cybersecurity Crossword Puzzles
american33 2024-06-08
Across
- Sustainable energy sources.
- Technology in biological research.
- Technology on an atomic scale.
- Large sets of complex data.
- Private space exploration company.
- Protection of internet connected systems.
- Technology involving robots.
- Popular electric vehicle.
- Internet of Things.
- Technology worn on the body.
- Amazon's virtual assistant.
- Automated home technology.
Down
- Virtual model of a physical object.
- Process of making three-dimensional objects.
- Digital currency using encryption.
- Remote diagnosis and treatment.
- Highspeed internet cables.
- Type of reality merging physical and digital.
- Type of computing involving quantum states.
- Study of genomes.
20 Clues: Study of genomes. • Internet of Things. • Popular electric vehicle. • Highspeed internet cables. • Automated home technology. • Sustainable energy sources. • Large sets of complex data. • Amazon's virtual assistant. • Technology involving robots. • Technology worn on the body. • Technology on an atomic scale. • Remote diagnosis and treatment. • Digital currency using encryption. • ...
CyberSecurity Terms (Participation 3) 2023-01-28
Across
- Lots of attackers preventing users
- Tricking users to click an image
- Malware disguised as normal software
- Public internet access
- Malware that tracks you
- Bring your own device
- Attack seeking out personal info
- Malware that makes you pay
- Attack that exploits unknown vulnerability
- Making data unreadable by scrambling
- Shield for data
- Network pro learning hacking techniques
Down
- Malicious hackers
- Security keeping internet users safe
- Software that is harmful
- Software that checks for malware
- Malware that displays ads
- Media altered realistically
- Virtual private network
- Unauthorized access to sensitive info
20 Clues: Shield for data • Malicious hackers • Bring your own device • Public internet access • Malware that tracks you • Virtual private network • Software that is harmful • Malware that displays ads • Malware that makes you pay • Media altered realistically • Software that checks for malware • Tricking users to click an image • Attack seeking out personal info • ...
How well do you know Nick? 2021-05-16
10 Clues: Fathers name. • Mothers name. • Favorite sport • Nick favorite girl • Where was Nick born? • Month Nick was born. • Make of Nick's truck? • What does he hunt in Texas? • Where will he attend college? • What will Nick major in in college?
Productive Techs Crossword Puzzle 2023-10-10
Across
- How you can help me grow my business
- We offer dependable ______ against digital threats
- My retail experience in tech
- One-on-one tech advise session
- State born and raised
- My name
- My profession
Down
- Ongoing commitment for specialized services
- Continuous measure of system health under our watch
- My primary remote management tool
- My business
- New service package subscription
- Regular checkups for optimal performance
13 Clues: My name • My business • My profession • State born and raised • My retail experience in tech • One-on-one tech advise session • New service package subscription • My primary remote management tool • How you can help me grow my business • Regular checkups for optimal performance • Ongoing commitment for specialized services • We offer dependable ______ against digital threats • ...
ICT EDUCATION IN ELEMENTARY GRADES 2024-09-29
Across
- Visual content for education.
- Immersive digital environment experience.
- Replication of real-world scenarios.
- Audio program for listening.
- Recording of screen activities.
- Step-by-step problem-solving procedure.
- Protection against online threats.
- Software for specific tasks.
- Moving images for storytelling.
Down
- Producing physical objects from digital models.
- Connected devices for communication.
- Information used for analysis.
- Interactive display for learning.
- Online writing and sharing.
- Creating interactive educational games.
15 Clues: Online writing and sharing. • Audio program for listening. • Software for specific tasks. • Visual content for education. • Information used for analysis. • Recording of screen activities. • Moving images for storytelling. • Interactive display for learning. • Protection against online threats. • Connected devices for communication. • Replication of real-world scenarios. • ...
Mrs. Dewey - CSIT - Operating System and Configuration 2021-10-08
Across
- released 2012
- how to get OS on device
- copy of data stored elsewhere
- founded by Bill Gates and Paul Allen
- released 2009
- to customize and configure the OS
Down
- basic input output system
- released 2015
- protects devices & data from harm(2words)
- stores, retrieves, and processes data
- a logical division of a hard disk
- best teacher
- loaded on a device(answer is abbreviated)
- network connecting computers globally
14 Clues: best teacher • released 2012 • released 2015 • released 2009 • how to get OS on device • basic input output system • copy of data stored elsewhere • a logical division of a hard disk • to customize and configure the OS • founded by Bill Gates and Paul Allen • stores, retrieves, and processes data • network connecting computers globally • protects devices & data from harm(2words) • ...
Cyber Security Crossword 2021-09-26
Across
- Malicious computer program (not to be confused with Corona)
- A defensive technology designed to keep the bad guys out. They can be hardware or software-based.
- A type of malicious software that locks your files until you pay up
- Unwanted but not malicious emails
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
- Short name for MALicious softWARE
- Sending a fake email to try and personal or sensitive information
Down
- The creators of our anime cybersecurity traing videos
- A type of malware that functions by spying on user activity without their knowledge
- Secret word or phrase used to gain access to a system (the longer the better)
- The name of the cybersecurity drama series (no space)
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network or if you were to send customer details to the wrong person.
12 Clues: Unwanted but not malicious emails • Short name for MALicious softWARE • The creators of our anime cybersecurity traing videos • The name of the cybersecurity drama series (no space) • Malicious computer program (not to be confused with Corona) • Sending a fake email to try and personal or sensitive information • ...
day 1 2022-03-29
Across
- Steve Smith used to play...?
- Only drinks beer with lemon in it
- Year of foundation
- To which cybersecurity framework is Pentera mapped?
- Which department did the first POCs?
- First customer's industry
- Arik's given name on passport
Down
- NA office based in
- Prior to Pentera
- Mike Magno's dog
- An X folk-dancer
- Chen started his career as
12 Clues: Prior to Pentera • Mike Magno's dog • An X folk-dancer • NA office based in • Year of foundation • First customer's industry • Chen started his career as • Steve Smith used to play...? • Arik's given name on passport • Only drinks beer with lemon in it • Which department did the first POCs? • To which cybersecurity framework is Pentera mapped?
All About Cindy & Kevin! 2024-07-27
12 Clues: Kevin’s job • Cindy’s job • Our 1st Date • Cindy’s Last Name • Kevin’s Last Name • Name of our Male Dog • Name of our Female Dog • Where Kevin is from (city) • Where Cindy is from (city) • The breed of our fur babies • Where HE asked HER out AND proposed • Our Favorite Place for Anniversary Trips
Cyber Security 2023-08-17
Across
- a quick access website based directory
- Entering into someone or something else’s data stream either by means of hacking or password changing.
- Being in favor of, or creating aspects towards a decision that will skew an argument at the expense of reputation.
- Company, known as a open network browser
- the world wide web is also known as
- The remnant that is left after browsing. Could be seen by researching through search history and clicking confirmation tickets.
Down
- Known as an asset in the stock market, these are an investment type
- False hyperlinks made in order to create data infiltration, used as a tactic, primary objective of account takeover.
- Trademarking an intellectual property in order to avoid copying an idea, commonly used in business material.
- an accessible tech support
- Protective strategy tailored towards the internet, an ever evolving shield against data infiltration.
- Company, known for computer backup and storage networking
- The street credit as well as infamy an idea creates.
- Company, known for cybersecurity basics software, recently deceased creator
- often used as a financial tolerance policy, this is used to measure the amount of danger one can obtain without failure.
15 Clues: an accessible tech support • the world wide web is also known as • a quick access website based directory • Company, known as a open network browser • The street credit as well as infamy an idea creates. • Company, known for computer backup and storage networking • Known as an asset in the stock market, these are an investment type • ...
Career Services: Cybersecurity Crossword 2025-03-24
Across
- The practice of protecting systems, networks, and programs from digital attacks
- The process of verifying a user’s identity.
- The process of converting data into a secret code to prevent unauthorized access.
- A type of malware that locks or encrypts a victim’s files and demands payment for their release.
- A security system that monitors and controls incoming and outgoing network traffic.
- A simulated cyber attack to test a system’s security.
- A tool that collects and analyzes security logs (Security Information and Event Management).
Down
- A security process that requires two forms of verification also known as 2FA.
- Protects devices like desktops, laptops, and mobile devices from cyber threats by implementing measures to prevent, detect, and respond to malicious activity.
- A type of malware that secretly gathers information from a user’s device.
- A person who gains unauthorized access to systems or networks.
- Malicious software designed to damage or disrupt computer systems.
- Software that detects and removes malicious programs from a computer.
- A cybersecurity professional who tests systems for vulnerabilities to improve security.
- A cyber attack where hackers trick people into revealing sensitive information through fake emails or websites.
15 Clues: The process of verifying a user’s identity. • A simulated cyber attack to test a system’s security. • A person who gains unauthorized access to systems or networks. • Malicious software designed to damage or disrupt computer systems. • Software that detects and removes malicious programs from a computer. • ...
Cyber Hackers & Cybersecurity 2023-06-01
Across
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- An incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner
- A form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable
- Type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
- Software designed to detect and destroy computer viruses
- Interconnected computing devices that can exchange data and share resources with each other
- A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
Down
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers
- It involves using computers, the internet, and other digital technologies to attack or defend against computer systems, networks, and infrastructure attacks
- Creation of a false identity by a cybercriminal with the intention of defrauding a victim
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- Software that automatically displays or downloads advertising material (often unwanted) when a user is online
- Group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses
- Baiting a trap for hackers
- The process of exploiting the flaws of a locked-down electronic device to install software other than what the manufacturer has made available for that device. Jailbreaking allows the device owner to gain full access to th
16 Clues: Baiting a trap for hackers • Software designed to detect and destroy computer viruses • Creation of a false identity by a cybercriminal with the intention of defrauding a victim • Interconnected computing devices that can exchange data and share resources with each other • ...
Cybersecurity revision crossword 2022-01-31
Across
- Checks incoming and outgoing network traffic for threats
- Hackers with no technical hacking knowledge
- Mathematically converts data into a form that is unreadable without a key
- Updating software to remove vulnerabilities automatically
- Type of testing that tests a network for vulnerabilities
- Directly observing someone enter personal details eg Pin, password
- Looking at common attacks and methods to protect ourselves and our networks against attacks
Down
- Inventing a scenario to obtaining personal information
- Verifying the identity of a user or process
- Raw facts and figures
- Created from the user fingerprint, iris, retina, facial, voice
- gaining unauthorised access to or control of a computer system
- Adverts for products a user may be interested in, based on internet history
- Distributed Denial of Service
- Data that has been processed and has context
- Completely Automated Public Turing Test To Tell Computers and Humans Apart
16 Clues: Raw facts and figures • Distributed Denial of Service • Verifying the identity of a user or process • Hackers with no technical hacking knowledge • Data that has been processed and has context • Inventing a scenario to obtaining personal information • Checks incoming and outgoing network traffic for threats • Type of testing that tests a network for vulnerabilities • ...
