cybersecurity Crossword Puzzles
Cybersecurity Awareness Crossword 2025-04-01
Across
- Good digital habits to protect your devices and accounts
- Regularly doing this keeps your software secure
- Don’t enter your password if this page looks suspicious
- When an attacker breaks into a system and steals data
- When an attacker makes something look real but it’s fake
- A message that warns you about a possible threat
- A common cyberattack that tries to trick you into clicking or giving info
Down
- People-based method hackers use to trick victims
- Type of hacking that manipulates people instead of software
- What your accounts and devices should always be
- A fake version of this might trick you into approving a login you didn’t make
- First line of defense — make it strong, never reuse it
- What you should do if you spot a suspicious email or message
- A fix released to close security vulnerabilities
- Adds a second layer of login security using a code or app
- A deceptive trick to steal money, data, or logins
16 Clues: What your accounts and devices should always be • Regularly doing this keeps your software secure • People-based method hackers use to trick victims • A fix released to close security vulnerabilities • A message that warns you about a possible threat • A deceptive trick to steal money, data, or logins • When an attacker breaks into a system and steals data • ...
CYBERSECURITY CROSSWORD CHALLENGE 2024-10-20
Across
- If you receive suspicious ____ then hover over it with your mouse before clicking to make sure it is real.
- Encryption technique used to protect data
- A big surprise problem in your computer. Sometimes it is small like an ant or big like a cricket"
- Any circumstance or event with the potential to adversely impact agency operations, assets, or individuals.
- A sequence of words or text used to control access to a computer; similar to a password.
- System(software or hardware) used to manage network security and monitor traffic
- Malicious program that can replicate itself
- An attack using computer program to guess the correct user credentials
- This testing simulates a full stack attack, probing every possible weakness
Down
- Unauthorized disclosure of this category of classified information could be expected to cause damage to organisation security
- Protocol used for encryption which protects data in transit
- Spoofing is when bad actors create a fake ______ and send phish emails to imitate a business
- The act of tricking someone into giving up sensitive information
- Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- A flaw or weakness in a computer system that could be exploited to violate the system’s security.
- A piece of data stored on your device by websites you visit. Not chocolate chip, though
16 Clues: Encryption technique used to protect data • Malicious program that can replicate itself • Protocol used for encryption which protects data in transit • The act of tricking someone into giving up sensitive information • An attack using computer program to guess the correct user credentials • ...
GenCyber Cybersecurity Concepts 2022-06-08
GenCyber Cybersecurity Concepts 2022-06-08
IEM's October Social Media Crossword Puzzle 2021-10-21
Across
- Wash your hands with _____ and water
- October is ________ Awareness Month
- IEMer moderating Techniques for Successful Grant Applications session at IAEM (last name)
- Important tool to protect your family during a fire emergency
- Theme of hurricane preparedness tip
- IEMer moderating FEAM Forum Panel at IAEM (last name)
- Sites opening across Virginia
- International Day for Disaster ______
Down
- Great Shake Out Drill
- Cyber attack
- FEMA Administrator (last name)
- 246th Birthday
- Committed to stabilizing ______ security
- NEMA 2021 Annual Forum
- ______ Week
- Annual Conference in Grand Rapids, MI
- Conferences are an opportunity to…
17 Clues: ______ Week • Cyber attack • 246th Birthday • Great Shake Out Drill • NEMA 2021 Annual Forum • Sites opening across Virginia • FEMA Administrator (last name) • Conferences are an opportunity to… • October is ________ Awareness Month • Theme of hurricane preparedness tip • Wash your hands with _____ and water • Annual Conference in Grand Rapids, MI • ...
Cybersecurity Legislations Crossword 2023-12-13
Across
- Legal framework that requires organisations to protect sensitive data
- This act empowers law enforcement agencies to investigate and combat cybercrime in the UK
- This act focuses on protecting critical national infrastructure from cyber threats
- The UK's primary legislation for the protection of personal data
Down
- This law ensures the security of electronic communications services in the UK
- Law that requires public sector organisations to follow specific cybersecurity standards (blankblank scheme)
- An organisation responsible for overseeing the implementation of cybersecurity strategies and policies in the UK
- Legislation that governs the interception and monitoring of communications in the UK
8 Clues: The UK's primary legislation for the protection of personal data • Legal framework that requires organisations to protect sensitive data • This law ensures the security of electronic communications services in the UK • This act focuses on protecting critical national infrastructure from cyber threats • ...
Emerging Cyber Threats and Attack Vectors Puzzle 2024-11-13
Across
- Cyberattack method involving reused login credentials
- Field focused on protecting digital information from unauthorized access
- A type of cyberattack where attackers demand payment to restore access
Down
- A breach involving an entertainment company that revealed weaknesses in cybersecurity
- A technique that makes it hard for attackers to distinguish between real and decoy assets
- A famous malware that targeted industrial control systems, raising concerns over cyber warfare
- Name of the ransomware known for using traditional tradecraft in its attacks
7 Clues: Cyberattack method involving reused login credentials • A type of cyberattack where attackers demand payment to restore access • Field focused on protecting digital information from unauthorized access • Name of the ransomware known for using traditional tradecraft in its attacks • ...
Dm literacy 2021-11-03
8 Clues: Videos • bitmoji • a blue bird • post pictures • online security • 3-180 second clips • ai that pushes out content • A social media used for old people
Love Letters 2024-05-07
Across
- First movie we "watched"
- Name a woman
- These stay in the backseat
- Tucker's dry food brand
- I DON'T HAVE ONE!
- My favorite food
Down
- My favorite fidget toy puzzle
- Character's name I make in every game
- Pokemon Bridget painted
- Lesbian label you taught me
- Certification I'm working on
- Dish I make for you
- Text on shirt you offered to fix
- First Birthday gift I gave you
- My hometown (not New Orleans)
15 Clues: Name a woman • My favorite food • I DON'T HAVE ONE! • Dish I make for you • Pokemon Bridget painted • Tucker's dry food brand • First movie we "watched" • These stay in the backseat • Lesbian label you taught me • Certification I'm working on • My favorite fidget toy puzzle • My hometown (not New Orleans) • First Birthday gift I gave you • Text on shirt you offered to fix • ...
Fathers day! 2025-06-12
Across
- Who is your FAVOURITE child?
- What is your favourite country?
- How old are you?
- What's your favourite food?
- 13 when is your birthday?
- What's YOUR favourite color?
- What's MY favourites color?
- How tall are you?
- What's your favourite sport?
Down
- What type of car do you drive?
- what year was I born?
- What is your favourite holiday?
- What is your job?
- What year was mom born born?
- 29 when is my birthday?
15 Clues: How old are you? • What is your job? • How tall are you? • what year was I born? • 29 when is my birthday? • 13 when is your birthday? • What's your favourite food? • What's MY favourites color? • Who is your FAVOURITE child? • What year was mom born born? • What's YOUR favourite color? • What's your favourite sport? • What type of car do you drive? • What is your favourite holiday? • ...
Computer Science 2024-03-19
Across
- Best department of the Interdep
- Name of the robot dog
- Associative role which is most found in the department
- Something you don't like to see while coding
- Head of the computer science department
- (Only) Friend
Down
- Favorite snake
- It's the dep info ....
- Programming web language
- Something unknown
- Field of 3A in the department
- the other field of 3A in the department
- Commonly used software to code
- Favorite dish
- Number of times the department won the Interdep
- Death project
16 Clues: Favorite dish • Death project • (Only) Friend • Favorite snake • Something unknown • Name of the robot dog • It's the dep info .... • Programming web language • Field of 3A in the department • Commonly used software to code • Best department of the Interdep • the other field of 3A in the department • Head of the computer science department • Something you don't like to see while coding • ...
Cybersecurity Crossword 2024-06-25
Across
- Faking an email, phone number or website.
- Attack that looks at/steals your data.
- Software used to protect your device.
- A string of random words used as a password.
Down
- We are not allowed to plug this into departmental devices.
- A program or programming code that self-replicates
- Attack that locks your data and demands money.
- Unsolicited emails that try to sell you products.
- Process used to help identify phishing.
- Malicious software.
10 Clues: Malicious software. • Software used to protect your device. • Attack that looks at/steals your data. • Process used to help identify phishing. • Faking an email, phone number or website. • A string of random words used as a password. • Attack that locks your data and demands money. • Unsolicited emails that try to sell you products. • ...
cybersecurity 2 2024-05-07
Across
- reacting to an incident
- assurance that information is not disclosed
- finding the problem
- the data or information is being maintained
- limiting access from everyone
Down
- making sure the information doesn't breach
- obtaining what was lost
- guarantees that systems are available
- information about something that one possess
- looking for the problem
10 Clues: finding the problem • obtaining what was lost • reacting to an incident • looking for the problem • limiting access from everyone • guarantees that systems are available • making sure the information doesn't breach • assurance that information is not disclosed • the data or information is being maintained • information about something that one possess
cybersecurity 4 2024-05-07
Across
- where all of the data is kept
- (1 trillion bytes)
- a passive way to direct someone to a malicious website
- (1000 bytes)
- (1 million bytes)
- threat actor that registers a domain name
Down
- a campaign desighned to steal account credentials.
- ( 1 billion bytes)
- remote access trojan
- an infected malware that's desighned to replicate and spread from device to device
10 Clues: (1000 bytes) • (1 million bytes) • (1 trillion bytes) • ( 1 billion bytes) • remote access trojan • where all of the data is kept • threat actor that registers a domain name • a campaign desighned to steal account credentials. • a passive way to direct someone to a malicious website • an infected malware that's desighned to replicate and spread from device to device
Cybersecurity Awareness 2021-09-28
Across
- An attempt to get an individual to reveal personal or sensitive information using email and disguising as a legitimate source.
- A network security system that is used for monitoring incoming and outgoing network traffic in reference to preset network security rules. This system is used to block unauthorized access to maintain network safety and security.
- The process of converting information or data into a code to further prevent unauthorized access.
- Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
- A vulnerability, or a system flaw, that is taken advantage of for malicious goals.
Down
- Unauthorized access to computer data, applications, networks, or devices.
- _____Engineering is used to manipulate end-users and exploiting human errors as a way to gain access to private information, access, or anything that the attacker deems valuable.
- Malicious software that is used to enter a computer of a device to get her data and information to then forward it to a third-party without the consent of the user.
