cybersecurity Crossword Puzzles

Cybersecurity Awareness Crossword 2025-04-01

Cybersecurity Awareness Crossword crossword puzzle
Across
  1. Good digital habits to protect your devices and accounts
  2. Regularly doing this keeps your software secure
  3. Don’t enter your password if this page looks suspicious
  4. When an attacker breaks into a system and steals data
  5. When an attacker makes something look real but it’s fake
  6. A message that warns you about a possible threat
  7. A common cyberattack that tries to trick you into clicking or giving info
Down
  1. People-based method hackers use to trick victims
  2. Type of hacking that manipulates people instead of software
  3. What your accounts and devices should always be
  4. A fake version of this might trick you into approving a login you didn’t make
  5. First line of defense — make it strong, never reuse it
  6. What you should do if you spot a suspicious email or message
  7. A fix released to close security vulnerabilities
  8. Adds a second layer of login security using a code or app
  9. A deceptive trick to steal money, data, or logins

16 Clues: What your accounts and devices should always beRegularly doing this keeps your software securePeople-based method hackers use to trick victimsA fix released to close security vulnerabilitiesA message that warns you about a possible threatA deceptive trick to steal money, data, or loginsWhen an attacker breaks into a system and steals data...

CYBERSECURITY CROSSWORD CHALLENGE 2024-10-20

CYBERSECURITY CROSSWORD CHALLENGE crossword puzzle
Across
  1. If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
  2. Encryption technique used to protect data
  3. A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
  4. Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
  5. A sequence of words or text used to control access to a computer; similar to a password.
  6. System(software or hardware) used to manage network security and monitor traffic
  7. Malicious program that can replicate itself
  8. An attack using computer program to guess the correct user credentials
  9. This testing simulates a full stack attack, probing every possible weakness
Down
  1. Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
  2. Protocol used for encryption which protects data in transit
  3. Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
  4. The act of tricking someone into giving up sensitive information
  5. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
  6. A flaw or weakness in a computer system that could be exploited to violate the system’s security.
  7. A piece of data stored on your device by websites you visit. Not chocolate chip, though

16 Clues: Encryption technique used to protect dataMalicious program that can replicate itselfProtocol used for encryption which protects data in transitThe act of tricking someone into giving up sensitive informationAn attack using computer program to guess the correct user credentials...

GenCyber Cybersecurity Concepts 2022-06-08

GenCyber Cybersecurity Concepts crossword puzzle
Across
  1. c
  2. y
  3. g
  4. n
  5. e
Down
  1. f
  2. c
  3. c

8 Clues: fccycgne

GenCyber Cybersecurity Concepts 2022-06-08

GenCyber Cybersecurity Concepts crossword puzzle
Across
  1. n
  2. c
  3. f
  4. c
Down
  1. g
  2. y
  3. c
  4. e

8 Clues: gynccefc

IEM's October Social Media Crossword Puzzle 2021-10-21

IEM's October Social Media Crossword Puzzle crossword puzzle
Across
  1. Wash your hands with _____ and water
  2. October is ________ Awareness Month
  3. IEMer moderating Techniques for Successful Grant Applications session at IAEM (last name)
  4. Important tool to protect your family during a fire emergency
  5. Theme of hurricane preparedness tip
  6. IEMer moderating FEAM Forum Panel at IAEM (last name)
  7. Sites opening across Virginia
  8. International Day for Disaster ______
Down
  1. Great Shake Out Drill
  2. Cyber attack
  3. FEMA Administrator (last name)
  4. 246th Birthday
  5. Committed to stabilizing ______ security
  6. NEMA 2021 Annual Forum
  7. ______ Week
  8. Annual Conference in Grand Rapids, MI
  9. Conferences are an opportunity to…

17 Clues: ______ WeekCyber attack246th BirthdayGreat Shake Out DrillNEMA 2021 Annual ForumSites opening across VirginiaFEMA Administrator (last name)Conferences are an opportunity to…October is ________ Awareness MonthTheme of hurricane preparedness tipWash your hands with _____ and waterAnnual Conference in Grand Rapids, MI...

Cybersecurity Legislations Crossword 2023-12-13

Cybersecurity Legislations Crossword crossword puzzle
Across
  1. Legal framework that requires organisations to protect sensitive data
  2. This act empowers law enforcement agencies to investigate and combat cybercrime in the UK
  3. This act focuses on protecting critical national infrastructure from cyber threats
  4. The UK's primary legislation for the protection of personal data
Down
  1. This law ensures the security of electronic communications services in the UK
  2. Law that requires public sector organisations to follow specific cybersecurity standards (blankblank scheme)
  3. An organisation responsible for overseeing the implementation of cybersecurity strategies and policies in the UK
  4. Legislation that governs the interception and monitoring of communications in the UK

8 Clues: The UK's primary legislation for the protection of personal dataLegal framework that requires organisations to protect sensitive dataThis law ensures the security of electronic communications services in the UKThis act focuses on protecting critical national infrastructure from cyber threats...

Emerging Cyber Threats and Attack Vectors Puzzle 2024-11-13

Emerging Cyber Threats and Attack Vectors Puzzle crossword puzzle
Across
  1. Cyberattack method involving reused login credentials
  2. Field focused on protecting digital information from unauthorized access
  3. A type of cyberattack where attackers demand payment to restore access
Down
  1. A breach involving an entertainment company that revealed weaknesses in cybersecurity
  2. A technique that makes it hard for attackers to distinguish between real and decoy assets
  3. A famous malware that targeted industrial control systems, raising concerns over cyber warfare
  4. Name of the ransomware known for using traditional tradecraft in its attacks

7 Clues: Cyberattack method involving reused login credentialsA type of cyberattack where attackers demand payment to restore accessField focused on protecting digital information from unauthorized accessName of the ransomware known for using traditional tradecraft in its attacks...

Dm literacy 2021-11-03

Dm literacy crossword puzzle
Across
  1. a blue bird
  2. A social media used for old people
  3. post pictures
Down
  1. online security
  2. Videos
  3. bitmoji
  4. 3-180 second clips
  5. ai that pushes out content

8 Clues: Videosbitmojia blue birdpost picturesonline security3-180 second clipsai that pushes out contentA social media used for old people

Love Letters 2024-05-07

Love Letters crossword puzzle
Across
  1. First movie we "watched"
  2. Name a woman
  3. These stay in the backseat
  4. Tucker's dry food brand
  5. I DON'T HAVE ONE!
  6. My favorite food
Down
  1. My favorite fidget toy puzzle
  2. Character's name I make in every game
  3. Pokemon Bridget painted
  4. Lesbian label you taught me
  5. Certification I'm working on
  6. Dish I make for you
  7. Text on shirt you offered to fix
  8. First Birthday gift I gave you
  9. My hometown (not New Orleans)

15 Clues: Name a womanMy favorite foodI DON'T HAVE ONE!Dish I make for youPokemon Bridget paintedTucker's dry food brandFirst movie we "watched"These stay in the backseatLesbian label you taught meCertification I'm working onMy favorite fidget toy puzzleMy hometown (not New Orleans)First Birthday gift I gave youText on shirt you offered to fix...

Fathers day! 2025-06-12

Fathers day! crossword puzzle
Across
  1. Who is your FAVOURITE child?
  2. What is your favourite country?
  3. How old are you?
  4. What's your favourite food?
  5. 13 when is your birthday?
  6. What's YOUR favourite color?
  7. What's MY favourites color?
  8. How tall are you?
  9. What's your favourite sport?
Down
  1. What type of car do you drive?
  2. what year was I born?
  3. What is your favourite holiday?
  4. What is your job?
  5. What year was mom born born?
  6. 29 when is my birthday?

15 Clues: How old are you?What is your job?How tall are you?what year was I born?29 when is my birthday?13 when is your birthday?What's your favourite food?What's MY favourites color?Who is your FAVOURITE child?What year was mom born born?What's YOUR favourite color?What's your favourite sport?What type of car do you drive?What is your favourite holiday?...

Computer Science 2024-03-19

Computer Science crossword puzzle
Across
  1. Best department of the Interdep
  2. Name of the robot dog
  3. Associative role which is most found in the department
  4. Something you don't like to see while coding
  5. Head of the computer science department
  6. (Only) Friend
Down
  1. Favorite snake
  2. It's the dep info ....
  3. Programming web language
  4. Something unknown
  5. Field of 3A in the department
  6. the other field of 3A in the department
  7. Commonly used software to code
  8. Favorite dish
  9. Number of times the department won the Interdep
  10. Death project

16 Clues: Favorite dishDeath project(Only) FriendFavorite snakeSomething unknownName of the robot dogIt's the dep info ....Programming web languageField of 3A in the departmentCommonly used software to codeBest department of the Interdepthe other field of 3A in the departmentHead of the computer science departmentSomething you don't like to see while coding...

Cybersecurity Crossword 2024-06-25

Cybersecurity Crossword crossword puzzle
Across
  1. Faking an email, phone number or website.
  2. Attack that looks at/steals your data.
  3. Software used to protect your device.
  4. A string of random words used as a password.
Down
  1. We are not allowed to plug this into departmental devices.
  2. A program or programming code that self-replicates
  3. Attack that locks your data and demands money.
  4. Unsolicited emails that try to sell you products.
  5. Process used to help identify phishing.
  6. Malicious software.

10 Clues: Malicious software.Software used to protect your device.Attack that looks at/steals your data.Process used to help identify phishing.Faking an email, phone number or website.A string of random words used as a password.Attack that locks your data and demands money.Unsolicited emails that try to sell you products....

cybersecurity 2 2024-05-07

cybersecurity 2 crossword puzzle
Across
  1. reacting to an incident
  2. assurance that information is not disclosed
  3. finding the problem
  4. the data or information is being maintained
  5. limiting access from everyone
Down
  1. making sure the information doesn't breach
  2. obtaining what was lost
  3. guarantees that systems are available
  4. information about something that one possess
  5. looking for the problem

10 Clues: finding the problemobtaining what was lostreacting to an incidentlooking for the problemlimiting access from everyoneguarantees that systems are availablemaking sure the information doesn't breachassurance that information is not disclosedthe data or information is being maintainedinformation about something that one possess

cybersecurity 4 2024-05-07

cybersecurity 4 crossword puzzle
Across
  1. where all of the data is kept
  2. (1 trillion bytes)
  3. a passive way to direct someone to a malicious website
  4. (1000 bytes)
  5. (1 million bytes)
  6. threat actor that registers a domain name
Down
  1. a campaign desighned to steal account credentials.
  2. ( 1 billion bytes)
  3. remote access trojan
  4. an infected malware that's desighned to replicate and spread from device to device

10 Clues: (1000 bytes)(1 million bytes)(1 trillion bytes)( 1 billion bytes)remote access trojanwhere all of the data is keptthreat actor that registers a domain namea campaign desighned to steal account credentials.a passive way to direct someone to a malicious websitean infected malware that's desighned to replicate and spread from device to device

Cybersecurity Awareness 2021-09-28

Cybersecurity Awareness crossword puzzle
Across
  1. An attempt to get an individual to reveal personal or sensitive information using email and disguising as a legitimate source.
  2. A network security system that is used for monitoring incoming and outgoing network traffic in reference to preset network security rules. This system is used to block unauthorized access to maintain network safety and security.
  3. The process of converting information or data into a code to further prevent unauthorized access.
  4. Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. A vulnerability, or a system flaw, that is taken advantage of for malicious goals.
Down
  1. Unauthorized access to computer data, applications, networks, or devices.
  2. _____Engineering is used to manipulate end-users and exploiting human errors as a way to gain access to private information, access, or anything that the attacker deems valuable.
  3. Malicious software that is used to enter a computer of a device to get her data and information to then forward it to a third-party without the consent of the user.
  4. Malicious Software that blocks access to systems or threatens to release data until a predetermined debt is paid.
  5. Malicious code, or a computer program, that is designed to change the way a computer operates and can spread from one computer to another by copying itself. It then attaches to other programs or documents to execute the malicious code which can result in corruption or damage to data.

