or simple methodology employed by the attack. The attacker simply tries to guess the login credentials of someone with access to the target system.
Down
  1. A _____ attack uses a malicious program that is hidden inside a seemingly legitimate one
  2. _____ types of cyber attacks refer to breaches in cybersecurity that make it possible for an attacker to eavesdrop on the data sent back and forth between two people, networks, or computers.
  3. A _____ attack is designed to overwhelm the resources of a system to the point where it is unable to reply to legitimate service requests.
  4. _____ infects a computer and changes how it functions, destroys data, or spies on the user or network traffic as it passes through.
  5. With _____, a hacker alters DNS records to send traffic to a fake website.

9 Clues: With _____, a hacker alters DNS records to send traffic to a fake website.In a _____ attack, a hacker embeds malicious code into an insecure website.A _____ attack uses a malicious program that is hidden inside a seemingly legitimate oneWith _____, the victim’s system is held hostage until they agree to pay money to the attacker....

Cybersecurity puzzle 2023-04-21

Cybersecurity puzzle crossword puzzle
Across
  1. related to your identity or personal information
  2. looking over someones shoulder to get information
  3. a file or code
  4. takes over your computer
Down
  1. the opposite to a virus
  2. knowledge obtained from investigating
  3. a type of malware that can copy itself
  4. data
  5. a network of computer infected by malware
  6. and individual who uses computer networking to overcome a technical problem

10 Clues: dataa file or codethe opposite to a virustakes over your computerknowledge obtained from investigatinga type of malware that can copy itselfa network of computer infected by malwarerelated to your identity or personal informationlooking over someones shoulder to get information...

day two - know your coworker 2022-03-27

day two - know your coworker crossword puzzle
Across
  1. shortest POV (__ minutes)
  2. POV?
  3. To which cybersecurity framework is Pentera mapped?
Down
  1. Morgan's end of night in Greece
  2. first of 2022
  3. Dor's favorite fruit
  4. How much RAM is needed for a Pentera RAN installation
  5. Maayan's second name
  6. One of Pentera's features
  7. Who said "Tenerife is great and dolphins are amazing but... Q1 isn't over yet!"

10 Clues: POV?first of 2022Dor's favorite fruitMaayan's second nameshortest POV (__ minutes)One of Pentera's featuresMorgan's end of night in GreeceTo which cybersecurity framework is Pentera mapped?How much RAM is needed for a Pentera RAN installationWho said "Tenerife is great and dolphins are amazing but... Q1 isn't over yet!"

Technology 2024-03-18

Technology crossword puzzle
Across
  1. Wireless technology for short-range communication.
  2. Security barrier for network traffic.
  3. Software that manages computer resources.
  4. Protection of computer systems from theft or damage.
Down
  1. Writing instructions for computers to execute.
  2. Measurement and analysis of unique physical characteristics.
  3. Software for accessing the internet.
  4. Global Positioning System for location tracking.
  5. This vast network connects computers worldwide.
  6. Artificial Intelligence Software

10 Clues: Artificial Intelligence SoftwareSoftware for accessing the internet.Security barrier for network traffic.Software that manages computer resources.Writing instructions for computers to execute.This vast network connects computers worldwide.Global Positioning System for location tracking.Wireless technology for short-range communication....

Cybersecurity 3 2024-07-30

Cybersecurity 3 crossword puzzle
Across
  1. Org at this level perform annual vulnerability scan
  2. Level 5 in CMM framework
  3. one of network scanning tool
  4. ... server - one of the observation class in VA
  5. ... configuration another observation class in VA
Down
  1. Team is tasked to conduct testing with objective to break app
  2. Type of testing which is concerned only with input-output ... box
  3. PT is by nature ...
  4. one of the tools used to conduct unauthenticated scan

9 Clues: PT is by nature ...Level 5 in CMM frameworkone of network scanning tool... server - one of the observation class in VA... configuration another observation class in VAOrg at this level perform annual vulnerability scanone of the tools used to conduct unauthenticated scanTeam is tasked to conduct testing with objective to break app...

CyberSecurity 2 2024-07-24

CyberSecurity 2 crossword puzzle
Across
  1. New team structure which combines application support and new work
  2. IAM differentiates between Authenticate and ...
  3. Non-human identity example
  4. Category A3 in top 10 application weaknesses
Down
  1. weakness in application
  2. Failures related to hardcoded passwords
  3. faster method of code delivery
  4. We differentiate betn User and ...
  5. ISO27000 has 14 different categories of ...

9 Clues: weakness in applicationNon-human identity examplefaster method of code deliveryWe differentiate betn User and ...Failures related to hardcoded passwordsISO27000 has 14 different categories of ...Category A3 in top 10 application weaknessesIAM differentiates between Authenticate and ......

Cybersecurity Awareness 2024-10-20

Cybersecurity Awareness crossword puzzle
Across
  1. Irrelevant or inappropriate messages sent over the internet.
  2. Fraudulent scheme, often involving money or personal information.
  3. A form of phishing using SMS or text messages.
  4. Theft Stealing personal or sensitive information without permission.
  5. Engineering Manipulative techniques to trick people into giving up confidential information.
Down
  1. Two-factor authentication, an extra layer of security for online accounts.
  2. Fraudulent attempt to obtain sensitive information through deceptive emails.
  3. Malicious software designed to harm or exploit devices.
  4. Unauthorized access to data in a system.

9 Clues: Unauthorized access to data in a system.A form of phishing using SMS or text messages.Malicious software designed to harm or exploit devices.Irrelevant or inappropriate messages sent over the internet.Fraudulent scheme, often involving money or personal information.Theft Stealing personal or sensitive information without permission....

Cybersecurity Crossword 2023-09-15

Cybersecurity Crossword crossword puzzle
Across
  1. A secure service that connects to another network remotely.
  2. Should be made up of upper and lower case letters, special characters and numbers.
  3. Fraudulent emails or messages tricking people into giving up their personal info.
  4. Someone who breaks into computer systems to obtain unauthorized access to data.
  5. When a hacker successfully accesses a network or device vulnerabilities and gains access to the device's files and data.
Down
  1. A type of malware that spreads through computers and corrupts data and software.
  2. A type of malware that locks users out of their computer in exchange for a ransom.
  3. A malware that gathers information about a person or organization without their permission.
  4. Unauthorized access to or from a private network is prevented by this hardware/software.

9 Clues: A secure service that connects to another network remotely.Someone who breaks into computer systems to obtain unauthorized access to data.A type of malware that spreads through computers and corrupts data and software.Fraudulent emails or messages tricking people into giving up their personal info....

Cybersecurity Crossword 2022-12-16

Cybersecurity Crossword crossword puzzle
Across
  1. a relatively new cyberattack technique that injects malicious code within digital ads
  2. a malware type in which security mechanism is bypassed to access a system
  3. a type of malware which replicates from one computer to another
  4. refer to the weak point in software code which can be exploited by a threat actor. They are most commonly found in an application like SaaS (Software as a service) software.
  5. the person who explores methods for breaching defenses and exploiting weaknesses in a computer system or network
Down
  1. a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid
  2. a cybercrime that happens when someone impersonates a trusted contact or brand, pretending to be someone you trust in order to access sensitive personal information
  3. refers to any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems
  4. an attack that attempts to steal your money, or your identity, by getting you to reveal personal information on websites that pretend to be legitimate

9 Clues: a type of malware which replicates from one computer to anothera malware type in which security mechanism is bypassed to access a systema relatively new cyberattack technique that injects malicious code within digital adsthe person who explores methods for breaching defenses and exploiting weaknesses in a computer system or network...

Cybersecurity vocab 2021-09-28

Cybersecurity vocab crossword puzzle
Across
  1. available to anyone
  2. The process of validating a user.
  3. A type of hacking that uses every combination or guess to gain authorization.
  4. when users cycle through multiple roles.
  5. when trust relationship is considered two way.
  6. used to decrypt data and given to one person.
Down
  1. what you leave behind on the internet.
  2. the measurement or analysis of a biological feature to validate a user.
  3. when credentials are falsely authorized.

9 Clues: available to anyoneThe process of validating a user.what you leave behind on the internet.when credentials are falsely authorized.when users cycle through multiple roles.used to decrypt data and given to one person.when trust relationship is considered two way.the measurement or analysis of a biological feature to validate a user....

Cybersecurity Crossword 2023-02-15

Cybersecurity Crossword crossword puzzle
Across
  1. A method cyber criminals use to lure you into giving away personal information by disguising as people you trust
  2. The practice of defending computers, mobile devices and IT systems against cyber criminals
  3. A series of letters, numbers and symbols to protect your device and online accounts
  4. The act of using more than one type of information to identify who you are in order to grant access to your online account
Down
  1. A type of malware that blocks access to computer file until a ransom is paid
  2. A type of code or programme that can cause your device to slow down or malfunction
  3. The act of ensuring your account/device is using the latest software
  4. An icon that suggests the website is safe
  5. A dishonest scheme to cheat you of your data or money

9 Clues: An icon that suggests the website is safeA dishonest scheme to cheat you of your data or moneyThe act of ensuring your account/device is using the latest softwareA type of malware that blocks access to computer file until a ransom is paidA type of code or programme that can cause your device to slow down or malfunction...

Cybersecurity Month 2016-10-03

Cybersecurity Month crossword puzzle
Across
  1. A highly skilled computer expert involved with circumvention of computer security
  2. Defrauding an online account holder of personal or financial information by posing as a legitimate company, typically via a fake email
  3. A type of malware that is often disguised as legitimate software
  4. Software that is intended to damage or disable computers and computer systems
  5. A part of a computer network that is designed to block unauthorized access while permitting outward communication
  6. Code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
  1. A type of fraud that targets high-profile end users such as C-level corporate executives, politicians and celebrities
  2. A type of malicious software designed to block access to a computer system until a sum of money is paid
  3. A self-replicating computer program that penetrates an operating system with the intent of spreading malicious code

9 Clues: A type of malware that is often disguised as legitimate softwareSoftware that is intended to damage or disable computers and computer systemsA highly skilled computer expert involved with circumvention of computer securityA type of malicious software designed to block access to a computer system until a sum of money is paid...

Cybersecurity Crossword 2022-05-10

Cybersecurity Crossword crossword puzzle
Across
  1. malware that spreads by users from an infected device to the rest of the devices on a system
  2. pretending to be someone you trust in order to get you to visit a fake site and enter private info
  3. malicious software including viruses and ransomware running on your device
  4. unethical distribution of mass digital messages
  5. that accesses or controls a device without being detected
Down
  1. when someone steals your personal info and uses it for fraud
  2. a type of virus that does not rely on users to copy and paste but can replicate itself once in a system
  3. malware that prevents you from accessing your files and demands money for their return
  4. malware disguised as a trusted source that convinces a user to open a link or attachment

9 Clues: unethical distribution of mass digital messagesthat accesses or controls a device without being detectedwhen someone steals your personal info and uses it for fraudmalicious software including viruses and ransomware running on your devicemalware that prevents you from accessing your files and demands money for their return...

Cybersecurity Crossword 2023-09-28

Cybersecurity Crossword crossword puzzle
Across
  1. A software installed on your computer that's used to keep intruders out.
  2. The _____ Man is an award winning security awareness series on KnowBe4.
  3. Virtual Private network
  4. A Data ____ is when a hacker successfully attacks a business, gaining control of it's network.
  5. If your computer gets this, it could change, corrupt, or destroy information.
Down
  1. Two-factor _________ is an extra layer of protection used to ensure the security of online accounts..
  2. Wi-Fi Access points that allow users to connect to the internet while away from home. Can be vulnerable to threats.
  3. A scam where a hacker poses as a legitimate business or organization in order to fool someone into giving over their personal information.
  4. A name commonly given to unsolicited emails

9 Clues: Virtual Private networkA name commonly given to unsolicited emailsThe _____ Man is an award winning security awareness series on KnowBe4.A software installed on your computer that's used to keep intruders out.If your computer gets this, it could change, corrupt, or destroy information....