- Malicious Software that blocks access to systems or threatens to release data until a predetermined debt is paid.
- Malicious code, or a computer program, that is designed to change the way a computer operates and can spread from one computer to another by copying itself. It then attaches to other programs or documents to execute the malicious code which can result in corruption or damage to data.
10 Clues: Unauthorized access to computer data, applications, networks, or devices. • A vulnerability, or a system flaw, that is taken advantage of for malicious goals. • Software that is designed to disrupt, damage, or gain unauthorized access to a computer system. • The process of converting information or data into a code to further prevent unauthorized access. • ...
Cybersecurity Brainteaser 2025-01-02
Across
- A service that encrypts your internet traffic and protects your online identity
- A secret word or phrase used to gain entry or authenticate identity
- The ability or permission to enter, view, or use a system or resource
- An additional security process requiring more than one form of verification
- What you should do when you receive a suspicious email
Down
- A network security system that monitors and controls incoming and outgoing traffic
- Information meant to be kept private and not shared without permission
- The most common cyber attack
- What you should do with your computer when you step away
- Software designed to disrupt, damage, or gain unauthorised access to a computer system
10 Clues: The most common cyber attack • What you should do when you receive a suspicious email • What you should do with your computer when you step away • A secret word or phrase used to gain entry or authenticate identity • The ability or permission to enter, view, or use a system or resource • Information meant to be kept private and not shared without permission • ...
Cybersecurity Terms 2023-10-08
Across
- Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
- Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
- Verifying the identity of users or systems to ensure secure access.
- Safeguarding personal information to ensure confidentiality and compliance with regulations.
Down
- Pertaining to the security challenges and measures for smartphones and tablets.
- A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
- Malware that encrypts files, demanding payment for their release.
- An update to fix vulnerabilities or improve security in software or systems.
- Converting data into a code to prevent unauthorized access, especially during transmission.
- A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.
10 Clues: Malware that encrypts files, demanding payment for their release. • Verifying the identity of users or systems to ensure secure access. • An update to fix vulnerabilities or improve security in software or systems. • Pertaining to the security challenges and measures for smartphones and tablets. • ...
Ylan cybersecurity 2024-11-21
Across
- Open-source operating system based on a kernel created by Linus Torvalds.
- A company that makes equipment and software to help connect and protect computer network
- A protocol that ensures reliable and ordered data transmission over a network.
- Raising awareness is the act of drawing attention to a previously overlooked topic
- A secret part of the internet, often used for anonymous activities.
Down
- A protocol for connecting to a remote computer without encryption
- A type of cyberattack where attackers impersonate legitimate organizations to steal sensitive information, like passwords or credit card details.
- A test used to verify if a user is human and not a robot.
- Identity theft to mask malicious communication.
- Software that secretly gathers information about a user without their consent.
10 Clues: Identity theft to mask malicious communication. • A test used to verify if a user is human and not a robot. • A protocol for connecting to a remote computer without encryption • A secret part of the internet, often used for anonymous activities. • Open-source operating system based on a kernel created by Linus Torvalds. • ...
Cybersecurity M.A 2024-10-17
Across
- A method used for guessing password using a high volume of combinaisons
- A way for cybercriminals to trick someone for redirecting them in a not authorized jacket
- A system designed to prevent unauthorized access to or from a computer network
- A way for cybercriminals to hide stolen data or malicious code in images, audio files and others malicious code in images, audio files and other media
Down
- A weakness in a computer system or network that can possibly be exploited by attackers to compromise the security.
- A malfunction or weakness in the software
- Completly Automated Public Turing Test To Tell Computers and Humans Apart
- An exploitation system for computer
- A type of attack where the pirate takes the victim’s files has an hostages and ask for money to give them back
- A way to verify someone identity
10 Clues: A way to verify someone identity • An exploitation system for computer • A malfunction or weakness in the software • A method used for guessing password using a high volume of combinaisons • Completly Automated Public Turing Test To Tell Computers and Humans Apart • A system designed to prevent unauthorized access to or from a computer network • ...
Cybersecurity Class 2024-03-26
Across
- Used to keep intruders out
- Malware that spreads
- Malware used by hackers to spy
- Tricking users to reveal information
- Bad software that damages systems
- Two or more computers connected
Down
- Protect your information from hackers
- Identifying a user’s identity
- Malware that hijacks your system
- Shields users against viruses
10 Clues: Malware that spreads • Used to keep intruders out • Identifying a user’s identity • Shields users against viruses • Malware used by hackers to spy • Two or more computers connected • Malware that hijacks your system • Bad software that damages systems • Tricking users to reveal information • Protect your information from hackers
Cybersecurity Terminology 2025-06-25
Across
- Prefix meaning harmful or bad
- The act of keeping something safe from harm
- Software used to stop or remove viruses
- Prefix related to computers, networks, or the internet
- A hacker who helps protect systems legally
- Fraudulent email tricking people into giving personal information
Down
- Malicious software that locks access until a ransom is paid.
- A weakness that can be exploited in a system.
- Software that secretly collects user data
- The process of encoding data to protect it
10 Clues: Prefix meaning harmful or bad • Software used to stop or remove viruses • Software that secretly collects user data • The process of encoding data to protect it • A hacker who helps protect systems legally • The act of keeping something safe from harm • A weakness that can be exploited in a system. • Prefix related to computers, networks, or the internet • ...
Cybersecurity Awareness 2025-10-14
Across
- Always ____ your devices and software when the newest version is available
- Always use strong, unique, and complex _____for each of your accounts.
- Using a secured ___ is important when working onsite or remotely.
- A piece of data about your online history that creates a trail of crumbs. Not chocolate chip, though.
Down
- Bad software installed on a computer to damage or harm it. Examples are viruses, Ransomware, Spyware, etc.
- DUO is an example of ____, where a prompt is sent to your phone to verify your identity before logging into the account.
- When a hacker impersonates a trustworthy person or organization to lure you into clicking on a suspicious link or download a file. This can be in the form of emails, text messages, and phone calls.
- A ___ breach is when sensitive and confidential information is accessed, viewed, or stolen by unauthorized individuals or groups.
- A method of receiving and sending messages over a network, such as the Internet
- If you notice anything suspicious, you should ___ it to IT.Security@uchicagomedicine.org or call 773-702-3456.
10 Clues: Using a secured ___ is important when working onsite or remotely. • Always use strong, unique, and complex _____for each of your accounts. • Always ____ your devices and software when the newest version is available • A method of receiving and sending messages over a network, such as the Internet • ...
My Dream Job: Computer Programer 2023-05-03
Across
- keeping information found online safe
- internet servers
- problem-solving operation
- testing for problems
- building a computer program
- the components that form a computer
Down
- acronym for hyper text markup language
- designing and building
- the storage and organization of data
- minimum level of education required
10 Clues: internet servers • testing for problems • designing and building • problem-solving operation • building a computer program • minimum level of education required • the components that form a computer • the storage and organization of data • keeping information found online safe • acronym for hyper text markup language
GenCyber Cybersecurity Concepts 2022-06-08
nlg 2023-10-17
Cybersecurity Crossword 2021-02-12
Across
- a worm, virus, or trojan that infects a computer and causes it to download or display malicious pop-ups
- unwanted software that monitors and gathers information on a person
- an attack where a victim gets an email disguised to look legit, in order to trick them into giving up valuable data
- malicious software
- a secret sequence of letters, numbers and characters to help verify someone.
Down
- a virus which tricks you into being downloaded
- information that relates to an identified or identifiable individual
- a type of worm, virus or trojan that demands money
- a malicious form of self-replicating software
- exploit vulnerabilities in a computer's operating system or a networks hardware
10 Clues: malicious software • a malicious form of self-replicating software • a virus which tricks you into being downloaded • a type of worm, virus or trojan that demands money • unwanted software that monitors and gathers information on a person • information that relates to an identified or identifiable individual • ...
Cybersecurity Crossword 2024-10-15
Across
- Security mechanism that involves multiple authentication methods (3 letters)
- The process of encoding data to keep it secure(10 letters)
- A Weakness in a system that can be exploited (13 letters)
- Process of finding and fixing errors in code (9 letters)
- An attack where a hacker tricks someone into revealing confidential information(8 letters)
Down
- Security incident where sensitive data is exposed to unauthorized parties (8 letters)
- A hidden or disguised computer virus(6 letters)
- A protection layer to prevent unauthorized access to a network(8 letters)
- Authentication factor using your fingerprint or face (10 letters)
- Online platform for hosting and reviewing code (6 letters)
10 Clues: A hidden or disguised computer virus(6 letters) • Process of finding and fixing errors in code (9 letters) • A Weakness in a system that can be exploited (13 letters) • The process of encoding data to keep it secure(10 letters) • Online platform for hosting and reviewing code (6 letters) • Authentication factor using your fingerprint or face (10 letters) • ...
6.8 Cybersecurity 2025-03-19
Across
- code that is capable of copying itself and corrupting a system or destroying data
- the ability to limit access to information to a certain set of users.
- software that is intended to damage or disable computers and computer systems.
- engineering the psychological manipulation of people into performing actions or divulging confidential information
Down
- measures taken to protect a computer or computer system against unauthorized access or attack
- obtaining confidential information by masquerading as an "official" person, site, or entity. A form of social engineering
- part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- Distributed Denial of Service - an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources
- the certainty that information is accurate
- the reliability of access to information
10 Clues: the reliability of access to information • the certainty that information is accurate • the ability to limit access to information to a certain set of users. • software that is intended to damage or disable computers and computer systems. • code that is capable of copying itself and corrupting a system or destroying data • ...
Cybersecurity Crossword 2025-09-14
Across
- Any software or program intentionally designed to cause harm to a computer, system, or user.
- A highly skilled computer professional who bypasses security measures to gain unauthorized access, often with malicious intent.
- Using voice calls to trick victims.
- Using text messages to trick victims.
- Gaining unauthorized physical access.
Down
- The criminal takes advantage of the relationship and tricks the victim into giving them money, extracting personal information, or installing malware.
- An attempt to defraud a person or group after first gaining their trust.
- Using enticing offers to lure victims into traps.
- Creating a believable scenario to extract information.
- Using fraudulent emails to steal information.
