cyber security Crossword Puzzles
Cybersecurity 2023-03-25
Across
- A security measure designed to verify an individual`s authorization to access a computer or security information
Down
- Discovering passwords by various methods; more generally gaining unauthorized access to secured computers or data. Crackers specialize in gaining unauthorized access
- A collection of computers subject to centralized remote control by an outside party, usually without the knowledge of the owners, using surreptitiously installed software robots. The robots are spread by trojan horses and viruses. The botnets can be used to launch denial-of-service attacks and transmit spam
- Small FBI Cyber Action Teams made up of computer analysts, forensic investigators and malicious-code experts ready to travel anywhere in the world where a cyber intrusion occurred
4 Clues: A security measure designed to verify an individual`s authorization to access a computer or security information • Discovering passwords by various methods; more generally gaining unauthorized access to secured computers or data. Crackers specialize in gaining unauthorized access • ...
Splunk Crossword 2017-09-25
Across
- The ________ library has more than 1,000 of apps and add-ons from Splunk, our partners and our community.
- Splunk IT _______ Intelligence is a next-generation monitoring and analytics solution that provides end-to-end visibility into operational health of critical IT and business services to simplify operations, prioritize problem resolution and enable analytics-driven IT.
Down
- Splunk Makes Machine Data Accessible, Usable and __________ to Everyone, to address Big Data, IT Operations, Security and Analytics use cases.
- Splunk User _______ Analytics detects cyber-attacks and insider threats using data science, machine learning and advanced correlation.
- Splunk Enterprise ________ addresses emerging security threats and SIEM use cases through monitoring, alerts and analytics.
5 Clues: The ________ library has more than 1,000 of apps and add-ons from Splunk, our partners and our community. • Splunk Enterprise ________ addresses emerging security threats and SIEM use cases through monitoring, alerts and analytics. • ...
Dungeons & Dragons Security Officer 2024-06-07
Across
- An extraplanar race in Dungeons & Dragons known for their martial prowess and enmity towards mind flayers.
- The protection of people, property, and assets through barriers, locks, access control, and other means.
- The management of large groups of people to prevent disorder, often a task for security officers.
- The practice of managing entry to a building or area, typically involving keys, cards, or biometric systems.
- The act of protecting and maintaining the integrity of evidence following an incident.
- A person, often a security officer, who has the authority to access and/or control keys for a building or area.
- Also known as mind flayers, these are brain-eating, psionic tyrants in Dungeons & Dragons.
- Activities and measures taken by security officers to stop crimes before they occur.
- A situation where security officers equipped with weapons are dispatched to handle a threat.
- A holy warrior bound by a sacred oath in the Dungeons & Dragons universe.
- A search technique used by security officers to detect concealed weapons or contraband on a person's body.
- A powerful and iconic spell in Dungeons & Dragons that engulfs an area in magical flames.
- A floating orb monster in Dungeons & Dragons with many eyes, each with a different magical ability.
- A person with the responsibility to arrive first at the scene of an emergency, which can include security officers.
- A set of rules or procedures designed to protect people, property, or information.
- A druid ability in Dungeons & Dragons that allows the character to transform into an animal.
- A status granted to individuals allowing them access to classified information or restricted areas.
- The identification and evaluation of the likelihood and impact of potential security threats.
- A legendary creature in Dungeons & Dragons known for its immense power and ability to regenerate.
- The continuous observation of a place, person, or group to gather information, often for security purposes.
- A twenty-sided die commonly used for checks and saving throws in Dungeons & Dragons.
- A document prepared by a security officer to record the details of an unusual event or situation.
- A standardized approach to the command, control, and coordination of emergency response.
Down
- Technology used in CCTV systems to analyze video footage for specific patterns or behaviors.
- A practice scenario conducted to prepare security personnel and others for an actual emergency.
- A secret language used by rogues and thieves in the Dungeons & Dragons universe.
- Techniques and strategies used by security officers to reduce theft and protect assets.
- An incident where a protected area is accessed without authorization.
- A communication device used by security officers to stay in contact with their team or dispatch.
- A routine task for security officers involving walking or driving around a property to ensure safety and security.
- The actions taken by security officers when an alarm is triggered.
- The organizer and participant in charge of creating the details and challenges of a Dungeons & Dragons adventure.
- A wearable video device used by security officers to record their interactions and incidents.
- A race of dragon-like humanoids in the Dungeons & Dragons universe, known for their breath weapon.
- The process by which a business or organization deals with a disruptive and unexpected event.
- Skills and techniques used by security officers to peacefully settle disputes or incidents.
- The route a security officer follows during a patrol, often tracked with checkpoints.
- Acronym for closed-circuit television, used for surveillance by security officers.
- A magical item in Dungeons & Dragons that provides an interior space much larger than its outside dimensions.
- A security concept involving the prevention of criminal activity by fear of detection and punishment.
- A security protocol that restricts movement in a facility during an emergency or threat.
- A cantrip spell in Dungeons & Dragons that allows the caster to telekinetically move an object.
- A system that uses badges or ID cards to grant or restrict entry to a facility.
- A powerful and commonly used warlock spell in Dungeons & Dragons.
- A roll made to resist a spell, trap, poison, or other harmful effect in Dungeons & Dragons.
- Systems and procedures used to identify unauthorized entry into a building or area.
- A team of security officers assigned to ensure the safety of a specific individual or group.
- Measures taken to protect the outermost boundaries of a property or facility.
- The process of identifying and evaluating potential threats and vulnerabilities in a security setting.
- The area from which security officers are sent out on assignments or calls.
50 Clues: A powerful and commonly used warlock spell in Dungeons & Dragons. • The actions taken by security officers when an alarm is triggered. • An incident where a protected area is accessed without authorization. • A holy warrior bound by a sacred oath in the Dungeons & Dragons universe. • The area from which security officers are sent out on assignments or calls. • ...
Teicneolaíocht 2023-11-09
Acronyms 2026-01-22
Across
- Hypertext Markup Language - standard language for building websites
- American Standard Code For Information Interchange - standard for encoding text characters
- Distributed Denial Of Service - cyber attack using high volume of traffic to take down a website
Down
- Multi-Factor Authentication - requires multiple verification steps for security.
- Software As A Service - software delivery and licensing accessed online via a subscription
5 Clues: Hypertext Markup Language - standard language for building websites • Multi-Factor Authentication - requires multiple verification steps for security. • American Standard Code For Information Interchange - standard for encoding text characters • Software As A Service - software delivery and licensing accessed online via a subscription • ...
Security Crossword 2023-03-10
Across
- This type of data classification is freely available to anyone and may be shared, such as information posted on our website.
- This type of MFA to your phone is the least secure.
- This type of data classification must not be shared but does not require special inventory and protection. Examples include budgets, salary, source code, sales and business information, design documents and partner information.
- You should always connect to this when using the internet outside of the Tempus office.
- Unwanted software for advertisements.
- Nickname for the security team that created this crossword puzzle and handles security monitoring, alerts, and incidents.
- This type of vulnerability is new and does not yet have a fix.
- This is used to make data secure so that anyone viewing the information cannot understand it without a key.
- A malicious text, such as an unexpected text requesting gift cards by someone pretending to be our CEO.
- Nickname for the security team that ensures that the right accounts have the right level of access to the right resources.
- A phishing campaign targeted at a specific individual or group of individuals.
- Nickname for the security team that implements security throughout the development of Tempus products.
Down
- Nickname for the security team that implements security measures to protect Tempus resources in the cloud.
- This type of security tool helps block known computer viruses.
- This type of data classification must not be shared and must be inventoried and protected. This includes PHI, passwords, access keys, and Tempus-generated unique identifiers such as patient-id, order-id, sample-id.
- This security principle forces code to run with the lowest permission level possible.
- Share your passwords with them.
- Nickname for the security team that ensures Tempus data is classified, processed, and stored according to security policies.
- Patient data must be protected to comply with this regulation.
- Malicious software.
20 Clues: Malicious software. • Share your passwords with them. • Unwanted software for advertisements. • This type of MFA to your phone is the least secure. • This type of security tool helps block known computer viruses. • This type of vulnerability is new and does not yet have a fix. • Patient data must be protected to comply with this regulation. • ...
Cyber Security Crossword 2023-10-29
Across
- a type of malware that can infect all the files on the network
- monitors and filters the system's incoming and outgoing network traffic
- a process of converting plain text (readable message) into codes
Down
- is a process of converting the ciphertext into plain text.
- malware collects sensitive data like user ids and passwords
5 Clues: is a process of converting the ciphertext into plain text. • malware collects sensitive data like user ids and passwords • a type of malware that can infect all the files on the network • a process of converting plain text (readable message) into codes • monitors and filters the system's incoming and outgoing network traffic
Cyber Threats & Security 2023-01-09
Across
- any illegal activity done through internet
- act of stealing and misuse of someone's personal information
Down
- means hoax or misleading
- in it, an attacker harasses a victim through e-mails, social media, chat rooms, blogs, instant messaging and etc.
- an act of harming or harassing through information technology
5 Clues: means hoax or misleading • any illegal activity done through internet • act of stealing and misuse of someone's personal information • an act of harming or harassing through information technology • in it, an attacker harasses a victim through e-mails, social media, chat rooms, blogs, instant messaging and etc.
IDEA- Cyber Security 2023-09-21
Across
- It is a way to scramble data so that only authorized parties can unscramble it.
- It is software that is installed on a computer without the user's consent and that performs malicious actions, such as stealing passwords or money.
- It is a type of malicious software that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return
Down
- It is a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication.
- It is a network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.
5 Clues: It is a way to scramble data so that only authorized parties can unscramble it. • It is a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication. • ...
Cyber Security Crossword! 2024-10-28
5 Clues: Never____on embedded links. • ____your antivirus software. • Never____your password with anyone. • Avoid____information in your password. • Use a minimum of ___ characters for a strong password.
Cyber Security 2 2025-10-22
5 Clues: Keeping your information safe • The trace of your online activity • Legal requirement before collecting data • Adjust these to control who sees your data • The act of giving others access to your information
FITE: Cyber words 2013-05-16
Across
- A thing that puts in data to a computer such as a keyboard
- Examples are Excel, Word, and Powerpoint
- A document or file having a preset format
- To start up a computer
- How you make your business or product know
- What does CPU stand for
- An electronic signal that is sent as binary code
- An object on a computer that stores data, information, settings, or commands
- The physical components of computer wiring
- Where you plug in the cord to get wired internet
- Encoded computer instructions
- Computer plug in
- Zoomable presentation program
- What does LED stand for
- Having to do with the internet
- A computer connected to a network that other networks cannot access
- What does WIFI stand for
- The smallest file size
- Protection for any published work that helps that work from being used without prior authorization
Down
- A thing that connects the mouse and keyboard to the computer
- The heart of the computer
- What does LCD stand for
- A computer program that is designed for a certain purpose
- Long term storage of your computer
- Examples DSL and Cable
- Examples Optical and Mechanical
- Where you can add storage to your computer
- An internet cite where you look for information
- A type of internet that does not require a wire
- What does SSID stand for
- The screen of the computer
- Largest file size
- The internet cite that promotes cyber safety, security, and ethics
- How you act on the internet
- What does USB stand for
- An electronic that is easily moved around
- The material form or layout
- A close up preview of a template
- A brief account fo one's profession or work experience and qualifications
- Xfinity
- A printed circuit that is in the foundation of a computer
- A way to send info out of the computer such as a computer
- The short term memory of your computer
- A search engine that searches other search engines for info
44 Clues: Xfinity • Computer plug in • Largest file size • Examples DSL and Cable • To start up a computer • The smallest file size • What does LCD stand for • What does CPU stand for • What does USB stand for • What does LED stand for • What does SSID stand for • What does WIFI stand for • The heart of the computer • The screen of the computer • How you act on the internet • ...