Cybersecurity Crossword 2023-09-14

Cybersecurity Crossword crossword puzzle
Across
  1. Protecting your online data and information.
  2. Learning about online threats and how to protect against them.
  3. A protective barrier for your computer or network
  4. Malicious software that can harm your computer.
Down
  1. Sending deceptive emails to trick people into revealing information.
  2. Unauthorized access to someone's computer or accounts.
  3. The practice of tracking and monitoring online activities.
  4. A secret code used to access your online accounts
  5. Keeping your personal information and data safe.

9 Clues: Protecting your online data and information.Malicious software that can harm your computer.Keeping your personal information and data safe.A secret code used to access your online accountsA protective barrier for your computer or networkUnauthorized access to someone's computer or accounts.The practice of tracking and monitoring online activities....

Crossword: Cybersecurity 2023-11-09

Crossword: Cybersecurity crossword puzzle
Across
  1. the current era characterized by widespread use of digital technology
  2. a person who uses computers to gain unauthorized access to data.
  3. a computer program that records every keystroke made by a computer user,
  4. concept of protecting computer systems, networks, and data from theft, damage, or unauthorized access
Down
  1. a type of disk storage composed of a thin and flexible disk of a magnetic storage medium
  2. Malicious software designed to spread from one computer to another
  3. a type of crime involving a computer or a computer network
  4. various types of malicious software, including viruses, worms, and spyware.
  5. process of converting information into a code to prevent unauthorized access

9 Clues: a type of crime involving a computer or a computer networka person who uses computers to gain unauthorized access to data.Malicious software designed to spread from one computer to anotherthe current era characterized by widespread use of digital technologya computer program that records every keystroke made by a computer user,...

Cybersecurity puzzle 2024-09-15

Cybersecurity puzzle crossword puzzle
Across
  1. Always make sure your software is _____. (7 letters)
  2. The bad software that locks your files until you pay money. (9 letters)
  3. A special word or code used to protect accounts. (8 letters)
  4. A program that can harm your computer. (5 letters)
  5. A device we use to connect to the internet. (8 letters)
  6. A trick someone uses online to get your personal information. (7 letters)
Down
  1. Don’t open suspicious _____. They might have viruses. (7 letters)
  2. Keep your _____ private and never share it with others. (8 letters)
  3. Software that helps protect your computer from bad programs. (10 letters)

9 Clues: A program that can harm your computer. (5 letters)Always make sure your software is _____. (7 letters)A device we use to connect to the internet. (8 letters)A special word or code used to protect accounts. (8 letters)Don’t open suspicious _____. They might have viruses. (7 letters)Keep your _____ private and never share it with others. (8 letters)...

Cybersecurity Awareness 2024-10-20

Cybersecurity Awareness crossword puzzle
Across
  1. Fraudulent scheme, often involving money or personal information.
  2. Stealing personal or sensitive information without permission.
  3. Fraudulent attempt to obtain sensitive information through deceptive emails.
  4. Malicious software designed to harm or exploit devices.
Down
  1. A form of phishing using SMS or text messages.
  2. Two-factor authentication, an extra layer of security for online accounts.
  3. Unauthorized access to data in a system.
  4. Manipulative techniques to trick people into giving up confidential information.
  5. Irrelevant or inappropriate messages sent over the internet.

9 Clues: Unauthorized access to data in a system.A form of phishing using SMS or text messages.Malicious software designed to harm or exploit devices.Irrelevant or inappropriate messages sent over the internet.Stealing personal or sensitive information without permission.Fraudulent scheme, often involving money or personal information....

Internet Safety Crossword 2021-02-11

Internet Safety Crossword crossword puzzle
Across
  1. information information that can identify someone
  2. securing information on the internet
  3. can be trusted
  4. if something makes you feel sad or uncomfortable tell a _______ adult trusted
  5. software intended to do damage to computers
  6. someone who witnesses but doesn't participate
Down
  1. information about a person found online
  2. bullying using technology
  3. a person who stands up for someone else
  4. good manners online
  5. too much information

11 Clues: can be trustedgood manners onlinetoo much informationbullying using technologysecuring information on the internetinformation about a person found onlinea person who stands up for someone elsesoftware intended to do damage to computerssomeone who witnesses but doesn't participateinformation information that can identify someone...

Crossword 2024-04-18

Crossword crossword puzzle
Across
  1. a device to separate your network
  2. different word for a trial version
  3. where data is stored on a pc
  4. is also an island
  5. most important software on a pc
Down
  1. a system for redundant storage
  2. protects your pc from attacks
  3. a program that isnt what it claims to be
  4. a common peripheral
  5. the prominent layer 2 protokol

10 Clues: is also an islanda common peripheralwhere data is stored on a pcprotects your pc from attacksa system for redundant storagethe prominent layer 2 protokolmost important software on a pca device to separate your networkdifferent word for a trial versiona program that isnt what it claims to be

CS Month Week 2 2023-09-14

CS Month Week 2 crossword puzzle
Across
  1. _______ Control: The practice of restricting access to resources based on user roles and permissions to prevent unauthorized access.
  2. Cybersecurity _______:A structured approach that defines guidelines and best practices for securing information systems.
  3. _______ Response: A planned approach to managing and mitigating the impact of a cybersecurity incident.
  4. _______ of Service: An attack that overwhelms a system, network, or website with excessive traffic, rendering it inaccessible.
  5. The process of verifying the identity of a user, system, or device to grant access to resources.
Down
  1. ______ Breach: Unauthorized access, acquisition, or disclosure of sensitive data, often involving large amounts of personal or confidential information.
  2. _______Testing: Ethical hacking conducted to identify vulnerabilities and assess the security of a system or network
  3. Malware that encrypts a victim’s data and demands payment (ransom) for its decryption.

8 Clues: Malware that encrypts a victim’s data and demands payment (ransom) for its decryption.The process of verifying the identity of a user, system, or device to grant access to resources._______ Response: A planned approach to managing and mitigating the impact of a cybersecurity incident....

Telecom Olympics 2021 2021-05-04

Telecom Olympics 2021 crossword puzzle
Across
  1. Network security system used to stop unauthorized access
  2. Someone who seeks to exploit weaknesses in a network
  3. Making copies of data
  4. Tech Support Company
  5. Communications over a distance
  6. Don't open ____ from people you don't know
  7. Use ____ passwords
Down
  1. What is a CDR?
  2. A piece of code that is capable of destroying data
  3. The capacity of a telecom line to carry signals
  4. The activity of defrauding by posting as a legitimate business
  5. NIST involves strategies for ____
  6. Board President

13 Clues: What is a CDR?Board PresidentUse ____ passwordsTech Support CompanyMaking copies of dataCommunications over a distanceNIST involves strategies for ____Don't open ____ from people you don't knowThe capacity of a telecom line to carry signalsA piece of code that is capable of destroying dataSomeone who seeks to exploit weaknesses in a network...

Office of Performance Management and Internal Controls 2021-03-05

Office of Performance Management and Internal Controls crossword puzzle
Across
  1. Intentional deceptive action
  2. Periodic comparison of source documents
  3. Office directed by Lt. Col. Terry
  4. Last name of OPMIC Information Security Officer
  5. Training due April 15th by all employees
Down
  1. Synonym for bloom, blossom and singing birds
  2. Control working in less than optimal condition
  3. Reduces the risk of error and inefficiency
  4. Acronym for Information Security Officer
  5. Complete acronym for internal control standards
  6. Last name of Internal Audit Manager
  7. The end toward which effort is directed
  8. Evaluation document with code of ethics

13 Clues: Intentional deceptive actionOffice directed by Lt. Col. TerryLast name of Internal Audit ManagerPeriodic comparison of source documentsThe end toward which effort is directedEvaluation document with code of ethicsAcronym for Information Security OfficerTraining due April 15th by all employeesReduces the risk of error and inefficiency...

August Crossword Puzzle 2024-08-18

August Crossword Puzzle crossword puzzle
Across
  1. Hero of a movie-turned-musical playing at the Kennedy Center
  2. Spielberg blockbuster approaching its 50th anniversary
  3. environmental certification for buildings
  4. site of the 2024 Olympics
  5. ___ Sullivan, 14-year-old signed with the Major Soccer League
  6. new Academic Dean
  7. ____ Richard, transgender tennis player
Down
  1. recently infamous cybersecurity company
  2. students may go to France, for instance (acronym)
  3. Chamber Chorus trip location
  4. controversial location for Olympic open-course swimming
  5. Charlie xcx album associated with the Harris campaign
  6. new Democratic presidential candidate

13 Clues: new Academic Deansite of the 2024 OlympicsChamber Chorus trip locationnew Democratic presidential candidaterecently infamous cybersecurity company____ Richard, transgender tennis playerenvironmental certification for buildingsstudents may go to France, for instance (acronym)Charlie xcx album associated with the Harris campaign...

Elicia's Birthday Crossword 2023-05-04

Elicia's Birthday Crossword crossword puzzle
Across
  1. the college Elicia is going to
  2. how many siblings does Elicia have
  3. career path Elicia wants to enter
  4. the month Elicia was born
  5. a birthday dessert
  6. an instrument Elicia plays
  7. author of Elicia's favourite books
Down
  1. how old is elicia turning
  2. the colour of Elicia's room
  3. the day of the week Elicia on which was born
  4. how does elicia take her coffee
  5. the genre of music Elicia listens to most

12 Clues: a birthday desserthow old is elicia turningthe month Elicia was bornan instrument Elicia playsthe colour of Elicia's roomthe college Elicia is going tohow does elicia take her coffeecareer path Elicia wants to enterhow many siblings does Elicia haveauthor of Elicia's favourite booksthe genre of music Elicia listens to most...

Future Jobs 2022-01-15

Future Jobs crossword puzzle
Across
  1. discontinue a job here and offer it in another country
  2. a specialist who’s an authority on something
  3. can continue for a long time
  4. a plan
  5. safety
  6. outdated and old-fashioned
Down
  1. someone who takes on gig work
  2. what we expect to happen in the future
  3. intelligence advanced computer software
  4. someone who starts a new company
  5. work temporary work on a specific project
  6. protecting systems, networks, and programs from digital attacks

12 Clues: a plansafetyoutdated and old-fashionedcan continue for a long timesomeone who takes on gig worksomeone who starts a new companywhat we expect to happen in the futureintelligence advanced computer softwarework temporary work on a specific projecta specialist who’s an authority on somethingdiscontinue a job here and offer it in another country...

Big 8 Ideas of Cyber 2024-01-11

Big 8 Ideas of Cyber crossword puzzle
Across
  1. worth a great deal
  2. doing the right thing online
  3. Always conected world
  4. synonym for electronic
  5. a staemnt of intent to damage
Down
  1. keeping computers safe and sound
  2. imaginng what could go wrong and figuring out how to stop it
  3. the application of conceptual knowledge
  4. It's like the key to a magical fortress and how to build it
  5. navigating dangers online
  6. the big impact of cybersecurity choices
  7. keeping secerets safe online

12 Clues: worth a great dealAlways conected worldsynonym for electronicnavigating dangers onlinedoing the right thing onlinekeeping secerets safe onlinea staemnt of intent to damagekeeping computers safe and soundthe application of conceptual knowledgethe big impact of cybersecurity choicesIt's like the key to a magical fortress and how to build it...

cybersicuritie eng briac 2024-03-13

cybersicuritie eng briac crossword puzzle
Across
  1. A barrier against network threats
  2. Harmful software
  3. is a network of private computers that have been infected with malicious software and are controlled as a group without the owners' knowledge.
  4. Fixing software vulnerabilities
  5. Protection against online threats
  6. Leaking sensitive information have 1 space (_)
  7. Unauthorized access
Down
  1. Double security confirmation for login have 1 space (_)
  2. Online assault
  3. Weakness in security
  4. Tricking people to reveal private information
  5. Scrambling data to keep it secret

12 Clues: Online assaultHarmful softwareUnauthorized accessWeakness in securityFixing software vulnerabilitiesA barrier against network threatsScrambling data to keep it secretProtection against online threatsTricking people to reveal private informationLeaking sensitive information have 1 space (_)Double security confirmation for login have 1 space (_)...