10 Clues: Using voice calls to trick victims. • Using text messages to trick victims. • Gaining unauthorized physical access. • Using fraudulent emails to steal information. • Using enticing offers to lure victims into traps. • Creating a believable scenario to extract information. • An attempt to defraud a person or group after first gaining their trust. • ...
Cybersecurity Fundamentals 2025-11-14
Across
- Process of converting data to unreadable form
- Software that locks files for payment
- Protection that filters network traffic
- Weakness that attackers can exploit
- Hidden access point in a system
Down
- Software that secretly monitors user activity
- Self-replicating code that attaches to programs
- Software that blocks unauthorized content
- Malicious software designed to harm systems
- Fraudulent emails attempting to steal data
10 Clues: Hidden access point in a system • Weakness that attackers can exploit • Software that locks files for payment • Protection that filters network traffic • Software that blocks unauthorized content • Fraudulent emails attempting to steal data • Malicious software designed to harm systems • Software that secretly monitors user activity • ...
cybersecurity Saleck 2025-11-10
Across
- Person who breaks into computer systems
- Secret code used to log in
- Trick used to steal personal information through fake emails
- Protecting computers and data from attacks
- A group of connected computers
Down
- Converts data into a secret code to protect it
- Malware that locks your files until a payment is made
- Program that can harm your computer
- Software that detects and removes malicious programs
- Blocks unauthorized access to a network
10 Clues: Secret code used to log in • A group of connected computers • Program that can harm your computer • Person who breaks into computer systems • Blocks unauthorized access to a network • Protecting computers and data from attacks • Converts data into a secret code to protect it • Software that detects and removes malicious programs • ...
Pentagon leaks 2023-04-19
Across
- A form of rupture, usually used in context of a laboratory or prison
- running out of..
- five sided shape
- a man who guards
- currently in war
- which concerns the nation
Down
- you’re being explained something
- Technology safety
- the opposite of attack
- what happens when a pipe is damaged
- unidentified floating...
- currently in war
12 Clues: running out of.. • five sided shape • a man who guards • currently in war • currently in war • Technology safety • the opposite of attack • unidentified floating... • which concerns the nation • you’re being explained something • what happens when a pipe is damaged • A form of rupture, usually used in context of a laboratory or prison
Cybersecurity Awareness Month 2025-04-22
Across
- A secret word or phrase used to authenticate access
- Verifying the identity of a user or device
- The malicious part of malware delivered after exploitation
- Malicious act of publicly releasing personal information online
- Secures information using mathematical algorithms
- Any software intentionally designed to cause damage or unauthorized access
- Deceptive attempt to steal sensitive information
- A network of compromised devices controlled by an attacker
Down
- One-way transformation of data into a fixed-length string
- Network device or software that filters traffic
- Malicious program that can replicate and spread
- A potential danger to cybersecurity
- The practice of disguising communication to appear as a trusted entity
- Takes advantage of a software vulnerability
- An incident where data is accessed or disclosed without authorization
- Secret method to bypass security controls
16 Clues: A potential danger to cybersecurity • Secret method to bypass security controls • Verifying the identity of a user or device • Takes advantage of a software vulnerability • Network device or software that filters traffic • Malicious program that can replicate and spread • Deceptive attempt to steal sensitive information • ...
Cybersecurity Awareness R5 2025-06-21
Across
- Extra Layer of security that requires users to provide multiple forms of verification before they can access a system or account
- method or code used to take advantage of that weakness
- A method transforming the original data into an unreadable format.
- Unauthorized access to confidential or sensitive data.
- System that prevents unauthorized access to or from a private network.
- Converting data into a secure format to prevent unauthorized access.
- A network of compromised computers controlled by attackers to launch cyber attacks.
Down
- Weakness in a system that can be exploited by threats.
- A malware that encrypts data and demands payment for decryption.
- A division under DICT Cybersecurity Bureau responsible for receiving, reviewing and responding to computer security incident reports and activities
- Software update designed to fix security vulnerabilities
- A phishing attack that uses text messages to trick individual into divulging personal information.
- A type of cyberattack where malicious actors attempt to trick individuals into revealing sensitive information
- Attached agency of DICT created upon the approval of Cybercrime Prevention Act of 2012; this agency is a part of the inter-Agency Response Center where you can report cyber incidents through hotline 1326.
- One of the frontline services of the DICT that ensures secure data Transactions.
- Attached agency of DICT Mandated to administer and implement the Data Privacy Act of 2012; the country's privacy watchdog.
16 Clues: Weakness in a system that can be exploited by threats. • method or code used to take advantage of that weakness • Unauthorized access to confidential or sensitive data. • Software update designed to fix security vulnerabilities • A malware that encrypts data and demands payment for decryption. • A method transforming the original data into an unreadable format. • ...
Cybersecurity Week Crossword 2025-08-28
Across
- A small file from a website that tracks your actions
- Malicious software that prevents access to a system until a ransom is paid
- A website used to attract hackers, without risking corporate data
- Bulk or unwanted emails
- Software to disrupt, damage or gain unauthorised access to a computer system
- Occurs when an unauthorised person bypasses access control measures for a restricted area by being granted access through an authorised user, who subjects themselves to the access control measures
- A person that has the potential to or causes actual damage to an organisation through using their authorized access to systems
- Practice of granting required access to authorized persons based on job requirements
- Type of attack that overwhelms a system or network with excessive requests, making it unusable to legitimate users
Down
- A person who uses computers to gain unauthorized access to data
- A technique used to disguise the sender's identity to gain sensitive information
- Method of exploiting social interactions that trick users to reveal sensitive information to gain access to a system
- A form of social engineering that is done via email or other messages
- Sofware that automatically displays advertisements
- Publishing someone's personal information online without their consent
- A combination of username, password or biometrics to authenticate access a system
16 Clues: Bulk or unwanted emails • Sofware that automatically displays advertisements • A small file from a website that tracks your actions • A person who uses computers to gain unauthorized access to data • A website used to attract hackers, without risking corporate data • A form of social engineering that is done via email or other messages • ...
CYBERSECURITY AWARENESS MONTH 2025-10-28
Across
- An update to an operating system, application, or other software issued specifically to correct problems with the software.
- A social engineering attack that uses phone calls to impersonate.
- A type of scam where attackers trick people into giving away sensitive information.
- When an attacker floods your inbox with emails to overwhelm the system and bury legitimate messages.
- Malicious software that is made to harm your computer. Types of malware are viruses, worms, spyware, and ransomware.
- A security tool that helps block unwanted access to your computer or network.
- Completely Automated Public Turing test to tell Computers and Humans Apart.
- Attack where a user's stolen login information (like username and password) from one website is used to gain access to accounts on other websites.
- Malicious software that can spread itself from one computer to another.
Down
- A type of malicious software that encrypts your data, holding it for ransom until a payment is made.
- Software that helps protect your computer or device from viruses, malware, and other harmful programs.
- Unauthorized user who attempts to or gains access to an information system.
- Virtual Private Network
- A security flaw in software that hackers discover before the company knows about it.
- Authentication method that uses more than one type of authentication such as a password or a fingerprint scan.
- A way to protect information by turning it into a secret code that only authorized people can read
16 Clues: Virtual Private Network • A social engineering attack that uses phone calls to impersonate. • Malicious software that can spread itself from one computer to another. • Unauthorized user who attempts to or gains access to an information system. • Completely Automated Public Turing test to tell Computers and Humans Apart. • ...
Emerging Web Technologies 2022-07-02
Cybersecurity Crossword 2021-10-08
Across
- verifying the identity of a user, process, or device
- a flaw or weakness that may allow harm to occur to a system
- malicious code like virus, worm
- Blink's single sign-on(SSO) solution
- an unauthorized user who attempts to or gains access to an information system
Down
- ensuring that data has not been altered or destroyed in an unauthorized manner
- an undocumented way of gaining access to a computer system
- how we work since covid started
- incident that results in disclosure of sensitive data
- individually identifiable health information
10 Clues: how we work since covid started • malicious code like virus, worm • Blink's single sign-on(SSO) solution • individually identifiable health information • verifying the identity of a user, process, or device • incident that results in disclosure of sensitive data • an undocumented way of gaining access to a computer system • ...
Cybersecurity Risk 2021-09-07
Across
- Abbreviation of Internet of Things.
- Short for "malicious software."
- Data that in published and can be found by anyone
- The type of data that should not be known to everyone.
- Pretending to be a friend or a trusted source online.
Down
- software that encrypts data on someone's device until that person agrees to pay to regain access.
- measures taken to protect computer systems.
- Joined or linked together.
- is a password made up of a saying or memorable set of words.
- Legitimate or innocent emails trying to trick you in clicking a link or providing personal information.
10 Clues: Joined or linked together. • Short for "malicious software." • Abbreviation of Internet of Things. • measures taken to protect computer systems. • Data that in published and can be found by anyone • Pretending to be a friend or a trusted source online. • The type of data that should not be known to everyone. • ...
Cybersecurity Password 2020-01-10
Across
- You may not divulge this information while you are working for an employer or after you leave.
- Malware that extorts money from victims by blocking access to their computer or encrypting the data stored on it.
- E-mailing victims to trick them into voluntarily giving up their confidential information.
- Software aimed at protecting your computer from malware.
Down
- A flaw in a system that leaves it open to attack.
- A bunch of compromised computers running malicious programs and being remotely controlled by cybercriminals.
- It is the scrambling of data into a secret code that can be read only by software set to decode the information.
- A netork-based technology that allows user to store a large amount of data and have access to it with any Internet-connected device.
- Malware that secretly installs more malware on a computer.
- A remote infrastructure for developing and deploying new online software applications.
10 Clues: A flaw in a system that leaves it open to attack. • Software aimed at protecting your computer from malware. • Malware that secretly installs more malware on a computer. • A remote infrastructure for developing and deploying new online software applications. • E-mailing victims to trick them into voluntarily giving up their confidential information. • ...
cybersecurity story 2024-02-23
Across
- - software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access
- - The protection of the cyber realms
- - a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware
- - the technique by which any kind of information can be converted into a secret form that conceals the actual meaning
- - someone who tries to access data they aren't authorized to view
- - monitoring network security system
Down
- - What happens when the firewall is broken
- - A security incident where confidential information is stolen
- - the story this puzzle is about
- - a mechanism for creating a secure connection
10 Clues: - the story this puzzle is about • - The protection of the cyber realms • - monitoring network security system • - What happens when the firewall is broken • - a mechanism for creating a secure connection • - A security incident where confidential information is stolen • - someone who tries to access data they aren't authorized to view • ...