Cybersecurity Crossword Challenge 2025-08-19
Across
- A fake email or text that tries to steal information.
- Keeping personal and health information protected.
- Written rules that guide safe and compliant practices.
- Software designed to damage or steal data.
- Must be sent from a secured machine when it contains PHI.
- When private or confidential information is accessed without permission.
- What you should file if you notice a privacy or security issue.
Down
- Information that must not be shared with unauthorized people.
- A secret word used to log in securely.
- The law that protects patient health information.
- How systems, files, and conversations should always be kept.
- Extra login security using a code or device.
- What staff must wear to access the building.
- Abbreviation for Protected Health Information.
- A review process to check compliance with rules.
- What you do to computers, doors, or files when unattended.
16 Clues: A secret word used to log in securely. • Software designed to damage or steal data. • Extra login security using a code or device. • What staff must wear to access the building. • Abbreviation for Protected Health Information. • A review process to check compliance with rules. • The law that protects patient health information. • ...
Tiffany & Matt 2023-03-14
Across
- The Bride's maiden name
- The wedding month!
- The holiday the couple met on
- "You may now ____ the bride."
- The Groom's hometown
- The month he proposed
- The Bride's ethnicity
- A small, circular band. Typically of precious metal.
- The Bride's favorite movie series
- The Groom's occupation
Down
- Degree The Bride graduated with
- The city he proposed at
- The fraternity The Groom is in
- The Groom's favorite sport
- Mr. & Mrs. _______
- The Best Man
- "____ is in the air!"
- The name of the couple's first pet
- The Matron of Honor
- Location of the first date (restaurant)
20 Clues: The Best Man • The wedding month! • Mr. & Mrs. _______ • The Matron of Honor • The Groom's hometown • "____ is in the air!" • The month he proposed • The Bride's ethnicity • The Groom's occupation • The Bride's maiden name • The city he proposed at • The Groom's favorite sport • The holiday the couple met on • "You may now ____ the bride." • The fraternity The Groom is in • ...
IEM Social Media Crossword Puzzle 2021-07-22
Across
- Practicing personal appreciation
- VDEM’s #______Monday
- The CISA, FBI, and the NSA published a Joint ____ Advisory
- Know ______ (Call to action)
- Have you made a family ____ plan?
- FEMA announced two initiatives to address
- Tool for public safety and emergency response
- IEM Spotlight
- Thank you postal workers
- Rapidly spreading variant
- Hire a _____ Day
Down
- Beat the…
- July Holiday
- Give Something Away Day
- Hernando County, Florida
- Summer heat brings increased risk
- Conservation Day
- IEM Senior Executive Advisor providing insight
- First hurricane of the 2021 season
- Connect with county leaders
20 Clues: Beat the… • July Holiday • IEM Spotlight • Conservation Day • Hire a _____ Day • VDEM’s #______Monday • Give Something Away Day • Hernando County, Florida • Thank you postal workers • Rapidly spreading variant • Connect with county leaders • Know ______ (Call to action) • Practicing personal appreciation • Summer heat brings increased risk • Have you made a family ____ plan? • ...
Security Safety 2023-07-19
Across
- Biological user authentication methods
- Software used to prevent cyberattacks
- Malicious web browser advertisements
- Publishing private user information
- Blocks fraudulent network traffic
- Maliciously placed computer system infection
- Attacker changes DNS server information
- Intimidating and threatening electronic communication
- Words used for account access
Down
- Tracks user's keystrokes
- Practice of protecting computer systems
- Computer networks used for cyberattacks
- Forceful hacker password guessing technique
- Fraudulent solicitation through an email
- More than two authentication techniques
- Requires users to confirm identity
- Tracks user's online behavior
- Plans and implements security measures
- Malicious click tricks
- Use of fake website addresses
20 Clues: Malicious click tricks • Tracks user's keystrokes • Tracks user's online behavior • Use of fake website addresses • Words used for account access • Blocks fraudulent network traffic • Requires users to confirm identity • Publishing private user information • Malicious web browser advertisements • Software used to prevent cyberattacks • Biological user authentication methods • ...
Jas & Cian: Sip & Solve 2024-07-30
Across
- Cian's family cat's name
- Cian's coffee order
- The month we got engaged
- Number of degrees Jasvin has
- City that Cian was born in
- The location of our first date
- Where do we live
- Jasvin's birthday month
- Jasvin's favourite Marvel character
- Jasvin's middle name
- The subject Jasvin teaches
Down
- The honeymoon destination
- The gemstone in Jasvin's engagement ring
- The policy area Cian works in
- Our favourite board game
- Cian's university
- The number of bridesmaids
- Our first overseas holiday
- Jasvin's home town
- The number of groomsmen
- Cian's football team
- Cian's middle name
22 Clues: Where do we live • Cian's university • Jasvin's home town • Cian's middle name • Cian's coffee order • Cian's football team • Jasvin's middle name • The number of groomsmen • Jasvin's birthday month • Cian's family cat's name • Our favourite board game • The month we got engaged • The honeymoon destination • The number of bridesmaids • Our first overseas holiday • City that Cian was born in • ...
public safty crossword 2024-08-20
Across
- control, to protect dangered animals and control thm
- to protect the city and people
- watch over an area
- protected
- security of things online
- to watch out for
- help minor injuries
- sound for an emergency
- to be quiet and away from windows
Down
- danger
- unexpected dangerous situation
- a statement that could mean possible danger
- to protect
- let someone know something important
- saving someone from danger
- flames
- to be kept safe
- to clear out quickly
- health, health of the population
- medical attention on the move
- being protected
21 Clues: danger • flames • protected • to protect • to be kept safe • being protected • to watch out for • watch over an area • help minor injuries • to clear out quickly • sound for an emergency • security of things online • saving someone from danger • medical attention on the move • unexpected dangerous situation • to protect the city and people • health, health of the population • ...
Cyber Security 2026-01-22
Across
- Secret code for account access
- Protection for brand names or logos
- Tricking users to steal information
- Illegal copying of software
- Keeping information secret
- Verifying user identity
- Copying work without credit
- Sending unwanted bulk messages
- Legal protection for original content
Down
- Protects computers and data from attacks
- Extra copy of data for safety
- Ensures data is not altered
- Information is accessible when needed
- Blocks unauthorized network access
- Control over personal information
- Unauthorized access to systems
- Moral rules for using technology
- Protection for inventions
- Online trail left by users
- Software that removes malware
20 Clues: Verifying user identity • Protection for inventions • Online trail left by users • Keeping information secret • Ensures data is not altered • Illegal copying of software • Copying work without credit • Extra copy of data for safety • Software that removes malware • Secret code for account access • Unauthorized access to systems • Sending unwanted bulk messages • ...
Girl Scouts Cybersecurity 2022-03-13
Across
- The official procedure or system of rules
- A virus that covertly monitors your online behavior without your knowledge or permission
- A program that seems to be a helpful but actually is a virus
- A string of characters that allows access to a computer system or service
- Program instructions or a secret message
- A group or system of interconnected people or things
- A Software designed to detect and destroy computer viruses
- a piece of code which is capable corrupting a system or destroying data
Down
- A person who uses computers to gain unauthorized access to data
- an identification used by a person with access to a computer, network, or online service
- Software that displays unwanted pop-up adverts
- copy data from one computer system to another, typically over the internet
- A virus that employs encryption to hold a victim's information at ransom
- A piece of code that's main goal is to self-replicate and infect other computers while remaining active on infected systems
- A secret or disguised way of writing
- Digital junk mail
16 Clues: Digital junk mail • A secret or disguised way of writing • Program instructions or a secret message • The official procedure or system of rules • Software that displays unwanted pop-up adverts • A group or system of interconnected people or things • A Software designed to detect and destroy computer viruses • A program that seems to be a helpful but actually is a virus • ...
Cybersecurity Awareness Crossword 2025-04-01
Across
- Good digital habits to protect your devices and accounts
- Regularly doing this keeps your software secure
- Don’t enter your password if this page looks suspicious
- When an attacker breaks into a system and steals data
- When an attacker makes something look real but it’s fake
- A message that warns you about a possible threat
- A common cyberattack that tries to trick you into clicking or giving info
Down
- People-based method hackers use to trick victims
- Type of hacking that manipulates people instead of software
- What your accounts and devices should always be
- A fake version of this might trick you into approving a login you didn’t make
- First line of defense — make it strong, never reuse it
- What you should do if you spot a suspicious email or message
- A fix released to close security vulnerabilities
- Adds a second layer of login security using a code or app
- A deceptive trick to steal money, data, or logins
16 Clues: What your accounts and devices should always be • Regularly doing this keeps your software secure • People-based method hackers use to trick victims • A fix released to close security vulnerabilities • A message that warns you about a possible threat • A deceptive trick to steal money, data, or logins • When an attacker breaks into a system and steals data • ...
CYBERSECURITY CROSSWORD CHALLENGE 2024-10-20
Across
- An attack using computer program to guess the correct user credentials
- If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
- Protocol used for encryption which protects data in transit
- A piece of data stored on your device by websites you visit. Not chocolate chip, though
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
- Encryption technique used to protect data
- A sequence of words or text used to control access to a computer; similar to a password.
- A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
Down
- The act of tricking someone into giving up sensitive information
- System(software or hardware) used to manage network security and monitor traffic
- A flaw or weakness in a computer system that could be exploited to violate the system’s security.
- Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
- Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
- This testing simulates a full stack attack, probing every possible weakness
- Malicious program that can replicate itself
16 Clues: Encryption technique used to protect data • Malicious program that can replicate itself • Protocol used for encryption which protects data in transit • The act of tricking someone into giving up sensitive information • An attack using computer program to guess the correct user credentials • ...
CYBERSECURITY CROSSWORD CHALLENGE 2024-10-20
Across
- If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
- Encryption technique used to protect data
- A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
- Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
- A sequence of words or text used to control access to a computer; similar to a password.
- System(software or hardware) used to manage network security and monitor traffic
- Malicious program that can replicate itself
- An attack using computer program to guess the correct user credentials
- This testing simulates a full stack attack, probing every possible weakness
Down
- Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
- Protocol used for encryption which protects data in transit
- Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
- The act of tricking someone into giving up sensitive information
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- A flaw or weakness in a computer system that could be exploited to violate the system’s security.