Testdf puzzlesd 2022-08-15

Testdf puzzlesd crossword puzzle
Across
  1. A string of words used to gain access to system or service which is easier to remember than a random combination of symbols and letters
  2. Use this feature in Outlook to report all suspicious email at work
  3. The act of having the content or recipient address(es) of a previously legitimate delivered email (with an attachment or link) replaced with a malicious version
  4. Cyberattacks can be targeted at anyone in the organisation. Who is responsible for Cybersecurity in your organisation?
  5. The Cybersecurity Awareness month occurs in <month>
Down
  1. A technique to manipulate a person to gain unauthorised access to a system or network and steal sensitive data or disperse malware
  2. Use this to make your passphrase harder to crack
  3. Authentication method identifying individuals based on their physical features
  4. You received an email with a suspicious link, attachment or with misspelling. What could this email be attempting to do?
  5. A malicious software that can infect your computer resulting in data theft and intrusion of your organisation

10 Clues: Use this to make your passphrase harder to crackThe Cybersecurity Awareness month occurs in <month>Use this feature in Outlook to report all suspicious email at workAuthentication method identifying individuals based on their physical features...

IT Vocabulary 2022-05-04

IT Vocabulary crossword puzzle
Across
  1. a type of social engineering attack often used to steal user data including login credentials and credit card numbers
  2. device that uses integrated circuit assemblies to store data persistently, typically using flash memory
  3. responsible for an organization’s overarching cybersecurity, which can include prevention, incident response (IR), compliance, and risk management.
  4. use a computer to gain unauthorized access to data in a system
  5. a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker
Down
  1. one kind of technology that stores the operating system, applications, and data files
  2. also referred to as junk email
  3. a set of computers sharing resources located together.
  4. attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic utilizing multiple compromised systems
  5. a group of information security experts responsible for the protection against, detection of and response to an organization's cybersecurity incidents.

10 Clues: also referred to as junk emaila set of computers sharing resources located together.use a computer to gain unauthorized access to data in a systemone kind of technology that stores the operating system, applications, and data filesdevice that uses integrated circuit assemblies to store data persistently, typically using flash memory...

Super Secret Security Crossword Puzzle 2024-05-31

Super Secret Security Crossword Puzzle crossword puzzle
Across
  1. itelligence exhibited by machines, particularly computer systems.
  2. one or more locations from which network monitoring and control, or network management, is exercised over a computer, telecommunication or satellite network.
  3. a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
  4. "gift" or "present" in Arabic.
  5. a team of experts that proactively monitor and respond to cybersecurity incidents.
  6. a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
Down
  1. the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change.
  2. an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
  3. a physical or logical sub-network that separates an internal local area network (LAN) from other untrusted networks, usually the Internet.
  4. a technique through which a cybercriminal disguises themselves as a known or trusted source.

10 Clues: "gift" or "present" in Arabic.itelligence exhibited by machines, particularly computer systems.a team of experts that proactively monitor and respond to cybersecurity incidents.a technique through which a cybercriminal disguises themselves as a known or trusted source....

CSN Turkeyday Puzzle 2021-11-24

CSN Turkeyday Puzzle crossword puzzle
Across
  1. Carbonblack and crowdstrike are ____ tools
  2. Swimlane and Phantom/splunk are ____ tools
  3. Twenty leaves and purple
  4. Only company in the US that specialized soley in cybersecurity hiring
  5. Anonymous by design, removing unconscious bias and fear of reprisal
  6. Intune, sentinel, and AD are in this cloud
Down
  1. Incident responders may have the responsibility to extract and analyze _______
  2. K8s
  3. A CI/CD Engineer or Container Engineer
  4. Find and be _____
  5. Cloud automation, Monty, and not Perl
  6. _____ your career
  7. Ubuntu and CentOS are ____ variants

13 Clues: K8sFind and be __________ your careerTwenty leaves and purpleUbuntu and CentOS are ____ variantsCloud automation, Monty, and not PerlA CI/CD Engineer or Container EngineerCarbonblack and crowdstrike are ____ toolsSwimlane and Phantom/splunk are ____ toolsIntune, sentinel, and AD are in this cloud...

Project Three Part Two 2021-10-15

Project Three Part Two crossword puzzle
Across
  1. Cyber ___ refers to fundamental cybersecurity best practices that an organization's security practitioners and users can undertake.
  2. a kind of bullying or harassment that takes place via the internet.
  3. The skill of writing and solving codes, or the study of codes.
  4. a structure or scheme consisting of a set of algorithms that converts plaintext to the ciphertext to encode or decode messages securely.
  5. cryptography is the study of ___ communications mechanisms that restrict access to a message's contents to just the sender and intended receiver.
  6. a digital certificate is a ___ or electronic password that uses cryptography and the public key infrastructure to authenticate the validity of a device, server, or user.digital Certificate
Down
  1. Cyberstalking is the use of the ____ or other electronic means to stalk or harass an individual, group, or organization.
  2. the technique of defending vital systems and sensitive data against cyber-attacks.
  3. any hostile operation aimed at computer information systems, computer networks, infrastructures, or personal computers.
  4. A person in an existing photograph or video is replaced with someone else's likeness in synthetic media.

10 Clues: The skill of writing and solving codes, or the study of codes.a kind of bullying or harassment that takes place via the internet.the technique of defending vital systems and sensitive data against cyber-attacks.A person in an existing photograph or video is replaced with someone else's likeness in synthetic media....

Cyber Security Awareness 2023-03-04

Cyber Security Awareness crossword puzzle
Across
  1. Using encryption and other security technologies to protect online activities and prevent unauthorized access to sensitive information.
  2. A common form of social engineering that involves sending fraudulent emails or messages in order to steal information or spread malware.
  3. The practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
  4. A mindset and set of behaviors that prioritize cybersecurity and make it a fundamental part of organizational culture.
  5. Policies and procedures for safeguarding sensitive data and ensuring its confidentiality, integrity, and availability.
  6. The process of identifying, assessing, and mitigating cyber risks in order to protect against cyber attacks.
Down
  1. Tools and techniques for detecting and removing malicious software, including viruses, worms, and Trojans.
  2. A targeted form of phishing that involves customized messages designed to deceive a specific individual or group.
  3. Strategies for creating strong, unique passwords and protecting them from unauthorized access.
  4. Techniques used by cybercriminals to manipulate individuals into revealing sensitive information or taking harmful actions.
  5. Best practices for keeping digital devices and online accounts clean and secure.
  6. Best practices for staying safe while browsing the internet, including avoiding risky websites and downloading files from trusted sources.

12 Clues: Best practices for keeping digital devices and online accounts clean and secure.Strategies for creating strong, unique passwords and protecting them from unauthorized access.Tools and techniques for detecting and removing malicious software, including viruses, worms, and Trojans....

Reasons why Singapore is Safe / Not Safe 2024-07-23

Reasons why Singapore is Safe / Not Safe crossword puzzle
Across
  1. Public cooperation via [] like SGSecure.
  2. Advanced surveillance and cybersecurity[]
  3. Robust laws and proactive Internal [] Department
  4. [] platforms spreading extremist ideologies.
Down
  1. terrorist may target tourist hotspots
  2. Potential for reduced vigilance over time.
  3. [] to regional terrorist hotspots.
  4. Emphasis on racial and religious [] reduces radicalisation.

8 Clues: [] to regional terrorist hotspots.terrorist may target tourist hotspotsPublic cooperation via [] like SGSecure.Advanced surveillance and cybersecurity[]Potential for reduced vigilance over time.[] platforms spreading extremist ideologies.Robust laws and proactive Internal [] DepartmentEmphasis on racial and religious [] reduces radicalisation.

Topic 3 AI & Competition Law 2024-11-15

Topic 3 AI & Competition Law crossword puzzle
Across
  1. Rules governing AI development and implementation
  2. When AI systems independently coordinate to avoid competition
  3. Large technology firms influencing markets
  4. Control by a major player in a market
  5. Internet-based computing and storage services
  6. Technology that mimics human thinking and learning
  7. Moral principles governing behavior
  8. Unfair preference in decision-making
Down
  1. Safeguarding personal information
  2. Charging different prices based on user data
  3. Organization for global trade rules
  4. Ensures fairness and innovation in markets
  5. Clarity in AI decision-making processes
  6. Protecting systems and networks from attacks

14 Clues: Safeguarding personal informationOrganization for global trade rulesMoral principles governing behaviorUnfair preference in decision-makingControl by a major player in a marketClarity in AI decision-making processesLarge technology firms influencing marketsEnsures fairness and innovation in marketsCharging different prices based on user data...

GCSAM 2023 2023-07-10

GCSAM 2023 crossword puzzle
Across
  1. A “tunnel” for private network browsing:
  2. The collection, use, sharing, storage, destruction, or processing of PI that is provided by an individual in connection with obtaining a product, service, or employment, including an individual’s choice on how their PI is used.
  3. Be client obsessed, champion our people, lead with integrity, own it, and win as one are examples of TIAA’s:
  4. What malware propagates without a host program?
  5. A _____ review is done quarterly to review privileged access.
  6. What is the most common attack vector for malware?
  7. TIAA’s ______ promotes a culture of inclusion, diversity and equity by connecting associates across diverse perspectives, wide-ranging talents and unique experiences.
  8. A targeted form of phishing that is customized for specific individuals within a specific organization.
  9. What does GCSAM stand for?
  10. Suspicious sender address, invalid branding, appealing to emotions, sense of urgency, invalid URL’s, request for sensitive data, spelling errors, requests to click links, and signatures are all __________ of phishing attempts.
Down
  1. Who founded TIAA?
  2. Malware that limits users access until a ransom is paid.
  3. A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.
  4. Who is the security awareness program’s mascot?
  5. What is TIAA’s social impact hashtag?
  6. Be the change by delivering lifetime income for all with investments that build a better world is TIAA’s:
  7. When somebody sends an e-mail with a link to a bogus website it is called:
  8. In 2021 TIAA cybersecurity expanded to become TIAA _____ cybersecurity.
  9. The probability of exposure or loss of assets is considered?

19 Clues: Who founded TIAA?What does GCSAM stand for?What is TIAA’s social impact hashtag?A “tunnel” for private network browsing:Who is the security awareness program’s mascot?What malware propagates without a host program?What is the most common attack vector for malware?Malware that limits users access until a ransom is paid....

Participation | Cybersecurity Crossword Puzzle 2023-03-13

Participation | Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Malware that can reproduce itself
  2. phishing that targets a specific individual
  3. program that is run entirely from the network
  4. encrypted parts of the internet
  5. hacker poses as a legitimate business
  6. attack on a computer system
  7. technology used to keep intruders out
  8. breach hacker successfully breaking into a system
  9. Coding used to protect your information
  10. computer infected with a virus
Down
  1. contains items that are temporarily blocked
  2. capture of data as its being transmitted
  3. process of identifying a user
  4. a private network across a public network
  5. records keystrokes made on a computer
  6. malware that hijacks your system
  7. malware used by hackers to spy on you
  8. tricked into clicking on a object on a web page
  9. hacker changes the IP address of an email
  10. video that has been altered to make it authentic

20 Clues: attack on a computer systemprocess of identifying a usercomputer infected with a virusencrypted parts of the internetmalware that hijacks your systemMalware that can reproduce itselfrecords keystrokes made on a computermalware used by hackers to spy on youhacker poses as a legitimate businesstechnology used to keep intruders out...