Cybersecurity Crossword 2024-04-13
Across
- What feature can you activate to secure your Habbo account from hacking attempts?
- What security measure adds an extra layer of protection to online accounts beyond just a username and password?
- What term refers to groups of individuals in Habbo who aim to maximize profit by any means necessary, including illegal activities?
- What should you do if you receive messages containing offers that seem too good to be true on Habbo DMs?
- What precautionary measure should you take to protect your personal information when using public networks?
- What is the first step you should take before giving personal information to a stranger online?
Down
- What symbol is often found on the badges and mottos of mafia members?
- What is the type of app you can use to scan the QR code for setting up 2FA on Habbo?
- What action should you take if someone threatens you or attempts to scam you on Habbo?
- What type of software can protect your devices from malware, trojans, and ransomware?
10 Clues: What symbol is often found on the badges and mottos of mafia members? • What feature can you activate to secure your Habbo account from hacking attempts? • What is the type of app you can use to scan the QR code for setting up 2FA on Habbo? • What type of software can protect your devices from malware, trojans, and ransomware? • ...
cybersecurity 5 2024-05-07
Across
- turning a code into the information it was originally
- a program that threats to destroy data if they don't give money
- a program that decides whether to allow or block specific traffic
- to avoid
- a software that automates the process of scanning systems
- managing and protecting information assets
Down
- use of copying IT resources by employees
- type of substitution cipher in which each letter in plaintext is replaced
- practice of secure communication or information from the public
- converting information into a code
10 Clues: to avoid • converting information into a code • use of copying IT resources by employees • managing and protecting information assets • turning a code into the information it was originally • a software that automates the process of scanning systems • a program that threats to destroy data if they don't give money • ...
Cybersecurity Awareness 2024-10-17
Across
- A security system that monitors and controls incoming and outgoing network traffic
- A security model that requires strict identity verification for every person and device trying to access resources on a network
- Software that secretly gathers information about a user's activities
- The process of encoding information to protect it from unauthorized access
- Malicious software that misleads users of its true intent by disguising itself as legitimate software
Down
- Manipulating people into divulging confidential information
- Phishing attacks conducted via SMS messages
- A malware designed to deny a user or organization access to files on their computer
- A type of online scam that tricks people into sharing sensitive information, such as login credentials and credit card numbers
- Small files stored on a user’s system to recognize the user and track preferences
10 Clues: Phishing attacks conducted via SMS messages • Manipulating people into divulging confidential information • Software that secretly gathers information about a user's activities • The process of encoding information to protect it from unauthorized access • Small files stored on a user’s system to recognize the user and track preferences • ...
Cybersecurity Awareness - 2024-10-08
Across
- [?] is a situation where a victim is tempted into clicking a malicious link
- Virus, Trojans and Worms are forms of [?]
- [?] are attackers whose motivation are political or social causes
- [?] is the term we used to to state that a transaction performed cannot be denied
- The minimum length of password we aim for is [?} numeric representation
Down
- [?} is a common social engineering tactic involving fake emails
- Fingerprint and/or facial recognition are form of authentication known as [?] scans
- The term [?] is commonly used in cybersecurity as a representation of weakness
- Account [?} is when an employee's email is hacked and used to make payments to fraudster's accounts.
- The microsoft brand for mobile device management is known as [?]
10 Clues: Virus, Trojans and Worms are forms of [?] • [?} is a common social engineering tactic involving fake emails • The microsoft brand for mobile device management is known as [?] • [?] are attackers whose motivation are political or social causes • The minimum length of password we aim for is [?} numeric representation • ...
SULAM cybersecurity 2023-06-15
Across
- Perlindungan maklumat peribadi atau data daripada capaian yang tidak dibenarkan.
- Upaya untuk menembusi sistem komputer dengan niat jahat.
- Ilmu dan teknik menyulitkan maklumat supaya hanya dapat dibaca oleh pihak yang dibenarkan.
- Proses memulihkan data atau sistem selepas berlaku kejadian yang tidak diingini.
Down
- Program jahat yang cuba merosakkan atau mengganggu komputer dan peranti elektronik.
- Sekumpulan peranti yang berhubung dan berkongsi maklumat antara satu sama lain.
- Potensi bahaya atau kejadian yang boleh menjejaskan keselamatan sistem atau maklumat digital.
- Kemungkinan berlakunya ancaman atau kejadian yang boleh menyebabkan kerugian atau gangguan.
- Keadaan maklumat atau data yang tidak diubah atau diubah suai tanpa kebenaran.
- Program yang digunakan untuk mengesan, menghalang, dan membuang program jahat dari sistem komputer.
10 Clues: Upaya untuk menembusi sistem komputer dengan niat jahat. • Keadaan maklumat atau data yang tidak diubah atau diubah suai tanpa kebenaran. • Sekumpulan peranti yang berhubung dan berkongsi maklumat antara satu sama lain. • Perlindungan maklumat peribadi atau data daripada capaian yang tidak dibenarkan. • ...
Cybersecurity - General 2022-05-26
Across
- Large scale attacks using remotely controlled malware-infected devices
- Systems, functions & data being provided on-demand, based on levels of service and defined parameters
- Number of stages of Penetration Testing
- Flooding a network / computer by overloading the system with huge number of requests and making it incapable of responses
- Only authorized parties permitted to access sensitive information / functions
Down
- Process of psychologically manipulating people to divulge personal or critical information
- A method of interrupting data traffic between nodes and stealing the required information
- Hostile spyware, ransomware & viruses that breach through vulnerabilities like clicking on suspicious links / installing risky applications
- Ensuring only authorized users can enter, modify or delete information / functions
- An attack that takes advantage of opportunity between a vulnerability announcement and corresponding security patch solution
10 Clues: Number of stages of Penetration Testing • Large scale attacks using remotely controlled malware-infected devices • Only authorized parties permitted to access sensitive information / functions • Ensuring only authorized users can enter, modify or delete information / functions • ...
Crosswords Cybersecurity 2025-11-03
Across
- is a set of modifications made to a computer program or its supporting data in order to update, correct, or improve it.
- establishes a digital connection between your computer and a remote server belonging to a provider
- malicious computer program used to give hackers unauthorized remote access to an infected computer by exploiting system vulnerabilities.
- is one of the disciplines concerned with protecting messages (ensuring confidentiality, authenticity and integrity) often using secrets or keys.
- It involves copying the magnetic stripes of a bank card using a memory reader
Down
- a person who seeks ways to bypass software and hardware protections.
- Malicious software that blocks access to the computer or files by encrypting them and demands a ransom payment from the victim to regain access.
- Key a string of characters used within an encryption algorithm for altering data so that it appears random
- a form of malware or hardware that tracks and records your keystrokes as you type
- fraudulent technique that allows fraudsters to display a phone number that is not their own.
10 Clues: a person who seeks ways to bypass software and hardware protections. • It involves copying the magnetic stripes of a bank card using a memory reader • a form of malware or hardware that tracks and records your keystrokes as you type • fraudulent technique that allows fraudsters to display a phone number that is not their own. • ...
Cybersecurity Applications 2023-12-12
Across
- An attacker might attempt to trick someone through manipulation or deception.
- to prevent vulnerabilities and injection attacks.
- determines what actions they are allowed to perform
- The process of verifying the identity of a user or device
Down
- Systems can detect and respond to potential security threats
- An attacker might flood the RFID reader with requests, preventing legitimate users from gaining access.
- to regulate who can access what resources
- to keep software and firmware updated to protect against known vulnerabilities
- It is important to secure data
- You must secure the actual, tangible devices.
10 Clues: It is important to secure data • to regulate who can access what resources • You must secure the actual, tangible devices. • to prevent vulnerabilities and injection attacks. • determines what actions they are allowed to perform • The process of verifying the identity of a user or device • Systems can detect and respond to potential security threats • ...
Crossword cybersecurity 2024-04-17
10 Clues: resolv a fault • person hack you • protect to virus • program infect you • program hide your IP • most pc attack server • attack on link of fish • fault what developer don't know • attack try multiple combination • virus look all you make on your pc
OT cybersecurity 2024-07-16
Across
- A system that monitors and controls industrial processes
- An unauthorized act of bypassing security mechanisms
- A secret word or phrase used to authenticate access
- A security flaw that can be exploited
- Protection of sensitive information from unauthorized access
Down
- A unique identifier for a network device
- The practice of securing computer systems and networks
- An act of gaining unauthorized access to systems and networks
- A device used to control the flow of electricity in OT systems
- A network security system that monitors and controls incoming and outgoing network traffic
10 Clues: A security flaw that can be exploited • A unique identifier for a network device • A secret word or phrase used to authenticate access • An unauthorized act of bypassing security mechanisms • The practice of securing computer systems and networks • A system that monitors and controls industrial processes • Protection of sensitive information from unauthorized access • ...
CyberSecurity Puzzle 2024-06-06
Across
- __________ IS SOMETHING YOU KEEP SECRET AND DO NOT SHARE WITH OTHERS.
- SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION.
- OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL.
- EMAIL IS THE MOST USED MEDIUM TO __________________ IN ORGANSATIONS.
Down
- CYBER ATTACK CAN CAUSE HUGE ____________
- IT IS NECESSARY TO CONFIRM IDENTITY BEFORE ALLOWING __________ IN OUR ORGANISATION.
- IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION.
- HACKER WILL DEMAND ____________ MONEY WHEN THEY TAKE COTROL OF YOUR COMPUTER.
- MAKE SURE THAT YOU HAVE ____________ SOFTWARE IN YOUR COMPUTER TO BE SAFE ONLINE.
- ___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS.
10 Clues: CYBER ATTACK CAN CAUSE HUGE ____________ • SENDING A FAKE EMAIL TO STEAL OTHER PEOPLE'S INFORMATION. • OPENING AN _____________ FROM UNKNOWN PEOPLE CAN BE HARMFUL. • IT IS RISKY TO USE __________ WI-FI TO CARRY DIGITAL TRANSACTION. • ___________ IS A SOFTWARE PROGRAMS DESIGNED TO CORRUPT COMPUTERS. • ...