Operation DigiVyuh 2025-01-27
Across
- - Converting data into a code to protect it
- - Entity that issues digital certificates
- - Stealing someone's personal information
- - Sending unwanted bulk messages
Down
- - Protecting systems from digital attacks
- - A secure way to sign electronic documents
- - Fraudulent attempt to steal sensitive information
- - Unauthorized access to computer systems
- - Police unit for investigating cyber crimes
- - Part of the IT Act dealing with computer offenses
- - Indian law for cyber crimes (abbreviation)
11 Clues: - Sending unwanted bulk messages • - Protecting systems from digital attacks • - Entity that issues digital certificates • - Unauthorized access to computer systems • - Stealing someone's personal information • - A secure way to sign electronic documents • - Converting data into a code to protect it • - Police unit for investigating cyber crimes • ...
10 2024-08-18
20 Clues: Slim ties • Scrunchies • Bold eyewear • Floor-length • Combat boots • Plaid skirts • Bustle skirts • Tunic dresses • Victory rolls • Wide-brim hats • Tie-dye shirts • Graphic prints • Opulent styles • Studded leather • Layered jewelry • Metallic fabrics • Corseted bodices • Rockabilly style • Glamorous sequins • Floral embroidery
Online safety 2013-06-06
Across
- Do not write in_____letters when texting to other because they may think that you are shouting.
- ___the incident to your parents or teachers.
- where does cyber bullying take place_______?
- Save the______when we are being cyber bullied.
- ______is having good online manners.
- Do not hurt others by using _____online.
Down
- ____ bullying is using the computer or phone to repeatedly say rude and hurtful things about a person.
- _______ is Spending a lot of time playing games and unable to control yourself to stop playing.
- be _____for your words and actions online because you may hurt others.
- ______ is sending irrelevant or unsolicited messages sent over the Internet.
10 Clues: ______is having good online manners. • Do not hurt others by using _____online. • ___the incident to your parents or teachers. • where does cyber bullying take place_______? • Save the______when we are being cyber bullied. • be _____for your words and actions online because you may hurt others. • ...
Cybersecurity crossword 2022-05-18
Across
- company security policy that allows for employees’ personal devices to be used in business.
- type of malware aimed to corrupt, erase or modify information on a computer before spreading to others
- malware that functions by spying on user activity without their knowledge.
- technology that allows access to files/services through the internet from anywhere in the world.
- acronym that stands for distributed denial of service – a form of cyber attack.
- malicious application or script that can be used to take advantage of a computer’s vulnerability.
- A piece of malware that often allows a hacker to gain remote access to a computer through a back door
- software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer
- udio or video clip that has been edited and manipulated to seem real or believable
- internet version of a home address for your computer
- hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.
- defensive technology designed to keep the bad guys out
- The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and networ
- umbrella term that describes all forms of malicious software
- tool that allows the user to remain anonymous while using the internet
- The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
Down
- malware that allows cybercriminals to remotely control your computer.
- technique used to manipulate and deceive people to gain sensitive and private information
- form of malware that deliberately prevents you from accessing files on your computer – holding your data hostag
- group of computers, printers and devices that are interconnected and governed as a whole
- set of programs that tell a computer to perform a task
- Breaches the network to gain sensitive information with the owner’s consent
- this practice is a means of evaluating security using hacker tools and techniques with the aim of discovering vulnerabilities and evaluating security flaws.
- technique used by hackers to obtain sensitive information.
- piece of malware that can replicate itself in order to spread the infection to other connected computers
25 Clues: internet version of a home address for your computer • set of programs that tell a computer to perform a task • defensive technology designed to keep the bad guys out • technique used by hackers to obtain sensitive information. • umbrella term that describes all forms of malicious software • malware that allows cybercriminals to remotely control your computer. • ...
ReadOn Insights Crossword 22-01-26 2026-01-20
Across
- The country linked to the 2025 cyber breach of a Norwegian hydroelectric dam.
- The Indonesian president whose likeness was impersonated in deepfake scam videos.
- The core organisational capability—combining preparedness, response, and recovery—that determines whether firms can survive major cyberattacks.
- Britain’s largest carmaker, forced into a five-week production shutdown in 2025 following a major cyberattack.
- The most common form of cyber-enabled fraud affecting individuals globally in 2025, often involving deceptive emails, messages, or links.
Down
- Artificial Intelligence, identified by 94% of executives as the biggest driver of change in the cybersecurity threat landscape.
- Business networks where a single weak vendor or software supplier can trigger cascading cyber failures across multiple organisations.
- AI-generated video and audio content used to impersonate leaders, executives, or relatives to commit fraud and misinformation campaigns.
- The organisation that released the Global Cybersecurity Outlook 2026.
- A cyber threat that has overtaken ransomware as the primary concern of CEOs, due to its scale, speed, and reputational damage.
10 Clues: The organisation that released the Global Cybersecurity Outlook 2026. • The country linked to the 2025 cyber breach of a Norwegian hydroelectric dam. • The Indonesian president whose likeness was impersonated in deepfake scam videos. • Britain’s largest carmaker, forced into a five-week production shutdown in 2025 following a major cyberattack. • ...
Sur mon écran (no spaces or accents) 2022-11-28
15 Clues: tablet • emojis • laptop • online • screen • bullying • computer • geocache • cell phone • technology • I think that • search engine • cyber bullying • social media (social networks) • app (application, abbreviation)
Cyber 2025-10-16
Across
- A trick where someone pretends to be trustworthy to steal your personal info.
- A way to lock your data so only the right person can read it.
- A tool that protects your computer by blocking unwanted internet traffic.
- Keeping your personal information safe and not sharing it without permission.
- A security step where you need two things (like a password and a code) to log in.
Down
- A small update that fixes problems or security holes in software.
- A machine that cuts paper into tiny pieces so no one can read it.
- A sneaky program that watches what you do on your computer without you knowing.
- A program that finds and removes harmful software from your device.
- Malicious software that can damage your computer or steal your data.
- A secret word or code you use to log in and keep your accounts safe.
11 Clues: A way to lock your data so only the right person can read it. • A small update that fixes problems or security holes in software. • A machine that cuts paper into tiny pieces so no one can read it. • A program that finds and removes harmful software from your device. • Malicious software that can damage your computer or steal your data. • ...
Cyber Safety 2024-03-05
Across
- A secret combination of words or numbers that allows a user to access an online service
- an attempt to trick a person into giving away money or information by pretending to be a well-known company
- harm inflicted through text, emails, or online sites
- online etiquette - being nice and respectful to others online
- software that displays unwanted advertising on your computer
- someone who gains unauthorized access to people's computers
- software designed to damage a computer of phone
- searching through websites freely
- a dishonest scheme to get information or money
- self-replicating program that attacks a computer system
Down
- short form for “world wide web"
- leaving offensive messages on the internet
- computer equipment, machines, and parts
- an internet-related crime
- when someone tracks, lures, or harasses people online
- a security system used to block malicious threats to your computer
- any action that’s taken to protect computers and prevent online crime
- a shorter word for internet
- unwanted emails or junk mail
19 Clues: an internet-related crime • a shorter word for internet • unwanted emails or junk mail • short form for “world wide web" • searching through websites freely • computer equipment, machines, and parts • leaving offensive messages on the internet • a dishonest scheme to get information or money • software designed to damage a computer of phone • ...
Cyber Ethics 2025-05-22
Across
- The act of turning encrypted data into readable text
- The act of sending someone advertisements or fake emails continuously
- The software that checks files for viruses
- The built-in software of a computer that checks everything entering the computer for malware
- Things that we use daily and need to update in order to have the latest features
- It is necessary to keep a ______ of your files in order to not lose them
- Data when it has some sort of meaning attached to it
- The act of viewing others' private information, mainly through malware
Down
- Someone who gains access to, encrypts, or deletes personal information
- Illegal copying of copyrighted information
- The act of stealing and misusing someone's personal information
- The act of doing fraudulent/criminal activity on the internet
- The track you leave when you browse the internet
- Hackers can gain ______ to your private information without you knowing
- The act of harassing someone on the internet
- Someone who illegally copies and distributes paid software for free
- The moral principles of the internet
- The piece of text used to identify if the correct person is trying to log in
- The policy that helps protect original works from plagiarism
19 Clues: The moral principles of the internet • Illegal copying of copyrighted information • The software that checks files for viruses • The act of harassing someone on the internet • The track you leave when you browse the internet • The act of turning encrypted data into readable text • Data when it has some sort of meaning attached to it • ...
Cyber Safety 2025-10-22
Across
- Always ____ for permission before sharing a friend's photo
- Whenever we are online, we leave a digital _____.
- Who are the only people who should have your passwords?
- Tell a _____ adult when a stranger contacts you online.
- Think before you ____ anything online.
- It is never okay to say _____ things online, even if you are just joking.
- A program that hackers use to try to harm your devices
- ____ friends are not the same as real friends.
- Using technology in safe, respectful and responsible ways is being good ____citizen.
- Being mean online on purpose
Down
- Everything we post online, stays online _____.
- The program used to monitor our online activity at school.
- Always keep these secret and safe
- Always be _____ when talking to others online.
- You risk infecting your device with viruses or malware whenever you ____ files from the internet.
- A video site not allowed at school.
- A strong password has letters, numbers and ____.
- Digital communication tools
- You should ____ give out your home address to strangers online.
19 Clues: Digital communication tools • Being mean online on purpose • Always keep these secret and safe • A video site not allowed at school. • Think before you ____ anything online. • Everything we post online, stays online _____. • Always be _____ when talking to others online. • ____ friends are not the same as real friends. • A strong password has letters, numbers and ____. • ...
Complexity Cross 2024-02-16
Across
- _____ Forest Island
- The abomination created by the Pentafractal
- ____ City Island
- The character who enjoys gardening
- The name of the child who merged with the fox cub
- The powerful liquid inside the Life Orb, _______ fluid
- The name of the fox cub who merged with the child
Down
- The character with a mechanical arm
- The characer who was merged with a fox cub
- The descendent of Aquarion
- The character once a vigilante
- The society Stratus and Cyber were once part of, The ___________
12 Clues: ____ City Island • _____ Forest Island • The descendent of Aquarion • The character once a vigilante • The character who enjoys gardening • The character with a mechanical arm • The characer who was merged with a fox cub • The abomination created by the Pentafractal • The name of the child who merged with the fox cub • The name of the fox cub who merged with the child • ...
09/1/19 abdul melon work 2019-01-09
Across
- horse - A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer
- surfing - Watching an authorized user enter a security code on a keypad
- - A type of Malware that locates and saves data from users without them knowing about it
- Hat Hacking - Engage in hacking for illegal purposes, often for financial gain, though also for notoriety. Their hacks (and cracks) result in inconvenience and loss for both the owners of the system they hack and the users
- - A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- - An attacker entering a secured building by following an authorized employee through a secure door and not providing identification
- - software that encrypts programs and data until a ransom is paid to remove it
- - collection of captured bot computers
- - program that hides in a computer and allows someone from a remote location to take full control of computer
- pro quo - Criminals promise a service in exchange for details - a common example is offering help with IT problems
Down
- - A destructive computer program that bores its way through a computer's files or through a computer's network
- - advertising-supported software.any software that shows adverts,popups.it can be harmless,but can include spyware
- - An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
- - Unauthorized access, modification, or use of an electronic device or some element of a computer system
- - An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information
- - Criminals make a promise of goods in return for details, such as offering a free music download
- - When someone deceives by pretending to be someone else in order to get personal data
- - an error in a program that prevents the program from running as expected
- Denial of Service (DDoS) - An attack where a firm's computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site's use. Often performed via botnets
- hat hacking - hackers penetrate security to test it, and inform the institution of vulnerabilities they find without exploiting them. This does not break IT security laws
- hat hacking - hacking into systems for 'fun' or to 'troll.'