10 Clues: Unauthorized access to computer data, applications, networks, or devices.A vulnerability, or a system flaw, that is taken advantage of for malicious goals.Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.The process of converting information or data into a code to further prevent unauthorized access....

Cybersecurity Brainteaser 2025-01-02

Cybersecurity Brainteaser crossword puzzle
Across
  1. A service that encrypts your internet traffic and protects your online identity
  2. A secret word or phrase used to gain entry or authenticate identity
  3. The ability or permission to enter, view, or use a system or resource
  4. An additional security process requiring more than one form of verification
  5. What you should do when you receive a suspicious email
Down
  1. A network security system that monitors and controls incoming and outgoing traffic
  2. Information meant to be kept private and not shared without permission
  3. The most common cyber attack
  4. What you should do with your computer when you step away
  5. Software designed to disrupt, damage, or gain unauthorised access to a computer system

10 Clues: The most common cyber attackWhat you should do when you receive a suspicious emailWhat you should do with your computer when you step awayA secret word or phrase used to gain entry or authenticate identityThe ability or permission to enter, view, or use a system or resourceInformation meant to be kept private and not shared without permission...

Cybersecurity Terms 2023-10-08

Cybersecurity Terms crossword puzzle
Across
  1. Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
  2. Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
  3. Verifying the identity of users or systems to ensure secure access.
  4. Safeguarding personal information to ensure confidentiality and compliance with regulations.
Down
  1. Pertaining to the security challenges and measures for smartphones and tablets.
  2. A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
  3. Malware that encrypts files, demanding payment for their release.
  4. An update to fix vulnerabilities or improve security in software or systems.
  5. Converting data into a code to prevent unauthorized access, especially during transmission.
  6. A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.

10 Clues: Malware that encrypts files, demanding payment for their release.Verifying the identity of users or systems to ensure secure access.An update to fix vulnerabilities or improve security in software or systems.Pertaining to the security challenges and measures for smartphones and tablets....

Ylan cybersecurity 2024-11-21

Ylan cybersecurity crossword puzzle
Across
  1. Open-source operating system based on a kernel created by Linus Torvalds.
  2. A company that makes equipment and software to help connect and protect computer network
  3. A protocol that ensures reliable and ordered data transmission over a network.
  4. Raising awareness is the act of drawing attention to a previously overlooked topic
  5. A secret part of the internet, often used for anonymous activities.
Down
  1. A protocol for connecting to a remote computer without encryption
  2. A type of cyberattack where attackers impersonate legitimate organizations to steal sensitive information, like passwords or credit card details.
  3. A test used to verify if a user is human and not a robot.
  4. Identity theft to mask malicious communication.
  5. Software that secretly gathers information about a user without their consent.

10 Clues: Identity theft to mask malicious communication.A test used to verify if a user is human and not a robot.A protocol for connecting to a remote computer without encryptionA secret part of the internet, often used for anonymous activities.Open-source operating system based on a kernel created by Linus Torvalds....

Cybersecurity M.A 2024-10-17

Cybersecurity M.A crossword puzzle
Across
  1. A method used for guessing password using a high volume of combinaisons
  2. A way for cybercriminals to trick someone for redirecting them in a not authorized jacket
  3. A system designed to prevent unauthorized access to or from a computer network
  4. A way for cybercriminals to hide stolen data or malicious code in images, audio files and others malicious code in images, audio files and other media
Down
  1. A weakness in a computer system or network that can possibly be exploited by attackers to compromise the security.
  2. A malfunction or weakness in the software
  3. Completly Automated Public Turing Test To Tell Computers and Humans Apart
  4. An exploitation system for computer
  5. A type of attack where the pirate takes the victim’s files has an hostages and ask for money to give them back
  6. A way to verify someone identity

10 Clues: A way to verify someone identityAn exploitation system for computerA malfunction or weakness in the softwareA method used for guessing password using a high volume of combinaisonsCompletly Automated Public Turing Test To Tell Computers and Humans ApartA system designed to prevent unauthorized access to or from a computer network...

Cybersecurity Class 2024-03-26

Cybersecurity Class crossword puzzle
Across
  1. Used to keep intruders out
  2. Malware that spreads
  3. Malware used by hackers to spy
  4. Tricking users to reveal information
  5. Bad software that damages systems
  6. Two or more computers connected
Down
  1. Protect your information from hackers
  2. Identifying a user’s identity
  3. Malware that hijacks your system
  4. Shields users against viruses

10 Clues: Malware that spreadsUsed to keep intruders outIdentifying a user’s identityShields users against virusesMalware used by hackers to spyTwo or more computers connectedMalware that hijacks your systemBad software that damages systemsTricking users to reveal informationProtect your information from hackers

Cybersecurity Terminology 2025-06-25

Cybersecurity Terminology crossword puzzle
Across
  1. Prefix meaning harmful or bad
  2. The act of keeping something safe from harm
  3. Software used to stop or remove viruses
  4. Prefix related to computers, networks, or the internet
  5. A hacker who helps protect systems legally
  6. Fraudulent email tricking people into giving personal information
Down
  1. Malicious software that locks access until a ransom is paid.
  2. A weakness that can be exploited in a system.
  3. Software that secretly collects user data
  4. The process of encoding data to protect it

10 Clues: Prefix meaning harmful or badSoftware used to stop or remove virusesSoftware that secretly collects user dataThe process of encoding data to protect itA hacker who helps protect systems legallyThe act of keeping something safe from harmA weakness that can be exploited in a system.Prefix related to computers, networks, or the internet...

Cybersecurity Awareness 2025-10-14

Cybersecurity Awareness crossword puzzle
Across
  1. Always ____ your devices and software when the newest version is available
  2. Always use strong, unique, and complex _____for each of your accounts.
  3. Using a secured ___ is important when working onsite or remotely.
  4. A piece of data about your online history that creates a trail of crumbs. Not chocolate chip, though.
Down
  1. Bad software installed on a computer to damage or harm it. Examples are viruses, Ransomware, Spyware, etc.
  2. DUO is an example of ____, where a prompt is sent to your phone to verify your identity before logging into the account.
  3. When a hacker impersonates a trustworthy person or organization to lure you into clicking on a suspicious link or download a file. This can be in the form of emails, text messages, and phone calls.
  4. A ___ breach is when sensitive and confidential information is accessed, viewed, or stolen by unauthorized individuals or groups.
  5. A method of receiving and sending messages over a network, such as the Internet
  6. If you notice anything suspicious, you should ___ it to IT.Security@uchicagomedicine.org or call 773-702-3456.

10 Clues: Using a secured ___ is important when working onsite or remotely.Always use strong, unique, and complex _____for each of your accounts.Always ____ your devices and software when the newest version is availableA method of receiving and sending messages over a network, such as the Internet...

My Dream Job: Computer Programer 2023-05-03

My Dream Job: Computer Programer crossword puzzle
Across
  1. keeping information found online safe
  2. internet servers
  3. problem-solving operation
  4. testing for problems
  5. building a computer program
  6. the components that form a computer
Down
  1. acronym for hyper text markup language
  2. designing and building
  3. the storage and organization of data
  4. minimum level of education required

10 Clues: internet serverstesting for problemsdesigning and buildingproblem-solving operationbuilding a computer programminimum level of education requiredthe components that form a computerthe storage and organization of datakeeping information found online safeacronym for hyper text markup language

GenCyber Cybersecurity Concepts 2022-06-08

GenCyber Cybersecurity Concepts crossword puzzle
Across
  1. n
  2. g
  3. c
Down
  1. c
  2. y
  3. e
  4. c
  5. f

8 Clues: cngyeccf

nlg 2023-10-17

nlg crossword puzzle
Across
  1. a
  2. b
  3. c
Down
  1. f
  2. e
  3. d

6 Clues: feadbc

Cybersecurity Crossword 2021-02-12

Cybersecurity Crossword crossword puzzle
Across
  1. a worm, virus, or trojan that infects a computer and causes it to download or display malicious pop-ups
  2. unwanted software that monitors and gathers information on a person
  3. an attack where a victim gets an email disguised to look legit, in order to trick them into giving up valuable data
  4. malicious software
  5. a secret sequence of letters, numbers and characters to help verify someone.
Down
  1. a virus which tricks you into being downloaded
  2. information that relates to an identified or identifiable individual
  3. a type of worm, virus or trojan that demands money
  4. a malicious form of self-replicating software
  5. exploit vulnerabilities in a computer's operating system or a networks hardware

10 Clues: malicious softwarea malicious form of self-replicating softwarea virus which tricks you into being downloadeda type of worm, virus or trojan that demands moneyunwanted software that monitors and gathers information on a personinformation that relates to an identified or identifiable individual...

Cybersecurity Crossword 2024-10-15

Cybersecurity Crossword crossword puzzle
Across
  1. Security mechanism that involves multiple authentication methods (3 letters)
  2. The process of encoding data to keep it secure(10 letters)
  3. A Weakness in a system that can be exploited (13 letters)
  4. Process of finding and fixing errors in code (9 letters)
  5. An attack where a hacker tricks someone into revealing confidential information(8 letters)
Down
  1. Security incident where sensitive data is exposed to unauthorized parties (8 letters)
  2. A hidden or disguised computer virus(6 letters)
  3. A protection layer to prevent unauthorized access to a network(8 letters)
  4. Authentication factor using your fingerprint or face (10 letters)
  5. Online platform for hosting and reviewing code (6 letters)

10 Clues: A hidden or disguised computer virus(6 letters)Process of finding and fixing errors in code (9 letters)A Weakness in a system that can be exploited (13 letters)The process of encoding data to keep it secure(10 letters)Online platform for hosting and reviewing code (6 letters)Authentication factor using your fingerprint or face (10 letters)...

6.8 Cybersecurity 2025-03-19

6.8 Cybersecurity crossword puzzle
Across
  1. code that is capable of copying itself and corrupting a system or destroying data
  2. the ability to limit access to information to a certain set of users.
  3. software that is intended to damage or disable computers and computer systems.
  4. engineering the psychological manipulation of people into performing actions or divulging confidential information
Down
  1. measures taken to protect a computer or computer system against unauthorized access or attack
  2. obtaining confidential information by masquerading as an "official" person, site, or entity. A form of social engineering
  3. part of a computer system or network that is designed to block unauthorized access while permitting outward communication
  4. Distributed Denial of Service - an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources
  5. the certainty that information is accurate
  6. the reliability of access to information

10 Clues: the reliability of access to informationthe certainty that information is accuratethe ability to limit access to information to a certain set of users.software that is intended to damage or disable computers and computer systems.code that is capable of copying itself and corrupting a system or destroying data...

Cybersecurity Crossword 2025-09-14

Cybersecurity Crossword crossword puzzle
Across
  1. Any software or program intentionally designed to cause harm to a computer, system, or user.
  2. A highly skilled computer professional who bypasses security measures to gain unauthorized access, often with malicious intent.
  3. Using voice calls to trick victims.
  4. Using text messages to trick victims.
  5. Gaining unauthorized physical access.
Down
  1. The criminal takes advantage of the relationship and tricks the victim into giving them money, extracting personal information, or installing malware.
  2. An attempt to defraud a person or group after first gaining their trust.
  3. Using enticing offers to lure victims into traps.
  4. Creating a believable scenario to extract information.
  5. Using fraudulent emails to steal information.