- A piece of data stored on your device by websites you visit. Not chocolate chip, though
16 Clues: Encryption technique used to protect data • Malicious program that can replicate itself • Protocol used for encryption which protects data in transit • The act of tricking someone into giving up sensitive information • An attack using computer program to guess the correct user credentials • ...
PhD crossword 2023-02-25
Across
- Antica istituzione alcolica del venerdì
- Il cognome del direttore d'istituto più odiato
- È severamente vietato prenderlo a Fai della Paganella
- Ci vanno coloro che vengono licenziati
- Osservare per essere ...
- Strumenti a percussione usati durante i rituali post mensa
- Si usa fare alla Winter School
- Nome dello startupper più influente degli ultimi anni
- Delle API... Ne fece una passione
- Nome del trofeo assegnato a chi si aggiudica il Valico dei 3 Faggi
- l'ambrosia della mensa
- L'autore di celebri racconti erotici
- Seconda solo dopo la riduzione della CO2
- Progetto inculata (solo per te)
- Tutti quanti vogliamo essere come lui
- Consiglio Nazionale delle Ricerche
- Soprannome dello storico direttore dell'IIT
- Gioco virale inventato per passare il tempo a mensa
- Il Quentin non Tarantino
- Città famosa per i suoi tortini stopposi
Down
- Scrisse "general_used_RAM_gt_75%"
- Incredibile, straordinario, ...
- Famosa località turistica romagnola
- Si mangia a colazione
- Località di mare conosciuta per lo Smart working
- Detto tipico viareggino
- Parola che non sa pronunciare Martinelli
- L'osservatorio di Cybersecurity
- L'ideatore del servizio "Access Policy"
- Il Gengis Khan dell'IIT
- superstar del bar
- Sulla bandiera sarda così come al CNR
- Il sosia di Ruggero dei Timidi
- Nomignolo affibbiato da Fabio per le persone di basso rango
- Nome della signora che fa le tagliatelle più buone della romagna
- Common Vulnerability and Exposure
- Storico avversario del Rosetti
37 Clues: superstar del bar • Si mangia a colazione • l'ambrosia della mensa • Detto tipico viareggino • Il Gengis Khan dell'IIT • Osservare per essere ... • Il Quentin non Tarantino • Si usa fare alla Winter School • Il sosia di Ruggero dei Timidi • Storico avversario del Rosetti • Incredibile, straordinario, ... • L'osservatorio di Cybersecurity • Progetto inculata (solo per te) • ...
DC9111 2024-08-09
Across
- A framework used to manage and mitigate cybersecurity risks.
- A cybersecurity tool used to monitor, detect, and respond to threats.
- - The process of converting data into a code to prevent unauthorized access.
- The practice of finding and fixing security flaws.
- A common online attack method involving fraudulent emails.
- A network security device that monitors and filters incoming and outgoing traffic.
- An open-source intelligence gathering technique.
- A term for ethically hacking a system.
- An organized event where hackers test their skills.
- The art of disguising communication within another medium.
- A type of malware that demands payment for the return of stolen data.
- The practice of attacking a system to test its security.
- A person who finds and reports security vulnerabilities for rewards.
- A malicious program that spreads across systems and networks.
- A type of attack where multiple systems flood a target with traffic.
Down
- The exploitation of software vulnerabilities by malicious hackers.
- The unauthorized access of data in transit.
- A cryptographic key used in public key cryptography.
- A protocol used for secure internet communication.
- The process of analyzing network traffic for malicious activity.
- An organization that sets standards for securing information systems.
- A type of attack that overwhelms a system with traffic.
- A hidden malicious software that provides backdoor access.
- A form of social engineering to manipulate users into giving up confidential information.
- A global, decentralized group known for hacktivism.
- A popular TV series about a hacker with dissociative identity disorder.
26 Clues: A term for ethically hacking a system. • The unauthorized access of data in transit. • An open-source intelligence gathering technique. • The practice of finding and fixing security flaws. • A protocol used for secure internet communication. • An organized event where hackers test their skills. • A global, decentralized group known for hacktivism. • ...
nebbycrossword 2025-06-05
Across
- "This is creepy, ___!"
- What I hoped New York was winning
- Who I've written a 5k word analysis on the backstory of
- Favorite bird...
- Favorite Terraria class (LOL)
- Took 121 attempts to obtain
- Fave Litigation Team member
- Cat's name
- College Major
Down
- Favorite Band
- My favorite DSMP member(when I liked it)
- Who I ran an update account for
- FAVORITE BSD CHARACTER?!?!?!
- The Genshin character I wish I could save
- Toontown character & Beloved character
- "Dear _____"
16 Clues: Cat's name • "Dear _____" • Favorite Band • College Major • Favorite bird... • "This is creepy, ___!" • Took 121 attempts to obtain • Fave Litigation Team member • FAVORITE BSD CHARACTER?!?!?! • Favorite Terraria class (LOL) • Who I ran an update account for • What I hoped New York was winning • Toontown character & Beloved character • My favorite DSMP member(when I liked it) • ...
Technology 2024-07-18
Across
- Protection against online threats
- Remote storage accessed via the internet
- Simulation of human intelligence
- Unm
- Secure digital ledger technology
- Electronic device for processing data
Down
- Programs that run on computers
- Simulation of a physical environment
- Device that directs network traffic
- Global network of connected devices
- Software application for mobile devices
11 Clues: Unm • Programs that run on computers • Simulation of human intelligence • Secure digital ledger technology • Protection against online threats • Device that directs network traffic • Global network of connected devices • Simulation of a physical environment • Electronic device for processing data • Software application for mobile devices • ...
CYBERSECURITY CROSSWORD CHALLENGE 2024-10-20
Across
- If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
- Encryption technique used to protect data
- A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
- Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
- A sequence of words or text used to control access to a computer; similar to a password.
- System(software or hardware) used to manage network security and monitor traffic
- Malicious program that can replicate itself
- An attack using computer program to guess the correct user credentials
- This testing simulates a full stack attack, probing every possible weakness
Down
- Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
- Protocol used for encryption which protects data in transit
- Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
- The act of tricking someone into giving up sensitive information
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- A flaw or weakness in a computer system that could be exploited to violate the system’s security.
- A piece of data stored on your device by websites you visit. Not chocolate chip, though
16 Clues: Encryption technique used to protect data • Malicious program that can replicate itself • Protocol used for encryption which protects data in transit • The act of tricking someone into giving up sensitive information • An attack using computer program to guess the correct user credentials • ...
GenCyber Cybersecurity Concepts 2022-06-08
GenCyber Cybersecurity Concepts 2022-06-08
IEM's October Social Media Crossword Puzzle 2021-10-21
Across
- Wash your hands with _____ and water
- October is ________ Awareness Month
- IEMer moderating Techniques for Successful Grant Applications session at IAEM (last name)
- Important tool to protect your family during a fire emergency
- Theme of hurricane preparedness tip
- IEMer moderating FEAM Forum Panel at IAEM (last name)
- Sites opening across Virginia
- International Day for Disaster ______
Down
- Great Shake Out Drill
- Cyber attack
- FEMA Administrator (last name)
- 246th Birthday
- Committed to stabilizing ______ security
- NEMA 2021 Annual Forum
- ______ Week
- Annual Conference in Grand Rapids, MI
- Conferences are an opportunity to…
17 Clues: ______ Week • Cyber attack • 246th Birthday • Great Shake Out Drill • NEMA 2021 Annual Forum • Sites opening across Virginia • FEMA Administrator (last name) • Conferences are an opportunity to… • October is ________ Awareness Month • Theme of hurricane preparedness tip • Wash your hands with _____ and water • Annual Conference in Grand Rapids, MI • ...
BUSINESS- SET B 2026-02-09
10 Clues: Using Time well • Less waste improves • Protecting computers • online selling method • Cost of all production • Cost per unit produced • Cost of all production • Rent is a type of cost • Productivity helps increase • Cost Electricity bill is usually
Dm literacy 2021-11-03
8 Clues: Videos • bitmoji • a blue bird • post pictures • online security • 3-180 second clips • ai that pushes out content • A social media used for old people
Cybersecurity Legislations Crossword 2023-12-13
Across
- Legal framework that requires organisations to protect sensitive data
- This act empowers law enforcement agencies to investigate and combat cybercrime in the UK
- This act focuses on protecting critical national infrastructure from cyber threats
- The UK's primary legislation for the protection of personal data
Down
- This law ensures the security of electronic communications services in the UK
- Law that requires public sector organisations to follow specific cybersecurity standards (blankblank scheme)
- An organisation responsible for overseeing the implementation of cybersecurity strategies and policies in the UK
- Legislation that governs the interception and monitoring of communications in the UK
8 Clues: The UK's primary legislation for the protection of personal data • Legal framework that requires organisations to protect sensitive data • This law ensures the security of electronic communications services in the UK • This act focuses on protecting critical national infrastructure from cyber threats • ...
Fathers day! 2025-06-12
Across
- Who is your FAVOURITE child?
- What is your favourite country?
- How old are you?
- What's your favourite food?
- 13 when is your birthday?
- What's YOUR favourite color?
- What's MY favourites color?
- How tall are you?
- What's your favourite sport?
Down
- What type of car do you drive?
- what year was I born?
- What is your favourite holiday?
- What is your job?
- What year was mom born born?
- 29 when is my birthday?
15 Clues: How old are you? • What is your job? • How tall are you? • what year was I born? • 29 when is my birthday? • 13 when is your birthday? • What's your favourite food? • What's MY favourites color? • Who is your FAVOURITE child? • What year was mom born born? • What's YOUR favourite color? • What's your favourite sport? • What type of car do you drive? • What is your favourite holiday? • ...
Love Letters 2024-05-07
Across
- First movie we "watched"
- Name a woman
- These stay in the backseat
- Tucker's dry food brand
- I DON'T HAVE ONE!
- My favorite food
Down
- My favorite fidget toy puzzle
- Character's name I make in every game
- Pokemon Bridget painted
- Lesbian label you taught me
- Certification I'm working on
- Dish I make for you
- Text on shirt you offered to fix
- First Birthday gift I gave you
- My hometown (not New Orleans)
15 Clues: Name a woman • My favorite food • I DON'T HAVE ONE! • Dish I make for you • Pokemon Bridget painted • Tucker's dry food brand • First movie we "watched" • These stay in the backseat • Lesbian label you taught me • Certification I'm working on • My favorite fidget toy puzzle • My hometown (not New Orleans) • First Birthday gift I gave you • Text on shirt you offered to fix • ...