NOVA Cybersecurity Lab Glossary 2022-10-03

NOVA Cybersecurity Lab Glossary crossword puzzle
Across
  1. a fictional virus modeled after the Stuxnet virus that is able to damage physical infrastructure.
  2. extra copies of computer files that can be used to restore files that are lost or damaged.
  3. a computer program that can copy itself and cause harm in various ways, such as stealing private
  4. the amount of data that can pass through a network or part of a network per second.
  5. or destroying data.
  6. a computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
  7. a flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
  8. someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
  9. a company or organization that gives users and devices access to the Internet.
  10. two or more interconnected devices that can exchange data.
Down
  1. a type of malware that holds victims’ computer files hostage by locking access to them or encrypting them.
  2. a distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
  3. attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
  4. code written in a programming language that instructs computers to perform specific tasks.
  5. a type of connection between devices that can exchange information and power supply.
  6. a data storage device that is used to store, back up, and transfer computer files.
  7. multiple computers on a network that are infected with a program that can be controlled remotely.
  8. software designed to block malware from entering protected networks.
  9. programs that harm computers, networks, or people.
  10. viruses, worms, ransomware, and other
  11. unsolicited emails sent to many addresses in order to make money through advertising or identity theft.
  12. a piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
  13. the process of using codes to make readable information unreadable.

23 Clues: or destroying data.viruses, worms, ransomware, and otherprograms that harm computers, networks, or people.two or more interconnected devices that can exchange data.the process of using codes to make readable information unreadable.software designed to block malware from entering protected networks....

CIS178 Cybersecurity Crossword Puzzle 2023-04-19

CIS178 Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. authentication using physical characteristics
  2. people carrying out specific actions
  3. software that installs itself secretly
  4. highly targeted phishing attacks
  5. virus disguised as legitimate software
  6. protect personal data
  7. users directed towards fake websites
  8. updates to improve security
Down
  1. permission to be on hard-drive
  2. security feature to detect hacking
  3. users denied access to services
  4. mathematical fuction that protects information
  5. attempting to obtain sensitive information
  6. prevents unauthorized access
  7. program added for entertainment
  8. emails asking for sensitive information
  9. detect and remove viruses
  10. software that makes data unstable
  11. secret software installed on hard-drive
  12. shared storage accessed online

20 Clues: protect personal datadetect and remove virusesupdates to improve securityprevents unauthorized accesspermission to be on hard-driveshared storage accessed onlineusers denied access to servicesprogram added for entertainmenthighly targeted phishing attackssoftware that makes data unstablesecurity feature to detect hacking...

CIS 178 Cybersecurity Participation 2023-04-20

CIS 178 Cybersecurity Participation crossword puzzle
Across
  1. Malware that demands payment
  2. Software that detects malware
  3. Criminal activity on computer systems
  4. secure website connection
  5. Successful cyber attack
  6. a software vulnerability
  7. a system weakness
  8. malicious digital activity
  9. data protection method
  10. fraudulent email technique
Down
  1. network security barrier
  2. a traffic overload cyberattack
  3. user identity verification
  4. computer infection
  5. secret access code
  6. unauthorized access
  7. harmful software program
  8. unsolicited email
  9. A network of infected computers
  10. physical trait recognition

20 Clues: unsolicited emaila system weaknesscomputer infectionsecret access codeunauthorized accessdata protection methodSuccessful cyber attacknetwork security barrierharmful software programa software vulnerabilitysecure website connectionuser identity verificationphysical trait recognitionmalicious digital activityfraudulent email technique...

example 2023-07-06

example crossword puzzle
Across
  1. A “tunnel” for private network browsing:
  2. The collection, use, sharing, storage, destruction, or processing of PI that is provided by an individual in connection with obtaining a product, service, or employment, including an individual’s choice on how their PI is used.
  3. Be client obsessed, champion our people, lead with integrity, own it, and win as one are examples of TIAA’s:
  4. What malware propagates without a host program?
  5. A _____ review is done quarterly to review privileged access.
  6. What is the most common attack vector for malware?
  7. TIAA’s ______ promotes a culture of inclusion, diversity and equity by connecting associates across diverse perspectives, wide-ranging talents and unique experiences.
  8. A targeted form of phishing that is customized for specific individuals within a specific organization.
  9. What does GCSAM stand for?
  10. Suspicious sender address, invalid branding, appealing to emotions, sense of urgency, invalid URL’s, request for sensitive data, spelling errors, requests to click links, and signatures are all __________ of phishing attempts.
Down
  1. Who founded TIAA?
  2. Malware that limits users access until a ransom is paid.
  3. A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.
  4. Who is the security awareness program’s mascot?
  5. What is TIAA’s social impact hashtag?
  6. Be the change by delivering lifetime income for all with investments that build a better world is TIAA’s:
  7. When somebody sends an e-mail with a link to a bogus website it is called:
  8. In 2021 TIAA cybersecurity expanded to become TIAA _____ cybersecurity.
  9. The probability of exposure or loss of assets is considered?

19 Clues: Who founded TIAA?What does GCSAM stand for?What is TIAA’s social impact hashtag?A “tunnel” for private network browsing:Who is the security awareness program’s mascot?What malware propagates without a host program?What is the most common attack vector for malware?Malware that limits users access until a ransom is paid....

Unit 11-Cyber Security 2023-09-15

Unit 11-Cyber Security crossword puzzle
Across
  1. digital illegal activity
  2. network security barrier
  3. scam in which attackers trick people into disclosing confidential information
Down
  1. harmful software
  2. isolated testing environment
  3. unique physical characteristics for authentication
  4. protection of digital resources

7 Clues: harmful softwaredigital illegal activitynetwork security barrierisolated testing environmentprotection of digital resourcesunique physical characteristics for authenticationscam in which attackers trick people into disclosing confidential information

CRACCon2024 2023-12-25

CRACCon2024 crossword puzzle
Across
  1. Pay to get your data
  2. The popular buzzword
  3. Get paid for hunting bugs
Down
  1. What do you want to learn?
  2. poses as a legitimate sender
  3. Stolen data
  4. You like to play

7 Clues: Stolen dataYou like to playPay to get your dataThe popular buzzwordGet paid for hunting bugsWhat do you want to learn?poses as a legitimate sender

CWiCS Cybersecurity Crossword Event 2021-02-25

CWiCS Cybersecurity Crossword Event crossword puzzle
Across
  1. A _____________ breach targeted 130 accounts, including those of past presidents and Elon Musk, resulted in attackers swindling $121,000 in Bitcoin through nearly 300 transactions
  2. This is a well-known banking trojan that steals credentials and other sensitive information from an infected machine.
  3. The telecom service provider became the victim of a Magecart card-skimming attack.
  4. This app's "Find Friends" feature could have exposed user's profile data and phone numbers (Jan 2021)
  5. Which Hotel had the breach Hackers gained access to over 10 million guest records .including Justin Bieber, Twitter CEO Jack Dorsey, and government officials
  6. A now-defunct online service that had been previously selling access to data hacked from other websites, 21 arrested in UK
  7. Hackers target Microsoft ___ machines running which servers to deploy backdoors and other kinds of malware
  8. International hotel chain disclosed a data breach of 5.2 million hotel guests, making it their second data breach hitting them
  9. This pharmacy chain announced an error within their mobile app's messaging feature exposing names, prescription numbers and drug names
  10. This unsecured component of Mailfire’s was breached, the hacker had access to over 320 million records from notifications being pushed out to Mailfire clients.
  11. Milpitas, Calif.-based platform security vendor ----------------- had compromised NetExtender VPN client and SMB-oriented Secure Mobile Access
Down
  1. -- based cyber attacks rose 630% between January and April 2020
  2. Trojan functioning as a downloader or dropper of other malwares
  3. Hacker remotely controlled, and clicked on various functions on the screen to change the level of sodium hydroxide to over 100 times its normal levels, at _________ Water Treatment Plant
  4. __________ Confusion Supply-Chain Attack Hit Over 35 High-Profile Companies
  5. Even in 2021, the Top 10 from ___ is the most effective first step towards changing the software development culture within your org
  6. Hosted on this cloud, a massive US property and demography database exposed 200 million records (March 2020)
  7. Hackers are now using this Google service to bypass web security and steal credit cards
  8. Hackers hit Nebraska Medical Center with --------------- and stole patient data
  9. The university paid a $1.14 million ransom to hackers in order to save COVID-19 research.
  10. Malicious code was sneaked into updates to this SolarWinds software
  11. Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug
  12. Since -------, the US FBI reported a 300% increase in reported cybercrimes
  13. LodaRAT Windows Malware Now Also Targets ______ Devices
  14. Malware designed to steal sensitive information stored on an infected device comes back disguised as a Game launcher

25 Clues: LodaRAT Windows Malware Now Also Targets ______ DevicesTrojan functioning as a downloader or dropper of other malwares-- based cyber attacks rose 630% between January and April 2020Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation BugMalicious code was sneaked into updates to this SolarWinds software...

Cybersecurity Unit 3 Terminology 2022-10-10

Cybersecurity Unit 3 Terminology crossword puzzle
Across
  1. A base-16 number system. The extra digits are represented by the letters a through f, so all digits in hex are 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f.
  2. Wired Equivalent Privacy is a security algorithm used in wireless networks.
  3. The Maximum Transmission Unit is the maximum amount of bytes than can be packaged into frame data.
  4. A wireless access point is a device provides connectivity to a network.
  5. An operating system similar in concept to the Windows OS but used more often to host routers and web servers.
  6. A media access control addresses is unique numeric code that is assigned to networking hardware components (typically a network interface card or NIC) that is built into computers and mobile devices.
  7. The selective process of allowing or restricting the availability of a resource.
  8. The fourth and last phase of ethical hacking in which the security professionals fix the system vulnerabilities uncovered in the previous phases.
  9. The act of starting or launching a process. The new processes is a child process of a parent process..
  10. The operation of joining character strings end-to-end.
  11. A device that plots a graph of signal strength (vertical axis) versus frequency (horizontal axis).
  12. A standard that computers use to represent letters , numbers, and symbols. (It stands for American Standard Code for Information Interchange.)
  13. The first phase of ethical hacking, which involves probing of the network to understand its structure and to see what services are open and running.
  14. A collection of files on a computer, logically grouped together.
Down
  1. A program that allows a user to enter commands to interact with an operating system.
  2. An exchange of messages that prove the identity of users and computers in a system.
  3. The third phase of ethical hacking, which involves launching exploits at targeted vulnerabilities to see if they are genuine exposures on the system.
  4. It can have two meanings in computer terminology: it can be a specific application or function such as email, chat, etc. or it can refer to a specific part of an application, such as transmitting the data of a webpage
  5. Pronounced "ganoo" or "g.noo", it is a UNIX-like operating system.
  6. A very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden, allowing the user to focus on the details that are important for the task at hand.
  7. The second phase of ethical hacking, which involves taking a closer look at the services and software running on the hosts.
  8. A starting point for data analysis. It is the initial data set used in later comparisons.
  9. An input value to a command.
  10. Software that is is freely available to anyone who wants to use it. Users can modify it and distribute it however they want.
  11. A method of transferring and organizing data over a network using packets, which contain routing information along with the data.
  12. A process in UNIX that runs without user input.
  13. An attack where a malicious user changes and corrupts the MAC-IP address information on a target computer.
  14. A network communication protocol occurring in the data link layer 2 and physical layer 1 of the OSI model.

28 Clues: An input value to a command.A process in UNIX that runs without user input.The operation of joining character strings end-to-end.A collection of files on a computer, logically grouped together.Pronounced "ganoo" or "g.noo", it is a UNIX-like operating system.A wireless access point is a device provides connectivity to a network....