10 Clues: Using voice calls to trick victims.Using text messages to trick victims.Gaining unauthorized physical access.Using fraudulent emails to steal information.Using enticing offers to lure victims into traps.Creating a believable scenario to extract information.An attempt to defraud a person or group after first gaining their trust....

Cybersecurity Fundamentals 2025-11-14

Cybersecurity Fundamentals crossword puzzle
Across
  1. Process of converting data to unreadable form
  2. Software that locks files for payment
  3. Protection that filters network traffic
  4. Weakness that attackers can exploit
  5. Hidden access point in a system
Down
  1. Software that secretly monitors user activity
  2. Self-replicating code that attaches to programs
  3. Software that blocks unauthorized content
  4. Malicious software designed to harm systems
  5. Fraudulent emails attempting to steal data

10 Clues: Hidden access point in a systemWeakness that attackers can exploitSoftware that locks files for paymentProtection that filters network trafficSoftware that blocks unauthorized contentFraudulent emails attempting to steal dataMalicious software designed to harm systemsSoftware that secretly monitors user activity...

cybersecurity Saleck 2025-11-10

cybersecurity Saleck crossword puzzle
Across
  1. Person who breaks into computer systems
  2. Secret code used to log in
  3. Trick used to steal personal information through fake emails
  4. Protecting computers and data from attacks
  5. A group of connected computers
Down
  1. Converts data into a secret code to protect it
  2. Malware that locks your files until a payment is made
  3. Program that can harm your computer
  4. Software that detects and removes malicious programs
  5. Blocks unauthorized access to a network

10 Clues: Secret code used to log inA group of connected computersProgram that can harm your computerPerson who breaks into computer systemsBlocks unauthorized access to a networkProtecting computers and data from attacksConverts data into a secret code to protect itSoftware that detects and removes malicious programs...

Pentagon leaks 2023-04-19

Pentagon leaks crossword puzzle
Across
  1. A form of rupture, usually used in context of a laboratory or prison
  2. running out of..
  3. five sided shape
  4. a man who guards
  5. currently in war
  6. which concerns the nation
Down
  1. you’re being explained something
  2. Technology safety
  3. the opposite of attack
  4. what happens when a pipe is damaged
  5. unidentified floating...
  6. currently in war

12 Clues: running out of..five sided shapea man who guardscurrently in warcurrently in warTechnology safetythe opposite of attackunidentified floating...which concerns the nationyou’re being explained somethingwhat happens when a pipe is damagedA form of rupture, usually used in context of a laboratory or prison

Cybersecurity Awareness Month 2025-04-22

Cybersecurity Awareness Month crossword puzzle
Across
  1. A secret word or phrase used to authenticate access
  2. Verifying the identity of a user or device
  3. The malicious part of malware delivered after exploitation
  4. Malicious act of publicly releasing personal information online
  5. Secures information using mathematical algorithms
  6. Any software intentionally designed to cause damage or unauthorized access
  7. Deceptive attempt to steal sensitive information
  8. A network of compromised devices controlled by an attacker
Down
  1. One-way transformation of data into a fixed-length string
  2. Network device or software that filters traffic
  3. Malicious program that can replicate and spread
  4. A potential danger to cybersecurity
  5. The practice of disguising communication to appear as a trusted entity
  6. Takes advantage of a software vulnerability
  7. An incident where data is accessed or disclosed without authorization
  8. Secret method to bypass security controls

16 Clues: A potential danger to cybersecuritySecret method to bypass security controlsVerifying the identity of a user or deviceTakes advantage of a software vulnerabilityNetwork device or software that filters trafficMalicious program that can replicate and spreadDeceptive attempt to steal sensitive information...

Cybersecurity Awareness R5 2025-06-21

Cybersecurity Awareness R5 crossword puzzle
Across
  1. Extra Layer of security that requires users to provide multiple forms of verification before they can access a system or account
  2. method or code used to take advantage of that weakness
  3. A method transforming the original data into an unreadable format.
  4. Unauthorized access to confidential or sensitive data.
  5. System that prevents unauthorized access to or from a private network.
  6. Converting data into a secure format to prevent unauthorized access.
  7. A network of compromised computers controlled by attackers to launch cyber attacks.
Down
  1. Weakness in a system that can be exploited by threats.
  2. A malware that encrypts data and demands payment for decryption.
  3. A division under DICT Cybersecurity Bureau responsible for receiving, reviewing and responding to computer security incident reports and activities
  4. Software update designed to fix security vulnerabilities
  5. A phishing attack that uses text messages to trick individual into divulging personal information.
  6. A type of cyberattack where malicious actors attempt to trick individuals into revealing sensitive information
  7. Attached agency of DICT created upon the approval of Cybercrime Prevention Act of 2012; this agency is a part of the inter-Agency Response Center where you can report cyber incidents through hotline 1326.
  8. One of the frontline services of the DICT that ensures secure data Transactions.
  9. Attached agency of DICT Mandated to administer and implement the Data Privacy Act of 2012; the country's privacy watchdog.

16 Clues: Weakness in a system that can be exploited by threats.method or code used to take advantage of that weaknessUnauthorized access to confidential or sensitive data.Software update designed to fix security vulnerabilitiesA malware that encrypts data and demands payment for decryption.A method transforming the original data into an unreadable format....

Cybersecurity Week Crossword 2025-08-28

Cybersecurity Week Crossword crossword puzzle
Across
  1. A small file from a website that tracks your actions
  2. Malicious software that prevents access to a system until a ransom is paid
  3. A website used to attract hackers, without risking corporate data
  4. Bulk or unwanted emails
  5. Software to disrupt, damage or gain unauthorised access to a computer system
  6. Occurs when an unauthorised person bypasses access control measures for a restricted area by being granted access through an authorised user, who subjects themselves to the access control measures
  7. A person that has the potential to or causes actual damage to an organisation through using their authorized access to systems
  8. Practice of granting required access to authorized persons based on job requirements
  9. Type of attack that overwhelms a system or network with excessive requests, making it unusable to legitimate users
Down
  1. A person who uses computers to gain unauthorized access to data
  2. A technique used to disguise the sender's identity to gain sensitive information
  3. Method of exploiting social interactions that trick users to reveal sensitive information to gain access to a system
  4. A form of social engineering that is done via email or other messages
  5. Sofware that automatically displays advertisements
  6. Publishing someone's personal information online without their consent
  7. A combination of username, password or biometrics to authenticate access a system

16 Clues: Bulk or unwanted emailsSofware that automatically displays advertisementsA small file from a website that tracks your actionsA person who uses computers to gain unauthorized access to dataA website used to attract hackers, without risking corporate dataA form of social engineering that is done via email or other messages...

CYBERSECURITY AWARENESS MONTH 2025-10-28

CYBERSECURITY AWARENESS MONTH crossword puzzle
Across
  1. An update to an operating system, application, or other software issued specifically to correct problems with the software.
  2. A social engineering attack that uses phone calls to impersonate.
  3. A type of scam where attackers trick people into giving away sensitive information.
  4. When an attacker floods your inbox with emails to overwhelm the system and bury legitimate messages.
  5. Malicious software that is made to harm your computer. Types of malware are viruses, worms, spyware, and ransomware.
  6. A security tool that helps block unwanted access to your computer or network.
  7. Completely Automated Public Turing test to tell Computers and Humans Apart.
  8. Attack where a user's stolen login information (like username and password) from one website is used to gain access to accounts on other websites.
  9. Malicious software that can spread itself from one computer to another.
Down
  1. A type of malicious software that encrypts your data, holding it for ransom until a payment is made.
  2. Software that helps protect your computer or device from viruses, malware, and other harmful programs.
  3. Unauthorized user who attempts to or gains access to an information system.
  4. Virtual Private Network
  5. A security flaw in software that hackers discover before the company knows about it.
  6. Authentication method that uses more than one type of authentication such as a password or a fingerprint scan.
  7. A way to protect information by turning it into a secret code that only authorized people can read

16 Clues: Virtual Private NetworkA social engineering attack that uses phone calls to impersonate.Malicious software that can spread itself from one computer to another.Unauthorized user who attempts to or gains access to an information system.Completely Automated Public Turing test to tell Computers and Humans Apart....

Emerging Web Technologies 2022-07-02

Emerging Web Technologies crossword puzzle
Across
  1. Pencipta HTML
  2. Sekuriti
  3. V______ Reality
  4. A_______ Reality
Down
  1. _______ Web Design
  2. Salah satu senarai teknologi web baru muncul
  3. Maksud Muncul

7 Clues: SekuritiPencipta HTMLMaksud MunculV______ RealityA_______ Reality_______ Web DesignSalah satu senarai teknologi web baru muncul

Cybersecurity Crossword 2021-10-08

Cybersecurity Crossword crossword puzzle
Across
  1. verifying the identity of a user, process, or device
  2. a flaw or weakness that may allow harm to occur to a system
  3. malicious code like virus, worm
  4. Blink's single sign-on(SSO) solution
  5. an unauthorized user who attempts to or gains access to an information system
Down
  1. ensuring that data has not been altered or destroyed in an unauthorized manner
  2. an undocumented way of gaining access to a computer system
  3. how we work since covid started
  4. incident that results in disclosure of sensitive data
  5. individually identifiable health information

10 Clues: how we work since covid startedmalicious code like virus, wormBlink's single sign-on(SSO) solutionindividually identifiable health informationverifying the identity of a user, process, or deviceincident that results in disclosure of sensitive dataan undocumented way of gaining access to a computer system...

Cybersecurity Risk 2021-09-07

Cybersecurity Risk crossword puzzle
Across
  1. Abbreviation of Internet of Things.
  2. Short for "malicious software."
  3. Data that in published and can be found by anyone
  4. The type of data that should not be known to everyone.
  5. Pretending to be a friend or a trusted source online.
Down
  1. software that encrypts data on someone's device until that person agrees to pay to regain access.
  2. measures taken to protect computer systems.
  3. Joined or linked together.
  4. is a password made up of a saying or memorable set of words.
  5. Legitimate or innocent emails trying to trick you in clicking a link or providing personal information.

10 Clues: Joined or linked together.Short for "malicious software."Abbreviation of Internet of Things.measures taken to protect computer systems.Data that in published and can be found by anyonePretending to be a friend or a trusted source online.The type of data that should not be known to everyone....

Cybersecurity Password 2020-01-10

Cybersecurity Password crossword puzzle
Across
  1. You may not divulge this information while you are working for an employer or after you leave.
  2. Malware that extorts money from victims by blocking access to their computer or encrypting the data stored on it.
  3. E-mailing victims to trick them into voluntarily giving up their confidential information.
  4. Software aimed at protecting your computer from malware.
Down
  1. A flaw in a system that leaves it open to attack.
  2. A bunch of compromised computers running malicious programs and being remotely controlled by cybercriminals.
  3. It is the scrambling of data into a secret code that can be read only by software set to decode the information.
  4. A netork-based technology that allows user to store a large amount of data and have access to it with any Internet-connected device.
  5. Malware that secretly installs more malware on a computer.
  6. A remote infrastructure for developing and deploying new online software applications.

10 Clues: A flaw in a system that leaves it open to attack.Software aimed at protecting your computer from malware.Malware that secretly installs more malware on a computer.A remote infrastructure for developing and deploying new online software applications.E-mailing victims to trick them into voluntarily giving up their confidential information....

cybersecurity story 2024-02-23

cybersecurity story crossword puzzle
Across
  1. - software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access
  2. - The protection of the cyber realms
  3. - a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware
  4. - the technique by which any kind of information can be converted into a secret form that conceals the actual meaning
  5. - someone who tries to access data they aren't authorized to view
  6. - monitoring network security system
Down
  1. - What happens when the firewall is broken
  2. - A security incident where confidential information is stolen
  3. - the story this puzzle is about
  4. - a mechanism for creating a secure connection

10 Clues: - the story this puzzle is about- The protection of the cyber realms- monitoring network security system- What happens when the firewall is broken- a mechanism for creating a secure connection- A security incident where confidential information is stolen- someone who tries to access data they aren't authorized to view...