Emerging Cyber Threats and Attack Vectors Puzzle 2024-11-13
Across
- Cyberattack method involving reused login credentials
- Field focused on protecting digital information from unauthorized access
- A type of cyberattack where attackers demand payment to restore access
Down
- A breach involving an entertainment company that revealed weaknesses in cybersecurity
- A technique that makes it hard for attackers to distinguish between real and decoy assets
- A famous malware that targeted industrial control systems, raising concerns over cyber warfare
- Name of the ransomware known for using traditional tradecraft in its attacks
7 Clues: Cyberattack method involving reused login credentials • A type of cyberattack where attackers demand payment to restore access • Field focused on protecting digital information from unauthorized access • Name of the ransomware known for using traditional tradecraft in its attacks • ...
Cybersecurity Awareness Month 2025-04-22
Across
- A secret word or phrase used to authenticate access
- Verifying the identity of a user or device
- The malicious part of malware delivered after exploitation
- Malicious act of publicly releasing personal information online
- Secures information using mathematical algorithms
- Any software intentionally designed to cause damage or unauthorized access
- Deceptive attempt to steal sensitive information
- A network of compromised devices controlled by an attacker
Down
- One-way transformation of data into a fixed-length string
- Network device or software that filters traffic
- Malicious program that can replicate and spread
- A potential danger to cybersecurity
- The practice of disguising communication to appear as a trusted entity
- Takes advantage of a software vulnerability
- An incident where data is accessed or disclosed without authorization
- Secret method to bypass security controls
16 Clues: A potential danger to cybersecurity • Secret method to bypass security controls • Verifying the identity of a user or device • Takes advantage of a software vulnerability • Network device or software that filters traffic • Malicious program that can replicate and spread • Deceptive attempt to steal sensitive information • ...
CYBERSECURITY AWARENESS MONTH 2025-10-28
Across
- An update to an operating system, application, or other software issued specifically to correct problems with the software.
- A social engineering attack that uses phone calls to impersonate.
- A type of scam where attackers trick people into giving away sensitive information.
- When an attacker floods your inbox with emails to overwhelm the system and bury legitimate messages.
- Malicious software that is made to harm your computer. Types of malware are viruses, worms, spyware, and ransomware.
- A security tool that helps block unwanted access to your computer or network.
- Completely Automated Public Turing test to tell Computers and Humans Apart.
- Attack where a user's stolen login information (like username and password) from one website is used to gain access to accounts on other websites.
- Malicious software that can spread itself from one computer to another.
Down
- A type of malicious software that encrypts your data, holding it for ransom until a payment is made.
- Software that helps protect your computer or device from viruses, malware, and other harmful programs.
- Unauthorized user who attempts to or gains access to an information system.
- Virtual Private Network
- A security flaw in software that hackers discover before the company knows about it.
- Authentication method that uses more than one type of authentication such as a password or a fingerprint scan.
- A way to protect information by turning it into a secret code that only authorized people can read
16 Clues: Virtual Private Network • A social engineering attack that uses phone calls to impersonate. • Malicious software that can spread itself from one computer to another. • Unauthorized user who attempts to or gains access to an information system. • Completely Automated Public Turing test to tell Computers and Humans Apart. • ...
Cybersecurity Awareness R5 2025-06-21
Across
- Extra Layer of security that requires users to provide multiple forms of verification before they can access a system or account
- method or code used to take advantage of that weakness
- A method transforming the original data into an unreadable format.
- Unauthorized access to confidential or sensitive data.
- System that prevents unauthorized access to or from a private network.
- Converting data into a secure format to prevent unauthorized access.
- A network of compromised computers controlled by attackers to launch cyber attacks.
Down
- Weakness in a system that can be exploited by threats.
- A malware that encrypts data and demands payment for decryption.
- A division under DICT Cybersecurity Bureau responsible for receiving, reviewing and responding to computer security incident reports and activities
- Software update designed to fix security vulnerabilities
- A phishing attack that uses text messages to trick individual into divulging personal information.
- A type of cyberattack where malicious actors attempt to trick individuals into revealing sensitive information
- Attached agency of DICT created upon the approval of Cybercrime Prevention Act of 2012; this agency is a part of the inter-Agency Response Center where you can report cyber incidents through hotline 1326.
- One of the frontline services of the DICT that ensures secure data Transactions.
- Attached agency of DICT Mandated to administer and implement the Data Privacy Act of 2012; the country's privacy watchdog.
16 Clues: Weakness in a system that can be exploited by threats. • method or code used to take advantage of that weakness • Unauthorized access to confidential or sensitive data. • Software update designed to fix security vulnerabilities • A malware that encrypts data and demands payment for decryption. • A method transforming the original data into an unreadable format. • ...
Cybersecurity Week Crossword 2025-08-28
Across
- A small file from a website that tracks your actions
- Malicious software that prevents access to a system until a ransom is paid
- A website used to attract hackers, without risking corporate data
- Bulk or unwanted emails
- Software to disrupt, damage or gain unauthorised access to a computer system
- Occurs when an unauthorised person bypasses access control measures for a restricted area by being granted access through an authorised user, who subjects themselves to the access control measures
- A person that has the potential to or causes actual damage to an organisation through using their authorized access to systems
- Practice of granting required access to authorized persons based on job requirements
- Type of attack that overwhelms a system or network with excessive requests, making it unusable to legitimate users
Down
- A person who uses computers to gain unauthorized access to data
- A technique used to disguise the sender's identity to gain sensitive information
- Method of exploiting social interactions that trick users to reveal sensitive information to gain access to a system
- A form of social engineering that is done via email or other messages
- Sofware that automatically displays advertisements
- Publishing someone's personal information online without their consent
- A combination of username, password or biometrics to authenticate access a system
16 Clues: Bulk or unwanted emails • Sofware that automatically displays advertisements • A small file from a website that tracks your actions • A person who uses computers to gain unauthorized access to data • A website used to attract hackers, without risking corporate data • A form of social engineering that is done via email or other messages • ...
Computer Science 2024-03-19
Across
- Best department of the Interdep
- Name of the robot dog
- Associative role which is most found in the department
- Something you don't like to see while coding
- Head of the computer science department
- (Only) Friend
Down
- Favorite snake
- It's the dep info ....
- Programming web language
- Something unknown
- Field of 3A in the department
- the other field of 3A in the department
- Commonly used software to code
- Favorite dish
- Number of times the department won the Interdep
- Death project
16 Clues: Favorite dish • Death project • (Only) Friend • Favorite snake • Something unknown • Name of the robot dog • It's the dep info .... • Programming web language • Field of 3A in the department • Commonly used software to code • Best department of the Interdep • the other field of 3A in the department • Head of the computer science department • Something you don't like to see while coding • ...
Cybersecurity Crossword 2021-02-12
Across
- a worm, virus, or trojan that infects a computer and causes it to download or display malicious pop-ups
- unwanted software that monitors and gathers information on a person
- an attack where a victim gets an email disguised to look legit, in order to trick them into giving up valuable data
- malicious software
- a secret sequence of letters, numbers and characters to help verify someone.
Down
- a virus which tricks you into being downloaded
- information that relates to an identified or identifiable individual
- a type of worm, virus or trojan that demands money
- a malicious form of self-replicating software
- exploit vulnerabilities in a computer's operating system or a networks hardware
10 Clues: malicious software • a malicious form of self-replicating software • a virus which tricks you into being downloaded • a type of worm, virus or trojan that demands money • unwanted software that monitors and gathers information on a person • information that relates to an identified or identifiable individual • ...
Cybersecurity Crossword 2024-10-15
Across
- Security mechanism that involves multiple authentication methods (3 letters)
- The process of encoding data to keep it secure(10 letters)
- A Weakness in a system that can be exploited (13 letters)
- Process of finding and fixing errors in code (9 letters)
- An attack where a hacker tricks someone into revealing confidential information(8 letters)
Down
- Security incident where sensitive data is exposed to unauthorized parties (8 letters)
- A hidden or disguised computer virus(6 letters)
- A protection layer to prevent unauthorized access to a network(8 letters)
- Authentication factor using your fingerprint or face (10 letters)
- Online platform for hosting and reviewing code (6 letters)
10 Clues: A hidden or disguised computer virus(6 letters) • Process of finding and fixing errors in code (9 letters) • A Weakness in a system that can be exploited (13 letters) • The process of encoding data to keep it secure(10 letters) • Online platform for hosting and reviewing code (6 letters) • Authentication factor using your fingerprint or face (10 letters) • ...
6.8 Cybersecurity 2025-03-19
Across
- code that is capable of copying itself and corrupting a system or destroying data
- the ability to limit access to information to a certain set of users.
- software that is intended to damage or disable computers and computer systems.
- engineering the psychological manipulation of people into performing actions or divulging confidential information
Down
- measures taken to protect a computer or computer system against unauthorized access or attack
- obtaining confidential information by masquerading as an "official" person, site, or entity. A form of social engineering
- part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- Distributed Denial of Service - an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources
- the certainty that information is accurate
- the reliability of access to information
10 Clues: the reliability of access to information • the certainty that information is accurate • the ability to limit access to information to a certain set of users. • software that is intended to damage or disable computers and computer systems. • code that is capable of copying itself and corrupting a system or destroying data • ...
Cybersecurity Crossword 2025-09-14
Across
- Any software or program intentionally designed to cause harm to a computer, system, or user.
- A highly skilled computer professional who bypasses security measures to gain unauthorized access, often with malicious intent.
- Using voice calls to trick victims.
- Using text messages to trick victims.
- Gaining unauthorized physical access.
Down
- The criminal takes advantage of the relationship and tricks the victim into giving them money, extracting personal information, or installing malware.
- An attempt to defraud a person or group after first gaining their trust.
- Using enticing offers to lure victims into traps.
- Creating a believable scenario to extract information.
- Using fraudulent emails to steal information.
10 Clues: Using voice calls to trick victims. • Using text messages to trick victims. • Gaining unauthorized physical access. • Using fraudulent emails to steal information. • Using enticing offers to lure victims into traps. • Creating a believable scenario to extract information. • An attempt to defraud a person or group after first gaining their trust. • ...