- - malware that allows a cyber-security attacker to take control of an infected computer.
22 Clues: - collection of captured bot computers • hat hacking - hacking into systems for 'fun' or to 'troll.' • surfing - Watching an authorized user enter a security code on a keypad • - an error in a program that prevents the program from running as expected • - software that encrypts programs and data until a ransom is paid to remove it • ...
malware 2022-10-21
Across
- sending messages that look like they are from a legitimate company or website.
- Software that automatically displays or downloads advertisement material such as banners or pop-ups when a user is online.
- can be installed on a user's computer once an authorized user has initially gained access through another type of malware
- programs that steal a user's login credentials
- A standalone malware computer program that replicates itself to spread to other computers
- a piece of code that replicates itself
Down
- used to describe malware
- errors in someone's code or program
- technology, such as tracking software, that aids in gathering info about a person or organization without them knowing
- holds computer systems captive
- A type of malware that allows a cyber-security attacker to take control of an infected computer without the user knowing its happening
11 Clues: used to describe malware • holds computer systems captive • errors in someone's code or program • a piece of code that replicates itself • programs that steal a user's login credentials • sending messages that look like they are from a legitimate company or website. • A standalone malware computer program that replicates itself to spread to other computers • ...
Sam Heath 7B 2021-06-24
10 Clues: a care taker • Being safe online • a feeling that is good • When a boy is grown up • when a girl is grown up • a mental felling that is sad • A person that cares about you • when someone is being mean online • someone that annoys you repeatedly • A group of people that are related to you
Sam Heath 7B 2021-06-24
10 Clues: a care taker • Being safe online • a feeling that is good • When a boy is grown up • when a girl is grown up • a mental felling that is sad • A person that cares about you • when someone is being mean online • someone that annoys you repeatedly • A group of people that are related to you
Sam Heath 7B 2021-06-24
10 Clues: a care taker • Being safe online • a feeling that is good • When a boy is grown up • when a girl is grown up • a mental felling that is sad • A person that cares about you • when someone is being mean online • someone that annoys you repeatedly • A group of people that are related to you
Cyber monday 2024-11-28
10 Clues: WHAT YOU BUY ONLINE • A WEB PAGE FOR SHOPPING • A BARGAIN DURING SHOPPING • HOW QUICKLY ITEMS SELL OUT • WHAT YOU SAVE DURING SALES • DISCOUNTS DURING CYBER MONDAY • A SET OF CHARACTERS FOR DISCOUNTS • WHAT YOU DO ONLINE ON CYBER MONDAY • WHAT YOU DO WITH A MOUSE TO SELECT • WHERE YOU KEEP ITEMS WHILE SHOPPING
cyber bullying 2024-03-04
8 Clues: sosial media • bentuk cyber bullying • perlakuan tidak pantas • menutup akses interaksi • akibat dari cyber bullying • dampak dari komentar negatif • yang dilakukan sebelum berkomentar • menghindarkan diri dari komentar negatif
Ho PeiQi- 8G: Social Engineering 2023-02-02
Across
- whichperson is known as the "World's Most Famous Hacker?"
- personal information e.g. promise of a free download in return for log-in details.
- Stealing login information by watching someone else log in
Down
- who tries to steal information from people?
- scamming someone to give privateinformation to 'confirm their identity', pretending they need information to help them.
- An email claiming that you have won the lottery, as long as you fill out the corresponding information, is an example of what type social engineering attack?
- what month is National Cyber Security month?
7 Clues: who tries to steal information from people? • what month is National Cyber Security month? • whichperson is known as the "World's Most Famous Hacker?" • Stealing login information by watching someone else log in • personal information e.g. promise of a free download in return for log-in details. • ...
Crypto Crossword Challenge 2024-01-19
Across
- A Form of Attack That Involves Manipulating the Price of a Cryptocurrency (9 letters)
- Type of Attack That Attempts to Identify the Private Keys of Cryptocurrency Wallets (11 letters)
- Phishing Technique (8 letters)
- Security Vulnerability Allowing Unauthorized Access to Cryptocurrency Wallets (7 letters)
- A Type of Cyber Attack Involving the Encryption of Files for Ransom (6 letters)
Down
- Manipulating the Market by Spreading False Information (8 letters)
- Unauthorized Mining of Cryptocurrencies on a User's Device (10 letters)
- A Scheme Where Returns Are Paid to Existing Investors from Funds Contributed by New Investors (9 letters)
8 Clues: Phishing Technique (8 letters) • Manipulating the Market by Spreading False Information (8 letters) • Unauthorized Mining of Cryptocurrencies on a User's Device (10 letters) • A Type of Cyber Attack Involving the Encryption of Files for Ransom (6 letters) • A Form of Attack That Involves Manipulating the Price of a Cryptocurrency (9 letters) • ...
Cyber Threats & Security 2023-01-09
Across
- any illegal activity done through internet
- act of stealing and misuse of someone's personal information
Down
- means hoax or misleading
- in it, an attacker harasses a victim through e-mails, social media, chat rooms, blogs, instant messaging and etc.
- an act of harming or harassing through information technology
5 Clues: means hoax or misleading • any illegal activity done through internet • act of stealing and misuse of someone's personal information • an act of harming or harassing through information technology • in it, an attacker harasses a victim through e-mails, social media, chat rooms, blogs, instant messaging and etc.
CRUCIVERBA ALICE OLIVARES 3^G 2021-11-20
10 Clues: a text • removed • a bad dream • try to ignore a problem • people who are threatened • victim celebrity of bullying • bullying using up to date technology • who do you go to if you get a threat? • victims of cyber-bullying feel isolated • someone who uses computers or mobile phones to hurt someone
Perundingan 2022-08-31
Across
- Perundungan secara lisan
- Perundungan yang dilakukan terhadap lawan jenis
- Perundungan yang meninggalkan bekas pada tubuh
- Perundungan cyber terjadi di dunia
- Perundungan secara lisan akan meninggalkan luka yang tidak
Down
- Jika mengalami perundungan kita perlu melapor ke
- Korban perundungan berkemungkinan akan merasa
- Perundungan terjadi karena kurangnya rasa
- Perundungan yang dilakukan oleh sekelompok orang
- Perundungan yang terjadi di media sosial
10 Clues: Perundungan secara lisan • Perundungan cyber terjadi di dunia • Perundungan yang terjadi di media sosial • Perundungan terjadi karena kurangnya rasa • Korban perundungan berkemungkinan akan merasa • Perundungan yang meninggalkan bekas pada tubuh • Perundungan yang dilakukan terhadap lawan jenis • Jika mengalami perundungan kita perlu melapor ke • ...
Cyber monday 2024-11-28
10 Clues: WHAT YOU BUY ONLINE • A WEB PAGE FOR SHOPPING • A BARGAIN DURING SHOPPING • HOW QUICKLY ITEMS SELL OUT • WHAT YOU SAVE DURING SALES • DISCOUNTS DURING CYBER MONDAY • A SET OF CHARACTERS FOR DISCOUNTS • WHAT YOU DO ONLINE ON CYBER MONDAY • WHAT YOU DO WITH A MOUSE TO SELECT • WHERE YOU KEEP ITEMS WHILE SHOPPING
Puzzle #2 – Social Security Essentials 2025-06-30
Across
- - Income used to calculate your benefit
- - Earliest age to begin retirement benefits
- - Most common type of Social Security benefit
- - Type of benefit for a deceased worker’s spouse
- - Social Security sends you this each year
- - Social Security Administration abbr
- - To apply for Social Security
Down
- - Monthly payment from Social Security
- - You need 40 of these to qualify
- - SSDI stands for this kind of insurance
- - You must do this to earn credits
- - Full Retirement Age abbr
- - Cost of Living Adjustment abbr
- - Some Social Security income is this
- - Supplemental Security Income abbr
15 Clues: - Full Retirement Age abbr • - To apply for Social Security • - Cost of Living Adjustment abbr • - You need 40 of these to qualify • - You must do this to earn credits • - Supplemental Security Income abbr • - Some Social Security income is this • - Social Security Administration abbr • - Monthly payment from Social Security • - Income used to calculate your benefit • ...
Computer Comunications 2025-10-10
Across
- what is a cyber security crime that involves sending emails to trick users into clicking on a scam link?
- what stores webpages?
- how is data sent over fibre optic cables?
Down
- what is a service of the internet that contains websites, web pages, and the links between them.
- what is an unsafe access point installed on a network without the owners permission?
- type of website that allows you to look up information on the World Wide Web.
6 Clues: what stores webpages? • how is data sent over fibre optic cables? • type of website that allows you to look up information on the World Wide Web. • what is an unsafe access point installed on a network without the owners permission? • what is a service of the internet that contains websites, web pages, and the links between them. • ...
Games Closing Coaching Clinic 2023 2023-03-31
4 Clues: Angka yang selalu naik dan tidak bisa turun • Sesuatu yang dimiliki orang, tapi tidak bisa dicuri • Angka yang kalau naik bikin seneng, kalau turun bikin sedih • Sesuatu yang krusial dan perlu dijaga dalam dunia cyber security
Cyber Threats & Security 2023-01-09
Across
- any illegal activity done through internet
- act of stealing and misuse of someone's personal information
Down
- means hoax or misleading
- in it, an attacker harasses a victim through e-mails, social media, chat rooms, blogs, instant messaging and etc.
- an act of harming or harassing through information technology
5 Clues: means hoax or misleading • any illegal activity done through internet • act of stealing and misuse of someone's personal information • an act of harming or harassing through information technology • in it, an attacker harasses a victim through e-mails, social media, chat rooms, blogs, instant messaging and etc.
lesson 5 black 2024-05-29
31 Clues: @ • car • oil • road • tire • fast • chest • trunk • mouse • delete • stereo • garage • charge • charge • screen • street • channel • battery • network • browser • charger • printer • highway • keyboard • workshop • password • turn off • suitcase • cyber cafe • windshield • application
A Small Town Christmas 2025 2025-11-20
26 Clues: Hat • Snow • Nine • Elves • Seven • Grant • Macy's • Florida • Arizona • Egg Nog • Cookies • Rudolph • Virginia • Shepherds • Coca Cola • Fraser Fir • North Pole • Holy Berry • Poinsettia • Gingerbread • Rockefeller • Cyber Monday • Thomas Edison • Chocolate Chip • Happy Birthday • Charles Dickens
english class 2024-07-18
Across
- a person who knows about languages and using them to create web platforms
- It is a non-physical site that is used to store information
- It is a project that is executed by the IT team
Down
- It is a set of rules that are used to perform internal calculations and manipulate data
- is the science of feedback-based communication and control systems
- is the practice of defending computers, servers, and mobile devices from malicious attacks.
6 Clues: It is a project that is executed by the IT team • It is a non-physical site that is used to store information • is the science of feedback-based communication and control systems • a person who knows about languages and using them to create web platforms • It is a set of rules that are used to perform internal calculations and manipulate data • ...
cyber puzzle 2024-11-15
Across
- This word maintain the accuracy and trustworthinessof data over its entire lifecycle
- Deliberate actions intended to harm, damage, or disrupt a system, person, or organization.
- Measures or systems designed to protect against threats, damage, or unauthorized access.
Down
- This word ensures that information and resources are accessible to authorized users when needed.
- This word ensures that sensitive information is only accessible to authorized individuals.
- The state of being protected from danger, theft, or unauthorized use of resources.
- A term used to describe anything related to computers, networks, or the internet.
7 Clues: A term used to describe anything related to computers, networks, or the internet. • The state of being protected from danger, theft, or unauthorized use of resources. • This word maintain the accuracy and trustworthinessof data over its entire lifecycle • Measures or systems designed to protect against threats, damage, or unauthorized access. • ...