Cybersecurity Crossword 2024-04-13

Cybersecurity Crossword crossword puzzle
Across
  1. What feature can you activate to secure your Habbo account from hacking attempts?
  2. What security measure adds an extra layer of protection to online accounts beyond just a username and password?
  3. What term refers to groups of individuals in Habbo who aim to maximize profit by any means necessary, including illegal activities?
  4. What should you do if you receive messages containing offers that seem too good to be true on Habbo DMs?
  5. What precautionary measure should you take to protect your personal information when using public networks?
  6. What is the first step you should take before giving personal information to a stranger online?
Down
  1. What symbol is often found on the badges and mottos of mafia members?
  2. What is the type of app you can use to scan the QR code for setting up 2FA on Habbo?
  3. What action should you take if someone threatens you or attempts to scam you on Habbo?
  4. What type of software can protect your devices from malware, trojans, and ransomware?

10 Clues: What symbol is often found on the badges and mottos of mafia members?What feature can you activate to secure your Habbo account from hacking attempts?What is the type of app you can use to scan the QR code for setting up 2FA on Habbo?What type of software can protect your devices from malware, trojans, and ransomware?...

cybersecurity 5 2024-05-07

cybersecurity 5 crossword puzzle
Across
  1. turning a code into the information it was originally
  2. a program that threats to destroy data if they don't give money
  3. a program that decides whether to allow or block specific traffic
  4. to avoid
  5. a software that automates the process of scanning systems
  6. managing and protecting information assets
Down
  1. use of copying IT resources by employees
  2. type of substitution cipher in which each letter in plaintext is replaced
  3. practice of secure communication or information from the public
  4. converting information into a code

10 Clues: to avoidconverting information into a codeuse of copying IT resources by employeesmanaging and protecting information assetsturning a code into the information it was originallya software that automates the process of scanning systemsa program that threats to destroy data if they don't give money...

Cybersecurity Awareness 2024-10-17

Cybersecurity Awareness crossword puzzle
Across
  1. A security system that monitors and controls incoming and outgoing network traffic
  2. A security model that requires strict identity verification for every person and device trying to access resources on a network
  3. Software that secretly gathers information about a user's activities
  4. The process of encoding information to protect it from unauthorized access
  5. Malicious software that misleads users of its true intent by disguising itself as legitimate software
Down
  1. Manipulating people into divulging confidential information
  2. Phishing attacks conducted via SMS messages
  3. A malware designed to deny a user or organization access to files on their computer
  4. A type of online scam that tricks people into sharing sensitive information, such as login credentials and credit card numbers
  5. Small files stored on a user’s system to recognize the user and track preferences

10 Clues: Phishing attacks conducted via SMS messagesManipulating people into divulging confidential informationSoftware that secretly gathers information about a user's activitiesThe process of encoding information to protect it from unauthorized accessSmall files stored on a user’s system to recognize the user and track preferences...

Cybersecurity Awareness - 2024-10-08

Cybersecurity Awareness - crossword puzzle
Across
  1. [?] is a situation where a victim is tempted into clicking a malicious link
  2. Virus, Trojans and Worms are forms of [?]
  3. [?] are attackers whose motivation are political or social causes
  4. [?] is the term we used to to state that a transaction performed cannot be denied
  5. The minimum length of password we aim for is [?} numeric representation
Down
  1. [?} is a common social engineering tactic involving fake emails
  2. Fingerprint and/or facial recognition are form of authentication known as [?] scans
  3. The term [?] is commonly used in cybersecurity as a representation of weakness
  4. Account [?} is when an employee's email is hacked and used to make payments to fraudster's accounts.
  5. The microsoft brand for mobile device management is known as [?]

10 Clues: Virus, Trojans and Worms are forms of [?][?} is a common social engineering tactic involving fake emailsThe microsoft brand for mobile device management is known as [?][?] are attackers whose motivation are political or social causesThe minimum length of password we aim for is [?} numeric representation...

SULAM cybersecurity 2023-06-15

SULAM cybersecurity crossword puzzle
Across
  1. Perlindungan maklumat peribadi atau data daripada capaian yang tidak dibenarkan.
  2. Upaya untuk menembusi sistem komputer dengan niat jahat.
  3. Ilmu dan teknik menyulitkan maklumat supaya hanya dapat dibaca oleh pihak yang dibenarkan.
  4. Proses memulihkan data atau sistem selepas berlaku kejadian yang tidak diingini.
Down
  1. Program jahat yang cuba merosakkan atau mengganggu komputer dan peranti elektronik.
  2. Sekumpulan peranti yang berhubung dan berkongsi maklumat antara satu sama lain.
  3. Potensi bahaya atau kejadian yang boleh menjejaskan keselamatan sistem atau maklumat digital.
  4. Kemungkinan berlakunya ancaman atau kejadian yang boleh menyebabkan kerugian atau gangguan.
  5. Keadaan maklumat atau data yang tidak diubah atau diubah suai tanpa kebenaran.
  6. Program yang digunakan untuk mengesan, menghalang, dan membuang program jahat dari sistem komputer.

10 Clues: Upaya untuk menembusi sistem komputer dengan niat jahat.Keadaan maklumat atau data yang tidak diubah atau diubah suai tanpa kebenaran.Sekumpulan peranti yang berhubung dan berkongsi maklumat antara satu sama lain.Perlindungan maklumat peribadi atau data daripada capaian yang tidak dibenarkan....

Cybersecurity - General 2022-05-26

Cybersecurity - General crossword puzzle
Across
  1. Large scale attacks using remotely controlled malware-infected devices
  2. Systems, functions & data being provided on-demand, based on levels of service and defined parameters
  3. Number of stages of Penetration Testing
  4. Flooding a network / computer by overloading the system with huge number of requests and making it incapable of responses
  5. Only authorized parties permitted to access sensitive information / functions
Down
  1. Process of psychologically manipulating people to divulge personal or critical information
  2. A method of interrupting data traffic between nodes and stealing the required information
  3. Hostile spyware, ransomware & viruses that breach through vulnerabilities like clicking on suspicious links / installing risky applications
  4. Ensuring only authorized users can enter, modify or delete information / functions
  5. An attack that takes advantage of opportunity between a vulnerability announcement and corresponding security patch solution

10 Clues: Number of stages of Penetration TestingLarge scale attacks using remotely controlled malware-infected devicesOnly authorized parties permitted to access sensitive information / functionsEnsuring only authorized users can enter, modify or delete information / functions...

Crosswords Cybersecurity 2025-11-03

Crosswords Cybersecurity crossword puzzle
Across
  1. is a set of modifications made to a computer program or its supporting data in order to update, correct, or improve it.
  2. establishes a digital connection between your computer and a remote server belonging to a provider
  3. malicious computer program used to give hackers unauthorized remote access to an infected computer by exploiting system vulnerabilities.
  4. is one of the disciplines concerned with protecting messages (ensuring confidentiality, authenticity and integrity) often using secrets or keys.
  5. It involves copying the magnetic stripes of a bank card using a memory reader
Down
  1. a person who seeks ways to bypass software and hardware protections.
  2. Malicious software that blocks access to the computer or files by encrypting them and demands a ransom payment from the victim to regain access.
  3. Key a string of characters used within an encryption algorithm for altering data so that it appears random
  4. a form of malware or hardware that tracks and records your keystrokes as you type
  5. fraudulent technique that allows fraudsters to display a phone number that is not their own.

10 Clues: a person who seeks ways to bypass software and hardware protections.It involves copying the magnetic stripes of a bank card using a memory readera form of malware or hardware that tracks and records your keystrokes as you typefraudulent technique that allows fraudsters to display a phone number that is not their own....

Cybersecurity Applications 2023-12-12

Cybersecurity Applications crossword puzzle
Across
  1. An attacker might attempt to trick someone through manipulation or deception.
  2. to prevent vulnerabilities and injection attacks.
  3. determines what actions they are allowed to perform
  4. The process of verifying the identity of a user or device
Down
  1. Systems can detect and respond to potential security threats
  2. An attacker might flood the RFID reader with requests, preventing legitimate users from gaining access.
  3. to regulate who can access what resources
  4. to keep software and firmware updated to protect against known vulnerabilities
  5. It is important to secure data
  6. You must secure the actual, tangible devices.

10 Clues: It is important to secure datato regulate who can access what resourcesYou must secure the actual, tangible devices.to prevent vulnerabilities and injection attacks.determines what actions they are allowed to performThe process of verifying the identity of a user or deviceSystems can detect and respond to potential security threats...

Crossword cybersecurity 2024-04-17

Crossword cybersecurity crossword puzzle
Across
  1. resolv a fault
  2. fault what developer don't know
  3. attack on link of fish
  4. attack try multiple combination
Down
  1. virus look all you make on your pc
  2. most pc attack server
  3. program hide your IP
  4. program infect you
  5. person hack you
  6. protect to virus

10 Clues: resolv a faultperson hack youprotect to virusprogram infect youprogram hide your IPmost pc attack serverattack on link of fishfault what developer don't knowattack try multiple combinationvirus look all you make on your pc

OT cybersecurity 2024-07-16

OT cybersecurity crossword puzzle
Across
  1. A system that monitors and controls industrial processes
  2. An unauthorized act of bypassing security mechanisms
  3. A secret word or phrase used to authenticate access
  4. A security flaw that can be exploited
  5. Protection of sensitive information from unauthorized access
Down
  1. A unique identifier for a network device
  2. The practice of securing computer systems and networks
  3. An act of gaining unauthorized access to systems and networks
  4. A device used to control the flow of electricity in OT systems
  5. A network security system that monitors and controls incoming and outgoing network traffic

10 Clues: A security flaw that can be exploitedA unique identifier for a network deviceA secret word or phrase used to authenticate accessAn unauthorized act of bypassing security mechanismsThe practice of securing computer systems and networksA system that monitors and controls industrial processesProtection of sensitive information from unauthorized access...

CyberSecurity Puzzle 2024-06-06

CyberSecurity Puzzle crossword puzzle
Across
  1. __________ IS SOMETHING YOU KEEP SECRET AND DO NOT SHARE WITH OTHERS.
  2. SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION.
  3. OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL.
  4. EMAIL IS THE MOST USED MEDIUM TO __________________ IN ORGANSATIONS.
Down
  1. CYBER ATTACK CAN CAUSE HUGE ____________
  2. IT IS NECESSARY TO CONFIRM IDENTITY BEFORE ALLOWING __________ IN OUR ORGANISATION.
  3. IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION.
  4. HACKER WILL DEMAND ____________ MONEY WHEN THEY TAKE COTROL OF YOUR COMPUTER.
  5. MAKE SURE THAT YOU HAVE ____________ SOFTWARE IN YOUR COMPUTER TO BE SAFE ONLINE.
  6. ___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS.

10 Clues: CYBER ATTACK CAN CAUSE HUGE ____________SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION.OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL.IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION.___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS....

