Type
Crossword
Description

An adversary having the intent, capability, and opportunity to cause loss or damage Threat
Devotion or loyalty to a person, group, cause, or country Allegiance
An employee who hates his job to the point of aggression Disgruntled
You are required to _______________ suspicious behavior Report
Goal of an Insider Threat Program Prevention
Threat of injury to persons Violence
Reportable action (two words) Security Violation
The ability and opportunity to obtain knowledge of classified sensitive information Access
___________________________ Monitoring (two words) User Activity
Any person with authorized access to any U.S. Governement (USG) resource, to include personnel, facilities, information, equipment, networks, or systems Insider Threat
______________________ Assistance Program Employee
Data derived from friendly detectable actions and open-source information that adversaries can use to reach conclustions or estimates of critical information concerning friendly intentions, capabilities, or activities Indicator
A potential risk indicator for person living above his means Affluence
A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure Need to Know

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

Security Awareness Crossword

Type
Crossword
Description

Last name of your FSO PERAZZO
Be Alert! Be _____ AWARE
Refers to information gathered to protect against espionage COUNTERINTELLIGENCE
Highest level of classification (two words) TOP SECRET
Report change of name and __________ CITIZENSHIP
____ Hotline FWAC
Imposes strict requirements for safeguarding and handling classified information NISPOM
_______ Threat INSIDER
You are required to ______ suspicious behavior REPORT
Discuss classified information in an _________, classified area AUTHORIZED
________ Classification Training DERIVATIVE

INFO Security Crossword

Type
Crossword
Description

a software update designed to fix a particular problem or vulnerability <5 char> patch
the 's' in ______ stands for 'secure' and indicates that communication with a webpage is encrypted <5 char> HTTPS
The activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe <6 char> backup
any data classified as personal, private or sensitive information <4 char> PPSI
function of one way encryption that is normally used to check integrity of data <4 char> hash
hardware or software mechanisms to prevent unauthorized users from accessing a computer network <8 char> firewall
malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim's data <7 char> malware
a piece of digital information generated by a web server and saved in your computer after visiting a website <6 char> cookie
a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity <13 char> vulnerability
an internet scam that targets unsuspecting users through email <8 char> phishing
a type of malware designed to block access to a computer system or data until a sum of money is paid <10 char> ransomware
this horse can stampede your security defenses for the bad guys and make you look sheepish too <6 char> trojan
your password is like a ____, use it regularly, change it often and do not share it with anyone else <10 char> toothbrush
a ________ is a program and/or device that monitors data travelling over a network. These programs/devices can be used both for legitimate network management and for stealing information off a network <6 char> snifer
____ is the scrambling of data into a secret code that can be read only by software set to decode that information <10 char> encryption
spoofing, tampering etc are examples of a security _____ <6 char> threat
a way of injecting malicious scripts into web pages <18 char> crosssitescripting
a ransomware crypto worm that attacked running microsoft windows operating systems, in May 2017 <8 char> wannacry
this malware targets microsoft windows based system and prevents it from booting <5 char> petya
group of experts that handle computer security incidents CERT

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

Cyberbullying Crossword

Type
Crossword
Description

An image or user name that represents a person online. Avatar
The denial of access to particular parts of the internet. Blocking
Interactive web journal or diary posted online. Blog
Repeated and deliberate harassment directed at another person. Bullying
Intentional & repeated harm inflicted through the use of computers, cell phones, and other electronic devices. Cyberbullying
Suicide caused directly or indirectly from cyberbullying. Cyberbullicide
Repeated harassment using electronic devices and networked technology that includes threats of harm. Cyberstalking
Evidence of a person's use of the internet. Digital Footprint
Intentionally excluding someone from an online group, like a buddy list or a game. Exclusion
The act of restricting access to certain websites. Filtering
Hardware or software that restricts and regulates incoming and outgoing data to or from computer systems. Firewall
Online fights using electronic messages with angry and vulgar language. Flaming
Repeatedly sending offensive, rude, or insulting messages. Harassment
Breaking into someone's account, posing as that person and sending messages to make the person look bad. Impersonation
An image with text used to describe a thought, idea, or joke that is widely shared. Meme
The one who instigates online social cruelty. Also know as the aggressor. Offender
Sharing someone's secrets or embarrassing information online. Outing
Software or a website that allows one's internet connection to be routed or tunneled through a different connection or site. Proxy
Making a statement or taking an action that indicates harm to another. Threat
A person who is known for creating controversy in an online setting. Troll
The person who is on the receiving end of online social cruelty Victim