Cybersecurity Crossword 2023-05-24
Across
- Practice of protecting information by converting it into a secret code
- Act of bombarding someone with a large number of negative comments
- Act of deliberately using digital communication to harass or intimidate someone
- Software designed to protect against malicious software
Down
- Term for sexually explicit material available on the internet
- Act of sending deceptive emails to trick individuals
- Act of creating fake online profiles to deceive and harass others
- Process of gaining unauthorized access to computer systems
- A secret word or phrase that must be used to gain admission
- Every aspect of protecting an organization and its employees and assets against cyber threats
10 Clues: Act of sending deceptive emails to trick individuals • Software designed to protect against malicious software • Process of gaining unauthorized access to computer systems • A secret word or phrase that must be used to gain admission • Term for sexually explicit material available on the internet • Act of creating fake online profiles to deceive and harass others • ...
Cybersecurity 101 2025-07-23
Across
- A fraudulent attempts to obtain sensitive information through deceptive emails.
- Phishing through text messages.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- A malicious software designed to gain unauthorized access to a computer or network.
Down
- A type of phishing attack that targets a business’ top executives “the big fish”.
- A cyberattack tactic where a malicious actor disguises their identity.
- The process of converting information or data into a code, especially to prevent unauthorized access
- Where attackers use phone calls to trick individuals.
- A series of multiple words, often longer than a typical password.
- An extra layer of security to accounts by requiring more than one form of verification.
10 Clues: Phishing through text messages. • Where attackers use phone calls to trick individuals. • A series of multiple words, often longer than a typical password. • A cyberattack tactic where a malicious actor disguises their identity. • A fraudulent attempts to obtain sensitive information through deceptive emails. • ...
Cybersecurity Essentials 2024-11-06
Across
- monitors your online activity and can log every key you press
- a computer program that replicates and attaches to files
- holds data until it makes a payment
- a program that scans a computer for malicious software and deletes it
- replicates itself to spread from one computer to another
- a decoy to sneak malicious software past unsuspecting users
Down
- hackers who are self-employed or working for large crime organization
- hardware or software that prevents hackers from accessing your personal data
- converting information into a form where an unauthorized people cannot read it
- any code that can steal data or cause harm to a system
10 Clues: holds data until it makes a payment • any code that can steal data or cause harm to a system • a computer program that replicates and attaches to files • replicates itself to spread from one computer to another • a decoy to sneak malicious software past unsuspecting users • monitors your online activity and can log every key you press • ...
Cybersecurity Awareness 2025-09-30
Across
- Synthetic media generated by AI
- They wear different hat colors (black hat, white hat, blue hat, etc. hat, etc.)
- Your online data trail
- Artificial Intelligence
- Fraudulent communication attack
- Used to prevent, identify and remove malicious software
- Software app programmed to do certain tasks
Down
- Converting information into a code to prevent unauthorized access.
- Use of two authentication methods to log in.
- Identity verification process
10 Clues: Your online data trail • Artificial Intelligence • Identity verification process • Synthetic media generated by AI • Fraudulent communication attack • Software app programmed to do certain tasks • Use of two authentication methods to log in. • Used to prevent, identify and remove malicious software • Converting information into a code to prevent unauthorized access. • ...
Emerging Web Technologies 2022-07-02
Intro to Cybersecurity Vocabulary 2025-10-14
Across
- set of security controls designed to protect payment account security such as credit or debit card transactions
- protection of digital devices and their connected networks from danger and threats as well as protecting personal information on a system by detecting, preventing and responding to attacks
- crime committed over the internet
- short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer
- set of policies and procedures meant to improve and guide an organization’s cybersecurity practices
- occur when hackers or malicious software gains unauthorized access to a system, examples include: hacker cracking passwords, breaking into a server or changing a user’s privileges on their system
Down
- set of best practice recommendations for information security management
- unique skills for a specific area
- attempt to steal, damage or destroy information on a device or computer system
- individual who participates in hacking
- abilities needed to communicate and work with others
- prevents a user from accessing a system
- act of skirting or breaking through security boundaries
13 Clues: unique skills for a specific area • crime committed over the internet • individual who participates in hacking • prevents a user from accessing a system • abilities needed to communicate and work with others • act of skirting or breaking through security boundaries • set of best practice recommendations for information security management • ...
Career Night Companies 2025-10-09
Across
- geotechnical construction
- designs, engineers, and manufactures custom, heavy-haul trailers
- bridge design and inspection
- live theater productions of Bible stories
- information technology and cybersecurity
- materials testing and inspection
- construction services
Down
- bread and roll manufacturer
- site planning and landscape design
- stormwater management
- roadway and bridge design
- attaching communications equipment to utility poles
- bridge design and inspection
- connecting, distributing, and controlling power and data
- designs mechanical, electrical, and plumbing (MEP) systems
15 Clues: stormwater management • construction services • geotechnical construction • roadway and bridge design • bread and roll manufacturer • bridge design and inspection • bridge design and inspection • materials testing and inspection • site planning and landscape design • information technology and cybersecurity • live theater productions of Bible stories • ...
ACES 2022-12-19
Across
- ACES IS A MEMBER OF THE ______ COLLEGE
- ACES FOUNDING PARTNER
- WHAT ACES STUDENTS STUDY
- STUDENT UNION
- GROUP THAT PLANS SOCIAL EVENTS FOR ACES
- COMPUTER SCIENCE BUILDING
Down
- THE DAY THE WEEKLY EMAIL COMES OUT
- ACES IS MADE UP OF AN LLP AND A _____
- LAST NAME OF ACES DIRECTOR
- CODING USED IN ACES COURSES
- COURSE CODE FOR ACES COURSES REGISTRATION
- HOME TO ACES LLP
- TYPE OF PROJECT COMPLETED IN HACS200 or 202
- HOME TO ACES NORTH
- UNIVERSITY OF MARYLAND MASCOT
15 Clues: STUDENT UNION • HOME TO ACES LLP • HOME TO ACES NORTH • ACES FOUNDING PARTNER • WHAT ACES STUDENTS STUDY • COMPUTER SCIENCE BUILDING • LAST NAME OF ACES DIRECTOR • CODING USED IN ACES COURSES • UNIVERSITY OF MARYLAND MASCOT • THE DAY THE WEEKLY EMAIL COMES OUT • ACES IS MADE UP OF AN LLP AND A _____ • ACES IS A MEMBER OF THE ______ COLLEGE • GROUP THAT PLANS SOCIAL EVENTS FOR ACES • ...
Technology Buzzwords 2023-09-05
Across
- - Leading internet search engine.
- - Online buying and selling.
- - High-tech mobile device.
- - Digital audio or video series.
- - Rapidly spreading on the internet.
- - Wireless internet connection.
Down
- - Online journal or web log.
- - Protection against online threats.
- - Online seminar or workshop.
- - Digital symbols conveying emotions.
10 Clues: - High-tech mobile device. • - Online journal or web log. • - Online buying and selling. • - Online seminar or workshop. • - Wireless internet connection. • - Digital audio or video series. • - Leading internet search engine. • - Protection against online threats. • - Rapidly spreading on the internet. • - Digital symbols conveying emotions.
Boredom buster 2023-06-28
Across
- Delicious Korean dish
- Creepy kids playground equipment at Minnippi parkland
- Dan's dream celebrity date
- Dan's alter ego
- 'Rejoice' in latin
- Place where the best conversations are had
- Dan's favourite mayonnaise
Down
- Hand-built spacecraft
- Name for a pressure cooker
- Bec's forbidden name
- I'm an ...
- 14th song on playlist
- Nerdy basketball team with cute point scorer
- Never would Dan ever ...
- I see you've played __ before
- Beloved kungfu fantasy series
- Term for a handsome cybersecurity person
- Powerful choral piece during epic space fight scene
- Best-looking hobbits in the Shire
- Name for a white Kona
- Brooklyn
- Dan's favourite book genre
22 Clues: Brooklyn • I'm an ... • Dan's alter ego • 'Rejoice' in latin • Bec's forbidden name • Hand-built spacecraft • Delicious Korean dish • 14th song on playlist • Name for a white Kona • Never would Dan ever ... • Name for a pressure cooker • Dan's dream celebrity date • Dan's favourite book genre • Dan's favourite mayonnaise • I see you've played __ before • Beloved kungfu fantasy series • ...
填字游戏词汇库-科技类-G1-数字基础 2025-03-26
Across
- Software application (~ store)
- Using binary code (~ currency)
- Organized information (~ query)
- Digital protection (~ threat)
- Input device (mechanical ~)
- Mobile communication tool (smart ~)
- Atomic-scale science (前缀: nano-)
- Initial model (~ testing)
- Global network (~ access)
- Moving visuals (~ streaming)
- Artificial intelligence (~ chatbot)
- Machine-driven process (~ industry)
Down
- Image capturer (digital ~)
- Produce (~ electricity)
- Simulated reality (~ reality)
- Living systems tech (前缀: bio-)
- Electronic processing device (~ programmer)
- Step-by-step procedure (搜索 ~)
- Digital information (~ analysis)
- Technical designer (software ~)
- Pointing device (wireless ~)
- Connected system (~ security)
- Novel invention (形容词: innovative)
- Visual display (~ touch)
- Automated machine (~ assistant)
25 Clues: Produce (~ electricity) • Visual display (~ touch) • Initial model (~ testing) • Global network (~ access) • Image capturer (digital ~) • Input device (mechanical ~) • Pointing device (wireless ~) • Moving visuals (~ streaming) • Simulated reality (~ reality) • Step-by-step procedure (搜索 ~) • Digital protection (~ threat) • Connected system (~ security) • ...
TEMA 2 2025-10-24
Across
- Aktivitas jual-beli tanpa uang tunai
- Platform untuk membangun toko online
- Platform jual-beli online
- Platform untuk belajar atau kursus online
- Pembayaran digital via ponsel
- Sistem manajemen konten website
- Promosi produk melalui media sosial
- Teknologi untuk transaksi cepat dan aman
- Teknologi komunikasi internet cepat
- Model bisnis online berbasis internet
Down
- Sistem keamanan data digital
- Alat pembayaran otomatis di toko online
- Penyimpanan data online
- , Layanan streaming konten digital
- Layanan transportasi berbasis aplikasi
- ,Perangkat lunak untuk mengelola bisnis online
- , Analisis data untuk strategi bisnis digital
- Uang digital yang digunakan secara global
- Layanan pengiriman barang berbasis digital
- Teknologi untuk mengenali wajah atau suara
20 Clues: Penyimpanan data online • Platform jual-beli online • Sistem keamanan data digital • Pembayaran digital via ponsel • Sistem manajemen konten website • , Layanan streaming konten digital • Promosi produk melalui media sosial • Teknologi komunikasi internet cepat • Aktivitas jual-beli tanpa uang tunai • Platform untuk membangun toko online • Model bisnis online berbasis internet • ...