Cyber monday 2024-11-28
10 Clues: WHAT YOU BUY ONLINE • A WEB PAGE FOR SHOPPING • A BARGAIN DURING SHOPPING • HOW QUICKLY ITEMS SELL OUT • WHAT YOU SAVE DURING SALES • DISCOUNTS DURING CYBER MONDAY • A SET OF CHARACTERS FOR DISCOUNTS • WHAT YOU DO ONLINE ON CYBER MONDAY • WHAT YOU DO WITH A MOUSE TO SELECT • WHERE YOU KEEP ITEMS WHILE SHOPPING
DoIT Cybersecurity Week 2026 Crossword 2026-03-04
Across
- A student account becomes _____________ when a cyber attacker successfully gains access into their sign-on.
- In an attack, the cyber attacker will often try to perform _______ movement to maintain access through other student accounts.
- A formalized guideline or baseline requirement to protect information or systems.
- To provide something you know plus something you have or something you are.
- A malicious social engineering tactic through email asking for the user to provide personal information or take action.
Down
- An action or feature available when new software is released for your computer.
- Cyber attackers will often use ___________ as a tactic to be someone they are not.
- Get a strange email? Stop! _______ it!
- A malicious software intended to harm your computer system.
- Following the sunset of beachnet+. This Wi-Fi is now used across campus.
- A malicious attack through phone text messaging.
- Trainings and events centered on cybersecurity strengthen this characteristic.
12 Clues: Get a strange email? Stop! _______ it! • A malicious attack through phone text messaging. • A malicious software intended to harm your computer system. • Following the sunset of beachnet+. This Wi-Fi is now used across campus. • To provide something you know plus something you have or something you are. • ...
Cyber security and EthicsCross Word 2023-08-25
Across
- Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
- The use of a computer and telecommunication devices as an instrument to perform illegal activities
- An area of data protection that concerns the proper handling of sensitive data
- Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
- Extortion software that can lock your computer and then demand a ransom for its release.
Down
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
- Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- Unsolicited messages sent in bulk by email
9 Clues: Unsolicited messages sent in bulk by email • An area of data protection that concerns the proper handling of sensitive data • Extortion software that can lock your computer and then demand a ransom for its release. • The use of a computer and telecommunication devices as an instrument to perform illegal activities • ...
Annajmu 2024-10-04
14 Clues: 3A • Cyber • Muroqobah • Tahun nabi • garuda biru • Pemberontakan • Jembatan labil • Sholat,Merdeka • Paling sempurna • Pandangan Pertama • Almuna Bidadariku • Musyawarah Mufakat • Kesaktian pancasila • Departement Pendidikan
Cybersecurity Crossword Puzzle 2025-03-14
Across
- Hackers engaging in illegal activities.
- Fraudulent attempt to steal data.
- Overloading systems by traffic flood.
- Manipulating people for sensitive data.
- Converting data into a secure format.
- Malware that demands payment for release.
- A weakness in system security.
- Malicious software disguised as useful.
- Advanced Wi-Fi security proticol.
- Trying all possible combinations to crack passwords.
- Unauthorized access to confidential data.
- Malicious software designed for harm.
Down
- Verifying user identity through credentials.
- Maliciouse code that replicates and spreads.
- Virtual Private Network for encrypted connections.
- Ethical hackers who improve security.
- Software that detects and removes malware.
- Software that secretly gathers information.
- Network security to monitor traffic.
- Update fixing security flaws or bugs.
20 Clues: A weakness in system security. • Fraudulent attempt to steal data. • Advanced Wi-Fi security proticol. • Network security to monitor traffic. • Overloading systems by traffic flood. • Ethical hackers who improve security. • Converting data into a secure format. • Update fixing security flaws or bugs. • Malicious software designed for harm. • ...
Architectures 2022-02-25
Across
- A way to refer to the manner in which the link and nodes of a network are arranged to relate to each other.
- Architecture defined as center of computational power, storage, and applications necessary to support an enterprise business.
- Sub Architecture what works as a device that provides functions or services for clients.
- Architecture defined as devices specialized in protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic.
Down
- Type of device that belongs to Enterprise Switching.
- Defined as a collaboration endpoints
- Device that is also called as access point
- Sub architecture that belongs to Enterprise Networking.
8 Clues: Defined as a collaboration endpoints • Device that is also called as access point • Type of device that belongs to Enterprise Switching. • Sub architecture that belongs to Enterprise Networking. • Sub Architecture what works as a device that provides functions or services for clients. • ...
Cloud Security and Data Privacy in Industrial IoT 2024-12-02
Across
- A technology that creates a virtual representation of physical hardware, such as servers, storage, and networks
- The unauthorized alteration or manipulation of devices, systems, or data to disrupt operations.
- A decentralized digital ledger used to securely record transactions across multiple systems.
- The principle of ensuring that information is accessible only to authorized users and systems.
- The implementation of measures to safeguard systems, networks, and data against cyber threats and attacks.
- A device that detects the change in the environment and responds to some output on the other system.
- The assurance that an individual or entity cannot deny the authenticity of their actions or communications.
- A mechanical or electronic component that performs actions based on control signals from a system.
- Malicious software designed to disrupt, damage, or gain unauthorized access to systems or data.
- The process of granting or denying specific permissions to a verified user or system.
- A framework that ensures the right individuals have appropriate access to technology resources.
- The process of verifying the identity of a user or device to ensure legitimate access.
- A cloud-based software delivery model where applications are accessed via a subscription over the internet.
Down
- A cyberattack where malicious code is inserted into a program or script to exploit vulnerabilities.
- An attack where a perpetrator intercepts and manipulates communication between two parties.
- The use of IoT technologies in industrial settings to enhance operational efficiency and automation.
- A type of key helps a user encrypt the available data while the private key decrypts it
- The process of securely creating, storing, distributing, and managing cryptographic keys.
- A security tool that monitors and filters network traffic to block unauthorized access while allowing legitimate communication.
- The process of converting readable data into a cipher text to prevent unauthorized access.
- A distributed computing paradigm that processes data near its source to minimize latency and improve efficiency.
- The practice of protecting personal or sensitive information from unauthorized access or disclosure.
- The assurance that data remains accurate, consistent, and unaltered during transmission or storage.
- A cyberattack that overwhelms a system or network to make it unavailable to users.
- Actions taken to reduce the severity or impact of identified security risks or vulnerabilities.
- Deliberate actions designed to exploit vulnerabilities in systems to gain unauthorized access or cause damage.
26 Clues: A cyberattack that overwhelms a system or network to make it unavailable to users. • The process of granting or denying specific permissions to a verified user or system. • The process of verifying the identity of a user or device to ensure legitimate access. • A type of key helps a user encrypt the available data while the private key decrypts it • ...
Impacts of cybersecurity attacks 2021-09-16
Across
- Denial of _______ attacks prevent customers from being able to access websites
- Identity _____ occurs when someone takes a credit card out in the victim’s name
- Data _____ is changing the amount of money in a bank account for an attacker to withdraw
Down
- Data _____ occurs when data is destroyed by a cyber-security attacker and no longer exists
- A type of data that can be stolen
- _________ theft is when personal details are stolen and used to make a copy of someone
- The changing of data for example on Twitter resulting in false news
7 Clues: A type of data that can be stolen • The changing of data for example on Twitter resulting in false news • Denial of _______ attacks prevent customers from being able to access websites • Identity _____ occurs when someone takes a credit card out in the victim’s name • _________ theft is when personal details are stolen and used to make a copy of someone • ...
CYBER ETHICS 2025-07-29
Across
- Unwanted and often harmful bulk emails. |
- Online etiquette or good manners on the internet. |
- Legal right granted to an inventor for a new invention. |
- Installing one licensed software copy on multiple devices illegally. |
- Theft Stealing someone's personal information for fraudulent use. |
- Illegally breaking into systems to steal sensitive information. |
- Illegal intrusion into a computer system or network. |
- Footprint Online data left behind from a user's digital activity. |
Down
- Using technology to harass or harm someone on purpose. |
- Piracy Copying and distributing software illegally. |
- Not morally correct or acceptable, especially in the digital world. |
- Tricking users into clicking something they didn't intend to. |
- Presenting someone else's work or ideas as your own. |
- Legal protection for original creative work. |
- Using phone calls or VoIP to steal personal information. |
- Attempting to trick someone into revealing personal info via fake emails. |
- A program that disrupts a computer's normal functioning. |
- Criminal activity involving computers, networks, or the internet. |
- Bombing Sending repeated spam to overflow someone’s inbox. |
- Law Rules and restrictions imposed on online users. |
20 Clues: Using technology to harass or harm someone on purpose. | • Unwanted and often harmful bulk emails. | • Online etiquette or good manners on the internet. | • Not morally correct or acceptable, especially in the digital world. | • ...
Learning Unit 10 - A Blueprint and Program for Security 2023-05-26
Across
- Implement mechanisms to continuously monitor and review the effectiveness of the risk management program. Regularly assess the effectiveness of control measures, review incident response plans, and conduct audits and assessments to identify areas for improvement.
- The program should systematically identify and catalogue the information assets within the organization, including data, systems, networks, and applications. This involves understanding the value of these assets, their potential vulnerabilities, and the potential threats they face.
- An information security risk management program should strive for continuous improvement. This involves reviewing and updating risk assessments, control measures, and incident response plans on a regular basis. Lessons learned from security incidents and audits should be used to enhance the organization's security posture.
- Conduct a comprehensive risk assessment to identify and evaluate potential threats, vulnerabilities, and their potential impact on the organization. This includes assessing internal and external risks, such as cyber threats, physical security risks, and operational risks.
- Document the risk management program, including policies, procedures, risk assessments, and incident response plans. Develop reporting mechanisms to provide regular updates to stakeholders, such as management, board of directors, or regulatory bodies.
Down
- Emphasize continuous improvement by regularly reviewing and updating the risk management program. Stay updated on emerging threats, technological advancements, and regulatory changes to ensure the program remains effective and aligned with the evolving security landscape.
- Identify and document the specific risks faced by the organization. This involves identifying critical assets, potential vulnerabilities, and potential threats. Use techniques such as asset inventories, vulnerability assessments, and threat intelligence to gather relevant information.
- An effective risk management program continuously monitors the risk landscape to identify new threats, vulnerabilities, or changes in the organization's risk profile. This includes monitoring emerging trends, security incidents, regulatory changes, and technological advancements that may affect the organization's risk posture.
- In the event of a security incident or breach, the program should have a well-defined and tested incident response plan in place. This ensures that the organization can respond promptly and effectively to mitigate the impact of the incident, minimize damage, and restore normal operations.
- The program should ensure compliance with relevant laws, regulations, and industry standards. It involves establishing appropriate security policies, procedures, and controls, as well as assigning responsibilities and accountability for information security throughout the organization.
10 Clues: Document the risk management program, including policies, procedures, risk assessments, and incident response plans. Develop reporting mechanisms to provide regular updates to stakeholders, such as management, board of directors, or regulatory bodies. • ...
Aidens dictionary 2023-11-28
Across
- The most important software that runs on a computer.
- A high-capacity, self-contained storage device.
- Peripheral device that enables a user to input text into a computer
- It takes the signals that come from your Internet Service Provider.
- The responsibility use of the technology
- Text files with small pieces of data like a username and password.
- A screen that puts out pixels
- Wireless connection that connects you to the internet
- Uniform Resource Locators.
- An application for accessing websites and the Internet.
Down
- A place where u can store pictures and files.
- Video camera that is connected to a computer
- Device that performs many of the same functions as a computer
- It is the opposite of hardware
- is information that is easy to access
- network security device that monitors incoming and outgoing network traffic.