Cybersecurity Crossword 2023-05-24

Cybersecurity Crossword crossword puzzle
Across
  1. Practice of protecting information by converting it into a secret code
  2. Act of bombarding someone with a large number of negative comments
  3. Act of deliberately using digital communication to harass or intimidate someone
  4. Software designed to protect against malicious software
Down
  1. Term for sexually explicit material available on the internet
  2. Act of sending deceptive emails to trick individuals
  3. Act of creating fake online profiles to deceive and harass others
  4. Process of gaining unauthorized access to computer systems
  5. A secret word or phrase that must be used to gain admission
  6. Every aspect of protecting an organization and its employees and assets against cyber threats

10 Clues: Act of sending deceptive emails to trick individualsSoftware designed to protect against malicious softwareProcess of gaining unauthorized access to computer systemsA secret word or phrase that must be used to gain admissionTerm for sexually explicit material available on the internetAct of creating fake online profiles to deceive and harass others...

Cybersecurity 101 2025-07-23

Cybersecurity 101 crossword puzzle
Across
  1. A fraudulent attempts to obtain sensitive information through deceptive emails.
  2. Phishing through text messages.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. A malicious software designed to gain unauthorized access to a computer or network.
Down
  1. A type of phishing attack that targets a business’ top executives “the big fish”.
  2. A cyberattack tactic where a malicious actor disguises their identity.
  3. The process of converting information or data into a code, especially to prevent unauthorized access
  4. Where attackers use phone calls to trick individuals.
  5. A series of multiple words, often longer than a typical password.
  6. An extra layer of security to accounts by requiring more than one form of verification.

10 Clues: Phishing through text messages.Where attackers use phone calls to trick individuals.A series of multiple words, often longer than a typical password.A cyberattack tactic where a malicious actor disguises their identity.A fraudulent attempts to obtain sensitive information through deceptive emails....

Cybersecurity Essentials 2024-11-06

Cybersecurity Essentials crossword puzzle
Across
  1. monitors your online activity and can log every key you press
  2. a computer program that replicates and attaches to files
  3. holds data until it makes a payment
  4. a program that scans a computer for malicious software and deletes it
  5. replicates itself to spread from one computer to another
  6. a decoy to sneak malicious software past unsuspecting users
Down
  1. hackers who are self-employed or working for large crime organization
  2. hardware or software that prevents hackers from accessing your personal data
  3. converting information into a form where an unauthorized people cannot read it
  4. any code that can steal data or cause harm to a system

10 Clues: holds data until it makes a paymentany code that can steal data or cause harm to a systema computer program that replicates and attaches to filesreplicates itself to spread from one computer to anothera decoy to sneak malicious software past unsuspecting usersmonitors your online activity and can log every key you press...

Cybersecurity Awareness 2025-09-30

Cybersecurity Awareness crossword puzzle
Across
  1. Synthetic media generated by AI
  2. They wear different hat colors (black hat, white hat, blue hat, etc. hat, etc.)
  3. Your online data trail
  4. Artificial Intelligence
  5. Fraudulent communication attack
  6. Used to prevent, identify and remove malicious software
  7. Software app programmed to do certain tasks
Down
  1. Converting information into a code to prevent unauthorized access.
  2. Use of two authentication methods to log in.
  3. Identity verification process

10 Clues: Your online data trailArtificial IntelligenceIdentity verification processSynthetic media generated by AIFraudulent communication attackSoftware app programmed to do certain tasksUse of two authentication methods to log in.Used to prevent, identify and remove malicious softwareConverting information into a code to prevent unauthorized access....

Emerging Web Technologies 2022-07-02

Emerging Web Technologies crossword puzzle
Across
  1. Pencipta HTML
  2. Sekuriti
  3. V______ Reality
  4. A_______ Reality
Down
  1. _______ Web Design
  2. Salah satu senarai teknologi web baru muncul
  3. Maksud Muncul

7 Clues: SekuritiPencipta HTMLMaksud MunculV______ RealityA_______ Reality_______ Web DesignSalah satu senarai teknologi web baru muncul

Intro to Cybersecurity Vocabulary 2025-10-14

Intro to Cybersecurity Vocabulary crossword puzzle
Across
  1. set of security controls designed to protect payment account security such as credit or debit card transactions
  2. protection of digital devices and their connected networks from danger and threats as well as protecting personal information on a system by detecting, preventing and responding to attacks
  3. crime committed over the internet
  4. short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer
  5. set of policies and procedures meant to improve and guide an organization’s cybersecurity practices
  6. occur when hackers or malicious software gains unauthorized access to a system, examples include: hacker cracking passwords, breaking into a server or changing a user’s privileges on their system
Down
  1. set of best practice recommendations for information security management
  2. unique skills for a specific area
  3. attempt to steal, damage or destroy information on a device or computer system
  4. individual who participates in hacking
  5. abilities needed to communicate and work with others
  6. prevents a user from accessing a system
  7. act of skirting or breaking through security boundaries

13 Clues: unique skills for a specific areacrime committed over the internetindividual who participates in hackingprevents a user from accessing a systemabilities needed to communicate and work with othersact of skirting or breaking through security boundariesset of best practice recommendations for information security management...

Career Night Companies 2025-10-09

Career Night Companies crossword puzzle
Across
  1. geotechnical construction
  2. designs, engineers, and manufactures custom, heavy-haul trailers
  3. bridge design and inspection
  4. live theater productions of Bible stories
  5. information technology and cybersecurity
  6. materials testing and inspection
  7. construction services
Down
  1. bread and roll manufacturer
  2. site planning and landscape design
  3. stormwater management
  4. roadway and bridge design
  5. attaching communications equipment to utility poles
  6. bridge design and inspection
  7. connecting, distributing, and controlling power and data
  8. designs mechanical, electrical, and plumbing (MEP) systems

15 Clues: stormwater managementconstruction servicesgeotechnical constructionroadway and bridge designbread and roll manufacturerbridge design and inspectionbridge design and inspectionmaterials testing and inspectionsite planning and landscape designinformation technology and cybersecuritylive theater productions of Bible stories...

ACES 2022-12-19

ACES crossword puzzle
Across
  1. ACES IS A MEMBER OF THE ______ COLLEGE
  2. ACES FOUNDING PARTNER
  3. WHAT ACES STUDENTS STUDY
  4. STUDENT UNION
  5. GROUP THAT PLANS SOCIAL EVENTS FOR ACES
  6. COMPUTER SCIENCE BUILDING
Down
  1. THE DAY THE WEEKLY EMAIL COMES OUT
  2. ACES IS MADE UP OF AN LLP AND A _____
  3. LAST NAME OF ACES DIRECTOR
  4. CODING USED IN ACES COURSES
  5. COURSE CODE FOR ACES COURSES REGISTRATION
  6. HOME TO ACES LLP
  7. TYPE OF PROJECT COMPLETED IN HACS200 or 202
  8. HOME TO ACES NORTH
  9. UNIVERSITY OF MARYLAND MASCOT

15 Clues: STUDENT UNIONHOME TO ACES LLPHOME TO ACES NORTHACES FOUNDING PARTNERWHAT ACES STUDENTS STUDYCOMPUTER SCIENCE BUILDINGLAST NAME OF ACES DIRECTORCODING USED IN ACES COURSESUNIVERSITY OF MARYLAND MASCOTTHE DAY THE WEEKLY EMAIL COMES OUTACES IS MADE UP OF AN LLP AND A _____ACES IS A MEMBER OF THE ______ COLLEGEGROUP THAT PLANS SOCIAL EVENTS FOR ACES...

Technology Buzzwords 2023-09-05

Technology Buzzwords crossword puzzle
Across
  1. - Leading internet search engine.
  2. - Online buying and selling.
  3. - High-tech mobile device.
  4. - Digital audio or video series.
  5. - Rapidly spreading on the internet.
  6. - Wireless internet connection.
Down
  1. - Online journal or web log.
  2. - Protection against online threats.
  3. - Online seminar or workshop.
  4. - Digital symbols conveying emotions.

10 Clues: - High-tech mobile device.- Online journal or web log.- Online buying and selling.- Online seminar or workshop.- Wireless internet connection.- Digital audio or video series.- Leading internet search engine.- Protection against online threats.- Rapidly spreading on the internet.- Digital symbols conveying emotions.

Boredom buster 2023-06-28

Boredom buster crossword puzzle
Across
  1. Delicious Korean dish
  2. Creepy kids playground equipment at Minnippi parkland
  3. Dan's dream celebrity date
  4. Dan's alter ego
  5. 'Rejoice' in latin
  6. Place where the best conversations are had
  7. Dan's favourite mayonnaise
Down
  1. Hand-built spacecraft
  2. Name for a pressure cooker
  3. Bec's forbidden name
  4. I'm an ...
  5. 14th song on playlist
  6. Nerdy basketball team with cute point scorer
  7. Never would Dan ever ...
  8. I see you've played __ before
  9. Beloved kungfu fantasy series
  10. Term for a handsome cybersecurity person
  11. Powerful choral piece during epic space fight scene
  12. Best-looking hobbits in the Shire
  13. Name for a white Kona
  14. Brooklyn
  15. Dan's favourite book genre

22 Clues: BrooklynI'm an ...Dan's alter ego'Rejoice' in latinBec's forbidden nameHand-built spacecraftDelicious Korean dish14th song on playlistName for a white KonaNever would Dan ever ...Name for a pressure cookerDan's dream celebrity dateDan's favourite book genreDan's favourite mayonnaiseI see you've played __ beforeBeloved kungfu fantasy series...

填字游戏词汇库-科技类-G1-数字基础 2025-03-26

填字游戏词汇库-科技类-G1-数字基础 crossword puzzle
Across
  1. Software application (~ store)
  2. Using binary code (~ currency)
  3. Organized information (~ query)
  4. Digital protection (~ threat)
  5. Input device (mechanical ~)
  6. Mobile communication tool (smart ~)
  7. Atomic-scale science (前缀: nano-)
  8. Initial model (~ testing)
  9. Global network (~ access)
  10. Moving visuals (~ streaming)
  11. Artificial intelligence (~ chatbot)
  12. Machine-driven process (~ industry)
Down
  1. Image capturer (digital ~)
  2. Produce (~ electricity)
  3. Simulated reality (~ reality)
  4. Living systems tech (前缀: bio-)
  5. Electronic processing device (~ programmer)
  6. Step-by-step procedure (搜索 ~)
  7. Digital information (~ analysis)
  8. Technical designer (software ~)
  9. Pointing device (wireless ~)
  10. Connected system (~ security)
  11. Novel invention (形容词: innovative)
  12. Visual display (~ touch)
  13. Automated machine (~ assistant)

25 Clues: Produce (~ electricity)Visual display (~ touch)Initial model (~ testing)Global network (~ access)Image capturer (digital ~)Input device (mechanical ~)Pointing device (wireless ~)Moving visuals (~ streaming)Simulated reality (~ reality)Step-by-step procedure (搜索 ~)Digital protection (~ threat)Connected system (~ security)...

TEMA 2 2025-10-24

TEMA 2 crossword puzzle
Across
  1. Aktivitas jual-beli tanpa uang tunai
  2. Platform untuk membangun toko online
  3. Platform jual-beli online
  4. Platform untuk belajar atau kursus online
  5. Pembayaran digital via ponsel
  6. Sistem manajemen konten website
  7. Promosi produk melalui media sosial
  8. Teknologi untuk transaksi cepat dan aman
  9. Teknologi komunikasi internet cepat
  10. Model bisnis online berbasis internet
Down
  1. Sistem keamanan data digital
  2. Alat pembayaran otomatis di toko online
  3. Penyimpanan data online
  4. , Layanan streaming konten digital
  5. Layanan transportasi berbasis aplikasi
  6. ,Perangkat lunak untuk mengelola bisnis online
  7. , Analisis data untuk strategi bisnis digital
  8. Uang digital yang digunakan secara global
  9. Layanan pengiriman barang berbasis digital
  10. Teknologi untuk mengenali wajah atau suara

20 Clues: Penyimpanan data onlinePlatform jual-beli onlineSistem keamanan data digitalPembayaran digital via ponselSistem manajemen konten website, Layanan streaming konten digitalPromosi produk melalui media sosialTeknologi komunikasi internet cepatAktivitas jual-beli tanpa uang tunaiPlatform untuk membangun toko onlineModel bisnis online berbasis internet...