Saint Mary 2022-07-07
Across
- Saint Mary Mascot
- We own a copy of this Amendment
- These are underground so we stay warm and dry
- One of four Saint Mary Values
- Colors are Navy and ____
Down
- Newest Major
- Residence Hall
- Saint ______ Dining Hall where we eat lunch
- ______ Memorial Stadium
- We eat at Oak Kiln
- _______ of Charity
- President whose lock of hair is in the KLC
12 Clues: Newest Major • Residence Hall • Saint Mary Mascot • We eat at Oak Kiln • _______ of Charity • ______ Memorial Stadium • Colors are Navy and ____ • One of four Saint Mary Values • We own a copy of this Amendment • President whose lock of hair is in the KLC • Saint ______ Dining Hall where we eat lunch • These are underground so we stay warm and dry
CBL Puzzle 2023-09-01
Across
- Rhymes with fishing
- Something you are (Inherence factor)
- Roofies mixed in software
- Divide and conquer. Tool to reduce scope
- Your cybersecurity partner
- Malicious code on a horse
Down
- Vaccine for your systems
- 12 characters long in PCI DSS v4.0
- Burning walls in cold rooms
- Party host
- Secure data with a pinch of salt
- Data secured. Locked with a key
12 Clues: Party host • Rhymes with fishing • Vaccine for your systems • Roofies mixed in software • Malicious code on a horse • Your cybersecurity partner • Burning walls in cold rooms • Data secured. Locked with a key • Secure data with a pinch of salt • 12 characters long in PCI DSS v4.0 • Something you are (Inherence factor) • Divide and conquer. Tool to reduce scope
Module 1 Introductory Course Telehealth 2017-03-01
8 Clues: Mobile health • Electronic health • Providing remote healthcare • Refers to teleconsultations • health Popular emerging term • Measures taken to protect a computer • Extended term for information technology • Ability of computers exchange information"
algorithms 2025-10-28
Across
- converts code into readable data
- study of secure communication
- secure distributed digital ledger
- logical true or false value
- delay between request and response
- software made to harm
- structure for programming language
Down
- repetition of a code block
- rules for data communication
- protecting system from attacks
10 Clues: software made to harm • repetition of a code block • logical true or false value • rules for data communication • study of secure communication • protecting system from attacks • converts code into readable data • secure distributed digital ledger • delay between request and response • structure for programming language
NAVFAC Capabilities 2023-02-13
Across
- _____ Handling Ashore Procurement
- NEPA Requirement: Environmental ______
- _______ and Facilities Operations
- Real Estate _______ and Management
- _______ Facilities and Equipment Engineering
Down
- Military Construction acronym
- Basic physical and organizational structures and facilities
- Protection against unauthorized data usage
- _______Vehicles providing transportation services
- _______ Conservation: Health assessment of natural and cultural resources
10 Clues: Military Construction acronym • _____ Handling Ashore Procurement • _______ and Facilities Operations • Real Estate _______ and Management • NEPA Requirement: Environmental ______ • Protection against unauthorized data usage • _______ Facilities and Equipment Engineering • _______Vehicles providing transportation services • ...
cy-rite crossword 2025-11-10
Across
- Response The process of identifying, managing, and recovering from a cybersecurity breach.
- Software that secretly collects user information without consent.
- Intelligence Information about potential or current attacks that helps organizations prepare for or respond to cyber threats.
- Malware disguised as legitimate software, used to trick users into installing it.
Down
- The practice of protecting systems, networks, and data from digital attacks, unauthorized access, or damage.
- The process of converting encrypted data back into its original readable form.
- A method of guessing passwords or encryption keys by trying all possible combinations.
- A type of malware that attaches itself to a legitimate program or file and spreads to other systems.
- Breach An event where sensitive or confidential data is accessed, disclosed, or stolen without authorization.
- A self-replicating program that spreads through networks without user action.
10 Clues: Software that secretly collects user information without consent. • A self-replicating program that spreads through networks without user action. • The process of converting encrypted data back into its original readable form. • Malware disguised as legitimate software, used to trick users into installing it. • ...
Cybersecurity Awareness Month Crossword Challenge 2023-09-25
Across
- When malicious actors send an email-based attack to trick the recipient into taking an action.
- The term for an email-based attack that involves the use of a QR code
- Instead of a simple password, it is recommended that you use a _______ for your log-in credentials.
- The month associated with Cybersecurity Awareness.
- The Be:_____ Viva Engage (Yammer) community keeps Goodyear associates up to date on cyber news.
Down
- A disgruntled or financially motivated employee is called a(n) ______ threat.
- The color of the banner that indicates a company email is from an external source.
- The acronym for the tool used to verify your identity for access. (Something you know. Something you have. Something you are)
- The title of the Goodyear 2023 cybersecurity awareness training is "Data _____ Basics."
- The action every associate must take when a suspicious email message is identified.
10 Clues: The month associated with Cybersecurity Awareness. • The term for an email-based attack that involves the use of a QR code • A disgruntled or financially motivated employee is called a(n) ______ threat. • The color of the banner that indicates a company email is from an external source. • ...
AI in Cybersecurity 2025-10-20
Across
- – What cybersecurity keeps us.
- – Information AI studies.
- – Harmful software.
- – What we do to teach AI.
- – A common target for phishing.
- – Automated programs used online.
- – What AI learns from.
Down
- – The goal of cybersecurity.
- – Process to teach AI models.
- – A warning from AI about danger.
- – A small automated tool.
- – Short for Artificial Intelligence.
12 Clues: – Harmful software. • – What AI learns from. • – Information AI studies. • – What we do to teach AI. • – A small automated tool. • – The goal of cybersecurity. • – Process to teach AI models. • – What cybersecurity keeps us. • – A common target for phishing. • – A warning from AI about danger. • – Automated programs used online. • – Short for Artificial Intelligence.
Cybersecurity Awareness 2021-09-29
Across
- An attempt to get an individual to reveal personal or sensitive information using email and disguising as a legitimate source.
- A network security system that is used for monitoring incoming and outgoing network traffic in reference to preset network security rules. This system is used to block unauthorized access to maintain network safety and security.
- The process of converting information or data into a code to further prevent unauthorized access.
- Software that is designed to disrupt, damage, or gain unauthorized access to a computer system.
- A vulnerability, or a system flaw, that is taken advantage of for malicious goals.
Down
- Unauthorized access to computer data, applications, networks, or devices.
- _____Engineering is used to manipulate end-users and exploiting human errors as a way to gain access to private information, access, or anything that the attacker deems valuable.
- Malicious software that is used to enter a computer of a device to get her data and information to then forward it to a third-party without the consent of the user.
- Malicious Software that blocks access to systems or threatens to release data until a predetermined debt is paid.
- Malicious code, or a computer program, that is designed to change the way a computer operates and can spread from one computer to another by copying itself. It then attaches to other programs or documents to execute the malicious code which can result in corruption or damage to data.
10 Clues: Unauthorized access to computer data, applications, networks, or devices. • A vulnerability, or a system flaw, that is taken advantage of for malicious goals. • Software that is designed to disrupt, damage, or gain unauthorized access to a computer system. • The process of converting information or data into a code to further prevent unauthorized access. • ...
Cybersecurity Crossword 2021-02-12
Across
- Something to protect your personal data.
- It locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- A malicious form of self-replicating software.
- It appears to be a useful or fun application but unbeknown to the user it also performs malicious actions.
Down
- It is any information relating to an identifiable person.
- a person who uses computers to gain unauthorized access to data.
- It is unwanted software that monitors and gathers information on a person and how they use their computer.
- It is an attack in which the victim receives an email disguised to look as if it has come from a reputable source
- They are able to exploit vulnerabilities in the a computer’s operating system or a networks hardware.
- It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
10 Clues: Something to protect your personal data. • A malicious form of self-replicating software. • It is any information relating to an identifiable person. • a person who uses computers to gain unauthorized access to data. • They are able to exploit vulnerabilities in the a computer’s operating system or a networks hardware. • ...
Cybersecurity Introduction 2023-06-18
Across
- Protects your online accounts and prevents unauthorized access
- A program that self-replicates and spreads to other computers
- The practice of tricking individuals into revealing sensitive information
- A type of software designed to block or remove computer viruses
- A software vulnerability that allows unauthorized access to a system
- Malicious software that encrypts files and demands a ransom
Down
- The unauthorized copying or distribution of copyrighted material
- The act of intentionally damaging or disrupting computer systems
- A set of characters used to gain access to a computer system
- A method used to verify the identity of a user
10 Clues: A method used to verify the identity of a user • Malicious software that encrypts files and demands a ransom • A set of characters used to gain access to a computer system • A program that self-replicates and spreads to other computers • Protects your online accounts and prevents unauthorized access • ...
CyberSecurity Crossword 2023-09-02
Across
- Pengiriman pesan maupun objek secara masif dan berulang yang tidak dikehendaki penerimanya. (bahasa inggris)
- Program komputer yang dapat menggandakan diri dan menyebar serta merusak sistem penggunanya
- Salah satu tipe malware yang menyandera data hingga suatu jumlah tebusan dibayarkan (bahasa inggris)
- Sedang marak mengalami kebocoran. Didapatkan dengan ilegal dan diperjualbelikan di dark web.