- A type of online fraud where a cyber criminal designs a fake
- Random Access Memory
- network Devices that can exchange data and share resources with each other
- A sequence of characters or encoded information
- computer Opposite of portable computers like laptops
- When you tell the readers that your source came with another writer
- engine Program that searches for and identifies items in a database
- Global network
- Universal Serial Bus
25 Clues: Global network • Random Access Memory • Universal Serial Bus • Uniform Resource Locators. • A screen that puts out pixels • It is the opposite of hardware • is information that is easy to access • The responsibility use of the technology • Video camera that is connected to a computer • A place where u can store pictures and files. • ...
Technical quiz 2025-03-05
Across
- : A security system that monitors and controls incoming and outgoing network traffic
- : The address of a web page on the internet
- : The smallest unit of data in a computer
- : The practice of protecting systems and networks from digital attacks
- : A decentralized and secure method of recording transactions
- : A step-by-step procedure for solving a problem
- : A cyber attack that tricks people into revealing sensitive information
- Computing : An advanced field of computing using quantum mechanics
- Intelligence : Technology that enables machines to mimic human intelligence
Down
- Computing : The delivery of computing services over the internet
- : A device that forwards data between computer networks
- : The process of converting data into a secure, unreadable format
- : The process of finding and fixing errors in code
- : A popular programming language known for its simplicity and versatility
- : A modern type of storage device that is faster than a hard drive
- : A small storage location that stores frequently accessed data for quick retrieval
- : The standard language for creating web pages
- Source : Software whose source code is freely available to the public
- : A material used to make computer chips and electronic devices
- : A test used to determine whether a user is human or a bot
20 Clues: : The smallest unit of data in a computer • : The address of a web page on the internet • : The standard language for creating web pages • : A step-by-step procedure for solving a problem • : The process of finding and fixing errors in code • : A device that forwards data between computer networks • : A test used to determine whether a user is human or a bot • ...
Networking and cyber ethics 2025-05-26
Across
- : Unique address assigned to each device on a network
- : Rules for correct and safe behavior on the internet
- : A program that detects and removes viruses
- : Malicious software
- : A person who gains unauthorized access to computer systems
- : A device that connects different networks together
- required crossword generation library isn't available in this environment. However, I can provide you with a formatted text version that you can paste into Crossword Labs or Discovery Puzzlemaker, which will generate the puzzle and let you download it as a PDF or image.
- : A private network used within an organization
- : Unauthorized duplication of digital contens
- : The physical layout of a computer network
- : Temporary storage for recently accessed data
- : Device used to connect to the internet
- : Online act of bullying or harassment
Down
- : Network that covers a small geographic area like a home or office
- : A global network connecting millions of computers
- Networking and Cyber Ethics
- how to do it using Crossword Labs:
- : Communication over a network in real time
- : Protecting personal and sensitive information online
- : Security measure requiring username and password
- : Process of converting data into a secure format
- the following format into the Crossword Labs input box:
- : A scam to trick users into revealing personal information
- : Lawful and responsible use of technology
24 Clues: : Malicious software • Networking and Cyber Ethics • how to do it using Crossword Labs: • : Online act of bullying or harassment • : Device used to connect to the internet • : Lawful and responsible use of technology • : Communication over a network in real time • : The physical layout of a computer network • : A program that detects and removes viruses • ...
Cybersecurity Concepts 2024-03-31
Across
- a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system
- the name commonly given to unwanted emails
- Made up of devices that are all connected to each other, like computers and
- a security system that forms a virtual perimeter around a network of workstations preventing an attack
- the process of verifying the identity of a user or piece of information
Down
- a process of maintaining data confidentiality by converting plain data into secret code
- makes sure that there are no unauthorized changes to information of systems
- A Virtual Private Network
- a collection of compromised computers running malicious programs that are controlled remotely by a cyber-criminal
- a program that gives a hacker remote access to, and control over, a computer or network
10 Clues: A Virtual Private Network • the name commonly given to unwanted emails • the process of verifying the identity of a user or piece of information • makes sure that there are no unauthorized changes to information of systems • Made up of devices that are all connected to each other, like computers and • ...
National Cyber Security Awareness Month 2017-08-09
Across
- A cryptographic algorithm for encryption and decryption.
- Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack?
- What is the term for electronic mail?
- Abbreviation for a physical address; a numeric value that uniquely identifies that network device from every other device on the planet.
Down
- What is the term to describe connecting multiple separate networks together?
- The term used for attacks that try to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer?
- What is the abbreviation for the University's Technology group on-campus?
- What is it called when someone encrypts your files and asks for money to decrypt them?
- What is the basic communication language or protocol of the Internet?
9 Clues: What is the term for electronic mail? • A cryptographic algorithm for encryption and decryption. • What is the basic communication language or protocol of the Internet? • What is the abbreviation for the University's Technology group on-campus? • What is the term to describe connecting multiple separate networks together? • ...
National Computer Security Crossword 2023-11-21
Across
- historically IT departments drink a lot of this.
- Malicious software designed to block access to a computer system until a sum of money is paid
- Fraudulent email that looks like it comes from a reputable company attempting to get personal information
- ___________Authentication a safety measure using another means in addition to your password and user name to gain access to a program or computer
- ________bullying is using the internet, social media and other electronic means to post harmful, negative or threatening things about someone else
- these should be constructed with at least 12 characters consisting of upper and lower case letters, a number and a special character.
- fraudulent phone calls trying to trick you into revealing personal information or requesting money
Down
- a flaw or weakness in a computer system that could be exploited in order to violate the systems security.
- Always_____ your computer then you leave your workspace or are not directly using it.
- a security measure that can be taken to make your email safe to send PHI if necessary.
- ______down your computer when placing it in a carrying case and at least once a day so that HIT can send it information and updates.
- _______ Media Facebook, Twitter, Instagram are examples of this.
- authorization signed by a client so that protected health information can be shared or requested or can be shared
- ________ IT is software and devices used without the Health IT Department knowledge or control
14 Clues: historically IT departments drink a lot of this. • _______ Media Facebook, Twitter, Instagram are examples of this. • Always_____ your computer then you leave your workspace or are not directly using it. • a security measure that can be taken to make your email safe to send PHI if necessary. • ...
HH2 2016-08-31
4 Clues: the peach state • Event you are currently at • the concept that small causes can have large effects. • is a global leader in InfoSec Cyber Security certification programs like Certified Ethical Hacker and Computer Hacking Forensic Investigator.
Chapter 11 Security Plus 2024-05-02
Across
- IT services using resources that are traditionally bound to hardware
- Virtualizing parts of physical network for reconfiguration.
- Special security challenges in spanning public/private spaces.
- VM breaking out to interact with host OS.
- Linux security architecture for access control.
- On-demand infrastructure for configurable computing resources.
- Dividing application development into smaller, manageable entities.
- Simplifies the process of building, deploying, and managing containerized applications
- Virtualized service extending WAN networks.
- Table listing security duties of user and cloud provider.
- Computing resources located on organization’s campus.
- AWS Lambda, Microsoft Azure Functions, Google Cloud Functions
- integrated, cloud-centric, and user-centric approach to network security.
Down
- External providers offering cloud security controls.
- Cloud security controls to mitigate vulnerabilities.
- Unique challenges to securing cloud usage.
- Method of packaging, distributing, and running applications .
- Equipment and personnel spread across different locations.
- provision computing infrastructure using code instead of manual processes.
- Local equipment and personnel at organization’s campus computing.
- Virtualization vulnerability exposing data to another VM.
21 Clues: VM breaking out to interact with host OS. • Unique challenges to securing cloud usage. • Virtualized service extending WAN networks. • Linux security architecture for access control. • External providers offering cloud security controls. • Cloud security controls to mitigate vulnerabilities. • Computing resources located on organization’s campus. • ...
Industrial security 2025-10-22
Across
- – A signaling device used to alert personnel to security breaches or emergencies.
- – A system or method used to regulate who can enter or exit specific areas within a facility.
- – Closed-Circuit Television system used for surveillance and monitoring of premises.
- – A formal statement of principles and rules to guide security practices within an organization.
- – A weakness in security systems that can be exploited by threats or unauthorized individuals.
- – Refers to tangible security measures like locks, fences, and barriers.
- – A trained personnel responsible for protecting property, assets, and people from harm or theft.
- – A designated safe route used during fire or other emergencies.
- – The deliberate destruction, damage, or obstruction of work, materials, or processes to weaken security or productivity.
- – A systematic process of identifying, evaluating, and prioritizing potential hazards or threats.
Down
- – Continuous observation of activities to detect and prevent security breaches.
- – A detailed set of procedures to ensure safety and business continuity during emergencies.
- – The act of stealing small quantities of goods or materials over time, often by employees.
- – Safeguarding an organization’s physical and intangible resources against theft or loss.
- – Training and education programs that inform personnel about proper security practices.
- – Unauthorized entry into a protected area or system.
- – Ensuring that sensitive information is only accessible to authorized individuals.
- – A defined step-by-step process for completing security-related tasks properly and safely.
- – A centralized area where monitoring, communication, and response systems are managed.
- – Any indication or potential cause that can harm or disrupt security and safety.
20 Clues: – Unauthorized entry into a protected area or system. • – A designated safe route used during fire or other emergencies. • – Refers to tangible security measures like locks, fences, and barriers. • – Continuous observation of activities to detect and prevent security breaches. • – A signaling device used to alert personnel to security breaches or emergencies. • ...
Security 2019-04-23
Across
- first line of defense and must remain locked at all times, using conventional key and lock, or a physical bolt.
- to help prevent unsolicited e-mail; can be applied to a network at the mail server or utilizing a cloud-based service.
- small reinforced attachment that facilitates locking the device to a secure object such as a desk.
- following an authorized user through a secure entrance
- small rooms with two doors leading to a secure area.
- used to verify to allow access to areas.
Down
- can be used to allow keyless entry into secure areas.
- used when sensitive data is normally transmitted in an encrypted format to protect the data.
- security methods such as iris scans, hand, and fingerprint scanners.
- used to grant keyless access to secure areas.
- is an attempt to obtain information fraudulently
- used to access secure areas; identify a user and allow access.
12 Clues: used to verify to allow access to areas. • used to grant keyless access to secure areas. • is an attempt to obtain information fraudulently • small rooms with two doors leading to a secure area. • can be used to allow keyless entry into secure areas. • following an authorized user through a secure entrance • ...
Chapter 3 - Countermeasure in Cybersecurity 2026-01-12
Across
- Security classification related to storage media like USB drives and disks
- Software layer where users interact with systems
- Security device that filters incoming and outgoing network traffic
- Infrastructure that focuses on storing and managing data
- A fake system designed to trap and study attackers
- Security system that detects suspicious activities in a network
- Minimum security standard that systems must follow
- IT infrastructure responsible for managing communication between systems
Down
- Type of IT infrastructure that includes servers, computers, and hardware
- Tool used to scan networks and discover active devices
- Process of strengthening an application by removing unnecessary features
- A secure tunnel used to protect data over public networks
- Security design that shows how security components are arranged in a network
- Tool used to capture and analyze network traffic
- Small update released to fix a specific security vulnerability
- Physical security method that uses fingerprints or facial recognition
- Network area that separates internal systems from the internet
17 Clues: Tool used to capture and analyze network traffic • Software layer where users interact with systems • A fake system designed to trap and study attackers • Minimum security standard that systems must follow • Tool used to scan networks and discover active devices • Infrastructure that focuses on storing and managing data • ...
vocabulary 2025-03-13
14 Clues: To tag • La red • To Add • To chat • En linea • Followers • Dashboard • Compartir • To search • To Download • Actualizacion • Iniciar sesion • Cyber Bullying • Foto de perfil
Architectures 2022-02-25
Across
- A way to refer to the manner in which the link and nodes of a network are arranged to relate to each other.
- Architecture defined as devices specialized in protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic.
- Sub architecture that belongs to Enterprise Networking.
- Architecture defined as center of computational power, storage, and applications necessary to support an enterprise business.
Down
- Type of device that belongs to Enterprise Switching.