Cybersecurity Fundamentals 2025-11-14
Across
- Process of converting data to unreadable form
- Software that locks files for payment
- Protection that filters network traffic
- Weakness that attackers can exploit
- Hidden access point in a system
Down
- Software that secretly monitors user activity
- Self-replicating code that attaches to programs
- Software that blocks unauthorized content
- Malicious software designed to harm systems
- Fraudulent emails attempting to steal data
10 Clues: Hidden access point in a system • Weakness that attackers can exploit • Software that locks files for payment • Protection that filters network traffic • Software that blocks unauthorized content • Fraudulent emails attempting to steal data • Malicious software designed to harm systems • Software that secretly monitors user activity • ...
cybersecurity Saleck 2025-11-10
Across
- Person who breaks into computer systems
- Secret code used to log in
- Trick used to steal personal information through fake emails
- Protecting computers and data from attacks
- A group of connected computers
Down
- Converts data into a secret code to protect it
- Malware that locks your files until a payment is made
- Program that can harm your computer
- Software that detects and removes malicious programs
- Blocks unauthorized access to a network
10 Clues: Secret code used to log in • A group of connected computers • Program that can harm your computer • Person who breaks into computer systems • Blocks unauthorized access to a network • Protecting computers and data from attacks • Converts data into a secret code to protect it • Software that detects and removes malicious programs • ...
Cybersecurity karim 2025-11-10
Across
- secret combination of characters used to access an account
- attempt to deceive a user in order to obtain peronal information
- Technique used to convert a message into a secret code
- A security vulnerability unknown to the software vendor and immediately exploitable by attackers.
- A video, image, or audio manipulated using artificial intelligence to create a false reality.
Down
- Malicious software that scares the user with fake security alerts to push them to install a fraudulent program.
- An isolated environment that allows software to run safely to prevent it from harming the system.
- Malicious software designed to damage a computer sytem
- A deliberately vulnerable computer system used to attract and trap hackers in order to study their techniques.
- Volatile memory used by the processor during execution.
10 Clues: Malicious software designed to damage a computer sytem • Technique used to convert a message into a secret code • Volatile memory used by the processor during execution. • secret combination of characters used to access an account • attempt to deceive a user in order to obtain peronal information • ...
My Dream Job: Computer Programer 2023-05-03
Across
- keeping information found online safe
- internet servers
- problem-solving operation
- testing for problems
- building a computer program
- the components that form a computer
Down
- acronym for hyper text markup language
- designing and building
- the storage and organization of data
- minimum level of education required
10 Clues: internet servers • testing for problems • designing and building • problem-solving operation • building a computer program • minimum level of education required • the components that form a computer • the storage and organization of data • keeping information found online safe • acronym for hyper text markup language
Cybersecurity Crossword 2021-10-08
Across
- verifying the identity of a user, process, or device
- a flaw or weakness that may allow harm to occur to a system
- malicious code like virus, worm
- Blink's single sign-on(SSO) solution
- an unauthorized user who attempts to or gains access to an information system
Down
- ensuring that data has not been altered or destroyed in an unauthorized manner
- an undocumented way of gaining access to a computer system
- how we work since covid started
- incident that results in disclosure of sensitive data
- individually identifiable health information
10 Clues: how we work since covid started • malicious code like virus, worm • Blink's single sign-on(SSO) solution • individually identifiable health information • verifying the identity of a user, process, or device • incident that results in disclosure of sensitive data • an undocumented way of gaining access to a computer system • ...
Cybersecurity Risk 2021-09-07
Across
- Abbreviation of Internet of Things.
- Short for "malicious software."
- Data that in published and can be found by anyone
- The type of data that should not be known to everyone.
- Pretending to be a friend or a trusted source online.
Down
- software that encrypts data on someone's device until that person agrees to pay to regain access.
- measures taken to protect computer systems.
- Joined or linked together.
- is a password made up of a saying or memorable set of words.
- Legitimate or innocent emails trying to trick you in clicking a link or providing personal information.
10 Clues: Joined or linked together. • Short for "malicious software." • Abbreviation of Internet of Things. • measures taken to protect computer systems. • Data that in published and can be found by anyone • Pretending to be a friend or a trusted source online. • The type of data that should not be known to everyone. • ...
Cybersecurity Password 2020-01-10
Across
- You may not divulge this information while you are working for an employer or after you leave.
- Malware that extorts money from victims by blocking access to their computer or encrypting the data stored on it.
- E-mailing victims to trick them into voluntarily giving up their confidential information.
- Software aimed at protecting your computer from malware.
Down
- A flaw in a system that leaves it open to attack.
- A bunch of compromised computers running malicious programs and being remotely controlled by cybercriminals.
- It is the scrambling of data into a secret code that can be read only by software set to decode the information.
- A netork-based technology that allows user to store a large amount of data and have access to it with any Internet-connected device.
- Malware that secretly installs more malware on a computer.
- A remote infrastructure for developing and deploying new online software applications.
10 Clues: A flaw in a system that leaves it open to attack. • Software aimed at protecting your computer from malware. • Malware that secretly installs more malware on a computer. • A remote infrastructure for developing and deploying new online software applications. • E-mailing victims to trick them into voluntarily giving up their confidential information. • ...
cybersecurity story 2024-02-23
Across
- - software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access
- - The protection of the cyber realms
- - a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware
- - the technique by which any kind of information can be converted into a secret form that conceals the actual meaning
- - someone who tries to access data they aren't authorized to view
- - monitoring network security system
Down
- - What happens when the firewall is broken
- - A security incident where confidential information is stolen
- - the story this puzzle is about
- - a mechanism for creating a secure connection
10 Clues: - the story this puzzle is about • - The protection of the cyber realms • - monitoring network security system • - What happens when the firewall is broken • - a mechanism for creating a secure connection • - A security incident where confidential information is stolen • - someone who tries to access data they aren't authorized to view • ...
Cybersecurity Crossword 2024-04-13
Across
- What feature can you activate to secure your Habbo account from hacking attempts?
- What security measure adds an extra layer of protection to online accounts beyond just a username and password?
- What term refers to groups of individuals in Habbo who aim to maximize profit by any means necessary, including illegal activities?
- What should you do if you receive messages containing offers that seem too good to be true on Habbo DMs?
- What precautionary measure should you take to protect your personal information when using public networks?
- What is the first step you should take before giving personal information to a stranger online?
Down
- What symbol is often found on the badges and mottos of mafia members?
- What is the type of app you can use to scan the QR code for setting up 2FA on Habbo?
- What action should you take if someone threatens you or attempts to scam you on Habbo?
- What type of software can protect your devices from malware, trojans, and ransomware?
10 Clues: What symbol is often found on the badges and mottos of mafia members? • What feature can you activate to secure your Habbo account from hacking attempts? • What is the type of app you can use to scan the QR code for setting up 2FA on Habbo? • What type of software can protect your devices from malware, trojans, and ransomware? • ...
cybersecurity 5 2024-05-07
Across
- turning a code into the information it was originally
- a program that threats to destroy data if they don't give money
- a program that decides whether to allow or block specific traffic
- to avoid
- a software that automates the process of scanning systems
- managing and protecting information assets
Down
- use of copying IT resources by employees
- type of substitution cipher in which each letter in plaintext is replaced
- practice of secure communication or information from the public
- converting information into a code
10 Clues: to avoid • converting information into a code • use of copying IT resources by employees • managing and protecting information assets • turning a code into the information it was originally • a software that automates the process of scanning systems • a program that threats to destroy data if they don't give money • ...
Cybersecurity Awareness 2024-10-17
Across
- A security system that monitors and controls incoming and outgoing network traffic
- A security model that requires strict identity verification for every person and device trying to access resources on a network
- Software that secretly gathers information about a user's activities
- The process of encoding information to protect it from unauthorized access
- Malicious software that misleads users of its true intent by disguising itself as legitimate software
Down
- Manipulating people into divulging confidential information
- Phishing attacks conducted via SMS messages
- A malware designed to deny a user or organization access to files on their computer
- A type of online scam that tricks people into sharing sensitive information, such as login credentials and credit card numbers
- Small files stored on a user’s system to recognize the user and track preferences
10 Clues: Phishing attacks conducted via SMS messages • Manipulating people into divulging confidential information • Software that secretly gathers information about a user's activities • The process of encoding information to protect it from unauthorized access • Small files stored on a user’s system to recognize the user and track preferences • ...
Cybersecurity Awareness - 2024-10-08
Across
- [?] is a situation where a victim is tempted into clicking a malicious link
- Virus, Trojans and Worms are forms of [?]
- [?] are attackers whose motivation are political or social causes
- [?] is the term we used to to state that a transaction performed cannot be denied
- The minimum length of password we aim for is [?} numeric representation
Down
- [?} is a common social engineering tactic involving fake emails
- Fingerprint and/or facial recognition are form of authentication known as [?] scans
- The term [?] is commonly used in cybersecurity as a representation of weakness
- Account [?} is when an employee's email is hacked and used to make payments to fraudster's accounts.
- The microsoft brand for mobile device management is known as [?]
10 Clues: Virus, Trojans and Worms are forms of [?] • [?} is a common social engineering tactic involving fake emails • The microsoft brand for mobile device management is known as [?] • [?] are attackers whose motivation are political or social causes • The minimum length of password we aim for is [?} numeric representation • ...
SULAM cybersecurity 2023-06-15
Across
- Perlindungan maklumat peribadi atau data daripada capaian yang tidak dibenarkan.
- Upaya untuk menembusi sistem komputer dengan niat jahat.
- Ilmu dan teknik menyulitkan maklumat supaya hanya dapat dibaca oleh pihak yang dibenarkan.
- Proses memulihkan data atau sistem selepas berlaku kejadian yang tidak diingini.
Down
- Program jahat yang cuba merosakkan atau mengganggu komputer dan peranti elektronik.
- Sekumpulan peranti yang berhubung dan berkongsi maklumat antara satu sama lain.
- Potensi bahaya atau kejadian yang boleh menjejaskan keselamatan sistem atau maklumat digital.
- Kemungkinan berlakunya ancaman atau kejadian yang boleh menyebabkan kerugian atau gangguan.
- Keadaan maklumat atau data yang tidak diubah atau diubah suai tanpa kebenaran.
- Program yang digunakan untuk mengesan, menghalang, dan membuang program jahat dari sistem komputer.
10 Clues: Upaya untuk menembusi sistem komputer dengan niat jahat. • Keadaan maklumat atau data yang tidak diubah atau diubah suai tanpa kebenaran. • Sekumpulan peranti yang berhubung dan berkongsi maklumat antara satu sama lain. • Perlindungan maklumat peribadi atau data daripada capaian yang tidak dibenarkan. • ...
Cybersecurity - General 2022-05-26
Across
- Large scale attacks using remotely controlled malware-infected devices
- Systems, functions & data being provided on-demand, based on levels of service and defined parameters
- Number of stages of Penetration Testing
- Flooding a network / computer by overloading the system with huge number of requests and making it incapable of responses
- Only authorized parties permitted to access sensitive information / functions
Down
- Process of psychologically manipulating people to divulge personal or critical information
- A method of interrupting data traffic between nodes and stealing the required information
- Hostile spyware, ransomware & viruses that breach through vulnerabilities like clicking on suspicious links / installing risky applications
- Ensuring only authorized users can enter, modify or delete information / functions
- An attack that takes advantage of opportunity between a vulnerability announcement and corresponding security patch solution
10 Clues: Number of stages of Penetration Testing • Large scale attacks using remotely controlled malware-infected devices • Only authorized parties permitted to access sensitive information / functions • Ensuring only authorized users can enter, modify or delete information / functions • ...