Down
- Facebook, X, Instagram, dll. (dua kata, bahasa indonesia)
- Serangkaian kata yang digunakan untuk autentikasi pengguna pada suatu sistem (bahasa inggris)
- Alat yang digunakan untuk mentransmisikan data secara aman terhadap jaringan publik sehingga lebih privat, dapat digunakan untuk bekerja remote (singkatan)
- Layanan komputasi termasuk penyimpanan data, perangkat lunak, perangkat keras dan lain-lain, melalui internet. Biasa disebut komputasi awan. (bahasa inggris)
- Istilah untuk jebolnya sistem keamanan data maupun informasi pada suatu entitas (bahasa inggris)
- Salah satu bentuk malware yang bersifat menyamar sebagai suatu program yang valid. Biasa diasosiasikan dengan jenis kuda. (bahasa inggris)
10 Clues: Facebook, X, Instagram, dll. (dua kata, bahasa indonesia) • Program komputer yang dapat menggandakan diri dan menyebar serta merusak sistem penggunanya • Sedang marak mengalami kebocoran. Didapatkan dengan ilegal dan diperjualbelikan di dark web. • Serangkaian kata yang digunakan untuk autentikasi pengguna pada suatu sistem (bahasa inggris) • ...
Cybersecurity Concepts 2024-03-31
Across
- a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system
- the name commonly given to unwanted emails
- Made up of devices that are all connected to each other, like computers and
- a security system that forms a virtual perimeter around a network of workstations preventing an attack
- the process of verifying the identity of a user or piece of information
Down
- a process of maintaining data confidentiality by converting plain data into secret code
- makes sure that there are no unauthorized changes to information of systems
- A Virtual Private Network
- a collection of compromised computers running malicious programs that are controlled remotely by a cyber-criminal
- a program that gives a hacker remote access to, and control over, a computer or network
10 Clues: A Virtual Private Network • the name commonly given to unwanted emails • the process of verifying the identity of a user or piece of information • makes sure that there are no unauthorized changes to information of systems • Made up of devices that are all connected to each other, like computers and • ...
Cybersecurity puzzle 2025-02-03
Across
- - Malicious software that can harm your computer
- - An email scam that attempts to trick users into giving up personal information
- - The process of converting data into unreadable code for security
- - Software that prevents unauthorized access to a network
- - The practice of disguising a communication to appear as a trusted source
Down
- - A secret combination of characters used to access an account
- - A program that appears harmless but has malicious intent
- - A security measure used to verify a user's identity, often using two different forms of authentication
- - A type of attack where a person tricks someone into revealing sensitive information
- - A type of cyberattack where traffic is flooded to a system to make it unavailable
10 Clues: - Malicious software that can harm your computer • - Software that prevents unauthorized access to a network • - A program that appears harmless but has malicious intent • - A secret combination of characters used to access an account • - The process of converting data into unreadable code for security • ...
CyberSecurity 1 2024-07-23
Across
- Entitlement is very closely related to ... performed
- ... to standard is verified during audit
- IAM also differentiates 'authenticate' and ...
- We differentiate between User and ... in IAM
- ISO 27000 standards has 14 categories for ...
Down
- S in SOD
- Issue faced by user in IT
- A in CIA
- C in PDCA
- Example of non-human identity
10 Clues: S in SOD • A in CIA • C in PDCA • Issue faced by user in IT • Example of non-human identity • ... to standard is verified during audit • We differentiate between User and ... in IAM • ISO 27000 standards has 14 categories for ... • IAM also differentiates 'authenticate' and ... • Entitlement is very closely related to ... performed
Cybersecurity Basics 2024-07-25
Across
- A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- An incident where data, trade secrets, or intellectual property is viewed, stolen, or used by an unauthorized individual.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- An event that could lead to loss of, or disruption to, an organization's operations, services, or functions.
Down
- A security process that verifies the identity of a user or device attempting to access a system.
- Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.
10 Clues: A security process that verifies the identity of a user or device attempting to access a system. • Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system. • The process of converting information or data into a code, especially to prevent unauthorized access. • ...
Cybersecurity Puzzle 2024-07-19
Across
- Unauthorized access to or manipulation of a computer system or network
- A secret word or phrase used to gain access to a system.
- The practice of protecting systems, networks, and programs from digital attacks
- A digital certificate used to encrypt and authenticate a website
- A type of software designed to harm or exploit any programmable device.
Down
- The act of pretending to be someone else to gain sensitive information
- A type of malicious software that demands ransom
- An attack that floods a network with excessive traffic, disrupting service
- Unwanted email that often contains malware or phishing attempts
- Software designed to detect and remove malicious software
10 Clues: A type of malicious software that demands ransom • A secret word or phrase used to gain access to a system. • Software designed to detect and remove malicious software • Unwanted email that often contains malware or phishing attempts • A digital certificate used to encrypt and authenticate a website • ...
cybersecurity Y.V 2024-10-17
Across
- Way a programmer may bypass securityto access a computer through trapdoor programs
- Security system that forms a virtual perimeter around a network
- An attack where the attacker secretly relays and possibly alters the communications between two parties (4_words)
- software that is secretly installed on a user's device to gather sensitive data
- Damage or destroy a computer network or system
- A malicious computer program
Down
- Block elements from sending you information
- Unwanted advertising, the email equivalant of physical junk
- person who use their skills and talents for good work and keep data safe from other (2_words)
- Person who try to gain unauthorized
10 Clues: A malicious computer program • Person who try to gain unauthorized • Block elements from sending you information • Damage or destroy a computer network or system • Unwanted advertising, the email equivalant of physical junk • Security system that forms a virtual perimeter around a network • ...
cybersecurity Y.V 2024-10-17
Across
- Damage or destroy a computer network or system
- A malicious computer program
- person who use their skills and talents for good work and keep data safe from other (2_words)
- Security system that forms a virtual perimeter around a network
Down
- Way a programmer may bypass securityto access a computer through trapdoor programs
- An attack where the attacker secretly relays and possibly alters the communications between two parties (4_words)
- Block elements from sending you information
- Unwanted advertising, the email equivalant of physical junk
- Person who try to gain unauthorized
- software that is secretly installed on a user's device to gather sensitive data
10 Clues: A malicious computer program • Person who try to gain unauthorized • Block elements from sending you information • Damage or destroy a computer network or system • Unwanted advertising, the email equivalant of physical junk • Security system that forms a virtual perimeter around a network • ...
Cybersecurity Awareness 2025-10-15
Across
- Fraudulent attempt to obtain sensitive information via email.
- A type of malicious software that locks files and demands payment.
- When employees unknowingly help hackers, it's called an ___ threat.
- Regularly updating this can patch security vulnerabilities.
- Security appliance that limits access to data or systems.
Down
- A secret word or phrase used to gain access to a system.
- Portable devices like USBs can carry this kind of malicious code.
- A common workplace policy: "Don't write your password on a ___."
- Two-step process to verify identity.
- You should never connect to public ___ without using a VPN.
10 Clues: Two-step process to verify identity. • A secret word or phrase used to gain access to a system. • Security appliance that limits access to data or systems. • You should never connect to public ___ without using a VPN. • Regularly updating this can patch security vulnerabilities. • Fraudulent attempt to obtain sensitive information via email. • ...
CyberSecurity Crossword 2025-10-22
Across
- An online trick where someone tries to steal your personal information by pretending to be someone else.
- A strong secret word or phrase used to access accounts.
- Protecting systems, networks, and data from digital attacks.
- A hidden, harmful program disguised as something safe to download.
- The practice of using technology in a safe and responsible way.
- Messages that threaten or harass others through technology.
Down
- Traces of information left online by users.
- Software that protects a computer from viruses and malware.
- The process of scrambling information to keep it private.
- A wall of security that blocks unauthorized access to a network.
10 Clues: Traces of information left online by users. • A strong secret word or phrase used to access accounts. • The process of scrambling information to keep it private. • Software that protects a computer from viruses and malware. • Messages that threaten or harass others through technology. • Protecting systems, networks, and data from digital attacks. • ...
Cybersecurity Crossword 2025-11-13
Cybersecurity Basics 2025-11-13
Across
- A short way to say “Information Technology.”
- Your special name you use to log into a computer, cell phone, tablet, or website.
- Something you type to log in — keep it secret!
- A computer, tablet, or phone is called a _______.
- To keep something from harm or danger.
- Something that keeps your personal stuff private.
Down
- What we use to surf websites and watch videos.
- Keeping your computer and personal data safe.
- Using smart rules online helps keep you _______.
- Inventions that come from science and research. It can solve problems and make our lives easier.
10 Clues: To keep something from harm or danger. • A short way to say “Information Technology.” • Keeping your computer and personal data safe. • What we use to surf websites and watch videos. • Something you type to log in — keep it secret! • Using smart rules online helps keep you _______. • A computer, tablet, or phone is called a _______. • ...
AWS 2024-08-14
Issue #1 2023-09-11
Across
- The Spooky Month Holiday
- Red ________ Week - Keeping kids drug-free
- Magnolia ________ Institute
- Racket sport this season
- Recent Hurricane in California
Down
- Seniors should be thinking about their college __________
- Homecoming King and ______
- Applying to a 4-year __________
- Future __________ Leaders of America Club
9 Clues: The Spooky Month Holiday • Racket sport this season • Homecoming King and ______ • Magnolia ________ Institute • Recent Hurricane in California • Applying to a 4-year __________ • Future __________ Leaders of America Club • Red ________ Week - Keeping kids drug-free • Seniors should be thinking about their college __________
Cybersecurity Awareness 2023 2023-10-06
Across
- A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
- Sensationalist headline or link to an article, blogpost, or other Internet content that exists for the purpose of attracting attention, or “drawing clicks.” Once a user clicks on the headline or image, the website is often mostly ads
- Digital ______ is the ability to use digital technology and media effectively
- Illegal _____ of copyrighted material is often referred to as piracy
- Your digital _____ is a collection of all information that you leave behind on the internet and can not be removed by deleting or setting as private
- Cybersecurity awareness month
- Online commenter whose intent is to attack views expressed online; these attacks are often personal
- Many features in online _____ can expose players to predators
- A type of cyber attack that attempts to fool users into providing sensitive information, such as passwords or credit card details, via fake emails and websites
Down
- A person who attempts to gain unauthorized access to computer systems
- _____ settings help control things like your profile, contact, and other information relating to your account
- Online harrassment
- A type of cyber attack that locks users out of their computer systems until they pay a ransom, typically in the form of cryptocurrency, such as Bitcoin
- ______ theft is a type of crime in which your private information is stolen and used for criminal activity
- Designed to detect and destroy computer viruses
15 Clues: Online harrassment • Cybersecurity awareness month • Designed to detect and destroy computer viruses • Many features in online _____ can expose players to predators • Illegal _____ of copyrighted material is often referred to as piracy • A person who attempts to gain unauthorized access to computer systems • ...