- Defined as a collaboration endpoints
- Sub Architecture what works as a device that provides functions or services for clients.
- Device that is also called as access point
8 Clues: Defined as a collaboration endpoints • Device that is also called as access point • Type of device that belongs to Enterprise Switching. • Sub architecture that belongs to Enterprise Networking. • Sub Architecture what works as a device that provides functions or services for clients. • ...
Cybersecurity 2024-04-03
Across
- A piece of audio or video that has been altered and changed to make it seem authentic or credible.
- Software designed to detect, prevent, and remove malicious software from computers.
- A malware that spreads through networks without human interaction.
Down
- A cybersecurity specialist who uses their skills to find and fix vulnerabilities in computer systems.
- A cyber-attack that floods a network or website with excessive traffic to disrupt service.
- A barrier that monitors and controls network traffic based on security rules.
- An online scam involving the impersonation of reputable entities to obtain sensitive personal information.
- A technology that secures connections over the internet, providing secure access to private networks.
8 Clues: A malware that spreads through networks without human interaction. • A barrier that monitors and controls network traffic based on security rules. • Software designed to detect, prevent, and remove malicious software from computers. • A cyber-attack that floods a network or website with excessive traffic to disrupt service. • ...
October 2025-10-14
Across
- Companies with a dedicated fraud program spent 42% less on response and 17% less on ______ costs than those companies with no program in place.
- Organizations are evaluating the concept of ______ compliance costs and developing a common utility.
- Cognizant's ______ intelligence offering provides intelligent and actionable recommendations to customers.
- Financial Institutions consider ______ and data breaches as the most significant challenges.
- Some large banks have introduced account security features based around ______ data.
Down
- AI-based models will increase operational ______ by catching fraud in real-time or proactively.
- Cognizant's AI Models for Fraud management achieved over 99.5% ______ at a Global Technology Giant.
- Unauthorized access to customer bank accounts is often obtained through social ______.
8 Clues: Some large banks have introduced account security features based around ______ data. • Unauthorized access to customer bank accounts is often obtained through social ______. • Financial Institutions consider ______ and data breaches as the most significant challenges. • ...
Fallout New Vegas Crossword 2020-04-04
Across
- song: – by the number
- leader of ghouls at REPCONN test site
- song: beacon that shines calling us home
- home of the Kings
- song: "without a dream in my heart"
- creatures with venomous stingers
- song: "I'm down so doggone low"
- "race" of REPCONN tour guide
- former gold mining town
- bipedal predator
- Canyon with a drug lab
- cyber-hound
- gay scientist; Followers of the Apocalypse
- used for horns, hide, milk, and meat
- common bug
- put Hidden Valley bunker on lockdown
- – Canyon; along the southern border
- Courier starts here
- like fish: slimy, scaly, but with legs
Down
- red-skinned soldiers of The Divide
- vacation rentals
- song: be sure it's true because it's a sin...
- "doctor" in Novac
- song: you let the blues move in
- – Farmstead; full of Vipers
- song: Always "playing it again"
- song: ranger v outlaw
- song: stars shine at this time
- fire ants love this lake
- orange-winged experiments
- Enclave eyebot
- historic event at Bitter Springs
- reptilian-humanoids
- scythe-wielding bug
- necrotic post-humans
- Dinky the T-Rex's home town
- NCR captain; Legion spy
- joyous security unit
- song: about a(n) – heart
- Nero's right-hand man
40 Clues: common bug • cyber-hound • Enclave eyebot • vacation rentals • bipedal predator • "doctor" in Novac • home of the Kings • reptilian-humanoids • scythe-wielding bug • Courier starts here • necrotic post-humans • joyous security unit • song: – by the number • song: ranger v outlaw • Nero's right-hand man • Canyon with a drug lab • former gold mining town • NCR captain; Legion spy • ...
Computer puzzle 2025-05-30
Across
- meaning of the instructions
- used in machine language
- Programming languages are used in a wide range of applications, including software development, web development, data analysis, and machine learning.
- like data types, variables, control structures (loops and conditional statements), and functions.
- Criminal activity to harm anyone using a computer
- Sofware that helps in preventing unauthorised access to your computer by blocking unsolicited communication
- security Protects your devices
- It is also known as unethical hackers
- Receiver of a message is fooled into believing that the message is received by him but it is not
- high-level languages
- Means hoaxing or misleading
- It is an illegal entry into a computer system or network
- It is the act of sending an email to a user; misleading him to beleive that it is from a trusted person
Down
- It is an act of harming or harassing using information technologically in a deliberate manner
- language low-level languages
- The process of 'be friendly' children on social media to facilitate online
- theft It refers to the act of stealing and misusing someone's personal information
- rules for how instructions are written
- It is a program that disrupts the normal functioning of a computer
- frauds Illegal methods to get money
20 Clues: high-level languages • used in machine language • meaning of the instructions • Means hoaxing or misleading • language low-level languages • security Protects your devices • frauds Illegal methods to get money • It is also known as unethical hackers • rules for how instructions are written • Criminal activity to harm anyone using a computer • ...
Networking and cyber ethics 2025-05-26
Across
- : Unique address assigned to each device on a network
- : Rules for correct and safe behavior on the internet
- : A program that detects and removes viruses
- : Malicious software
- : A person who gains unauthorized access to computer systems
- : A device that connects different networks together
- required crossword generation library isn't available in this environment. However, I can provide you with a formatted text version that you can paste into Crossword Labs or Discovery Puzzlemaker, which will generate the puzzle and let you download it as a PDF or image.
- : A private network used within an organization
- : Unauthorized duplication of digital content
- : The physical layout of a computer network
- : Temporary storage for recently accessed data
- : Device used to connect to the internet
- : Online act of bullying or harassment
Down
- : Network that covers a small geographic area like a home or office
- : A global network connecting millions of computers
- Networking and Cyber Ethics
- how to do it using Crossword Labs:
- : Communication over a network in real time
- : Protecting personal and sensitive information online
- : Security measure requiring username and password
- : Process of converting data into a secure format
- the following format into the Crossword Labs input box:
- : A scam to trick users into revealing personal information
- : Lawful and responsible use of technology
24 Clues: : Malicious software • Networking and Cyber Ethics • how to do it using Crossword Labs: • : Online act of bullying or harassment • : Device used to connect to the internet • : Lawful and responsible use of technology • : Communication over a network in real time • : The physical layout of a computer network • : A program that detects and removes viruses • ...
Types of threats 2019-01-09
Across
- Malware that allows a cyber-security attacker to take control of an infected computer.
- Program that hides in a computer and allows someone from a remote location to take full control of the computer.
- Horse A program that appears desirable but actually contains something harmful. They can copy themselves, steal information, or harm the host computer.
- pro quo Criminals promise a service in exchange for details - a common example is offering help with IT problems
- An attacker entering a secured building by following an authorized employee through a secure door and not providing identification.
- When someone deceives by pretending to be someone else in order to get personal data.
- An error in a program that prevents the program from running as expected.
- Advertising-supported software. Any software that shows adverts, such as popups. It can be harmless, but can include spyware.
Down
- Collection of captured bot computers
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- Software that encrypts programs and data until a ransom is paid to remove it.
- An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
- surfing Watching an authorized user enter a security code on a keypad.
- Criminals make a promise of goods in return for details, such as offering a free music download.
- A type of Malware that locates and saves data from users without them knowing about it.
- error in a program that prevents the program from running as expected.
- A destructive computer program that bores its way through a computer's files or through a computer's network.
17 Clues: Collection of captured bot computers • surfing Watching an authorized user enter a security code on a keypad. • error in a program that prevents the program from running as expected. • An error in a program that prevents the program from running as expected. • Software that encrypts programs and data until a ransom is paid to remove it. • ...
TTH: The story 2017-01-16
Across
- what do superheroes use for tax calculations?
- the nerve center of the security operation - a great place to display the dashboard
- there is an apb oin a sketchy character, so ...
- the part of the risk equation that you cannot control
- In many cases this is the security company's client
- putting client expecttaions and delivery down on paper
- world's largest security association. You down with CPP, Ya you know me ...
- a guard does one every DAY
- Think mobile. Normally faster than a web based app
- it ain't fencing, but it makes a heck of an outline.
- adaptable to any size security organisation, TrackTik is ...
- the intersection of physec and infosec
Down
- The stuff that the guard just needs to know
- Use mobile+ to dispatch a team to respond to this
- what a security company in the UK does when it schedules a guards (while sipping tea)
- watchmode
- Line up behind a common goal and define results (abrv)
- coding language for heroes
- corporate security professionals want this, bread crumbs help
- The foundation of your security program
- certain things are better as a service, like software
- Money coming in to the company
- R&D credits in Canada. Tear it up.
- drop the word service, name of the company that hosts superhero data
- The big kahuna of the security world, part of the C-suite
25 Clues: watchmode • coding language for heroes • a guard does one every DAY • Money coming in to the company • R&D credits in Canada. Tear it up. • the intersection of physec and infosec • The foundation of your security program • The stuff that the guard just needs to know • what do superheroes use for tax calculations? • there is an apb oin a sketchy character, so ... • ...
h28 2024-06-24
Across
- Apocalyptic events
- Aquatic terror
- Egyptian curses
- Mind powers
- Stick to Dracula
- Scary humor
- Crime and horror
- Stick to gore
- Childfriendly frights
- Ghostly places
- Bug attacks
Down
- Aesthetic horror
- Beastly attacks
- Vampiric tales
- Romantic zombies
- Digital dread
- Multiple stories
- Cursed artifacts
- Stick to slasher
- Adolescent horror
20 Clues: Mind powers • Scary humor • Bug attacks • Digital dread • Stick to gore • Aquatic terror • Vampiric tales • Ghostly places • Beastly attacks • Egyptian curses • Aesthetic horror • Stick to Dracula • Romantic zombies • Multiple stories • Crime and horror • Cursed artifacts • Stick to slasher • Adolescent horror • Apocalyptic events • Childfriendly frights
Disruptive Technology 2025-07-23
13 Clues: Mesh • cloud • Reality • Screening • Computing • Automation • technology • Intelligence • Intelligence • Immune System • Authentication • Liability Insurance • Detection and Response
Neptunus Crossword Puzzle 2017-09-20
Across
- At what event location was the Salacia built for the first time?
- What is the campaign name of our security IT project?
- Our Neptunus team jumped in the canals for this charity event.
- What is the name of the new round Evolution?
- What’s the name of our weekly Facebook post?
- What is the nickname of Andy Coleman?
- What was the surname of Hans Eilers' father, the founder of Neptunus?
- What animals arrived – after a long flight – in our storage hall at Schiphol?
- Which prestigious political event took place in Brussels in May?
- Where is our Belgian Office located?
Down
- Where is our production facility based?
- In which year was Neptunus founded?
- Near which bigFrench City did the airshow take place?
- What was the name of the Trophy skiers could win in Zagreb early January?
- Since last year, we frequently supply structures for this royal location.
- Who said good-bye (retired) to Neptunus in 2016?
- Which world famous violinist and conductor is among our clients?
- What kind of 'attack' on online systems took place early/mid-May?
- Where are we moving the sports hall of Lorentzweiler to?
- Which sport is practiced in the new sports hall at Papendal?
- We received three of these Neptunus vans.
21 Clues: In which year was Neptunus founded? • Where is our Belgian Office located? • What is the nickname of Andy Coleman? • Where is our production facility based? • We received three of these Neptunus vans. • What is the name of the new round Evolution? • What’s the name of our weekly Facebook post? • Who said good-bye (retired) to Neptunus in 2016? • ...