Crosswords Cybersecurity 2025-11-03
Across
- is a set of modifications made to a computer program or its supporting data in order to update, correct, or improve it.
- establishes a digital connection between your computer and a remote server belonging to a provider
- malicious computer program used to give hackers unauthorized remote access to an infected computer by exploiting system vulnerabilities.
- is one of the disciplines concerned with protecting messages (ensuring confidentiality, authenticity and integrity) often using secrets or keys.
- It involves copying the magnetic stripes of a bank card using a memory reader
Down
- a person who seeks ways to bypass software and hardware protections.
- Malicious software that blocks access to the computer or files by encrypting them and demands a ransom payment from the victim to regain access.
- Key a string of characters used within an encryption algorithm for altering data so that it appears random
- a form of malware or hardware that tracks and records your keystrokes as you type
- fraudulent technique that allows fraudsters to display a phone number that is not their own.
10 Clues: a person who seeks ways to bypass software and hardware protections. • It involves copying the magnetic stripes of a bank card using a memory reader • a form of malware or hardware that tracks and records your keystrokes as you type • fraudulent technique that allows fraudsters to display a phone number that is not their own. • ...
3 2026-02-15
Across
- — Step-by-step problem-solving process
- — Imaging using sound waves
- — Study of an organism’s DNA
- — Capable of regrowing tissue
- — Finding previously unknown knowledge
- — Artificial body part
Down
- — Artificial rather than natural
- — Measurable indicator of disease
- — Therapy to restore function
- — Protection of digital systems
10 Clues: — Artificial body part • — Imaging using sound waves • — Study of an organism’s DNA • — Therapy to restore function • — Capable of regrowing tissue • — Protection of digital systems • — Artificial rather than natural • — Measurable indicator of disease • — Step-by-step problem-solving process • — Finding previously unknown knowledge
Cybersecurity Crossword 2024-06-25
Across
- Faking an email, phone number or website.
- Attack that looks at/steals your data.
- Software used to protect your device.
- A string of random words used as a password.
Down
- We are not allowed to plug this into departmental devices.
- A program or programming code that self-replicates
- Attack that locks your data and demands money.
- Unsolicited emails that try to sell you products.
- Process used to help identify phishing.
- Malicious software.
10 Clues: Malicious software. • Software used to protect your device. • Attack that looks at/steals your data. • Process used to help identify phishing. • Faking an email, phone number or website. • A string of random words used as a password. • Attack that locks your data and demands money. • Unsolicited emails that try to sell you products. • ...
cybersecurity 2 2024-05-07
Across
- reacting to an incident
- assurance that information is not disclosed
- finding the problem
- the data or information is being maintained
- limiting access from everyone
Down
- making sure the information doesn't breach
- obtaining what was lost
- guarantees that systems are available
- information about something that one possess
- looking for the problem
10 Clues: finding the problem • obtaining what was lost • reacting to an incident • looking for the problem • limiting access from everyone • guarantees that systems are available • making sure the information doesn't breach • assurance that information is not disclosed • the data or information is being maintained • information about something that one possess
cybersecurity 4 2024-05-07
Across
- where all of the data is kept
- (1 trillion bytes)
- a passive way to direct someone to a malicious website
- (1000 bytes)
- (1 million bytes)
- threat actor that registers a domain name
Down
- a campaign desighned to steal account credentials.
- ( 1 billion bytes)
- remote access trojan
- an infected malware that's desighned to replicate and spread from device to device
10 Clues: (1000 bytes) • (1 million bytes) • (1 trillion bytes) • ( 1 billion bytes) • remote access trojan • where all of the data is kept • threat actor that registers a domain name • a campaign desighned to steal account credentials. • a passive way to direct someone to a malicious website • an infected malware that's desighned to replicate and spread from device to device
Cybersecurity Awareness 2021-09-28
Across
- An attempt to get an individual to reveal personal or sensitive information using email and disguising as a legitimate source.
- A network security system that is used for monitoring incoming and outgoing network traffic in reference to preset network security rules. This system is used to block unauthorized access to maintain network safety and security.
- The process of converting information or data into a code to further prevent unauthorized access.
- Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
- A vulnerability, or a system flaw, that is taken advantage of for malicious goals.
Down
- Unauthorized access to computer data, applications, networks, or devices.
- _____Engineering is used to manipulate end-users and exploiting human errors as a way to gain access to private information, access, or anything that the attacker deems valuable.
- Malicious software that is used to enter a computer of a device to get her data and information to then forward it to a third-party without the consent of the user.
- Malicious Software that blocks access to systems or threatens to release data until a predetermined debt is paid.
- Malicious code, or a computer program, that is designed to change the way a computer operates and can spread from one computer to another by copying itself. It then attaches to other programs or documents to execute the malicious code which can result in corruption or damage to data.
10 Clues: Unauthorized access to computer data, applications, networks, or devices. • A vulnerability, or a system flaw, that is taken advantage of for malicious goals. • Software that is designed to disrupt, damage, or gain unauthorized access to a computer system. • The process of converting information or data into a code to further prevent unauthorized access. • ...
Cybersecurity Brainteaser 2025-01-02
Across
- A service that encrypts your internet traffic and protects your online identity
- A secret word or phrase used to gain entry or authenticate identity
- The ability or permission to enter, view, or use a system or resource
- An additional security process requiring more than one form of verification
- What you should do when you receive a suspicious email
Down
- A network security system that monitors and controls incoming and outgoing traffic
- Information meant to be kept private and not shared without permission
- The most common cyber attack
- What you should do with your computer when you step away
- Software designed to disrupt, damage, or gain unauthorised access to a computer system
10 Clues: The most common cyber attack • What you should do when you receive a suspicious email • What you should do with your computer when you step away • A secret word or phrase used to gain entry or authenticate identity • The ability or permission to enter, view, or use a system or resource • Information meant to be kept private and not shared without permission • ...
Cybersecurity Terms 2023-10-08
Across
- Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
- Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
- Verifying the identity of users or systems to ensure secure access.
- Safeguarding personal information to ensure confidentiality and compliance with regulations.
Down
- Pertaining to the security challenges and measures for smartphones and tablets.
- A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
- Malware that encrypts files, demanding payment for their release.
- An update to fix vulnerabilities or improve security in software or systems.
- Converting data into a code to prevent unauthorized access, especially during transmission.
- A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.
10 Clues: Malware that encrypts files, demanding payment for their release. • Verifying the identity of users or systems to ensure secure access. • An update to fix vulnerabilities or improve security in software or systems. • Pertaining to the security challenges and measures for smartphones and tablets. • ...
Ylan cybersecurity 2024-11-21
Across
- Open-source operating system based on a kernel created by Linus Torvalds.
- A company that makes equipment and software to help connect and protect computer network
- A protocol that ensures reliable and ordered data transmission over a network.
- Raising awareness is the act of drawing attention to a previously overlooked topic
- A secret part of the internet, often used for anonymous activities.
Down
- A protocol for connecting to a remote computer without encryption
- A type of cyberattack where attackers impersonate legitimate organizations to steal sensitive information, like passwords or credit card details.
- A test used to verify if a user is human and not a robot.
- Identity theft to mask malicious communication.
- Software that secretly gathers information about a user without their consent.
10 Clues: Identity theft to mask malicious communication. • A test used to verify if a user is human and not a robot. • A protocol for connecting to a remote computer without encryption • A secret part of the internet, often used for anonymous activities. • Open-source operating system based on a kernel created by Linus Torvalds. • ...
Cybersecurity M.A 2024-10-17
Across
- A method used for guessing password using a high volume of combinaisons
- A way for cybercriminals to trick someone for redirecting them in a not authorized jacket
- A system designed to prevent unauthorized access to or from a computer network
- A way for cybercriminals to hide stolen data or malicious code in images, audio files and others malicious code in images, audio files and other media
Down
- A weakness in a computer system or network that can possibly be exploited by attackers to compromise the security.
- A malfunction or weakness in the software
- Completly Automated Public Turing Test To Tell Computers and Humans Apart
- An exploitation system for computer
- A type of attack where the pirate takes the victim’s files has an hostages and ask for money to give them back
- A way to verify someone identity
10 Clues: A way to verify someone identity • An exploitation system for computer • A malfunction or weakness in the software • A method used for guessing password using a high volume of combinaisons • Completly Automated Public Turing Test To Tell Computers and Humans Apart • A system designed to prevent unauthorized access to or from a computer network • ...
Cybersecurity Class 2024-03-26
Across
- Used to keep intruders out
- Malware that spreads
- Malware used by hackers to spy
- Tricking users to reveal information
- Bad software that damages systems
- Two or more computers connected
Down
- Protect your information from hackers
- Identifying a user’s identity
- Malware that hijacks your system
- Shields users against viruses
10 Clues: Malware that spreads • Used to keep intruders out • Identifying a user’s identity • Shields users against viruses • Malware used by hackers to spy • Two or more computers connected • Malware that hijacks your system • Bad software that damages systems • Tricking users to reveal information • Protect your information from hackers
Cybersecurity Terminology 2025-06-25
Across
- Prefix meaning harmful or bad
- The act of keeping something safe from harm
- Software used to stop or remove viruses
- Prefix related to computers, networks, or the internet
- A hacker who helps protect systems legally
- Fraudulent email tricking people into giving personal information
Down
- Malicious software that locks access until a ransom is paid.
- A weakness that can be exploited in a system.
- Software that secretly collects user data
- The process of encoding data to protect it
10 Clues: Prefix meaning harmful or bad • Software used to stop or remove viruses • Software that secretly collects user data • The process of encoding data to protect it • A hacker who helps protect systems legally • The act of keeping something safe from harm • A weakness that can be exploited in a system. • Prefix related to computers, networks, or the internet • ...
Cybersecurity Awareness 2025-10-14
Across
- Always ____ your devices and software when the newest version is available
- Always use strong, unique, and complex _____for each of your accounts.
- Using a secured ___ is important when working onsite or remotely.
- A piece of data about your online history that creates a trail of crumbs. Not chocolate chip, though.
Down
- Bad software installed on a computer to damage or harm it. Examples are viruses, Ransomware, Spyware, etc.