CIS178 - Cybersecurity Crossword Puzzle 2023-07-13

CIS178 - Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. bring your own device
  2. code that protects data
  3. malicious software
  4. transmit information without users knowledge
  5. penetration testers
  6. wont allow changes to system’s settings
  7. illegally exploit network vulnerabilities
  8. identifies device connected to internet
  9. high traffic creates web shutdown
  10. vulnerable free wireless hotspots
  11. practicing to identify cyber threats
  12. software to carry out cyberattacks
  13. preventan d remove malware infections
  14. harrassing others over online platforms
Down
  1. propaganda to steal personal information
  2. downloaded apps disguised malicious attacks
  3. virtual private network
  4. exploits vulnerabilities in software
  5. helps remember passwords encrypted
  6. unauthorized users gain access
  7. attacks users until pay ransom
  8. clicking on hidden links
  9. tries to steal personal data
  10. software preventing access to networks
  11. scrambling sensitive data

25 Clues: malicious softwarepenetration testersbring your own devicevirtual private networkcode that protects dataclicking on hidden linksscrambling sensitive datatries to steal personal dataunauthorized users gain accessattacks users until pay ransomhigh traffic creates web shutdownvulnerable free wireless hotspotshelps remember passwords encrypted...

Cybersecurity Awareness Month Crossword 2023-09-21

Cybersecurity Awareness Month Crossword crossword puzzle
Across
  1. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  2. A cybersecurity risk that originates from within an organization (2 words).
  3. A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
  4. A mechanism for creating a secure connection between a computing device and a computer network
  5. The ability of individuals to understand and exercise control over how information about themselves may be used by others.
  6. Unsolicited emails sent to many addresses.
  7. A process or measure used to verify a user's identity.
  8. Part of the internet that isn't indexed by search engines.
  9. Faking the sending address of a transmission to gain illegal entry into a secure system.
  10. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities (2 words).
  11. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization (2 words).
  12. Computer programs that can block, detect, and remove viruses and other malware.
  13. A type of malware that denies a user's access to a system or data until a sum of money is paid.
Down
  1. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
  2. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  3. Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
  4. Software that compromises the operation of a system by performing an unauthorized function or process.
  5. A string of characters used to authenticate an identity.
  6. Extra copies of computer files that can be used to restore files that are lost or damaged.
  7. A flaw or weakness in an information system that could be exploited.
  8. An unauthorized user who attempts to or gains access to an information system.
  9. A collection of computers compromised by malicious code and controlled across a network.
  10. Software designed to block malware from entering protected networks.
  11. Converting data into a form that cannot be easily understood by unauthorized people.

24 Clues: Unsolicited emails sent to many addresses.A process or measure used to verify a user's identity.A string of characters used to authenticate an identity.Part of the internet that isn't indexed by search engines.A flaw or weakness in an information system that could be exploited.Software designed to block malware from entering protected networks....

2024 Cybersecurity Awareness Month 2024-09-17

2024 Cybersecurity Awareness Month crossword puzzle
Across
  1. A digital document used to verify the identity of a user or device online
  2. Software used to detect, prevent, and remove malicious software
  3. A security risk that originates from within the organization, often involving employees
  4. A tool that records keystrokes on a keyboard, often used to steal sensitive information
  5. The process of verifying a user or device
  6. A person who uses technical skills to exploit systems or networks
  7. The unauthorized access and retrieval of sensitive information from a system
  8. A type of malware that locks users out of their systems until a ransom is paid
  9. A hidden way of bypassing security controls in a system
  10. A string of characters used to authenticate access to a system or account
Down
  1. A software update designed to fix vulnerabilities or bugs
  2. An attempt to damage, disrupt, or gain unauthorized access to a computer or network
  3. Software designed to disrupt, damage, or gain unauthorized access to a computer system
  4. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
  5. A network security system that monitors and controls incoming and outgoing traffic
  6. A vulnerability in software that is taken advantage of by hackers to carry out attacks
  7. A virtual private network that allows secure remote access to a network over the internet
  8. The use of deception to manipulate individuals into divulging confidential information
  9. The process used by an organization to handle and recover from a cyberattack
  10. An additional security layer that requires a second form of verification beyond a password
  11. The process of converting information or data into a code to prevent unauthorized access
  12. Software that gathers information from a user's device without their knowledge

22 Clues: The process of verifying a user or deviceA hidden way of bypassing security controls in a systemA software update designed to fix vulnerabilities or bugsSoftware used to detect, prevent, and remove malicious softwareA person who uses technical skills to exploit systems or networks...

Spectrum Degree Programs 2023-10-18

Spectrum Degree Programs crossword puzzle
Across
  1. Ideas to interest customers
  2. Understanding formulas to gather data
Down
  1. Protecting computers
  2. Employee relations
  3. Budgeting and money
  4. Tracking expenses and payments

6 Clues: Employee relationsBudgeting and moneyProtecting computersIdeas to interest customersTracking expenses and paymentsUnderstanding formulas to gather data

Sondre's Christmas Crossword 2023-12-26

Sondre's Christmas Crossword crossword puzzle
Across
  1. Sarah's favorite "The office" character
  2. Name of the species of the big boi fish Sarah caught
  3. Month of Sondre's birthday
  4. One of Sarah's favorite vegetables
  5. Indie band from Norwich, UK
  6. Country with the most snow
  7. Soon to be patented bike
  8. Homeless cat
  9. Country that Canada has been at war with for almost 40 years
  10. Sarah's totally real and true favorite tv-show ;)
Down
  1. Sondre's field of study
  2. National park in the west of Canada that Sarah has visited
  3. Sarah's favorite League of Legends champion
  4. Sarah's favorite tea
  5. Good girl
  6. Good boy
  7. Subject of the class that had a field trip in Sarah's dream

17 Clues: Good boyGood girlHomeless catSarah's favorite teaSondre's field of studySoon to be patented bikeMonth of Sondre's birthdayCountry with the most snowIndie band from Norwich, UKOne of Sarah's favorite vegetablesSarah's favorite "The office" characterSarah's favorite League of Legends championSarah's totally real and true favorite tv-show ;)...

Natalie and Robbie 2024-07-01

Natalie and Robbie crossword puzzle
Across
  1. The couple's favorite singer.
  2. The food Robbie hates but Natalie insists on making.
  3. Robbie's first roommate.
  4. The month Robbie proposed.
  5. Robbie's least favorite household chore.
  6. The grade Natalie teaches.
  7. The city they got engaged in.
  8. What is the name of Natalie and Robbie's cat?
  9. Who made the first move?
Down
  1. Who said I love you first?
  2. The elementary school Natalie and Robbie first met (Forest __)
  3. Natalie's least favorite household chore.
  4. Natalie and Robbie's eye color.
  5. What field does Robbie work in?
  6. Number of dresses Natalie tried on.
  7. Number of years Natalie and Robbie dated.
  8. What college did they attend?
  9. Total number of bridesmaids and groomsmen.
  10. The shape of the engagment ring.
  11. Natalie and Robbie's favorite condiment.

20 Clues: Robbie's first roommate.Who made the first move?Who said I love you first?The month Robbie proposed.The grade Natalie teaches.The couple's favorite singer.The city they got engaged in.What college did they attend?Natalie and Robbie's eye color.What field does Robbie work in?The shape of the engagment ring.Number of dresses Natalie tried on....

Cybersecurity 2022-09-08

Cybersecurity crossword puzzle
Across
  1. airline
  2. Theft Using idenitty
  3. security
Down
  1. stalking
  2. IT

5 Clues: ITairlinestalkingsecurityTheft Using idenitty

smple 2023-09-20

smple crossword puzzle
Across
  1. Cybersecurity is _____ responsibility.
  2. fjkgdkfg
Down
  1. fjrfjdj
  2. dfgjdjfgj
  3. sdjfks

5 Clues: sdjfksfjrfjdjfjkgdkfgdfgjdjfgjCybersecurity is _____ responsibility.

cybersecurity crossword by perla 2022-05-23

cybersecurity crossword by perla crossword puzzle
Across
  1. a wireless technology for exchanging data over short distances.
  2. Computer viruses are small programs or scripts that can negatively affect the health of your computer
  3. A technology that allows us to access our files and/or services through the internet from anywhere in the world
  4. A copy of data and/or applications contained in the IT stored on magnetic media outside of the IT to be used in the event IT data are lost.
  5. Any circumstance or event with the potential to adversely impact an information system through unauthorized access, destruction, disclosure, modification of data, and/or denial of service
  6. the determining factor in the classification of an enclave of servers/computers
  7. An audio or video clip that has been edited and manipulated to seem real or believable.
  8. A network point that acts as an entrance to another network
  9. Type of surveillance software that has the capability to record every key stroke you make on a Log file, usually encrypted
  10. Any program that acts to produce copies of itself. Examples include; a program, a worm, or virus.
  11. Encryption is the process of converting data to an unrecognizable or "encrypted" form. It is commonly used to protect sensitive information so that only authorized parties can view it
  12. Unauthorized act of bypassing the security mechanisms of a system.
  13. Software that is intended to damage or disable computers and computer systems
  14. An attempt to gather information about an information system for the apparent purpose of circumventing its security controls.
  15. the science that deals with the logic of form, quantity, and disposition
  16. A feature or defect of a computer system that allows surreptitious unauthorized access to data
  17. A bot is an automated program that runs over the Internet
  18. A decoy system or network that serves to attract potential attackers.
Down
  1. The activity of defrauding an online account holder of financial information by posing as a legitimate company
  2. Is global system of interconnected computer networks that use the internet protocol suite
  3. A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
  4. a term used to describe any fraudulent business or scheme that takes money or other goods from an unsuspecting person.
  5. A hacker security tool that captures passwords and message traffic to and from a computer.
  6. A block of data sent over the network transmitting the identities of the sending and receiving stations, error-control information, and message.
  7. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.
  8. Is the body of technology's, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
  9. It acts as a barrier between a trusted system or network and outside connections, such as the Internet.
  10. a process that ensures and confirms a user’s identity.
  11. Self replicating virus that does not alter files but resides in active memory and duplicates itself
  12. Type of incident involving insertion of a large volume of data resulting in denial of service.
  13. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.
  14. A person who uses computers to gain unauthorized access to data
  15. A weakness in automated system security procedures, technical controls, environmental controls, administrative controls, internal controls, etc., that could be used as an entry point to gain unauthorized access to information or disrupt critical processing.
  16. Software agent that performs a function or operation on behalf of another application or system while hiding the details involved.
  17. To indiscriminately send unsolicited, unwanted, irrelevant, or inappropriate messages, especially commercial advertising in mass quantities.
  18. a way for the website to recognize you and keep track of your preferences.
  19. Software that enables a user to obtain convert information about another's computer activities by transmitting data from their hard drive

37 Clues: a process that ensures and confirms a user’s identity.A bot is an automated program that runs over the InternetA network point that acts as an entrance to another networka wireless technology for exchanging data over short distances.A person who uses computers to gain unauthorized access to data...

Cybersecurity Unit - Vocabulary Crossword 2023-04-25

Cybersecurity Unit - Vocabulary Crossword crossword puzzle
Across
  1. Using someone else’s work and claiming it is your own
  2. A type of online threat where a fake website is used to try and trick people into providing personal information.
  3. Settings on social media that limit who can see your online activity.
  4. The right to be free of undue intrusion.
  5. Computer programs designed to protect your computer from online threats, like viruses and other malicious software.
  6. An illegal use of copyrighted material.
  7. Original work that is not protected by copyright and is free to use without permission is known to be in this.
Down
  1. A type of malware that is spread through human interaction, usually by clicking on an infected attachment, download, or link.
  2. A setting online or on social media that prevents another user from seeing your profile or contacting you in any way.
  3. An online community of people with like interests
  4. The exclusive right to make copies. This automatically applies to original work.
  5. Formal ways to give credit to an original creator or author.
  6. These are guidelines for using copyright-protected work in a specific way and for a specific purpose, like a school project, to avoid copyright infringement.
  7. Malicious Software.
  8. A permanent record of all of your online activity.
  9. A detailed report on someone’s actions and behaviors
  10. A type of online threat where a fake email is used to try and trick people into clicking and providing personal information.
  11. A type of malware that is difficult to detect and secretly watches what you do online. Some versions can copy your keystrokes.
  12. A type of malware that looks like a trustworthy file or program but isn’t. Insidious malware.
  13. A type of malware that self-replicates and spreads without human interaction. Can use up all of your RAM and make your computer freeze and become unusable.