Creative Role Puzzle Maker The Eye of Minds 2019-04-24
Across
- Short for the VirtNet Security
- "To catch a hacker, you need a ______"
- Where Kaine's base is located
- The genre of the book "The Eye of Minds"
- Creatures programmed by Kaine to suck the life out of player's auras
- She gave Michael guidance to find Kaine but got attacked by KillSims
- A virtual reality system containing various games for players in their sleep
- A path that leads to Kaine
- A club that Michael and his friends hacks into in order to meet Ronika
- A program created by Kaine
Down
- A gamer who mysteriously disappeared from the VirtNet
- A victim of Kaine who commited suicide by ripping out her core and jumping off a bridge
- A barber in Lifeblood who helped Michael by giving him information
- A game in VirtNet where The Path could be found
- The main character/protagonist in the story
- The most popular game in VirtNet that features a recreation of real life
- A player's virtual body
- The girl who hacked into the Black and Blue club, one of Michael's friends
- A cyber-terrorist that the VNS wants to catch; the antagonist of the story
- This separates a player's virtual body from their real life body
20 Clues: A player's virtual body • A path that leads to Kaine • A program created by Kaine • Where Kaine's base is located • Short for the VirtNet Security • "To catch a hacker, you need a ______" • The genre of the book "The Eye of Minds" • The main character/protagonist in the story • A game in VirtNet where The Path could be found • ...
Terminologies Related to RA 10175 2023-10-26
Across
- instruction, communication with, storing data in, retrieving data from
- an electronic, magnetic, optical, electrochemical, or other data processing
- keeping of data that already exists in a stored form
- refers to any information contained in the form of computer data
- gathering and receiving information
- listening to, recording, monitoring or surveillance of the content of communications
- refers to the DOJ – Office of Cybercrime
- either the Cybercrime Investigation and Coordinating Center
- transmission of information through information and communication technology
- comprehensive plan of actions designed to improve the security and enhance cyber resilience
Down
- National Bureau of Investigation and the Philippine National Police
- collection of tools, policies, risk management approaches and actions
- representation of information, knowledge, facts, concepts or instructions which are being prepared
- refers to any computer data other than the content of the communication
- person who created or is the origin of the assailed electronic statement
- a person who hosts or who proposes to host internet content
- modification or change, in form or substance, of an existing computer data or program
- a set of instructions executed by the computer to achieve intended results
- any representation of facts, information, or concepts in a form suitable for processing in a computer system
- mathematical algorithm produced against digital information
20 Clues: gathering and receiving information • refers to the DOJ – Office of Cybercrime • keeping of data that already exists in a stored form • a person who hosts or who proposes to host internet content • either the Cybercrime Investigation and Coordinating Center • mathematical algorithm produced against digital information • ...
TTS Informatika_Nazala_XH_27 2025-04-15
Across
- diseminasi konten digital merupakan ... konten digital
- orang yang bekerja untuk menganalisis data disebut data..
- orang yang bertugas untuk memastikan keamanan website/aplikasi disebut ...security specialist
- fitur yang digunakan untuk menghindari konten negatif pada google adalah...
- software developer adalah seorang yang bertugas untuk .... sebuah aplikasi atau perangkat lunak
- Siapa yang bertanggung jawab untuk memvalidasi konten negatif di sebuah platform digital? penyelenggara...
- pelanggan haki dapat dikenakan hukuman penjara atau...
- platform diseminasi konten digital, dimana hanya berisi video
- Hak eksklusif bagi pencipta untuk mengumumkan atau memperbanyak ciptaannya disebut hak..
- Hak Kekayaan intelektual disingkat..
- cara melindungi haki yaitu dengan ... karya
- tombol lain yang juga berfungsi untuk memberi perintah menelusuri/mencari..
Down
- apa nama lain dari mesin pencari?
- pekerjaan untuk merancang suatu program disebut.
- apakah konten edukasi termasuk konten negatif?
- salah satu contoh mesin pencari yang paling banyak digunakan..
- konten digital merupakan kombinasi dari gambar,teks, video, dan ...
- tombol yang digunakan untuk memberi perintah menelusuri/mencari..
- Hak eksklusif atas penemuan disebut hak..
- salah satu tujuan diseminasi konten digital adalah ... informasi
- ui/ux designer merupakan pekerjaan untuk... web/program
- Microsoft Excel... merupakan platform diseminasi konten digital
- konten yang memuat unsur SARA, kekerasan,atau pornografi termasuk konten...
- Validasi konten negatif membantu menciptakan lingkungan digital yang... dan sehat
- mengandung ancaman Salah satu indikator .... negatif
25 Clues: apa nama lain dari mesin pencari? • Hak Kekayaan intelektual disingkat.. • Hak eksklusif atas penemuan disebut hak.. • cara melindungi haki yaitu dengan ... karya • apakah konten edukasi termasuk konten negatif? • pekerjaan untuk merancang suatu program disebut. • mengandung ancaman Salah satu indikator .... negatif • ...
Week Two News 2024-12-04
Across
- NFL teams stadium that people went two hours early to in order to dig out their seats
- the number of deaths in the past two years with Amazon vehicles involved
- An actor who opened up about his cancer
- the number of deaths caused by terrible road conditions across the United States
- what a traveler coming back to the United States was removed from and is now held in custody
- what police and first responders are looking in for a missing grandmother
- the Korea that the White House is concerned about
- number of millions of people who traveled during the holiday
- Movie that came out from Disney over the holidays
- the judge who granted 20 adaptations
- Country where hostages are from that are being help across seas
Down
- Trump's pick for his kids father in law
- the person killed while riding a golf cart with her husband
- the holiday on Monday after Thanksgiving
- this was the proof that some of the hostages are still alive
- Trumps pick for Defense Security
- Trump's pick for FBI Director
- the number of pounds of snow in a cubic foot
- number of million dollars expected to be spent during Cyber Monday
- the first name of Joe Biden's son who had gun convictions
- the age that Jonbenet was murdered the day after christmas
21 Clues: Trump's pick for FBI Director • Trumps pick for Defense Security • the judge who granted 20 adaptations • Trump's pick for his kids father in law • An actor who opened up about his cancer • the holiday on Monday after Thanksgiving • the number of pounds of snow in a cubic foot • the Korea that the White House is concerned about • ...
BULLYING 2023-11-22
15 Clues: trauma • memaki • curhat • sosmed • melukai • payudara • penindasan • di sanjung • semena-mena • berani tampil • mengurung diri • melupakan akibat • contoh yang baik • semangat dan penguatan • baik, sopan, suka menolong, disiplin
Neptunus Crossword Puzzle 2017-09-20
Across
- Which sport is practiced in the new sports hall at Papendal?
- What animals arrived – after a long flight – in our storage hall at Schiphol?
- Who said good-bye (retired) to Neptunus in 2016?
- What was the surname of Hans Eilers' father, the founder of Neptunus?
- What was the name of the Trophy skiers could win in Zagreb early January?
- What is the name of the new round Evolution?
- What is the campaign name of our security IT project?
- Which prestigious political event took place in Brussels in May?
- Our Neptunus team jumped in the canals for this charity event.
- What’s the name of our weekly Facebook post?
- In which place was the Salacia built for the first time? (Of Kessel )
- What is the nickname of Andy Coleman?
Down
- Where is our Belgian Office located?
- Which world famous violinist and conductor is among our clients?
- In which French City did the airshow take place? Le Bourget
- In which year was Neptunus founded?
- Where are we moving the sports hall of Lorentzweiler to?
- Where is our production facility based?
- Palace Since last year, we frequently supply structures for this royal location.
- What kind of 'attack' on online systems took place early/mid-May?
- We received three of these Neptunus vans.
21 Clues: In which year was Neptunus founded? • Where is our Belgian Office located? • What is the nickname of Andy Coleman? • Where is our production facility based? • We received three of these Neptunus vans. • What is the name of the new round Evolution? • What’s the name of our weekly Facebook post? • Who said good-bye (retired) to Neptunus in 2016? • ...
Pieces of Our Love Story 2025-07-14
Across
- Grooms degree (_____ Security)
- How many years the Bride & Groom have been married.
- Grooms favorite color.
- Brides degree (_____ Engineering)
- Brides zodiac sign.
- Bride & Grooms favorite board game.
- The name of the Bride & Grooms oldest dog.
- Year Bride & Groom started dating.
- Brides favorite season.
- Grooms rank in the Army.
- Name of Grooms childhood dog.
- Item Groom collects.
- Street name bride grew up on.
- Brides first car.
- Brides favorite TV show.
- Instrument Groom played in school.
- Bride & Grooms favorite artist.
- How many years the Bride & Groom have been together.
Down
- Sport Groom played in highschool.
- High school Bride & Groom attended.
- Street groom grew up on.
- Sport Bride played in college.
- Class Bride & Groom met in.
- Road that the Bride & Groom live on.
- Grooms first car.
- Grooms zodiac sign.
- Grooms college (____ University)
- Name of Grooms fraternity and Brides place of work.
- Brides go-to drink.
- The name of the Bride & Grooms youngest dog.
- Name of Brides childhood dog.
- Where Groom proposed (___ Park).
- Instrument Bride played in school.
- Grooms middle name.
- Grooms go-to drink.
- Brides middle name.
- Brides college (SUNY _____)
- The Bride & Grooms cats name.
- Brides favorite color.
- Brides sport number.
40 Clues: Grooms first car. • Brides first car. • Brides zodiac sign. • Grooms zodiac sign. • Brides go-to drink. • Grooms middle name. • Grooms go-to drink. • Brides middle name. • Item Groom collects. • Brides sport number. • Grooms favorite color. • Brides favorite color. • Brides favorite season. • Street groom grew up on. • Grooms rank in the Army. • Brides favorite TV show. • ...
Horton Wedding 2025-09-26
Across
- Grooms rank in the Army.
- Road that the Bride & Groom live on.
- Where Groom proposed (___ Park).
- Instrument Bride played in school.
- Grooms first car.
- Grooms degree (_____ Security)
- Brides middle name.
- Class Bride & Groom met in.
- Grooms college (____ University)
- Instrument Groom played in school.
- The name of the Bride & Grooms youngest dog.
- Bride & Grooms favorite board game.
- Bride & Grooms favorite artist.
- Grooms favorite color.
- Brides sport number.
- Name of Grooms childhood dog.
- Item Groom collects.
Down
- High school Bride & Groom attended.
- The Bride & Grooms cats name.
- Street name bride grew up on.
- Grooms zodiac sign.
- Brides degree (_____ Engineering)
- Brides favorite color.
- Brides zodiac sign.
- Street groom grew up on.
- Sport Bride played in college.
- Brides college (SUNY _____)
- Brides first car.
- Sport Groom played in highschool.
- Grooms middle name.
- Name of Brides childhood dog.
- Brides go-to drink.
- Grooms go-to drink.
- Brides favorite season.
- The name of the Bride & Grooms oldest dog.
- Year Bride & Groom started dating.
- How many years the Bride & Groom have been married.
- How many years the Bride & Groom have been together.
- Name of Grooms fraternity and Brides place of work.
- Brides favorite TV show.
40 Clues: Grooms first car. • Brides first car. • Grooms zodiac sign. • Brides zodiac sign. • Brides middle name. • Grooms middle name. • Brides go-to drink. • Grooms go-to drink. • Brides sport number. • Item Groom collects. • Brides favorite color. • Grooms favorite color. • Brides favorite season. • Grooms rank in the Army. • Street groom grew up on. • Brides favorite TV show. • ...
Security 2016-12-14
Across
- Do not share your login ___
- In the realm of computers, the act of obtaining secure data by conning an individual into revealing secure information
- Policy, which restrict sending mail to public mail domain
- This is the process of encoding messages or information in such a way that only authorized parties can read it
- All project information must be classified as ___
Down
- Activity to ensure the effectiveness and adequacy of BCP
- When a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain checkpoint
- This can be used only to send personal information like payslip, PF statement from TCS mail domain to public mail domain
- Where does Risks are captured
- All unwanted paper based sensitive documents including confidential and proprietary documents must be ___
- TCS is following ___ standard for business continuity Management
- TCS enterprise wide certified against this ISO standard for information security
12 Clues: Do not share your login ___ • Where does Risks are captured • All project information must be classified as ___ • Activity to ensure the effectiveness and adequacy of BCP • Policy, which restrict sending mail to public mail domain • TCS is following ___ standard for business continuity Management • ...
