Type
Crossword
Description

This crossword contains the following questions and answers:

A form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself Virus
The process of verifying the identity of a user authentication
A collection of computers compromised by malicious code and controlled across a network botnet
Data in its encrypted form ciphertext
The unauthorized transfer of information from a network exfiltration
Device or program that limits network traffic firewall
An unauthorized user who attempts to access an information system hacker
An unauthorized act of bypassing the security mechanisms of a network intrusion
Software that tracks keystrokes keylogger
Software that compromises the operation of a system by performing an unauthorized function malware
A string of characters used to authenticate a user password
A digital form of social engineering to deceive individuals into providing sensitive information phishing
Indiscriminately sent unsolicited bulk messages spam
A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself worm

    Customize    

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

    Customize    

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

process of confirming the correctness of the claimed identity authentication
approval, permission, or empowerment for someone or something to do something authorization
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one brute force
encrypted form of the message being sent ciphertext
stripping one llayer's headers and passing the rest of the packet up to next higher layer decapsulation
TCP/IP protocol specifying the transfer of text or binary files across the network File Transfer Protocol
pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1) loopback address
software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse) malicious code
prove that a user sent a message and the message has not been altered non repudiation
sequence of eight bits octet
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website phishing
gaining unauthorized logical access to sensitive data by circumventing a system's protections penetration
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQL injection
basic communication language or "protocol" of the Internet TCP/IP
hidden, self-replicating section of computer software that inserts itself and becomes part of the another program virus

    Customize    

Technology Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. Browser
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Firewall
The combination of typeface and other qualities, such as size, pitch, and spacing. Font
A word or group of words that act as a way to cross reference to other documents or files on the computer. Link
A device that feeds data into a computer, such as a keyboard or mouse. Input
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape. Output
Usually comprises the display device, circuitry, casing, and power supply. Monitor
Sending an email, posting photos on a social media site and using your webcam. Upload
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways. Bug
Usually consists of eight bits. Byte
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials. Copyright
copy (data) from one computer system to another, typically over the Internet. Download
The collection of physical parts of a computer system. Hardware
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method. Hypertext
A measure of the amount of computational work that a computer system performs. Load

    Customize    

Digital Technology Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

computer resources must be ready for use by authorized users when needed availability
keep information protected from unauthorized disclosure or viewing confidentiality
process of converting data into a secret code for transmission over a public network cryptography
separate two or more parts of a network to control data exchange between each other firewall
prevent data from being modified or tampered with integrity
rate at which a processor can complete a processing cycle clock speed
data sent to your computer by a Web server that records your actions on a certain Web site cookie
code made up of numbers separated by three dots that identifies a particular computer on the Internet IP address
computer network limited to a small area such as an office building, university, or even a residential home LAN
main circuit board of your computer and is also known as the mainboard or logic board motherboard
each motherboard has a collection of chips and controllers known as _____ chipset
external device that provides input and output for the computer (e.g. keyboard, mouse) peripheral
memory containing hardwired instructions that the computer uses when it boots up, before the system software loads ROM
protocol used for sending e-mail over the Internet using a set of commands that authenticate and direct the transfer of electronic mail SMTP
hardware or software that acts as a bridge between two networks so that data can be transferred between a number of computers gateway

    Customize    

INFO Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

a software update designed to fix a particular problem or vulnerability <5 char> patch
the 's' in ______ stands for 'secure' and indicates that communication with a webpage is encrypted <5 char> HTTPS
The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe <6 char> backup
any data classified as personal, private or sensitive information <4 char> PPSI
function of one way encryption that is normally used to check integrity of data <4 char> hash
hardware or software mechanisms to prevent unauthorized users from accessing a computer network <8 char> firewall
malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim's data <7 char> malware
a piece of digital information generated by a web server and saved in your computer after visiting a website <6 char> cookie
a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity <13 char> vulnerability
an internet scam that targets unsuspecting users through email <8 char> phishing
a type of malware designed to block access to a computer system or data until a sum of money is paid <10 char> ransomware
this horse can stampede your security defenses for the bad guys and make you look sheepish too <6 char> trojan
your password is like a ____, use it regularly, change it often and do not share it with anyone else <10 char> toothbrush
a ________ is a program and/or device that monitors data travelling over a network. These programs/devices can be used both for legitimate network management and for stealing information off a network <6 char> snifer
____ is the scrambling of data into a secret code that can be read only by software set to decode that information <10 char> encryption
spoofing, tampering etc are examples of a security _____ <6 char> threat
a way of injecting malicious scripts into web pages <18 char> crosssitescripting
a ransomware crypto worm that attacked running microsoft windows operating systems, in May 2017 <8 char> wannacry
this malware targets microsoft windows based system and prevents it from booting <5 char> petya
group of experts that handle computer security incidents CERT

    Customize    

InfoSec-Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Action that might compromise the security Threat
Filters network traffic firewall
Person who exploits a computer system for a reason hacker
Malware that passes information about a computer user’s activities to another entity spyware
Synonym: Tailgating piggybacking
Action of verifying the user's identity authentication
Information is not made available to unauthorized individuals or processes confidentiality
Type of social engineering Baiting
Unauthorized entry into the security mechanisms of a system by an external group Intrusion
Unsolicited bulk commercial email messages spam