Saint Mary 2022-07-07

Saint Mary crossword puzzle
Across
  1. Saint Mary Mascot
  2. We own a copy of this Amendment
  3. These are underground so we stay warm and dry
  4. One of four Saint Mary Values
  5. Colors are Navy and ____
Down
  1. Newest Major
  2. Residence Hall
  3. Saint ______ Dining Hall where we eat lunch
  4. ______ Memorial Stadium
  5. We eat at Oak Kiln
  6. _______ of Charity
  7. President whose lock of hair is in the KLC

12 Clues: Newest MajorResidence HallSaint Mary MascotWe eat at Oak Kiln_______ of Charity______ Memorial StadiumColors are Navy and ____One of four Saint Mary ValuesWe own a copy of this AmendmentPresident whose lock of hair is in the KLCSaint ______ Dining Hall where we eat lunchThese are underground so we stay warm and dry

CBL Puzzle 2023-09-01

CBL Puzzle crossword puzzle
Across
  1. Rhymes with fishing
  2. Something you are (Inherence factor)
  3. Roofies mixed in software
  4. Divide and conquer. Tool to reduce scope
  5. Your cybersecurity partner
  6. Malicious code on a horse
Down
  1. Vaccine for your systems
  2. 12 characters long in PCI DSS v4.0
  3. Burning walls in cold rooms
  4. Party host
  5. Secure data with a pinch of salt
  6. Data secured. Locked with a key

12 Clues: Party hostRhymes with fishingVaccine for your systemsRoofies mixed in softwareMalicious code on a horseYour cybersecurity partnerBurning walls in cold roomsData secured. Locked with a keySecure data with a pinch of salt12 characters long in PCI DSS v4.0Something you are (Inherence factor)Divide and conquer. Tool to reduce scope

Module 1 Introductory Course Telehealth 2017-03-01

Module 1 Introductory Course Telehealth crossword puzzle
Across
  1. Electronic health
  2. Providing remote healthcare
  3. Ability of computers exchange information"
  4. health Popular emerging term
Down
  1. Mobile health
  2. Measures taken to protect a computer
  3. Refers to teleconsultations
  4. Extended term for information technology

8 Clues: Mobile healthElectronic healthProviding remote healthcareRefers to teleconsultationshealth Popular emerging termMeasures taken to protect a computerExtended term for information technologyAbility of computers exchange information"

algorithms 2025-10-28

algorithms crossword puzzle
Across
  1. converts code into readable data
  2. study of secure communication
  3. secure distributed digital ledger
  4. logical true or false value
  5. delay between request and response
  6. software made to harm
  7. structure for programming language
Down
  1. repetition of a code block
  2. rules for data communication
  3. protecting system from attacks

10 Clues: software made to harmrepetition of a code blocklogical true or false valuerules for data communicationstudy of secure communicationprotecting system from attacksconverts code into readable datasecure distributed digital ledgerdelay between request and responsestructure for programming language

NAVFAC Capabilities 2023-02-13

NAVFAC Capabilities crossword puzzle
Across
  1. _____ Handling Ashore Procurement
  2. NEPA Requirement: Environmental ______
  3. _______ and Facilities Operations
  4. Real Estate _______ and Management
  5. _______ Facilities and Equipment Engineering
Down
  1. Military Construction acronym
  2. Basic physical and organizational structures and facilities
  3. Protection against unauthorized data usage
  4. _______Vehicles providing transportation services
  5. _______ Conservation: Health assessment of natural and cultural resources

10 Clues: Military Construction acronym_____ Handling Ashore Procurement_______ and Facilities OperationsReal Estate _______ and ManagementNEPA Requirement: Environmental ______Protection against unauthorized data usage_______ Facilities and Equipment Engineering_______Vehicles providing transportation services...

cy-rite crossword 2025-11-10

cy-rite crossword crossword puzzle
Across
  1. Response The process of identifying, managing, and recovering from a cybersecurity breach.
  2. Software that secretly collects user information without consent.
  3. Intelligence Information about potential or current attacks that helps organizations prepare for or respond to cyber threats.
  4. Malware disguised as legitimate software, used to trick users into installing it.
Down
  1. The practice of protecting systems, networks, and data from digital attacks, unauthorized access, or damage.
  2. The process of converting encrypted data back into its original readable form.
  3. A method of guessing passwords or encryption keys by trying all possible combinations.
  4. A type of malware that attaches itself to a legitimate program or file and spreads to other systems.
  5. Breach An event where sensitive or confidential data is accessed, disclosed, or stolen without authorization.
  6. A self-replicating program that spreads through networks without user action.

10 Clues: Software that secretly collects user information without consent.A self-replicating program that spreads through networks without user action.The process of converting encrypted data back into its original readable form.Malware disguised as legitimate software, used to trick users into installing it....

Cybersecurity Awareness Month Crossword Challenge 2023-09-25

Cybersecurity Awareness Month Crossword Challenge crossword puzzle
Across
  1. When malicious actors send an email-based attack to trick the recipient into taking an action.
  2. The term for an email-based attack that involves the use of a QR code
  3. Instead of a simple password, it is recommended that you use a _______ for your log-in credentials.
  4. The month associated with Cybersecurity Awareness.
  5. The Be:_____ Viva Engage (Yammer) community keeps Goodyear associates up to date on cyber news.
Down
  1. A disgruntled or financially motivated employee is called a(n) ______ threat.
  2. The color of the banner that indicates a company email is from an external source.
  3. The acronym for the tool used to verify your identity for access. (Something you know. Something you have. Something you are)
  4. The title of the Goodyear 2023 cybersecurity awareness training is "Data _____ Basics."
  5. The action every associate must take when a suspicious email message is identified.

10 Clues: The month associated with Cybersecurity Awareness.The term for an email-based attack that involves the use of a QR codeA disgruntled or financially motivated employee is called a(n) ______ threat.The color of the banner that indicates a company email is from an external source....

AI in Cybersecurity 2025-10-20

AI in Cybersecurity crossword puzzle
Across
  1. – What cybersecurity keeps us.
  2. – Information AI studies.
  3. – Harmful software.
  4. – What we do to teach AI.
  5. – A common target for phishing.
  6. – Automated programs used online.
  7. – What AI learns from.
Down
  1. – The goal of cybersecurity.
  2. – Process to teach AI models.
  3. – A warning from AI about danger.
  4. – A small automated tool.
  5. – Short for Artificial Intelligence.

12 Clues: – Harmful software.– What AI learns from.– Information AI studies.– What we do to teach AI.– A small automated tool.– The goal of cybersecurity.– Process to teach AI models.– What cybersecurity keeps us.– A common target for phishing.– A warning from AI about danger.– Automated programs used online.– Short for Artificial Intelligence.

Cybersecurity Awareness 2021-09-29

Cybersecurity Awareness crossword puzzle
Across
  1. An attempt to get an individual to reveal personal or sensitive information using email and disguising as a legitimate source.
  2. A network security system that is used for monitoring incoming and outgoing network traffic in reference to preset network security rules. This system is used to block unauthorized access to maintain network safety and security.
  3. The process of converting information or data into a code to further prevent unauthorized access.
  4. Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. A vulnerability, or a system flaw, that is taken advantage of for malicious goals.
Down
  1. Unauthorized access to computer data, applications, networks, or devices.
  2. _____Engineering is used to manipulate end-users and exploiting human errors as a way to gain access to private information, access, or anything that the attacker deems valuable.
  3. Malicious software that is used to enter a computer of a device to get her data and information to then forward it to a third-party without the consent of the user.
  4. Malicious Software that blocks access to systems or threatens to release data until a predetermined debt is paid.
  5. Malicious code, or a computer program, that is designed to change the way a computer operates and can spread from one computer to another by copying itself. It then attaches to other programs or documents to execute the malicious code which can result in corruption or damage to data.

10 Clues: Unauthorized access to computer data, applications, networks, or devices.A vulnerability, or a system flaw, that is taken advantage of for malicious goals.Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.The process of converting information or data into a code to further prevent unauthorized access....

Cybersecurity Crossword 2021-02-12

Cybersecurity Crossword crossword puzzle
Across
  1. Something to protect your personal data.
  2. It locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
  3. A malicious form of self-replicating software.
  4. It appears to be a useful or fun application but unbeknown to the user it also performs malicious actions.
Down
  1. It is any information relating to an identifiable person.
  2. a person who uses computers to gain unauthorized access to data.
  3. It is unwanted software that monitors and gathers information on a person and how they use their computer.
  4. It is an attack in which the victim receives an email disguised to look as if it has come from a reputable source
  5. They are able to exploit vulnerabilities in the a computer’s operating system or a networks hardware.
  6. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.

10 Clues: Something to protect your personal data.A malicious form of self-replicating software.It is any information relating to an identifiable person.a person who uses computers to gain unauthorized access to data.They are able to exploit vulnerabilities in the a computer’s operating system or a networks hardware....

Cybersecurity Introduction 2023-06-18

Cybersecurity Introduction crossword puzzle
Across
  1. Protects your online accounts and prevents unauthorized access
  2. A program that self-replicates and spreads to other computers
  3. The practice of tricking individuals into revealing sensitive information
  4. A type of software designed to block or remove computer viruses
  5. A software vulnerability that allows unauthorized access to a system
  6. Malicious software that encrypts files and demands a ransom
Down
  1. The unauthorized copying or distribution of copyrighted material
  2. The act of intentionally damaging or disrupting computer systems
  3. A set of characters used to gain access to a computer system
  4. A method used to verify the identity of a user

10 Clues: A method used to verify the identity of a userMalicious software that encrypts files and demands a ransomA set of characters used to gain access to a computer systemA program that self-replicates and spreads to other computersProtects your online accounts and prevents unauthorized access...

CyberSecurity Crossword 2023-09-02

CyberSecurity Crossword crossword puzzle
Across
  1. Pengiriman pesan maupun objek secara masif dan berulang yang tidak dikehendaki penerimanya. (bahasa inggris)
  2. Program komputer yang dapat menggandakan diri dan menyebar serta merusak sistem penggunanya
  3. Salah satu tipe malware yang menyandera data hingga suatu jumlah tebusan dibayarkan (bahasa inggris)
  4. Sedang marak mengalami kebocoran. Didapatkan dengan ilegal dan diperjualbelikan di dark web.
Down
  1. Facebook, X, Instagram, dll. (dua kata, bahasa indonesia)
  2. Serangkaian kata yang digunakan untuk autentikasi pengguna pada suatu sistem (bahasa inggris)
  3. Alat yang digunakan untuk mentransmisikan data secara aman terhadap jaringan publik sehingga lebih privat, dapat digunakan untuk bekerja remote (singkatan)
  4. Layanan komputasi termasuk penyimpanan data, perangkat lunak, perangkat keras dan lain-lain, melalui internet. Biasa disebut komputasi awan. (bahasa inggris)
  5. Istilah untuk jebolnya sistem keamanan data maupun informasi pada suatu entitas (bahasa inggris)
  6. Salah satu bentuk malware yang bersifat menyamar sebagai suatu program yang valid. Biasa diasosiasikan dengan jenis kuda. (bahasa inggris)

10 Clues: Facebook, X, Instagram, dll. (dua kata, bahasa indonesia)Program komputer yang dapat menggandakan diri dan menyebar serta merusak sistem penggunanyaSedang marak mengalami kebocoran. Didapatkan dengan ilegal dan diperjualbelikan di dark web.Serangkaian kata yang digunakan untuk autentikasi pengguna pada suatu sistem (bahasa inggris)...