20 Clues: Malicious Software.An illegal use of copyrighted material.The right to be free of undue intrusion.An online community of people with like interestsA permanent record of all of your online activity.A detailed report on someone’s actions and behaviorsUsing someone else’s work and claiming it is your own...

2023 Cybersecurity Awareness Month 2023-10-06

2023 Cybersecurity Awareness Month crossword puzzle
Across
  1. A process or measure used to verify a user's identity.
  2. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  3. Unsolicited emails sent to many addresses.
  4. Converting data into a form that cannot be easily understood by unauthorized people.
  5. A mechanism for creating a secure connection between a computing device and a computer network.
  6. A cybersecurity risk that originates from within an organization.
  7. The ability of individuals to understand and exercise control over how information about themselves may be used by others.
  8. Software designed to block malware from entering protected networks.
  9. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
  10. An unauthorized user who attempts to or gains access to an information system.
  11. Faking the sending address of a transmission to gain illegal entry into a secure system.
  12. A collection of computers compromised by malicious code and controlled across a network.
  13. A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
Down
  1. Software that compromises the operation of a system by performing an unauthorized function or process.
  2. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  3. Part of the internet that isn't indexed by search engines.
  4. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization.
  5. Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
  6. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
  7. Computer programs that can block, detect, and remove viruses and other malware.
  8. A flaw or weakness in an information system that could be exploited.
  9. A type of malware that denies a user's access to a system or data until a sum of money is paid

22 Clues: Unsolicited emails sent to many addresses.A process or measure used to verify a user's identity.Part of the internet that isn't indexed by search engines.A cybersecurity risk that originates from within an organization.A flaw or weakness in an information system that could be exploited....

Cybersecurity Awareness Month 2024 2024-09-24

Cybersecurity Awareness Month 2024 crossword puzzle
Across
  1. Pop-up malware intent on using fear tactics to get you to perform an action.
  2. Data must be accessible when you need them. Part of the CIA triad.
  3. The trustworthiness that data have not been altered or modified by unauthorized users. Part of the CIA triad.
  4. A flaw in a system that can enable an adversary to compromise the security of that system.
  5. A type of threat that includes authorized system users and disgruntled employees.
  6. "Good guy" hackers.
  7. A popular, but not-so-secure, policy where users can use their personal smart devices to conduct business.
  8. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a system.
  9. Multiple compromised systems under the control of a single attacker.
  10. A device that permits the flow of authorized data, while keeping unauthorized data out.
  11. A vulnerability or exploit that is unknown to software developers and security professionals.
  12. A team that acts as the adversary during a security assessment.
  13. Using fraudulent e-mails to trick recipients into providing sensitive information or taking a deliberate action.
  14. The broad term for nontraditional, internet-connected smart devices.
  15. A network of devices created for the sole purpose of luring in an attacker.
  16. A protocol used to ensure time synchronization between devices.
Down
  1. The act of moving around, looking for vulnerable Wi-Fi networks.
  2. Hardware and/or software used to capture and record key strokes.
  3. Spear phishing aimed at high-profile targets such as executives.
  4. Cryptography that uses two different keys for encryption and decryption.
  5. Information that can be used to distinguish an individual’s identity.
  6. The act of applying a fix to a software defect.
  7. An (abbreviated) attack where a malicious actor sits in-between two parties, intercepting communications.
  8. Cryptography that uses the same shared secret key for both encryption and decryption.
  9. An attack from multiple compromised systems that target a single system, service, or application.
  10. Malware intent on holding your data hostage in an attempt to extort money.
  11. Protecting of information from unauthorized access. Part of the CIA triad.
  12. A team usually involved with the defense of the organization’s infrastructure.
  13. An old method programmers use to bypass security to gain access to a system or software. "War Games"
  14. "Bad guy" hackers.
  15. An isolated environment used by security professionals to run suspicious code or to "detonate" potential malware.

31 Clues: "Bad guy" hackers."Good guy" hackers.The act of applying a fix to a software defect.A team that acts as the adversary during a security assessment.A protocol used to ensure time synchronization between devices.The act of moving around, looking for vulnerable Wi-Fi networks.Hardware and/or software used to capture and record key strokes....

Computing Vocabulary 2019-12-04

Computing Vocabulary crossword puzzle
Across
  1. Small device to store data on the go
  2. The amount of space available
  3. Most of the time you do it illegally
  4. Smaller than a rat
  5. Part of a computer that reads information
  6. Synonym of information
  7. We also call it the Web
  8. System of computer equipment & programs
  9. Computers that are connected together
Down
  1. Desktop machine
  2. Combination of letters and numbers
  3. Protection system making use of the internet
  4. Someone who uses a product, machine or service
  5. Software designed to damage
  6. A set of mathematical instructions or rules
  7. Identifying data ; Biscuit
  8. Computer program
  9. Central computer from which other computers get information
  10. Accessing information without permission
  11. All the equipment necessary to run a computer

20 Clues: Desktop machineComputer programSmaller than a ratSynonym of informationWe also call it the WebIdentifying data ; BiscuitSoftware designed to damageThe amount of space availableCombination of letters and numbersSmall device to store data on the goMost of the time you do it illegallyComputers that are connected together...

Pineapple #2 2023-05-05

Pineapple #2 crossword puzzle
Across
  1. slithering coding language
  2. Pokemon Cards for REAL men
  3. fictional school with one of the worst student safety track records
  4. Heath Ledger or an otaku with an ungodly amount of rizz
  5. rock band that just "Can't Stop"
  6. Ghibli mastermind Miyazaki
  7. Your favorite cybersecurity student
  8. One who is "virtually insane"
  9. a site that is full of idiots and dank memes
  10. Psych lead James Roday
  11. Star Trek captain with a terrible "Rocketman" cover
Down
  1. that old meme you had as your background for a while
  2. Cocaine sadly not included anymore
  3. "Ride of The Valkyries" Composer
  4. They're finally making GTA VI
  5. "I think therefore I'm"
  6. Feline from Fukuhara
  7. based smash main
  8. Soulsborne mastermind Miyazaki
  9. Kentaro Miura's masterpiece

20 Clues: based smash mainFeline from FukuharaPsych lead James Roday"I think therefore I'm"slithering coding languagePokemon Cards for REAL menGhibli mastermind MiyazakiKentaro Miura's masterpieceThey're finally making GTA VIOne who is "virtually insane"Soulsborne mastermind Miyazaki"Ride of The Valkyries" Composerrock band that just "Can't Stop"...

Sip and Solve 2024-04-05

Sip and Solve crossword puzzle
Across
  1. What month did they begin dating?
  2. Where is their honeymoon location?
  3. What is Adonis' middle name?
  4. What is Eimear's eye colour?
  5. How they first meet?
  6. Where do they live?
  7. What is Eimear's job?
  8. How many years have they been together?
  9. What is the name of their dog?
  10. Where was Eimear born?
Down
  1. What is Adonis' job?
  2. What car do they drive?
  3. Where was their first date?
  4. What instrument does Eimear learn?
  5. Where did they get engaged?
  6. What is Eimear's birth month?
  7. What is Eimear's middle name?
  8. What is Adonis' favourite hobby?
  9. What is Adonis' eye colour?
  10. What is Adonis' birth month?
  11. Where was Adonis born?
  12. Where was their first holiday?

22 Clues: Where do they live?What is Adonis' job?How they first meet?What is Eimear's job?Where was Adonis born?Where was Eimear born?What car do they drive?Where was their first date?Where did they get engaged?What is Adonis' eye colour?What is Adonis' middle name?What is Eimear's eye colour?What is Adonis' birth month?What is Eimear's birth month?...

If Ever You're Bored 2022-09-07

If Ever You're Bored crossword puzzle
Across
  1. my favorite food you cook
  2. my college major
  3. my favorite song from Renaissance
  4. the first food place we've ever been together to
  5. your first car's name
  6. our son's name
Down
  1. place we celebrated when we thought we were going to get accepted into our first "dream" apt.
  2. my car's name
  3. my mother's name
  4. type of car i want in the future
  5. what we are going to be in the future
  6. you and Miracle

12 Clues: my car's nameour son's nameyou and Miraclemy college majormy mother's nameyour first car's namemy favorite food you cooktype of car i want in the futuremy favorite song from Renaissancewhat we are going to be in the futurethe first food place we've ever been together to...

The Internet and Cybersecurity 2024-04-30

The Internet and Cybersecurity crossword puzzle
Across
  1. A type of cyber attack where individuals are manipulated into revealing sensitive information.
  2. A trial and error method used to decode encrypted data such as passwords.
  3. An unauthorized wireless access point that allows unauthorized users to connect to a secure network.
  4. The action of tracking and recording keys struck on a keyboard, typically in a covert manner.
  5. The practice and study of techniques for secure communication, often involving encryption and decryption.
  6. A type of computation in which many calculations or processes are carried out simultaneously.
  7. Refers to the gap between people who have access to modern information and communication technology and those who do not.
  8. A process that converts input data into a fixed-size string of bytes, often used for data integrity verification.
  9. The practice of concealing messages or data within other non-secret text or data.
  10. The process of verifying the identity of a user or system.
  11. A type of encryption where the same key is used for both encryption and decryption.
Down
  1. A cryptographic key that can be freely distributed and used to encrypt messages.
  2. A networking device that forwards data packets between computer networks.
  3. A global network of interconnected computers that communicate with each other using a common set of protocols.
  4. A cyber attack that disrupts normal traffic of a targeted server.
  5. The inclusion of extra components in a system to improve reliability and performance.
  6. A set of rules that govern the exchange of data between devices.
  7. The process of encoding information in such a way that only authorized parties can access it.
  8. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  9. A public-key encryption algorithm used for secure data transmission over the internet.
  10. Small units of data that are transmitted over a network.

21 Clues: Small units of data that are transmitted over a network.The process of verifying the identity of a user or system.A set of rules that govern the exchange of data between devices.A cyber attack that disrupts normal traffic of a targeted server.A networking device that forwards data packets between computer networks....

Year 9 cybersecurity 1 2024-11-05

Year 9 cybersecurity 1 crossword puzzle
Across
  1. A type of malware that infects files and spreads to other systems, often damaging files and affecting system performance.
  2. A password that combines letters, numbers, and symbols, is at least 8 characters long, and avoids common words to prevent unauthorized access.
  3. A security system that monitors and controls network traffic, blocking unauthorized access to protect systems from malicious attacks.
  4. A professional who protects networks and systems from hacking, malware, and other threats by monitoring, installing security measures, and educating users.
  5. A security process that requires users to provide two forms of identification to access an account, adding an extra layer of protection.
  6. Unauthorized access to computer systems or networks, often with the intent to steal or modify data.
  7. Software that displays unwanted advertisements on a device, which can slow down the system and pose security risks.
  8. A program designed to detect, prevent, and remove malware, including viruses and spyware, to protect computer systems.
  9. The process of converting data into a secure format to prevent unauthorized access during transmission over networks.
  10. The information and data left behind from a user’s online activities, which can be tracked or accessed by others.
Down
  1. A unique numerical identifier assigned to each device on a network, allowing devices to communicate over the internet or within a local network.
  2. A method of manipulating people into revealing confidential information, often for malicious purposes, by exploiting trust.
  3. A service that encrypts internet connections, making online activities more secure and protecting users' identities and data on public networks.
  4. A text-based interface that allows users to interact with the computer by typing commands rather than using graphical icons.
  5. A tool used to block unwanted and potentially harmful emails, such as phishing attempts or advertisements, from reaching a user’s inbox.
  6. Controls that allow users to manage who can view their profiles, posts, and personal information on social platforms.
  7. A fraudulent attempt to steal personal information by pretending to be a legitimate entity, often using fake emails or messages.
  8. A virtual point used to identify specific services or applications on a networked device, allowing data to flow to and from the device.
  9. Malicious software designed to harm, exploit, or otherwise compromise a computer system, including viruses, adware, and spyware.
  10. A fake public Wi-Fi network set up to steal personal information from users who connect to it.