- DUO is an example of ____, where a prompt is sent to your phone to verify your identity before logging into the account.
- When a hacker impersonates a trustworthy person or organization to lure you into clicking on a suspicious link or download a file. This can be in the form of emails, text messages, and phone calls.
- A ___ breach is when sensitive and confidential information is accessed, viewed, or stolen by unauthorized individuals or groups.
- A method of receiving and sending messages over a network, such as the Internet
- If you notice anything suspicious, you should ___ it to IT.Security@uchicagomedicine.org or call 773-702-3456.
10 Clues: Using a secured ___ is important when working onsite or remotely. • Always use strong, unique, and complex _____for each of your accounts. • Always ____ your devices and software when the newest version is available • A method of receiving and sending messages over a network, such as the Internet • ...
GenCyber Cybersecurity Concepts 2022-06-08
nlg 2023-10-17
Cybersecurity Applications 2023-12-12
Across
- An attacker might attempt to trick someone through manipulation or deception.
- to prevent vulnerabilities and injection attacks.
- determines what actions they are allowed to perform
- The process of verifying the identity of a user or device
Down
- Systems can detect and respond to potential security threats
- An attacker might flood the RFID reader with requests, preventing legitimate users from gaining access.
- to regulate who can access what resources
- to keep software and firmware updated to protect against known vulnerabilities
- It is important to secure data
- You must secure the actual, tangible devices.
10 Clues: It is important to secure data • to regulate who can access what resources • You must secure the actual, tangible devices. • to prevent vulnerabilities and injection attacks. • determines what actions they are allowed to perform • The process of verifying the identity of a user or device • Systems can detect and respond to potential security threats • ...
Crossword cybersecurity 2024-04-17
10 Clues: resolv a fault • person hack you • protect to virus • program infect you • program hide your IP • most pc attack server • attack on link of fish • fault what developer don't know • attack try multiple combination • virus look all you make on your pc
OT cybersecurity 2024-07-16
Across
- A system that monitors and controls industrial processes
- An unauthorized act of bypassing security mechanisms
- A secret word or phrase used to authenticate access
- A security flaw that can be exploited
- Protection of sensitive information from unauthorized access
Down
- A unique identifier for a network device
- The practice of securing computer systems and networks
- An act of gaining unauthorized access to systems and networks
- A device used to control the flow of electricity in OT systems
- A network security system that monitors and controls incoming and outgoing network traffic
10 Clues: A security flaw that can be exploited • A unique identifier for a network device • A secret word or phrase used to authenticate access • An unauthorized act of bypassing security mechanisms • The practice of securing computer systems and networks • A system that monitors and controls industrial processes • Protection of sensitive information from unauthorized access • ...
CyberSecurity Puzzle 2024-06-06
Across
- __________ IS SOMETHING YOU KEEP SECRET AND DO NOT SHARE WITH OTHERS.
- SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION.
- OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL.
- EMAIL IS THE MOST USED MEDIUM TO __________________ IN ORGANSATIONS.
Down
- CYBER ATTACK CAN CAUSE HUGE ____________
- IT IS NECESSARY TO CONFIRM IDENTITY BEFORE ALLOWING __________ IN OUR ORGANISATION.
- IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION.
- HACKER WILL DEMAND ____________ MONEY WHEN THEY TAKE COTROL OF YOUR COMPUTER.
- MAKE SURE THAT YOU HAVE ____________ SOFTWARE IN YOUR COMPUTER TO BE SAFE ONLINE.
- ___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS.
10 Clues: CYBER ATTACK CAN CAUSE HUGE ____________ • SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION. • OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL. • IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION. • ___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS. • ...
Cybersecurity Crossword 2023-05-24
Across
- Practice of protecting information by converting it into a secret code
- Act of bombarding someone with a large number of negative comments
- Act of deliberately using digital communication to harass or intimidate someone
- Software designed to protect against malicious software
Down
- Term for sexually explicit material available on the internet
- Act of sending deceptive emails to trick individuals
- Act of creating fake online profiles to deceive and harass others
- Process of gaining unauthorized access to computer systems
- A secret word or phrase that must be used to gain admission
- Every aspect of protecting an organization and its employees and assets against cyber threats
10 Clues: Act of sending deceptive emails to trick individuals • Software designed to protect against malicious software • Process of gaining unauthorized access to computer systems • A secret word or phrase that must be used to gain admission • Term for sexually explicit material available on the internet • Act of creating fake online profiles to deceive and harass others • ...
Cybersecurity 101 2025-07-23
Across
- A fraudulent attempts to obtain sensitive information through deceptive emails.
- Phishing through text messages.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- A malicious software designed to gain unauthorized access to a computer or network.
Down
- A type of phishing attack that targets a business’ top executives “the big fish”.
- A cyberattack tactic where a malicious actor disguises their identity.
- The process of converting information or data into a code, especially to prevent unauthorized access
- Where attackers use phone calls to trick individuals.
- A series of multiple words, often longer than a typical password.
- An extra layer of security to accounts by requiring more than one form of verification.
10 Clues: Phishing through text messages. • Where attackers use phone calls to trick individuals. • A series of multiple words, often longer than a typical password. • A cyberattack tactic where a malicious actor disguises their identity. • A fraudulent attempts to obtain sensitive information through deceptive emails. • ...
Cybersecurity Essentials 2024-11-06
Across
- monitors your online activity and can log every key you press
- a computer program that replicates and attaches to files
- holds data until it makes a payment
- a program that scans a computer for malicious software and deletes it
- replicates itself to spread from one computer to another
- a decoy to sneak malicious software past unsuspecting users
Down
- hackers who are self-employed or working for large crime organization
- hardware or software that prevents hackers from accessing your personal data
- converting information into a form where an unauthorized people cannot read it
- any code that can steal data or cause harm to a system
10 Clues: holds data until it makes a payment • any code that can steal data or cause harm to a system • a computer program that replicates and attaches to files • replicates itself to spread from one computer to another • a decoy to sneak malicious software past unsuspecting users • monitors your online activity and can log every key you press • ...
Cybersecurity Awareness 2025-09-30
Across
- Synthetic media generated by AI
- They wear different hat colors (black hat, white hat, blue hat, etc. hat, etc.)
- Your online data trail
- Artificial Intelligence
- Fraudulent communication attack
- Used to prevent, identify and remove malicious software
- Software app programmed to do certain tasks
Down
- Converting information into a code to prevent unauthorized access.
- Use of two authentication methods to log in.
- Identity verification process
10 Clues: Your online data trail • Artificial Intelligence • Identity verification process • Synthetic media generated by AI • Fraudulent communication attack • Software app programmed to do certain tasks • Use of two authentication methods to log in. • Used to prevent, identify and remove malicious software • Converting information into a code to prevent unauthorized access. • ...
Pentagon leaks 2023-04-19
Across
- A form of rupture, usually used in context of a laboratory or prison
- running out of..
- five sided shape
- a man who guards
- currently in war
- which concerns the nation
Down
- you’re being explained something
- Technology safety
- the opposite of attack
- what happens when a pipe is damaged
- unidentified floating...
- currently in war
12 Clues: running out of.. • five sided shape • a man who guards • currently in war • currently in war • Technology safety • the opposite of attack • unidentified floating... • which concerns the nation • you’re being explained something • what happens when a pipe is damaged • A form of rupture, usually used in context of a laboratory or prison
Emerging Web Technologies 2022-07-02
Emerging Web Technologies 2022-07-02
Career Night Companies 2025-10-09
Across
- geotechnical construction
- designs, engineers, and manufactures custom, heavy-haul trailers
- bridge design and inspection
- live theater productions of Bible stories
- information technology and cybersecurity
- materials testing and inspection
- construction services
Down
- bread and roll manufacturer
- site planning and landscape design
- stormwater management
- roadway and bridge design
- attaching communications equipment to utility poles
- bridge design and inspection
- connecting, distributing, and controlling power and data
- designs mechanical, electrical, and plumbing (MEP) systems
15 Clues: stormwater management • construction services • geotechnical construction • roadway and bridge design • bread and roll manufacturer • bridge design and inspection • bridge design and inspection • materials testing and inspection • site planning and landscape design • information technology and cybersecurity • live theater productions of Bible stories • ...
ACES 2022-12-19
Across
- ACES IS A MEMBER OF THE ______ COLLEGE
- ACES FOUNDING PARTNER
- WHAT ACES STUDENTS STUDY
- STUDENT UNION
- GROUP THAT PLANS SOCIAL EVENTS FOR ACES
- COMPUTER SCIENCE BUILDING
Down
- THE DAY THE WEEKLY EMAIL COMES OUT
- ACES IS MADE UP OF AN LLP AND A _____
- LAST NAME OF ACES DIRECTOR
- CODING USED IN ACES COURSES
- COURSE CODE FOR ACES COURSES REGISTRATION
- HOME TO ACES LLP
- TYPE OF PROJECT COMPLETED IN HACS200 or 202
- HOME TO ACES NORTH
- UNIVERSITY OF MARYLAND MASCOT
15 Clues: STUDENT UNION • HOME TO ACES LLP • HOME TO ACES NORTH • ACES FOUNDING PARTNER • WHAT ACES STUDENTS STUDY • COMPUTER SCIENCE BUILDING • LAST NAME OF ACES DIRECTOR • CODING USED IN ACES COURSES • UNIVERSITY OF MARYLAND MASCOT • THE DAY THE WEEKLY EMAIL COMES OUT • ACES IS MADE UP OF AN LLP AND A _____ • ACES IS A MEMBER OF THE ______ COLLEGE • GROUP THAT PLANS SOCIAL EVENTS FOR ACES • ...
Intro to Cybersecurity Vocabulary 2025-10-14
Across
- set of security controls designed to protect payment account security such as credit or debit card transactions
- protection of digital devices and their connected networks from danger and threats as well as protecting personal information on a system by detecting, preventing and responding to attacks
- crime committed over the internet
- short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer
- set of policies and procedures meant to improve and guide an organization’s cybersecurity practices
- occur when hackers or malicious software gains unauthorized access to a system, examples include: hacker cracking passwords, breaking into a server or changing a user’s privileges on their system
Down
- set of best practice recommendations for information security management
- unique skills for a specific area
- attempt to steal, damage or destroy information on a device or computer system
- individual who participates in hacking
- abilities needed to communicate and work with others
- prevents a user from accessing a system
- act of skirting or breaking through security boundaries
13 Clues: unique skills for a specific area • crime committed over the internet • individual who participates in hacking • prevents a user from accessing a system • abilities needed to communicate and work with others • act of skirting or breaking through security boundaries • set of best practice recommendations for information security management • ...