Cybersecurity Concepts 2024-03-31

Cybersecurity Concepts crossword puzzle
Across
  1. a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system
  2. the name commonly given to unwanted emails
  3. Made up of devices that are all connected to each other, like computers and
  4. a security system that forms a virtual perimeter around a network of workstations preventing an attack
  5. the process of verifying the identity of a user or piece of information
Down
  1. a process of maintaining data confidentiality by converting plain data into secret code
  2. makes sure that there are no unauthorized changes to information of systems
  3. A Virtual Private Network
  4. a collection of compromised computers running malicious programs that are controlled remotely by a cyber-criminal
  5. a program that gives a hacker remote access to, and control over, a computer or network

10 Clues: A Virtual Private Networkthe name commonly given to unwanted emailsthe process of verifying the identity of a user or piece of informationmakes sure that there are no unauthorized changes to information of systemsMade up of devices that are all connected to each other, like computers and...

Cybersecurity puzzle 2025-02-03

Cybersecurity puzzle crossword puzzle
Across
  1. - Malicious software that can harm your computer
  2. - An email scam that attempts to trick users into giving up personal information
  3. - The process of converting data into unreadable code for security
  4. - Software that prevents unauthorized access to a network
  5. - The practice of disguising a communication to appear as a trusted source
Down
  1. - A secret combination of characters used to access an account
  2. - A program that appears harmless but has malicious intent
  3. - A security measure used to verify a user's identity, often using two different forms of authentication
  4. - A type of attack where a person tricks someone into revealing sensitive information
  5. - A type of cyberattack where traffic is flooded to a system to make it unavailable

10 Clues: - Malicious software that can harm your computer- Software that prevents unauthorized access to a network- A program that appears harmless but has malicious intent- A secret combination of characters used to access an account- The process of converting data into unreadable code for security...

CyberSecurity 1 2024-07-23

CyberSecurity 1 crossword puzzle
Across
  1. Entitlement is very closely related to ... performed
  2. ... to standard is verified during audit
  3. IAM also differentiates 'authenticate' and ...
  4. We differentiate between User and ... in IAM
  5. ISO 27000 standards has 14 categories for ...
Down
  1. S in SOD
  2. Issue faced by user in IT
  3. A in CIA
  4. C in PDCA
  5. Example of non-human identity

10 Clues: S in SODA in CIAC in PDCAIssue faced by user in ITExample of non-human identity... to standard is verified during auditWe differentiate between User and ... in IAMISO 27000 standards has 14 categories for ...IAM also differentiates 'authenticate' and ...Entitlement is very closely related to ... performed

Cybersecurity Basics 2024-07-25

Cybersecurity Basics crossword puzzle
Across
  1. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  2. An incident where data, trade secrets, or intellectual property is viewed, stolen, or used by an unauthorized individual.
  3. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. An event that could lead to loss of, or disruption to, an organization's operations, services, or functions.
Down
  1. A security process that verifies the identity of a user or device attempting to access a system.
  2. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. The process of converting information or data into a code, especially to prevent unauthorized access.
  4. A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
  5. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  6. A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.

10 Clues: A security process that verifies the identity of a user or device attempting to access a system.Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.The process of converting information or data into a code, especially to prevent unauthorized access....

Cybersecurity Puzzle 2024-07-19

Cybersecurity Puzzle crossword puzzle
Across
  1. Unauthorized access to or manipulation of a computer system or network
  2. A secret word or phrase used to gain access to a system.
  3. The practice of protecting systems, networks, and programs from digital attacks
  4. A digital certificate used to encrypt and authenticate a website
  5. A type of software designed to harm or exploit any programmable device.
Down
  1. The act of pretending to be someone else to gain sensitive information
  2. A type of malicious software that demands ransom
  3. An attack that floods a network with excessive traffic, disrupting service
  4. Unwanted email that often contains malware or phishing attempts
  5. Software designed to detect and remove malicious software

10 Clues: A type of malicious software that demands ransomA secret word or phrase used to gain access to a system.Software designed to detect and remove malicious softwareUnwanted email that often contains malware or phishing attemptsA digital certificate used to encrypt and authenticate a website...

cybersecurity Y.V 2024-10-17

cybersecurity Y.V crossword puzzle
Across
  1. Way a programmer may bypass securityto access a computer through trapdoor programs
  2. Security system that forms a virtual perimeter around a network
  3. An attack where the attacker secretly relays and possibly alters the communications between two parties (4_words)
  4. software that is secretly installed on a user's device to gather sensitive data
  5. Damage or destroy a computer network or system
  6. A malicious computer program
Down
  1. Block elements from sending you information
  2. Unwanted advertising, the email equivalant of physical junk
  3. person who use their skills and talents for good work and keep data safe from other (2_words)
  4. Person who try to gain unauthorized

10 Clues: A malicious computer programPerson who try to gain unauthorizedBlock elements from sending you informationDamage or destroy a computer network or systemUnwanted advertising, the email equivalant of physical junkSecurity system that forms a virtual perimeter around a network...

cybersecurity Y.V 2024-10-17

cybersecurity Y.V crossword puzzle
Across
  1. Damage or destroy a computer network or system
  2. A malicious computer program
  3. person who use their skills and talents for good work and keep data safe from other (2_words)
  4. Security system that forms a virtual perimeter around a network
Down
  1. Way a programmer may bypass securityto access a computer through trapdoor programs
  2. An attack where the attacker secretly relays and possibly alters the communications between two parties (4_words)
  3. Block elements from sending you information
  4. Unwanted advertising, the email equivalant of physical junk
  5. Person who try to gain unauthorized
  6. software that is secretly installed on a user's device to gather sensitive data

10 Clues: A malicious computer programPerson who try to gain unauthorizedBlock elements from sending you informationDamage or destroy a computer network or systemUnwanted advertising, the email equivalant of physical junkSecurity system that forms a virtual perimeter around a network...

Cybersecurity Awareness 2025-10-15

Cybersecurity Awareness crossword puzzle
Across
  1. Fraudulent attempt to obtain sensitive information via email.
  2. A type of malicious software that locks files and demands payment.
  3. When employees unknowingly help hackers, it's called an ___ threat.
  4. Regularly updating this can patch security vulnerabilities.
  5. Security appliance that limits access to data or systems.
Down
  1. A secret word or phrase used to gain access to a system.
  2. Portable devices like USBs can carry this kind of malicious code.
  3. A common workplace policy: "Don't write your password on a ___."
  4. Two-step process to verify identity.
  5. You should never connect to public ___ without using a VPN.

10 Clues: Two-step process to verify identity.A secret word or phrase used to gain access to a system.Security appliance that limits access to data or systems.You should never connect to public ___ without using a VPN.Regularly updating this can patch security vulnerabilities.Fraudulent attempt to obtain sensitive information via email....

CyberSecurity Crossword 2025-10-22

CyberSecurity Crossword crossword puzzle
Across
  1. An online trick where someone tries to steal your personal information by pretending to be someone else.
  2. A strong secret word or phrase used to access accounts.
  3. Protecting systems, networks, and data from digital attacks.
  4. A hidden, harmful program disguised as something safe to download.
  5. The practice of using technology in a safe and responsible way.
  6. Messages that threaten or harass others through technology.
Down
  1. Traces of information left online by users.
  2. Software that protects a computer from viruses and malware.
  3. The process of scrambling information to keep it private.
  4. A wall of security that blocks unauthorized access to a network.

10 Clues: Traces of information left online by users.A strong secret word or phrase used to access accounts.The process of scrambling information to keep it private.Software that protects a computer from viruses and malware.Messages that threaten or harass others through technology.Protecting systems, networks, and data from digital attacks....

Cybersecurity Crossword 2025-11-13

Cybersecurity Crossword crossword puzzle
Across
  1. une menace
  2. empêcher
  3. escroquer
  4. activer
  5. malveillant
  6. des escrocs
Down
  1. dévoiler, révéler
  2. tromper, duper
  3. profiter
  4. faire confiance

10 Clues: activerempêcherprofiterescroquerune menacemalveillantdes escrocstromper, duperfaire confiancedévoiler, révéler

Cybersecurity Basics 2025-11-13

Cybersecurity Basics crossword puzzle
Across
  1. A short way to say “Information Technology.”
  2. Your special name you use to log into a computer, cell phone, tablet, or website.
  3. Something you type to log in — keep it secret!
  4. A computer, tablet, or phone is called a _______.
  5. To keep something from harm or danger.
  6. Something that keeps your personal stuff private.
Down
  1. What we use to surf websites and watch videos.
  2. Keeping your computer and personal data safe.
  3. Using smart rules online helps keep you _______.
  4. Inventions that come from science and research. It can solve problems and make our lives easier.

10 Clues: To keep something from harm or danger.A short way to say “Information Technology.”Keeping your computer and personal data safe.What we use to surf websites and watch videos.Something you type to log in — keep it secret!Using smart rules online helps keep you _______.A computer, tablet, or phone is called a _______....

AWS 2024-08-14

AWS crossword puzzle
Across
  1. O D D U O
  2. P T R A B
  3. M E O L A
  4. C L O U D
  5. T R A D A
  6. I N I U B
  7. S O N I A
Down
  1. T U M P N
  2. Z E M T G
  3. O 1 O S T
  4. I C T C L
  5. T R A N S
  6. A N E O S

13 Clues: T U M P NZ E M T GO 1 O S TI C T C LO D D U OT R A N SP T R A BM E O L AC L O U DT R A D AA N E O SI N I U BS O N I A

Issue #1 2023-09-11

Issue #1 crossword puzzle
Across
  1. The Spooky Month Holiday
  2. Red ________ Week - Keeping kids drug-free
  3. Magnolia ________ Institute
  4. Racket sport this season
  5. Recent Hurricane in California
Down
  1. Seniors should be thinking about their college __________
  2. Homecoming King and ______
  3. Applying to a 4-year __________
  4. Future __________ Leaders of America Club

9 Clues: The Spooky Month HolidayRacket sport this seasonHomecoming King and ______Magnolia ________ InstituteRecent Hurricane in CaliforniaApplying to a 4-year __________Future __________ Leaders of America ClubRed ________ Week - Keeping kids drug-freeSeniors should be thinking about their college __________

Cybersecurity Awareness 2023 2023-10-06

Cybersecurity Awareness 2023 crossword puzzle
Across
  1. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
  2. Sensationalist headline or link to an article, blogpost, or other Internet content that exists for the purpose of attracting attention, or “drawing clicks.” Once a user clicks on the headline or image, the website is often mostly ads
  3. Digital ______ is the ability to use digital technology and media effectively
  4. Illegal _____ of copyrighted material is often referred to as piracy
  5. Your digital _____ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
  6. Cybersecurity awareness month
  7. Online commenter whose intent is to attack views expressed online; these attacks are often personal
  8. Many features in online _____ can expose players to predators
  9. A type of cyber attack that attempts to fool users into providing sensitive information, such as passwords or credit card details, via fake emails and websites
Down
  1. A person who attempts to gain unauthorized access to computer systems
  2. _____ settings help control things like your profile, contact, and other information relating to your account
  3. Online harrassment
  4. A type of cyber attack that locks users out of their computer systems until they pay a ransom, typically in the form of cryptocurrency, such as Bitcoin
  5. ______ theft is a type of crime in which your private information is stolen and used for criminal activity
  6. Designed to detect and destroy computer viruses

15 Clues: Online harrassmentCybersecurity awareness monthDesigned to detect and destroy computer virusesMany features in online _____ can expose players to predatorsIllegal _____ of copyrighted material is often referred to as piracyA person who attempts to gain unauthorized access to computer systems...