    Customize    

Quartz Security: Crossword puzzle for National Cyber Security Awareness Month 2017

Type
Crossword
Description

This crossword contains the following questions and answers:

a list of entities that are blocked or denied access/privilege BLACKLIST
the unauthorized access and disclosure of sensitive information released outside of an unauthorized organization DATA BREACH
specialized techniques for gathering, retaining and analyzing data as evidence for investigations FORENSICS
an act of pretending to be from a reputable organization to deceive individuals into providing sensitive information PHISHING
a list of organizations that are considered trustworthy or allowed access/privilege WHITELIST
ensuring information with sensitive data remain hidden, inaccessible to unauthorized users. DATA PRIVACY
a type of malware that requires some type of payment to either remove the malware by the hacker, or retrieve files that have been encrypted by the hacker. RANSOMWARE
a type of digital currency Bitcoin
The practice and process designed to help protect one or an organizations networks, computers, programs and data from unauthorized access. cybersecurity
Medical history information, laboratory results, insurance information and other healthcare data an entity collects to identify an individual Personal health Information
The name of the leader who you would report security incidents to Charlie Pierce
The name of the leader who you would report privacy incidents to Kelly Skifton
The name of our Chief Information Officer who oversees the IT Infrastructures at Quartz Marybeth Bay
Duo-Security is considered what type of authentication when logging in remotely? Multifactor
Name of the form used to submit requests for: Hardware/Software, Security, Telecom or Facilities (Badging only) IT Request Form
To report a compliance incident, who do you contact? compliancehotline
Quartz policy and procedure S014 outlines what type of policy? ACCEPTABLE USE
The process of taking an unencrypted message or data and applying a mathematical function to it, to produce an encrypted message ENCRYPTION
What process do you need to go through for approval before files can be exchanged externally? externaldatareview
You are required to wear this item at all times while on Company premises badge
When a person tags along with another person who is authorized to gain entry pass a certain checkpoint piggyback

    Customize    

Computer Science Vocabulary Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

A sequence of instructions suitable for processing by a computer. COMPUTERPROGRAM
The rules that govern the structure of language statements; in particular, the rules for forming statements in a source language correctly. SYNTAX
An error in the rules that govern the structure of language statements. SYNTAXERROR
A program that runs in the context of a browser. APPLET
A program that runs when translated by a Java computer. APPLICATION
Binary digit. The smallest unit of information for data storage and transmission. Each bit is considered to be either a "0" or a "1". BIT
A set of bits normally considered as a unit, it normally consists of eight bits and corresponds to a single character of information. BYTE
Hardware, software, or both, that allow a user to interact with and perform operations on a system, program, or other device. USERINTERFACE
A program that translates a program into machine code that can be converted into an executable program (an object program). COMPILER
An ordered set of well-defined instructions for the solution of a problem in a finite number of steps. ALGORITHM
Used to describe a complete data processing system, with the flow of data through clerical operations involved, down to the level of individual programs, but excluding such programs. FLOWCHART

    Customize    

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

    Customize    

Cyber Security Puzzle Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Takes advantage of a weakness. Exploit
Free software that arrives when doing online shopping. Adware
A major event which causes systems to be unavailable. Disruption
A program which hides functions that are potentially malicious. Trojanhorse
Unauthorized user with malicious intent. Hacker
A criminal tool used for extortion. Ransomware
Software used to create system havoc. Malware
The potential for losing valuable information. Risk
Blocks unwanted traffic from accessing a network. Firewall
A sickness in your system. Virus
Deception tool used to detect an attack. Honeypot
Process of protecting data by secret code. Encryption
Process where a legitimate user is verified for system access. Authenticate
Human characteristics used for identification. Biometrics
Process of finding a solution by trying many possible answers. BruteForce
In plain view. Cleartext
Device connected to a network. Host
Numerical label assigned to a machine. IPAddress
Potentially malicious email designed to trick you. Phish
A self-replicating malicious program. Worm
Personal identifier that should be unique to you. Password
A routine fix for a computer program. Patch
Process of identifying vulnerabilities in a system. PenTesting
Place to test potentially malicious software. Sandbox
Condition achieved by taking protective measures. Security
Flooding the internet with many messages. Spam
To pose or pretend to be another person in email. Spoof
Remote controlled and compromised machine. Zombie
A group of computer zombies. Botnet
An attempt to manipulate undisclosed vulnerabilities in a system. ZeroDay
Deceitful way of creating internet revenue. Clickfraud
Vast underbelly of the internet. Darkweb
A Wi-Fi connection set up to trick you. EvilTwin
Used by criminals to record your computer activities. Keylogger
Criminal activity used to direct you to fake websites. Pharming
When a hacker uses the phone to trick you. Vishing
When a criminal uses text messages to trick you. Smishing
A bridge between networks. Gateway
Device used to identify a human person entering data. Captcha
Phishing for the big prize! Whaling
Usually a criminal adversary. Attacker
Group of users denied entry to a system. Blacklist
A type of digital currency. Bitcoin
An small computer defect. Bug
Stolen information, now public. DataBreach
A group of trusted users. Whitelist
A tool used to steal your digital currency. Cryptominer
A malicious program used to gain information without your knowledge. Spyware

    Customize