Challenge yourself with puzzles designed to test and expand your knowledge of cybersecurity concepts, trends, and terminology. Whether you’re an expert or new to the field, these puzzles are a fun way to stay engaged with the latest in cybersecurity. 

Across:

1. A secret set of characters used for authentication

3. Process of converting information into a code

7. October marks National Cybersecurity ___ Month

8. The core of what cybersecurity aims to protect

Down:

1. Deceptive attempt to obtain sensitive information

2. Software that demands payment from users

4. Program developed by criminals to cause harm

5. Deceptive emails often request this personal code

6. Advisable action for compromised login credentials

Read Next

CyberNext BRU: The Future of the Cybersecurity Act & EU Certifications

A panel at CyberNext BRU will look at cybersecurity certifications and amendments to the EUs CSA.

CyberNext BRU: Cyber Defense: Protecting Critical Infrastructure & Supporting Strategic Partnerships

The EU has taken steps addressing the challenges posed by cyber threats, particularly related to critical infrastructure. CyberNext BRU will feature a panel that will discuss the challenges related to EU cyber defense policy.

CCPL, Coalition Leads Speak at 2025 State of the Net Conference

On Feb. 11, the annual State of the Net conference kicked off in Washington, DC featuring two speakers from the Center for Cybersecurity Policy & Law, Jeremy Grant and Ari Schwartz.