Cybersecurity and Cryptography 2024-10-17

Cybersecurity and Cryptography crossword puzzle
Across
  1. What device monitors and controls incoming and outgoing network traffic?
  2. What is a digital document that verifies the ownership of a public key?
  3. term describes a weakness in a system that can be exploited by threats?
  4. What is the process of converting data into a fixed-size string of characters for security?
  5. What is the process of converting plaintext into ciphertext to protect information?
  6. What is the process of converting ciphertext back into plaintext?
  7. What type of malware disguises itself as legitimate software?
  8. What type of malware records keystrokes made by a user?
Down
  1. What is a physical or digital object used to prove identity in security systems?
  2. What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
  3. What term refers to malicious software designed to harm or exploit devices?
  4. What term refers to the permission to enter or use a system or network?
  5. What protocol secures data sent over the internet by encrypting it?
  6. What is the process of verifying the identity of a user or system?
  7. What is the process of creating copies of data to restore in case of loss?

15 Clues: What type of malware records keystrokes made by a user?What type of malware disguises itself as legitimate software?What is the process of converting ciphertext back into plaintext?What is the process of verifying the identity of a user or system?What protocol secures data sent over the internet by encrypting it?...

crossword about Cybersecurity 2025-06-07

crossword about Cybersecurity crossword puzzle
Across
  1. Malware that encrypts files for ransom
  2. Network of infected devices
  3. Small data file stored by websites
  4. Software that secretly monitors activity
  5. Scrambling data for security
  6. Person who exploits system vulnerabilities
  7. Remote data storage and computing
Down
  1. Fraudulent attempts to steal info
  2. Harmful software like viruses
  3. Authentication using fingerprints
  4. Directs internet traffic
  5. Decentralized ledger technology
  6. Malware disguised as legitimate software
  7. Secures internet connections
  8. Network security barrier

15 Clues: Directs internet trafficNetwork security barrierNetwork of infected devicesSecures internet connectionsScrambling data for securityHarmful software like virusesDecentralized ledger technologyFraudulent attempts to steal infoAuthentication using fingerprintsRemote data storage and computingSmall data file stored by websites...

CBL Puzzle 2023-09-01

CBL Puzzle crossword puzzle
Across
  1. Divide and conquer. Tool to reduce the scope
  2. Roofies mixed in software
  3. Party host
  4. Secure data with a pinch of salt
  5. Chained blocks. Runs crypto
  6. 12 characters long in PCI DSS v4.0
Down
  1. Something you are (Inherence factor)
  2. Rhymes with fishing
  3. Your cybersecurity partner
  4. Vaccine for your Ssystems
  5. Burning wall in cold rooms
  6. Data secured. Locked with a key
  7. Malicious code on a horse

13 Clues: Party hostRhymes with fishingVaccine for your SsystemsRoofies mixed in softwareMalicious code on a horseYour cybersecurity partnerBurning wall in cold roomsChained blocks. Runs cryptoData secured. Locked with a keySecure data with a pinch of salt12 characters long in PCI DSS v4.0Something you are (Inherence factor)...

Week 1 Puzzle 2020-08-25

Week 1 Puzzle crossword puzzle
Across
  1. This is an example of "something you know"--one of the key factors in MFA.
  2. Approximately $6 trillion is planned on being spent on this by 2021.
  3. General term for the type of device most often connecting to public WiFi.
  4. This is a type of malware that threatens to publish the victim's data or perpetually block access to it unless the victim pays money.
  5. Globally, one of these attacks every 39 seconds.
  6. By 2025, there will be an estimated 75 billion of these devices connected to the internet.
  7. 95% of cybersecurity breaches involve this type of error.
Down
  1. Any incident that results in unauthorized access to computer data, applications, networks or devices.
  2. The most dangerous type of WiFi.
  3. This is an example of "something you are"--one of the key factors of MFA.
  4. This typically is a 4 or 6 digit password used to lock/unlock a mobile device.
  5. To increase your personal internet security, consider turning off the "save password" feature in this.
  6. 93% of these organizations have experienced a data breach within the past 3 years.
  7. Software that is created specifically to help detect, prevent and remove malicious software.

14 Clues: The most dangerous type of WiFi.Globally, one of these attacks every 39 seconds.95% of cybersecurity breaches involve this type of error.Approximately $6 trillion is planned on being spent on this by 2021.This is an example of "something you are"--one of the key factors of MFA....

Cybersecurity and Cryptography 2024-10-17

Cybersecurity and Cryptography crossword puzzle
Across
  1. What is a digital document that verifies the ownership of a public key?
  2. What type of malware records keystrokes made by a user?
  3. What term refers to the permission to enter or use a system or network?
  4. What term refers to malicious software designed to harm or exploit devices?
  5. What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
  6. term describes a weakness in a system that can be exploited by threats?
  7. What is the process of verifying the identity of a user or system?
  8. What is the process of converting data into a fixed-size string of characters for security?
Down
  1. What device monitors and controls incoming and outgoing network traffic?
  2. What is the process of converting ciphertext back into plaintext?
  3. What protocol secures data sent over the internet by encrypting it?
  4. What is the process of converting plaintext into ciphertext to protect information?
  5. What is the process of creating copies of data to restore in case of loss?
  6. What is a physical or digital object used to prove identity in security systems?
  7. What type of malware disguises itself as legitimate software?

15 Clues: What type of malware records keystrokes made by a user?What type of malware disguises itself as legitimate software?What is the process of converting ciphertext back into plaintext?What is the process of verifying the identity of a user or system?What protocol secures data sent over the internet by encrypting it?...

Cybersecurity Crossword Puzzle 2025-05-06

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Software that secretly gathers user information
  2. Software that is harmful to your system
  3. Software used to detect and remove malicious software
  4. A security system that blocks unauthorized access to a network
  5. A hidden way to access a system or software
  6. The process of converting data into a secret code
  7. A method of guessing passwords by trying all combinations
  8. A fake email that tricks you into giving personal info
Down
  1. A tool that records everything you type
  2. A tool that hides your IP and encrypts your internet connection
  3. A vulnerability that is exploited before it’s known to developers
  4. A type of malware that locks your files until you pay
  5. A type of malware disguised as a legitimate file
  6. An extra step to verify your identity during login
  7. Manipulating people to reveal confidential information

15 Clues: A tool that records everything you typeSoftware that is harmful to your systemA hidden way to access a system or softwareSoftware that secretly gathers user informationA type of malware disguised as a legitimate fileThe process of converting data into a secret codeAn extra step to verify your identity during login...

FIT_Vocab.JT 2013-05-15

FIT_Vocab.JT crossword puzzle
Across
  1. picture for a business
  2. internet service provider
  3. headphone port
  4. TB
  5. online presentation maker
  6. Wireless Fidelity
  7. flash drive, disc
  8. who is asking, what they asking, why are they asking
  9. Google Bing Yahoo
  10. flash drive plug in
  11. online protection
  12. GB
  13. smallest storage amount
  14. 3g 4g
  15. MG
Down
  1. light emitting diode
  2. speakers, printer
  3. cd drive
  4. computer screen
  5. Safari, iTunes, iMovie, App Store
  6. central circuit board
  7. main engine of computer
  8. central processing unit
  9. National Cyber Security Alliance
  10. online manners
  11. Random Access Memory
  12. KB
  13. eight bits
  14. liquid crystal display

29 Clues: TBKBGBMG3g 4gcd driveeight bitsheadphone portonline mannerscomputer screenspeakers, printerWireless Fidelityflash drive, discGoogle Bing Yahooonline protectionflash drive plug inlight emitting diodeRandom Access Memorycentral circuit boardpicture for a businessliquid crystal displaymain engine of computercentral processing unit...

Cybersecurity Terms Crossword Puzzle 2024-02-28

Cybersecurity Terms Crossword Puzzle crossword puzzle
Across
  1. Secure connection for private browsing
  2. Hostage-taking malware for files
  3. Vulnerability before the fix
  4. Identity verification for access
  5. Computer virus and harmful software
  6. Guard against harmful computer viruses
  7. Protecting digital systems and data
  8. Monitor for malicious activities
  9. Deceptive emails for sensitive data
Down
  1. Deliberate act to disrupt systems
  2. Malicious software's harmful action
  3. Secretly records keystrokes for theft
  4. System's exploitable weak point
  5. Network traffic gatekeeper and monitor
  6. Secret entry to bypass security
  7. Impersonation for unauthorized access
  8. Secure data with secret code
  9. Authorized entities' access list
  10. Flood of traffic to disrupt
  11. Software update to fix vulnerabilities

20 Clues: Flood of traffic to disruptVulnerability before the fixSecure data with secret codeSystem's exploitable weak pointSecret entry to bypass securityHostage-taking malware for filesIdentity verification for accessAuthorized entities' access listMonitor for malicious activitiesDeliberate act to disrupt systemsMalicious software's harmful action...

Technology 2023-06-11

Technology crossword puzzle
Across
  1. (Step-by-step problem-solving procedure)
  2. (Global computer network)
  3. (Intelligence that mimics human behavior)
  4. (Securing data with codes)
  5. (Global Positioning System)
  6. (Pocket-sized mobile device)
  7. (Identification based on unique human characteristics)
  8. (Remote data storage and computing)
  9. (Wireless network connectivity)
  10. (Unmanned aerial vehicles)
  11. (Process of making systems operate automatically)
Down
  1. (Protection of computer systems)
  2. (Electronic data processing machine)
  3. (Distributed digital ledger)
  4. (Simulated or computer-generated)
  5. (Enhancement of real-world experiences with digital content)
  6. (Manipulation of matter at the atomic and molecular scale)
  7. (Field of building and programming robots)
  8. Printing (Additive manufacturing process)
  9. Data (Large sets of complex data)

20 Clues: (Global computer network)(Securing data with codes)(Unmanned aerial vehicles)(Global Positioning System)(Distributed digital ledger)(Pocket-sized mobile device)(Wireless network connectivity)(Protection of computer systems)(Simulated or computer-generated)Data (Large sets of complex data)(Remote data storage and computing)...

Wedding Crossword 2024-11-18

Wedding Crossword crossword puzzle
Across
  1. Where Bride was working when the couple met
  2. Amanda's middle name
  3. Bride’s favorite cuisine
  4. Month of the proposal
  5. Amanda's birth month
  6. Bride’s profession
  7. Location of the wedding venue
  8. Couple's favorite fantasy series
  9. Bride's Eye Color
  10. Groom’s favorite holiday
  11. Groom’s favorite takeout
Down
  1. Where the couple get engaged
  2. Russ' middle name
  3. Bride's favorite outdoor activity
  4. Russ' birth month
  5. Bride’s favorite holiday
  6. What Russ is in school for
  7. Groom's Eye Color
  8. # of years couple has been together
  9. Where Groom was born
  10. Couple's favorite hobby
  11. Their cat's name
  12. Groom's favorite hobby
  13. Where Bride was born
  14. Honeymoon Destination

25 Clues: Their cat's nameRuss' middle nameRuss' birth monthGroom's Eye ColorBride's Eye ColorBride’s professionAmanda's middle nameWhere Groom was bornAmanda's birth monthWhere Bride was bornMonth of the proposalHoneymoon DestinationGroom's favorite hobbyCouple's favorite hobbyBride’s favorite holidayBride’s favorite cuisineGroom’s favorite holiday...