20 Clues: A fake public Wi-Fi network set up to steal personal information from users who connect to it.Unauthorized access to computer systems or networks, often with the intent to steal or modify data.The information and data left behind from a user’s online activities, which can be tracked or accessed by others....

Cybersecurity/Web Design 2019-11-05

Cybersecurity/Web Design crossword puzzle
Across
  1. to scramble information so that it can be sent safely over the Internet
  2. Hacking’ - Testing a computer systems to find security vulnerabilities
  3. Audience
  4. is the branch of Computer Science that deals with online threats, how to keep data safe and preventing cybercrime (criminal activity carried out using a computer/computer networks)
  5. preferred way to present/layout digital material
  6. attack intended to direct a website’s traffic to another fake site by hacking a DNS server or redirecting the computer electronically.
  7. to help protect a computer network from unauthorised access
  8. reason for which the website has been created e.g. to entertain
Down
  1. Testing
  2. a secret word to unlock a device – must include numbers/special characters
  3. by reproducing itself or infecting other programs by modifying them.
  4. to use and understand
  5. a user is sent a fake email that looks like it is from a bank/business hoping to gather personal information.
  6. simple way to get passwords/PIN numbers by criminals standing behind you and watching.

14 Clues: TestingAudienceto use and understandpreferred way to present/layout digital materialto help protect a computer network from unauthorised accessreason for which the website has been created e.g. to entertainby reproducing itself or infecting other programs by modifying them.Hacking’ - Testing a computer systems to find security vulnerabilities...

Cybersecurity Unit 2 Terminology 2022-09-13

Cybersecurity Unit 2 Terminology crossword puzzle
Across
  1. A machine that requests a webpage using a web browser.
  2. A Wireshark data capture file that contains packet information of network traffic.
  3. A network interface card is a physical component on a computer or device that provides connectivity to a network.
  4. In network security, it allows or denies packets based on source and destinations addresses, ports, or protocols.
  5. The arrangement of the various elements (computers,routers, switches, etc) of a network.
  6. A (distributed) denial of service attack that targets websites and web servers with the intention of bringing the services they provide to a halt.
  7. Transmission Control Protocol used to establish and maintain connections over a computer network.
  8. An agreed-upon method for communication.
  9. A code that defines every structure on an HTML page, such as text, images, and links. HTML tags begin with the less-than (<) character and end with greater-than (>) .
  10. An operating system similar in concept to the Windows OS but used more often to host routers and web servers.
  11. Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it.
  12. A part of a process or system that is seen by the user and typically provides functionality to the user.
  13. A small local area network of computers and devices.
  14. A piece of software or a sequence of commands that takes advantage of a vulnerability in a computer system to cause unexpected behavior to occur.
  15. A machine that responds to a request received.
  16. An identifying number for hosts and servers on the internet.
  17. The buying and selling of goods or services over the internet.
  18. it helps the reader of the program understand the code, especially when working on code with other people.
  19. A way for a computer to identify specific programs and manage their activity.
  20. When hackers can use their knowledge of a web server's directory structure to craft URL addresses and navigate to locations that are unreferenced and unlinked in a website.
  21. A file that contains an official record of activities that occur on a computer.
  22. A computer, typically one on a network.
  23. Preserving the accuracy of information and validating its source.
  24. A database in which data is organized into collections of similar data, called tables. It uses relationships to define how data in one table can relate to data in another table.
  25. A computer that delivers files forming web pages across a network to requesting clients.
  26. Problems, faults, and bugs in the program that are exploitable, allowing attackers access to the computer on which the program is running.
  27. A starting point for data analysis. It is the initial data set used in later comparisons.
  28. In a command, they are used to specify different variations, sometimes supplying additional input to the command or requesting different styles of output from the command.
Down
  1. Ensuring that information resources and services are accessible in a timely manner.
  2. Keeping sensitive information out of unwanted hands.
  3. Performing a computer attack to evaluate the security of a
  4. It can have two meanings in computer terminology:a) it can be a specific application or function such as email, chat, etc. b) it can refer to a specific part of an application, such as transmitting the data of a webpage
  5. Software that replicates and infects many computers, turning the computer into a "zombie". Zombie devices are remotely controlled by an attacker for malicious purposes.
  6. The way an organization structures and organizes the information that is required by their employees and/or customers.
  7. system The hardware and software used to help organize and analyze data.
  8. Analyze something without interfering or affecting it.
  9. Refers to the action of watching and analyzing network traffic at the packet level.
  10. A type of exploit in which the attacker inserts malicious client-side code into webpages to steal data, take control of a computer, run malicious code, or achieve a phishing scam.
  11. A computer, typically one on a network. It can also be referred to as a machine or a system.
  12. In terms of computer science, it means to increase a system's security and reduce its vulnerabilities.
  13. Reverse the encryption process, making the data human-readable again.
  14. system. The extra digits are represented by the letters a through f, so all digits in hex are 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f. You can also see hex numbers in all capitals A through F.
  15. A three-way communication method using SYN (synchronize), SYN-ACK (synchronize=acknowledge), and ACK (acknowledge) to establishing a connection between
  16. They are best known for developing standards in the computer and electronics industries.
  17. A human-based attack in which the malicious user intercepts communication between the victim's computer and the internet.
  18. Data that is stored in a router in table format. It contains addresses of known networks (other routers), ones that have already been discovered and used.
  19. The Organizationally Unique Identifier is the first half of the MAC address, designating the manufacturer of the network device.
  20. It is a very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden, allowing the user to focus on the details that are important for the task at hand.
  21. Transport Layer Security is a security protocol that uses encryption at a lower level of abstraction.
  22. Software and hardware that track all keyboard clicks, including back spaces, to discover usernames, passwords, credit card numbers, and other sensitive information.
  23. Software running with elevated privileges to control a computer or to gain access to restricted accounts and data.
  24. A network device that controls and filters data between networks, either wired or wireless. It is a specific type of "gateway", a device that acts as a gate between two networks.
  25. A media access control (MAC) addresses is unique numeric code that is assigned to networking hardware components (typically a network interface card or NIC) that is built into computers and mobile devices. The code is assigned by the manufacturer, includes their unique identification number, and never changes.
  26. Often referred to as hex, it is a base-16
  27. The acronym for "Uniform Resource Locator". The systematic way to find specific web addresses and web pages.
  28. A note in a program that describes what the code is doing. Adding them is very good programming practice,
  29. A part of a process or system that is not seen by the user. It provides a supporting function on behalf of the main process.
  30. Small units of data, transmitted on a network. Collected together, they compose some larger data, such as a document, a website, a movie, etc.

58 Clues: A computer, typically one on a network.An agreed-upon method for communication.Often referred to as hex, it is a base-16A machine that responds to a request received.Keeping sensitive information out of unwanted hands.A small local area network of computers and devices.A machine that requests a webpage using a web browser....

Cybersecurity Unit 2 Terminology 2022-09-15

Cybersecurity Unit 2 Terminology crossword puzzle
Across
  1. The way an organization structures and organizes the information that is required by their employees and/or customers.
  2. Performing a computer attack to evaluate the security of a system.
  3. A computer typically one on a network.
  4. An agreed-upon method for communication.
  5. A file that contains an official record of activities that occur on a computer.
  6. The acronym for "Uniform Resource Locator". The systematic way to find specific web addresses and web pages.
  7. A human-based attack in which the malicious user intercepts communication between the victim's computer and the internet.
  8. It is a very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden allowing the user to focus on the details that are important for the task at hand.
  9. A way for a computer to identify specific programs and manage their activity.
  10. Preserving the accuracy of information and validating its source.
  11. A network device that controls and filters data between networks either wired or wireless. It is a specific type of "gateway" a device that acts as a gate between two networks.
  12. A piece of software or a sequence of commands that takes advantage of a vulnerability in a computer system to cause unexpected behavior to occur.
  13. Transmission Control Protocol used to establish and maintain connections over a computer network.
  14. Refers to the action of watching and analyzing network traffic at the packet level.
  15. An identifying number for hosts and servers on the internet.
  16. Software running with elevated privileges to control a computer or to gain access to restricted accounts and data.
  17. It can have two meanings in computer terminology: a) it can be a specific application or function such as email chat etc. b) it can refer to a specific part of an application such as transmitting the data of a web page
  18. Keeping sensitive information out of unwanted hands.
  19. A type of exploit in which the attacker inserts malicious client-side code into webpages to steal data take control of a computer run malicious code or achieve a phishing scam.
  20. In a command flags are used to specify different variations sometimes supplying additional input to the command or requesting different styles of output from the command.
  21. Often referred to as hex it is a base-16 number system.
  22. Problems faults and bugs in the program that are exploitable allowing attackers access to the computer on which the program is running.
  23. A database in which data is organized into collections of similar data called tables. It uses relationships to define how data in one table can relate to data in another table.
  24. In network security it allows or denies packets based on source and destinations addresses ports or protocols.
  25. baseline A starting point for data analysis. It is the initial data set used in later comparisons.
  26. Ensuring that information resources and services are accessible in a timely manner.
  27. Analyze something without interfering or affecting it.
Down
  1. The arrangement of the various elements (computers routers switches etc) of a network.
  2. Small units of data transmitted on a network. Collected together they compose some larger data such as a document a website a movie etc.
  3. Software that locks your computer or makes it inoperable requiring you to pay someone to remove it.
  4. Software that replicates and infects many computers turning the computer into a "zombie". Zombie devices are remotely controlled by an attacker for malicious purposes.
  5. The hardware and software used to help organize and analyze data.
  6. A code that defines every structure on an HTML page such as text images and links.
  7. A (distributed) denial of service attack that targets websites and web servers with the intention of bringing the services they provide to a halt.
  8. Data that is stored in a router in table format. It contains addresses of known networks (other routers) ones that have already been discovered and used.
  9. When hackers can use their knowledge of a web server's directory structure to craft URL addresses and navigate to locations that are unreferenced and unlinked in a website.
  10. A Wireshark data capture file that contains packet information of network traffic.
  11. Transport Layer Security is a security protocol that uses encryption at a lower level of abstraction.
  12. In terms of computer science it means to increase a systems security and reduce its vulnerabilities.
  13. A machine that requests a webpage using a web browser.
  14. A machine that responds to a request received.
  15. A computer that delivers files forming web pages across a network to requesting clients.
  16. The buying and selling of goods or services over the internet.
  17. A note in a program that describes what the code is doing.
  18. A computer typically one on a network.
  19. Software and hardware that track all keyboard clicks including back spaces to discover usernames passwords credit card numbers and other sensitive information.
  20. A three-way communication method using SYN (synchronize) SYN-ACK (synchronize=acknowledge) and ACK (acknowledge) to establishing a connection between hosts.
  21. A small local area network of computers and devices.
  22. An operating system similar in concept to the Windows OS but used more often to host routers and web servers.

49 Clues: A computer typically one on a network.A computer typically one on a network.An agreed-upon method for communication.A machine that responds to a request received.Keeping sensitive information out of unwanted hands.A small local area network of computers and devices.A machine that requests a webpage using a web browser....

Cybersecurity Crossword Puzzle - MP 2023-01-27

Cybersecurity Crossword Puzzle - MP crossword puzzle
Across
  1. transforms plaintext into ciphertext
  2. key used to decrypt
  3. trap for cyber criminals
  4. unsolicited emails
  5. tricked into clicking
  6. intrusive computer software
  7. key to encrypt and decrypt
  8. helps prevent hackers and viruses
  9. hidden horse surprise
  10. malware that collects personal data
  11. hides users location
Down
  1. unwanted pop up ads
  2. used to detect viruses network
  3. program that allows remote access
  4. person who harms your computer
  5. protects data by scrambling it
  6. error on software
  7. malware that reproduces itself
  8. ethical hacker
  9. form of internet communication
  10. peripherals connected as one entity.