Boredom buster 2023-06-28
Across
- Delicious Korean dish
- Creepy kids playground equipment at Minnippi parkland
- Dan's dream celebrity date
- Dan's alter ego
- 'Rejoice' in latin
- Place where the best conversations are had
- Dan's favourite mayonnaise
Down
- Hand-built spacecraft
- Name for a pressure cooker
- Bec's forbidden name
- I'm an ...
- 14th song on playlist
- Nerdy basketball team with cute point scorer
- Never would Dan ever ...
- I see you've played __ before
- Beloved kungfu fantasy series
- Term for a handsome cybersecurity person
- Powerful choral piece during epic space fight scene
- Best-looking hobbits in the Shire
- Name for a white Kona
- Brooklyn
- Dan's favourite book genre
22 Clues: Brooklyn • I'm an ... • Dan's alter ego • 'Rejoice' in latin • Bec's forbidden name • Hand-built spacecraft • Delicious Korean dish • 14th song on playlist • Name for a white Kona • Never would Dan ever ... • Name for a pressure cooker • Dan's dream celebrity date • Dan's favourite book genre • Dan's favourite mayonnaise • I see you've played __ before • Beloved kungfu fantasy series • ...
填字游戏词汇库-科技类-G1-数字基础 2025-03-26
Across
- Software application (~ store)
- Using binary code (~ currency)
- Organized information (~ query)
- Digital protection (~ threat)
- Input device (mechanical ~)
- Mobile communication tool (smart ~)
- Atomic-scale science (前缀: nano-)
- Initial model (~ testing)
- Global network (~ access)
- Moving visuals (~ streaming)
- Artificial intelligence (~ chatbot)
- Machine-driven process (~ industry)
Down
- Image capturer (digital ~)
- Produce (~ electricity)
- Simulated reality (~ reality)
- Living systems tech (前缀: bio-)
- Electronic processing device (~ programmer)
- Step-by-step procedure (搜索 ~)
- Digital information (~ analysis)
- Technical designer (software ~)
- Pointing device (wireless ~)
- Connected system (~ security)
- Novel invention (形容词: innovative)
- Visual display (~ touch)
- Automated machine (~ assistant)
25 Clues: Produce (~ electricity) • Visual display (~ touch) • Initial model (~ testing) • Global network (~ access) • Image capturer (digital ~) • Input device (mechanical ~) • Pointing device (wireless ~) • Moving visuals (~ streaming) • Simulated reality (~ reality) • Step-by-step procedure (搜索 ~) • Digital protection (~ threat) • Connected system (~ security) • ...
TEMA 2 2025-10-24
Across
- Aktivitas jual-beli tanpa uang tunai
- Platform untuk membangun toko online
- Platform jual-beli online
- Platform untuk belajar atau kursus online
- Pembayaran digital via ponsel
- Sistem manajemen konten website
- Promosi produk melalui media sosial
- Teknologi untuk transaksi cepat dan aman
- Teknologi komunikasi internet cepat
- Model bisnis online berbasis internet
Down
- Sistem keamanan data digital
- Alat pembayaran otomatis di toko online
- Penyimpanan data online
- , Layanan streaming konten digital
- Layanan transportasi berbasis aplikasi
- ,Perangkat lunak untuk mengelola bisnis online
- , Analisis data untuk strategi bisnis digital
- Uang digital yang digunakan secara global
- Layanan pengiriman barang berbasis digital
- Teknologi untuk mengenali wajah atau suara
20 Clues: Penyimpanan data online • Platform jual-beli online • Sistem keamanan data digital • Pembayaran digital via ponsel • Sistem manajemen konten website • , Layanan streaming konten digital • Promosi produk melalui media sosial • Teknologi komunikasi internet cepat • Aktivitas jual-beli tanpa uang tunai • Platform untuk membangun toko online • Model bisnis online berbasis internet • ...
Technology Buzzwords 2023-09-05
Across
- - Leading internet search engine.
- - Online buying and selling.
- - High-tech mobile device.
- - Digital audio or video series.
- - Rapidly spreading on the internet.
- - Wireless internet connection.
Down
- - Online journal or web log.
- - Protection against online threats.
- - Online seminar or workshop.
- - Digital symbols conveying emotions.
10 Clues: - High-tech mobile device. • - Online journal or web log. • - Online buying and selling. • - Online seminar or workshop. • - Wireless internet connection. • - Digital audio or video series. • - Leading internet search engine. • - Protection against online threats. • - Rapidly spreading on the internet. • - Digital symbols conveying emotions.
Saint Mary 2022-07-07
Across
- Saint Mary Mascot
- We own a copy of this Amendment
- These are underground so we stay warm and dry
- One of four Saint Mary Values
- Colors are Navy and ____
Down
- Newest Major
- Residence Hall
- Saint ______ Dining Hall where we eat lunch
- ______ Memorial Stadium
- We eat at Oak Kiln
- _______ of Charity
- President whose lock of hair is in the KLC
12 Clues: Newest Major • Residence Hall • Saint Mary Mascot • We eat at Oak Kiln • _______ of Charity • ______ Memorial Stadium • Colors are Navy and ____ • One of four Saint Mary Values • We own a copy of this Amendment • President whose lock of hair is in the KLC • Saint ______ Dining Hall where we eat lunch • These are underground so we stay warm and dry
CBL Puzzle 2023-09-01
Across
- Rhymes with fishing
- Something you are (Inherence factor)
- Roofies mixed in software
- Divide and conquer. Tool to reduce scope
- Your cybersecurity partner
- Malicious code on a horse
Down
- Vaccine for your systems
- 12 characters long in PCI DSS v4.0
- Burning walls in cold rooms
- Party host
- Secure data with a pinch of salt
- Data secured. Locked with a key
12 Clues: Party host • Rhymes with fishing • Vaccine for your systems • Roofies mixed in software • Malicious code on a horse • Your cybersecurity partner • Burning walls in cold rooms • Data secured. Locked with a key • Secure data with a pinch of salt • 12 characters long in PCI DSS v4.0 • Something you are (Inherence factor) • Divide and conquer. Tool to reduce scope
Cybersecurity Awareness 2021-09-29
Across
- An attempt to get an individual to reveal personal or sensitive information using email and disguising as a legitimate source.
- A network security system that is used for monitoring incoming and outgoing network traffic in reference to preset network security rules. This system is used to block unauthorized access to maintain network safety and security.
- The process of converting information or data into a code to further prevent unauthorized access.
- Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
- A vulnerability, or a system flaw, that is taken advantage of for malicious goals.
Down
- Unauthorized access to computer data, applications, networks, or devices.
- _____Engineering is used to manipulate end-users and exploiting human errors as a way to gain access to private information, access, or anything that the attacker deems valuable.
- Malicious software that is used to enter a computer of a device to get her data and information to then forward it to a third-party without the consent of the user.
- Malicious Software that blocks access to systems or threatens to release data until a predetermined debt is paid.
- Malicious code, or a computer program, that is designed to change the way a computer operates and can spread from one computer to another by copying itself. It then attaches to other programs or documents to execute the malicious code which can result in corruption or damage to data.
10 Clues: Unauthorized access to computer data, applications, networks, or devices. • A vulnerability, or a system flaw, that is taken advantage of for malicious goals. • Software that is designed to disrupt, damage, or gain unauthorized access to a computer system. • The process of converting information or data into a code to further prevent unauthorized access. • ...
Cybersecurity Crossword 2021-02-12
Across
- Something to protect your personal data.
- It locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- A malicious form of self-replicating software.
- It appears to be a useful or fun application but unbeknown to the user it also performs malicious actions.
Down
- It is any information relating to an identifiable person.
- a person who uses computers to gain unauthorized access to data.
- It is unwanted software that monitors and gathers information on a person and how they use their computer.
- It is an attack in which the victim receives an email disguised to look as if it has come from a reputable source
- They are able to exploit vulnerabilities in the a computer’s operating system or a networks hardware.
- It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
10 Clues: Something to protect your personal data. • A malicious form of self-replicating software. • It is any information relating to an identifiable person. • a person who uses computers to gain unauthorized access to data. • They are able to exploit vulnerabilities in the a computer’s operating system or a networks hardware. • ...
Cybersecurity Introduction 2023-06-18
Across
- Protects your online accounts and prevents unauthorized access
- A program that self-replicates and spreads to other computers
- The practice of tricking individuals into revealing sensitive information
- A type of software designed to block or remove computer viruses
- A software vulnerability that allows unauthorized access to a system
- Malicious software that encrypts files and demands a ransom
Down
- The unauthorized copying or distribution of copyrighted material
- The act of intentionally damaging or disrupting computer systems
- A set of characters used to gain access to a computer system
- A method used to verify the identity of a user
10 Clues: A method used to verify the identity of a user • Malicious software that encrypts files and demands a ransom • A set of characters used to gain access to a computer system • A program that self-replicates and spreads to other computers • Protects your online accounts and prevents unauthorized access • ...
CyberSecurity Crossword 2023-09-02
Across
- Pengiriman pesan maupun objek secara masif dan berulang yang tidak dikehendaki penerimanya. (bahasa inggris)
- Program komputer yang dapat menggandakan diri dan menyebar serta merusak sistem penggunanya
- Salah satu tipe malware yang menyandera data hingga suatu jumlah tebusan dibayarkan (bahasa inggris)
- Sedang marak mengalami kebocoran. Didapatkan dengan ilegal dan diperjualbelikan di dark web.
Down
- Facebook, X, Instagram, dll. (dua kata, bahasa indonesia)
- Serangkaian kata yang digunakan untuk autentikasi pengguna pada suatu sistem (bahasa inggris)
- Alat yang digunakan untuk mentransmisikan data secara aman terhadap jaringan publik sehingga lebih privat, dapat digunakan untuk bekerja remote (singkatan)
- Layanan komputasi termasuk penyimpanan data, perangkat lunak, perangkat keras dan lain-lain, melalui internet. Biasa disebut komputasi awan. (bahasa inggris)
- Istilah untuk jebolnya sistem keamanan data maupun informasi pada suatu entitas (bahasa inggris)
- Salah satu bentuk malware yang bersifat menyamar sebagai suatu program yang valid. Biasa diasosiasikan dengan jenis kuda. (bahasa inggris)
10 Clues: Facebook, X, Instagram, dll. (dua kata, bahasa indonesia) • Program komputer yang dapat menggandakan diri dan menyebar serta merusak sistem penggunanya • Sedang marak mengalami kebocoran. Didapatkan dengan ilegal dan diperjualbelikan di dark web. • Serangkaian kata yang digunakan untuk autentikasi pengguna pada suatu sistem (bahasa inggris) • ...