Cybersecurity and Cryptography 2024-10-17
Across
- What device monitors and controls incoming and outgoing network traffic?
- What is a digital document that verifies the ownership of a public key?
- term describes a weakness in a system that can be exploited by threats?
- What is the process of converting data into a fixed-size string of characters for security?
- What is the process of converting plaintext into ciphertext to protect information?
- What is the process of converting ciphertext back into plaintext?
- What type of malware disguises itself as legitimate software?
- What type of malware records keystrokes made by a user?
Down
- What is a physical or digital object used to prove identity in security systems?
- What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
- What term refers to malicious software designed to harm or exploit devices?
- What term refers to the permission to enter or use a system or network?
- What protocol secures data sent over the internet by encrypting it?
- What is the process of verifying the identity of a user or system?
- What is the process of creating copies of data to restore in case of loss?
15 Clues: What type of malware records keystrokes made by a user? • What type of malware disguises itself as legitimate software? • What is the process of converting ciphertext back into plaintext? • What is the process of verifying the identity of a user or system? • What protocol secures data sent over the internet by encrypting it? • ...
crossword about Cybersecurity 2025-06-07
Across
- Malware that encrypts files for ransom
- Network of infected devices
- Small data file stored by websites
- Software that secretly monitors activity
- Scrambling data for security
- Person who exploits system vulnerabilities
- Remote data storage and computing
Down
- Fraudulent attempts to steal info
- Harmful software like viruses
- Authentication using fingerprints
- Directs internet traffic
- Decentralized ledger technology
- Malware disguised as legitimate software
- Secures internet connections
- Network security barrier
15 Clues: Directs internet traffic • Network security barrier • Network of infected devices • Secures internet connections • Scrambling data for security • Harmful software like viruses • Decentralized ledger technology • Fraudulent attempts to steal info • Authentication using fingerprints • Remote data storage and computing • Small data file stored by websites • ...
CBL Puzzle 2023-09-01
Across
- Divide and conquer. Tool to reduce the scope
- Roofies mixed in software
- Party host
- Secure data with a pinch of salt
- Chained blocks. Runs crypto
- 12 characters long in PCI DSS v4.0
Down
- Something you are (Inherence factor)
- Rhymes with fishing
- Your cybersecurity partner
- Vaccine for your Ssystems
- Burning wall in cold rooms
- Data secured. Locked with a key
- Malicious code on a horse
13 Clues: Party host • Rhymes with fishing • Vaccine for your Ssystems • Roofies mixed in software • Malicious code on a horse • Your cybersecurity partner • Burning wall in cold rooms • Chained blocks. Runs crypto • Data secured. Locked with a key • Secure data with a pinch of salt • 12 characters long in PCI DSS v4.0 • Something you are (Inherence factor) • ...
Week 1 Puzzle 2020-08-25
Across
- This is an example of "something you know"--one of the key factors in MFA.
- Approximately $6 trillion is planned on being spent on this by 2021.
- General term for the type of device most often connecting to public WiFi.
- This is a type of malware that threatens to publish the victim's data or perpetually block access to it unless the victim pays money.
- Globally, one of these attacks every 39 seconds.
- By 2025, there will be an estimated 75 billion of these devices connected to the internet.
- 95% of cybersecurity breaches involve this type of error.
Down
- Any incident that results in unauthorized access to computer data, applications, networks or devices.
- The most dangerous type of WiFi.
- This is an example of "something you are"--one of the key factors of MFA.
- This typically is a 4 or 6 digit password used to lock/unlock a mobile device.
- To increase your personal internet security, consider turning off the "save password" feature in this.
- 93% of these organizations have experienced a data breach within the past 3 years.
- Software that is created specifically to help detect, prevent and remove malicious software.
14 Clues: The most dangerous type of WiFi. • Globally, one of these attacks every 39 seconds. • 95% of cybersecurity breaches involve this type of error. • Approximately $6 trillion is planned on being spent on this by 2021. • This is an example of "something you are"--one of the key factors of MFA. • ...
Cybersecurity and Cryptography 2024-10-17
Across
- What is a digital document that verifies the ownership of a public key?
- What type of malware records keystrokes made by a user?
- What term refers to the permission to enter or use a system or network?
- What term refers to malicious software designed to harm or exploit devices?
- What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
- term describes a weakness in a system that can be exploited by threats?
- What is the process of verifying the identity of a user or system?
- What is the process of converting data into a fixed-size string of characters for security?
Down
- What device monitors and controls incoming and outgoing network traffic?
- What is the process of converting ciphertext back into plaintext?
- What protocol secures data sent over the internet by encrypting it?
- What is the process of converting plaintext into ciphertext to protect information?
- What is the process of creating copies of data to restore in case of loss?
- What is a physical or digital object used to prove identity in security systems?
- What type of malware disguises itself as legitimate software?
15 Clues: What type of malware records keystrokes made by a user? • What type of malware disguises itself as legitimate software? • What is the process of converting ciphertext back into plaintext? • What is the process of verifying the identity of a user or system? • What protocol secures data sent over the internet by encrypting it? • ...
Cybersecurity Crossword Puzzle 2025-05-06
Across
- Software that secretly gathers user information
- Software that is harmful to your system
- Software used to detect and remove malicious software
- A security system that blocks unauthorized access to a network
- A hidden way to access a system or software
- The process of converting data into a secret code
- A method of guessing passwords by trying all combinations
- A fake email that tricks you into giving personal info
Down
- A tool that records everything you type
- A tool that hides your IP and encrypts your internet connection
- A vulnerability that is exploited before it’s known to developers
- A type of malware that locks your files until you pay
- A type of malware disguised as a legitimate file
- An extra step to verify your identity during login
- Manipulating people to reveal confidential information
15 Clues: A tool that records everything you type • Software that is harmful to your system • A hidden way to access a system or software • Software that secretly gathers user information • A type of malware disguised as a legitimate file • The process of converting data into a secret code • An extra step to verify your identity during login • ...
FIT_Vocab.JT 2013-05-15
Across
- picture for a business
- internet service provider
- headphone port
- TB
- online presentation maker
- Wireless Fidelity
- flash drive, disc
- who is asking, what they asking, why are they asking
- Google Bing Yahoo
- flash drive plug in
- online protection
- GB
- smallest storage amount
- 3g 4g
- MG
Down
- light emitting diode
- speakers, printer
- cd drive
- computer screen
- Safari, iTunes, iMovie, App Store
- central circuit board
- main engine of computer
- central processing unit
- National Cyber Security Alliance
- online manners
- Random Access Memory
- KB
- eight bits
- liquid crystal display
29 Clues: TB • KB • GB • MG • 3g 4g • cd drive • eight bits • headphone port • online manners • computer screen • speakers, printer • Wireless Fidelity • flash drive, disc • Google Bing Yahoo • online protection • flash drive plug in • light emitting diode • Random Access Memory • central circuit board • picture for a business • liquid crystal display • main engine of computer • central processing unit • ...
Cybersecurity Terms Crossword Puzzle 2024-02-28
Across
- Secure connection for private browsing
- Hostage-taking malware for files
- Vulnerability before the fix
- Identity verification for access
- Computer virus and harmful software
- Guard against harmful computer viruses
- Protecting digital systems and data
- Monitor for malicious activities
- Deceptive emails for sensitive data
Down
- Deliberate act to disrupt systems
- Malicious software's harmful action
- Secretly records keystrokes for theft
- System's exploitable weak point
- Network traffic gatekeeper and monitor
- Secret entry to bypass security
- Impersonation for unauthorized access
- Secure data with secret code
- Authorized entities' access list
- Flood of traffic to disrupt
- Software update to fix vulnerabilities
20 Clues: Flood of traffic to disrupt • Vulnerability before the fix • Secure data with secret code • System's exploitable weak point • Secret entry to bypass security • Hostage-taking malware for files • Identity verification for access • Authorized entities' access list • Monitor for malicious activities • Deliberate act to disrupt systems • Malicious software's harmful action • ...
Technology 2023-06-11
Across
- (Step-by-step problem-solving procedure)
- (Global computer network)
- (Intelligence that mimics human behavior)
- (Securing data with codes)
- (Global Positioning System)
- (Pocket-sized mobile device)
- (Identification based on unique human characteristics)
- (Remote data storage and computing)
- (Wireless network connectivity)
- (Unmanned aerial vehicles)
- (Process of making systems operate automatically)
Down
- (Protection of computer systems)
- (Electronic data processing machine)
- (Distributed digital ledger)
- (Simulated or computer-generated)
- (Enhancement of real-world experiences with digital content)
- (Manipulation of matter at the atomic and molecular scale)
- (Field of building and programming robots)
- Printing (Additive manufacturing process)
- Data (Large sets of complex data)
20 Clues: (Global computer network) • (Securing data with codes) • (Unmanned aerial vehicles) • (Global Positioning System) • (Distributed digital ledger) • (Pocket-sized mobile device) • (Wireless network connectivity) • (Protection of computer systems) • (Simulated or computer-generated) • Data (Large sets of complex data) • (Remote data storage and computing) • ...
Wedding Crossword 2024-11-18
Across
- Where Bride was working when the couple met
- Amanda's middle name
- Bride’s favorite cuisine
- Month of the proposal
- Amanda's birth month
- Bride’s profession
- Location of the wedding venue
- Couple's favorite fantasy series
- Bride's Eye Color
- Groom’s favorite holiday
- Groom’s favorite takeout
Down
- Where the couple get engaged
- Russ' middle name
- Bride's favorite outdoor activity
- Russ' birth month
- Bride’s favorite holiday
- What Russ is in school for
- Groom's Eye Color
- # of years couple has been together
- Where Groom was born
- Couple's favorite hobby
- Their cat's name
- Groom's favorite hobby
- Where Bride was born
- Honeymoon Destination
25 Clues: Their cat's name • Russ' middle name • Russ' birth month • Groom's Eye Color • Bride's Eye Color • Bride’s profession • Amanda's middle name • Where Groom was born • Amanda's birth month • Where Bride was born • Month of the proposal • Honeymoon Destination • Groom's favorite hobby • Couple's favorite hobby • Bride’s favorite holiday • Bride’s favorite cuisine • Groom’s favorite holiday • ...