Ethics & Legal Terms Crossword

Type
Crossword
Description

Use (something) to bad effect or for a bad purpose; misuse. Abuse
legal doctrine related to the guilt of someone who aids or abets in the commission of a crime Aiding & Abetting
A threat or attempt to inflict offensive physical contact or bodily harm on a person (as by lifting a fist in a threatening manner) that puts the person in immediate danger of or in apprehension of such harm or contact Assault
An offensive touching or use of force on a person without the person's consent Battery
The issuing of a statement or certificate by a professional organization to a person who has met the requirements of education and/or experience and who meets the standards set by the organization Certification
Threat of kidnapping, extortion, force or violence to be performed immediately or in the future, or the use of parental, custodial, or official authority over a child Coercion
The act of saying false things in order to make people have a bad opinion of someone or something Defamation
A system of moral principles that apply values and judgments to the practice of medicine Ethics
A clear and voluntary indication of preference or choice, usually oral or written, and freely given in circumstances where the available options and their consequences have been made clear (informed consent Expressed Consent
An intentional tort; the intentional unjustified, nonconsensual detention or confinement of a person within fixed boundaries for any length of time. Restraint may be physical, chemical, or emotional False Imprisonment
Health Insurance Portability and Accountability Act (1996) is United States legislation that provides data privacy and security provisions for safeguarding medical information HIPAA
An agreement by a patient to allow disclosure of private health information in cases in which the patient has been informed about the information to be disclosed, the purpose of the disclosure, and his or her right to object to the disclosure, but has not done so. Implied Consent
A formal agreement that a patient signs to give permission for a medical procedure (such as surgery) after having been told about the risks, benefits, etc. Informed Consent
Illicit (i.e., unauthorized) use of documentary materials related to treatment or condition of a patient. Invasion of Privacy
An area of commercial law dealing with a set of contractual, quasi-contractual and non-contractual fiduciary relationships that involve a person, called the agent, that is authorized to act on behalf of another (called the principal) to create legal relations with a third party. Law of Agency
The branch of law that deals with the application of medical knowledge to legal problems. Laws
Responsible by law; legally answerable Liable
A false accusation written, printed, or typewritten, or presented in a picture or a sign that is made with malicious intent to defame the reputation of a person who is living or the memory of a person who is dead, resulting in public embarrassment, contempt, ridicule, or hatred. Libel
The state or condition of having a license granted by official or legal authority to perform medical acts and procedures not permitted by persons without such a license Licensure
Improper, illegal, or negligent professional activity or treatment, especially by a medical practitioner, lawyer, or public official Malpractice
Concerning or relating to what is right and wrong in human behavior Morals
Fail to care for properly Neglect
The failure to do something that a reasonable person of ordinary prudence would do in a certain situation or the doing of something that such a person would not do Negligence

Information security crossword puzzle

Type
Crossword
Description

Is a technique that is used to exploit a vulnerability in any application attack
gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. Vulnerability
potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability. risk
People, property, and information that needed to be protected asset
Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset threat
Occurs when the system is vulnerable to attacks intrusion
process to retrieve vital data from a crashed system or data storage devices recovery
Occurs when a user/machine is discovered trying to access unauthorized data detection
the action of stopping any form of attack from happening prevention
the process of determining what rights and privileges a particular entity has authorization
Is the process of determining and assigning privileges to various resources, objects or data access control
the process of tracking recording system activities and resource access accounting
the part of accounting in which a security professional examines logs of what was recorded. auditing
Are physical or virtual objects, such as smart cards, ID badges, or data packets, that store authentication information• tokens
Are authentication schemes based on the identification of individuals by their physical characteristics biometrics
the science of hiding information cryptography
the original message plaintext
the encoded message ciphertext
info used in cipher only to sender/receiver key

Security Awareness Word Scramble

Type
Word Scramble
Description

secret
responsibility
protect
confidential
top secret
email
encryption
firewall
malware
backup
virus
surf
theft
piracy
internet
policies
violations
phishing
need to know
attacks
facility security officer
homeland security
department of defense
police department
FBI
copyright
background checks
privacy
phone fraud
safety
log out
login
fraud
hoax
chain letters
network
security
spam
hackers
report
cybersecurity
threat
monitor
access
badges
serve
secure
tailgate
insider threat
accounts
scams
crime
passwords
breach
keylogger
spoofing
ransomware
intrusion detection
multifactor authentication
personal protective equipment
certified
trained
speak up
look out

Quartz Security: Crossword puzzle for National Cyber Security Awareness Month 2017

Type
Crossword
Description

a list of entities that are blocked or denied access/privilege BLACKLIST
the unauthorized access and disclosure of sensitive information released outside of an unauthorized organization DATA BREACH
specialized techniques for gathering, retaining and analyzing data as evidence for investigations FORENSICS
an act of pretending to be from a reputable organization to deceive individuals into providing sensitive information PHISHING
a list of organizations that are considered trustworthy or allowed access/privilege WHITELIST
ensuring information with sensitive data remain hidden, inaccessible to unauthorized users. DATA PRIVACY
a type of malware that requires some type of payment to either remove the malware by the hacker, or retrieve files that have been encrypted by the hacker. RANSOMWARE
a type of digital currency Bitcoin
The practice and process designed to help protect one or an organizations networks, computers, programs and data from unauthorized access. cybersecurity
Medical history information, laboratory results, insurance information and other healthcare data an entity collects to identify an individual Personal health Information
The name of the leader who you would report security incidents to Charlie Pierce
The name of the leader who you would report privacy incidents to Kelly Skifton
The name of our Chief Information Officer who oversees the IT Infrastructures at Quartz Marybeth Bay
Duo-Security is considered what type of authentication when logging in remotely? Multifactor
Name of the form used to submit requests for: Hardware/Software, Security, Telecom or Facilities (Badging only) IT Request Form
To report a compliance incident, who do you contact? compliancehotline
Quartz policy and procedure S014 outlines what type of policy? ACCEPTABLE USE
The process of taking an unencrypted message or data and applying a mathematical function to it, to produce an encrypted message ENCRYPTION
What process do you need to go through for approval before files can be exchanged externally? externaldatareview
You are required to wear this item at all times while on Company premises badge
When a person tags along with another person who is authorized to gain entry pass a certain checkpoint piggyback

InfoSecurity Fest Crossword

Type
Crossword
Description

a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules Firewall
a standalone malware computer program that replicates itself in order to spread to other computers WORM
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive Spyware
a local or restricted communications network, especially a private network created using World Wide Web software Internet
the activity of defrauding an online account holder of financial information by posing as a legitimate company Phishing
any malicious computer program which is used to hack into a computer by misleading users of its true intent Trojanhorse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data VIRUS
are small files that Web sites put on your computer hard disk drive when you first visit Cookie
algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information Encyrption
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Backup