21 Clues: ethical hackererror on softwareunsolicited emailsunwanted pop up adskey used to decrypthides users locationtricked into clickinghidden horse surprisetrap for cyber criminalskey to encrypt and decryptintrusive computer softwareused to detect viruses networkperson who harms your computerprotects data by scrambling itmalware that reproduces itself...

Cybersecurity Month - October 2023 2023-05-19

Cybersecurity Month - October 2023 crossword puzzle
Across
  1. TRSL's IT team stays on top of this so don't you fall for it either
  2. Not gonna fry up anything with this catch
  3. out to get you and your information
  4. always best to use your own instead of a public or free charging station
  5. If public, not the best connection for work-related tasks or any sensitive and/or personal info
  6. malicious software that can infiltrate a network(s)
  7. I can be dangerous so don't open me unless you know I'm safe
  8. If you don't know the source, do not ____ the data.
  9. hacker operating in cyberspace
  10. Being alert to avoid potential dangers or risks
  11. If you get a __ ___from someone you don't know, no response is best of all
  12. scammers can give you a ring too
Down
  1. Scammers use this trick to redirect your browser
  2. Your fingers do the talking but don't fall for this threat
  3. Leave it this section to handle your PC needs, please.
  4. when a "big fish" is targeted
  5. An ___ ___ calls at 3 am with a fraud alert from your bank. Hang up and call your bank directly, ASAP.
  6. FortiToken or Google
  7. Instead of just a single word, this is also great for a great password
  8. I should be unique and not reused
  9. If something seems too good to be true, you should feel this way.
  10. always do this when stepping away from your PC
  11. use this to type in the URL
  12. share carefully on these profiles
  13. method of communication in lieu of "snail mail"

25 Clues: FortiToken or Googleuse this to type in the URLwhen a "big fish" is targetedhacker operating in cyberspacescammers can give you a ring tooI should be unique and not reusedshare carefully on these profilesout to get you and your informationNot gonna fry up anything with this catchalways do this when stepping away from your PC...

CIS178 Cybersecurity Crossword Puzzle 2023-07-26

CIS178 Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. people bullying others online
  2. software that destroys information on your computer
  3. someone who attempts to get your information
  4. detection to shield against viruses
  5. software that hackers use to spy on you
  6. someone is tricked on clicking on an object
  7. software that hijacks your system and wants money
  8. malware that spreads to devices and slows down everything
  9. software to keep intruders out
  10. two or more computers connected together
  11. hackers change an IP address to seem real
Down
  1. multiple steps to access your account
  2. series of numbers that allow devices to connect to the internet
  3. owners permission to hack into their network
  4. connecting computers on a private network
  5. a scam that seems real
  6. hacker breaking into your computer data
  7. computers that are connected as one entity
  8. password to access your device
  9. a type of storage for your information

20 Clues: a scam that seems realpeople bullying others onlinepassword to access your devicesoftware to keep intruders outdetection to shield against virusesmultiple steps to access your accounta type of storage for your informationsoftware that hackers use to spy on youhacker breaking into your computer datatwo or more computers connected together...

MAHIM SIKDER-Cybersecurity Crossword 2023-09-07

MAHIM SIKDER-Cybersecurity Crossword crossword puzzle
Across
  1. a client/server protocol that automatically provides an IP host with its IP address, subnet mask and default gateway.
  2. a process that verifies a user's identity and ensures that they have authorization, before providing them with access to information.
  3. a copy of data that is used if original data is unavailable.
  4. a scheme that takes money or other valuables from an unsuspecting victim.
  5. a process in which data is converted to code, in order to prevent unauthorized access.
  6. a malware that denies users access to their files. The attacker demands money from the user, in order for them to get their information back.
  7. process of copying data from the internet to your computer.
  8. a communication method that electronic devices use to deliver and receive messages electronically.
  9. software that hackers use to steal data,damage or destroy computers/computer systems.
Down
  1. protection of networks,data and devices from criminal use.
  2. a software used to detect and destroy viruses.
  3. A number used to track someones financial information.(EVERYONE GETS THIS NUMBER AT BIRTH).
  4. this word is short for organization(s) that provides access to the Internet.
  5. string of characters used to access authorization.
  6. a set of instructions, data or programs used by computers to operate and execute specific tasks.
  7. known as the address of a web page.
  8. a system that changes domain name into IP-addresses.
  9. advertisement that promote product or services to the user. Sometimes this can lead to malicious websites.
  10. a device that connects two or more packet-switched networks. Uses ip-Addresses.
  11. authentication method that requires the user to provide more than one verification information.

20 Clues: known as the address of a web page.a software used to detect and destroy viruses.string of characters used to access authorization.a system that changes domain name into IP-addresses.protection of networks,data and devices from criminal use.process of copying data from the internet to your computer....

Cybersecurity Awareness Month Crossword 2023-09-27

Cybersecurity Awareness Month Crossword crossword puzzle
Across
  1. A process or measure used to verify a user's identity.
  2. A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
  3. Software that compromises the operation of a system by performing an unauthorized function or process.
  4. Converting Data into a form that cannot be easily understood by unauthorized people.
  5. A flaw or weakness in an information system that could be exploited.
  6. A string of characters used to authenticate an identity.
  7. Extra copies of computer files that can be used to restore files that are lost or damaged.
  8. A mechanism for creating a secure connection between a computing device and a computer network
  9. A type of malware that denies a user's access to a system or data until a sum of money is paid.
  10. A collection of computers compromised by malicious code and controlled across a network.
  11. Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
Down
  1. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization
  2. The ability of individuals to understand and exercise control over how information about themselves may be used by others.
  3. Software designed to block malware from entering protected networks.
  4. Faking the sending address of a transmission to gain illegal entry into a secure system.
  5. Part of the Internet that isn't indexed by search engines.
  6. An unauthorized user who attempts to or gains access to an information system.
  7. an individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
  8. Computer programs that can block, detect, and remove viruses and other malware.
  9. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  10. A cybersecurity risk that originates from within an organization.
  11. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
  12. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  13. Unsolicited emails sent to many addresses.

24 Clues: Unsolicited emails sent to many addresses.A process or measure used to verify a user's identity.A string of characters used to authenticate an identity.Part of the Internet that isn't indexed by search engines.A cybersecurity risk that originates from within an organization.Software designed to block malware from entering protected networks....

Harris 20th Anniversary 2022-10-14

Harris 20th Anniversary crossword puzzle
Across
  1. What sport/activity does Chris play
  2. Where did Melissa grow up?
  3. Where did they live when they got married?
  4. What is the Harris family dogs name?
  5. What volcano did the Harris family climb in Hawaii?
  6. Who is Melissa's favorite singer?
  7. Where did they Chris & Melissa get married?
Down
  1. What is Chris' profession?
  2. What are Chris & Melissa's kids middle
  3. Who is Chris' favorite rapper?
  4. What cruise line did they sail on when they
  5. married?

12 Clues: married?What is Chris' profession?Where did Melissa grow up?Who is Chris' favorite rapper?Who is Melissa's favorite singer?What sport/activity does Chris playWhat is the Harris family dogs name?What are Chris & Melissa's kids middleWhere did they live when they got married?What cruise line did they sail on when they...

THE FRIENDS 2023-04-20

THE FRIENDS crossword puzzle
Across
  1. ashley's most used phrase
  2. what maria gets on her face when she's outside
  3. a class we all share
  4. kaylee's biggest feature
  5. the man the myth the situationship
  6. the groupchat that we all have together
  7. the teacher that is better than woolley
  8. chaine's dead name
  9. ariany could never live with out this
  10. kaylee and ashley are poor...
Down
  1. ashley's stem major
  2. ariany, kaylee, ashley all have in common
  3. our last year here:(
  4. ariany is lacking her...
  5. what maria is (foreign)
  6. ariany gives you this when you speak
  7. emily thinks she looks like this when her hair is up (in spanish)
  8. chaine is pretty in...

18 Clues: chaine's dead nameashley's stem majorour last year here:(a class we all sharechaine is pretty in...what maria is (foreign)ariany is lacking her...kaylee's biggest featureashley's most used phrasekaylee and ashley are poor...the man the myth the situationshipariany gives you this when you speakariany could never live with out this...

Technology 2024-01-26

Technology crossword puzzle
Across
  1. Smallest unity of information
  2. Small electronic devices that make your life easier.
  3. Electronic devices that you can wear as accessories.
  4. About conersing analog information to a digital ones.
  5. Intenet of things.
  6. To protect systems or data from cybernetics attacks.
  7. Programmable machine to automate processes
Down
  1. The smallest technology.
  2. It's used to talk
  3. A process or set of rules
  4. Msurament and analysis about unique physical of everyone.
  5. Aereal no tipulated devices
  6. Can make tridimensional images to crate optical illusions.
  7. Generally, the not physical about a computer.
  8. To protect data encoding the information.

15 Clues: It's used to talkIntenet of things.The smallest technology.A process or set of rulesAereal no tipulated devicesSmallest unity of informationTo protect data encoding the information.Programmable machine to automate processesGenerally, the not physical about a computer.Small electronic devices that make your life easier....

Technology 2024-01-26

Technology crossword puzzle
Across
  1. Smallest unity of information
  2. Small electronic devices that make your life easier.
  3. Electronic devices that you can wear as accessories.
  4. About conersing analog information to a digital ones.
  5. Intenet of things.
  6. To protect systems or data from cybernetics attacks.
  7. Programmable machine to automate processes
Down
  1. The smallest technology.
  2. It's used to talk
  3. A process or set of rules
  4. Msurament and analysis about unique physical of everyone.
  5. Aereal no tipulated devices
  6. Can make tridimensional images to crate optical illusions.
  7. Generally, the not physical about a computer.
  8. To protect data encoding the information.

15 Clues: It's used to talkIntenet of things.The smallest technology.A process or set of rulesAereal no tipulated devicesSmallest unity of informationTo protect data encoding the information.Programmable machine to automate processesGenerally, the not physical about a computer.Small electronic devices that make your life easier....

AI 2024-07-12

AI crossword puzzle
Across
  1. A celestial body or a digital storage?
  2. Computer's systematic steps for problem-solving
  3. Digital lock and key
  4. What AI craves to learn and grow
  5. Dogecoin or Shiba Inu
  6. Satellite navigator
  7. Physical form of AI doing everything from vaccuming to surgery
  8. Will probably take over the world by 2050
Down
  1. AI that creates content faster than your caffeinated coworker
  2. Your digital pal who's always up for a chat, no matter what (7 lette
  3. Identity recognition with a touch!
  4. Digital Bodyguard
  5. Pocket sized device that tells you everything from time to time
  6. Next-gen computing
  7. Augmented reality

15 Clues: Digital BodyguardAugmented realityNext-gen computingSatellite navigatorDigital lock and keyDogecoin or Shiba InuWhat AI craves to learn and growIdentity recognition with a touch!A celestial body or a digital storage?Will probably take over the world by 2050Computer's systematic steps for problem-solving...

Cybersecurity - LMC Style 2022-10-11

Cybersecurity - LMC Style crossword puzzle
Across
  1. Malicious software
  2. ___ Engineering. Hackers us this skill to trick people into revealing private information .
  3. Software that collects data about a user and transmits it over the internet without the user’s knowledge/permission.
  4. A technology used when working remote that secures information going to/from LMC’s servers.
  5. Software Usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.
  6. A technology that allows us to access our files through the internet from anywhere in the world. Hint: it also brings rain.
  7. A group of computers, printers and devices that are interconnected.
Down
  1. A system that relies upon encryption techniques rather than banks to regulate the generation of units of currency and verify the transfer of funds.
  2. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. A process of encoding messages to keep them secret, so only “authorized” parties can read it.
  4. Who do you call for help?
  5. A sequence of words (spaces and punctuation too) used for authentication.
  6. Piece of code that replicates itself in order to spread the infection to other connected computers.

13 Clues: Malicious softwareWho do you call for help?A group of computers, printers and devices that are interconnected.A sequence of words (spaces and punctuation too) used for authentication.___ Engineering. Hackers us this skill to trick people into revealing private information ....