Cyber Crime 2021-02-10
Across
- It is the part of the malware program that actually executes its designed task
- It is a form of social engineering carried out in electronic form, usually by email, with the purpose of gathering sensitive information.
- It is simply unsolicited email, also known as junk email
- It is a security barrier designed to keep unwanted intruders “outside” a computer system or network while allowing safe communication between systems and users
- A non-malicious surprise contained in a program or on a circuit board installed by the developer
- It is someone who breaks into a computer system or network without authorization and with the intention of doing damage
- It is a malicious program disguised to look like a valid program, making it difficult to distinguish from programs that are supposed to be there
- It is the act of driving around in a vehicle with the purpose of finding an open, unsecured Wi-Fi wireless network
- It is a non-destructive program that is designed to log every keystroke made on a computer
Down
- It is the art of misdirection
- The act of rummaging through the trash of an individual or business to gather information that could be useful for a cyber-criminal to gain access to a system or attain personal information to aid them in identity theft or system intrusion
- It includes viruses, Trojans, worms, time bombs, logic bombs, or anything else intended to cause damage upon the execution of the payload
- It is used to track a user’s Internet surfing habits for advertising purposes in an effort to match user's interests with relevant ads
- It is a malicious program or code that attaches itself to another program file and can replicate itself and thereby infect other systems
- It is a software designed to force pre-chosen ads to display on your system
- It is a small packet of information from a visited webserver stored on your system by your computer’s browser to store personalized information in order to customize your next visit
- It is a malicious program designed to execute when a certain criterion is met.
- It is a software “robot” that performs an extensive set of automated tasks on its own
18 Clues: It is the art of misdirection • It is simply unsolicited email, also known as junk email • It is a software designed to force pre-chosen ads to display on your system • It is the part of the malware program that actually executes its designed task • It is a malicious program designed to execute when a certain criterion is met. • ...
Cyber Ethics 2025-05-19
Across
- Action to prevent someone from contacting you online
- A dishonest scheme to trick someone online
- A secret word used for logging in
- Repeating someone's work without credit
- Threatening someone online
- An identity used to log into online accounts
- A system that blocks unauthorized access to a network
- Measures taken to protect devices and data
Down
- A file or program that can harm your computer
- Permission given to share personal data
- Illegal access to someone’s computer
- Browsing the internet casually
- Keeping your online identity safe
- Platforms like Facebook, Instagram, and Twitter
- Monitoring users’ activity on websites
- What you must do after using a public computer
- The process of converting data into a secure code
- What you should do if you see cyberbullying
18 Clues: Threatening someone online • Browsing the internet casually • Keeping your online identity safe • A secret word used for logging in • Illegal access to someone’s computer • Monitoring users’ activity on websites • Permission given to share personal data • Repeating someone's work without credit • A dishonest scheme to trick someone online • ...
Cyber Forensics 2024-11-26
Across
- Software that is used to allow a hacker to access all the activity on an individual’s personal/business computer
- Under this company's privacy policy, all video, photo, and message content is deleted from servers after it’s been viewed by all recipients or after 30 days.
- Intentionally entering an unauthorized network system
- These hackers fall somewhere in the middle. The short definition is that they violate computer laws, steal information, or shut down systems—but not for personal gain.
- The specialized practice of identifying, preserving, extracting, documenting, and interpreting electronic data that can be used as evidence
- Self-replicating malware program that spreads through a computer system by sending copies of itself to networked computers
- Software designed with the intention to harm a computer or the information therein
- Uses the same analysis techniques as computer forensics except the emphasis is placed on the Internet as a whole
Down
- These hackers attempt to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons.
- Illegally gathering personal information
- Hacking into a company’s internal networking system for the purpose of demonstrating or protesting a political agenda
- Software designed to provide unauthor-ized access to a computer system
- Ensuring that users always have accesses to their systems when required and expected, part of the CIA Triad.
- Part of the CIA Triad, means that systems and data are only being access to those who are authorized to do so.
- This company will always have your location data regardless of device settings
- These hackers are security experts that use their technical skills to to find vulnerabilities before malicious actors do.
- Security professionals ensure that data can always be trusted, part of the CIA Triad.
- A copy made in the same type of media
18 Clues: A copy made in the same type of media • Illegally gathering personal information • Intentionally entering an unauthorized network system • Software designed to provide unauthor-ized access to a computer system • This company will always have your location data regardless of device settings • ...
Lesson 5 Vocab 2024-05-29
30 Clues: At • Oil • Rojo • road • Cart • Tire • Trunk • Mouse • Chest • Screen • Street • Stereo • garage • battery • Channel • freeway • Printer • suitcase • workshop • Password • Keyboard • magazine • discharge • To delete • To charge • Windshield • Cyber Safe • Application • To turn off • search engine
Lesson 5 Barone 2024-05-29
31 Clues: oil • car • tire • road • grid • fast • carry • chest • mouse • trunk • delete • screen • street • seeker • garage • stereo • highway • charger • channel • at sign • battery • printer • workshop • keyboard • password • discharge • suitcases • windshield • application • to turn off • cyber coffee
Road Security Crosswords 2023-05-09
Across
- Technique or code that takes advantage of a vulnerability.
- Who uses skills to exploit systems or networks.
- Is a technique used to assess the security of web applications by simulating attacks in real-time.
- A potential harm or negative consequences that arise from vulnerabilities and threats.
- Weakness or flaw that can be exploited.
- The practice of protecting computer systems, networks, and data from digital threats or unauthorized access.
- Malicious software that aims to damage or compromise systems.
- A disruptive event that compromises the security or integrity.
- A structured approach to developing software with a focus on security.
- A type of security testing that analyzes application source code for vulnerabilities.
Down
- A non-profit organization dedicated to improving software security through open resources and information.
- The process of evaluating and analyzing potential risks and vulnerabilities.
- Condition or circumstance that can cause harm or damage.
- Individuals within an organization who promote and advocate for security practices and help drive a culture of security awareness.
- Confidential or hidden information that is not widely known or shared
- A security assessment that identifies vulnerabilities in computer systems and networks.
- The process of reducing or minimizing the impact or severity.
17 Clues: Weakness or flaw that can be exploited. • Who uses skills to exploit systems or networks. • Condition or circumstance that can cause harm or damage. • Technique or code that takes advantage of a vulnerability. • Malicious software that aims to damage or compromise systems. • The process of reducing or minimizing the impact or severity. • ...
Cybersecurity Unit 10 Crossword 2025-03-20
Across
- also known as a "white list"
- any software that relies upon by other applications and software
- predefined responses for security incidents
- this type of restart is needed for applying updates
- when a system is unavailable
- involves assessing all existing security controls, policies and procedures
- step-by-step instructions for security measures
- ideal security position based on industry standards
- define requirements for security controls and configurations
Down
- prioritization of improving security and moving to the desired state
- also known as "block lists"
- limiting certain actions or behaviors
- comparing the current and desired states
- Comparing the current state of an organization's security position to a desired state
- never trust, always verify
- these types of apps are outdated and older
16 Clues: never trust, always verify • also known as "block lists" • also known as a "white list" • when a system is unavailable • limiting certain actions or behaviors • comparing the current and desired states • these types of apps are outdated and older • predefined responses for security incidents • step-by-step instructions for security measures • ...
Week 4 2024-02-28
Across
- The artist's painting depicted a ________________ figure, evoking a sense of discomfort in viewers.
- Seeking ________________ , the victim pressed charges against their assailant.
- He would often ________________ his way into conversations, subtly planting doubts in people's minds.
- There's a growing ________________ between the rich and the poor in many societies.
- The scent of fresh flowers ________________ the air in the springtime garden.
- The document appeared to be a ________________ of the original, complete with signatures and stamps.
- The ________________ waiter hovered attentively, eager to fulfill every diner's request.
- The professor's lectures on quantum mechanics were often ________________ , leaving many students bewildered.
- The detective began to ________________ the suspect about their whereabouts on the night of the crime.
Down
- The magician's performance was so captivating that it seemed to ________________ the entire audience.
- The company implemented new security measures to ________________ any potential cyber attacks
- The ________________ spread of misinformation can undermine trust in institution.
- It was an ________________ moment to pitch my idea to the investors while they were in a receptive mood.
- Some people believe in the existence of an ________________ being that controls the universe.
- The monk lived an ________________ life, devoid of material possessions.
15 Clues: The monk lived an ________________ life, devoid of material possessions. • The scent of fresh flowers ________________ the air in the springtime garden. • Seeking ________________ , the victim pressed charges against their assailant. • The ________________ spread of misinformation can undermine trust in institution. • ...
Cyber Vocabulary 2022-08-17
Across
- Stealing another’s work
- The legal right to use a piece of media
- To use a piece of copyrighted material verbatim, without having to have permission from the copyright holder. Teaching and criticism both fall under fair use
- A piece of code that can copy itself to wreak havoc
- The sole right to an invention or piece of work
- Websites made to share or post in a social network
- A centralized program or area ran in a computer
- Software that continuously posts ads when a user is online
- Malware designed to replicate itself and spread elsewhere
- Predators that use the online to commit child abuse
- A collaboration of a single file
Down
- Belonging to the public, and therefore not copyrighted
- The act of sending emails, posing as a credible source or business, when it is in fact an attempt to access a user’s personal information
- A program hidden as a normal function attempting to breach the security
- A software that allows a user to essentially be a spy and access private info
- A word, symbol, or design representing a company or brand
- A set of rules stipulating what a user can and cannot do
17 Clues: Stealing another’s work • A collaboration of a single file • The legal right to use a piece of media • The sole right to an invention or piece of work • A centralized program or area ran in a computer • Websites made to share or post in a social network • A piece of code that can copy itself to wreak havoc • Predators that use the online to commit child abuse • ...
Cyber Risk 2018-02-25
18 Clues: Slow • Bate • Laws • Analog • History • Breaking • Sterness • Peaceful • To confirm • Data mining • To identify • Flexibility • Disturbance • Hiring staff • Internet of Things • Malicious software • Stores information • Artificial Intelligence
Cyber Safety 2025-01-26
Across
- Practices to ensure secure and responsible internet use
- A copy of important data stored separately for recovery
- Regular software improvements to fix security vulnerabilities
- Manipulating people to gain confidential information
- Software designed to detect and remove malicious programs
- The process of verifying a user's identity
- When data is accessed or exposed without permission
- A fraudulent attempt to obtain sensitive information
- A person who gains unauthorized access to systems
Down
- A type of malicious software that can infect a computer
- Malicious software designed to harm or exploit systems
- A program that secretly gathers information about a user
- A tool that stores and encrypts login credentials
- Protecting personal information from unauthorized access
- A wireless network that should be secured with a strong password
- When someone illegally uses your personal information
- The process of converting information into a secure code
- An extra layer of security requiring two forms of verification
18 Clues: The process of verifying a user's identity • A tool that stores and encrypts login credentials • A person who gains unauthorized access to systems • When data is accessed or exposed without permission • Manipulating people to gain confidential information • A fraudulent attempt to obtain sensitive information • When someone illegally uses your personal information • ...
Digital Cititzenship crossword puzzle 2020-09-29
Across
- When someone tricks someone by taking there money or personal information
- information that you can't share online
- person who stands up to the cyberbully
- when someone steals your identity illegally
- someone who witness cyber-bulling but does nothing
- An online letter
Down
- your online history
- rude words that are usually CAPITALIZED
- a online program that guides you through he internet
- program that can mess up your device
- someone who can see your private info
- When you use facts to ask questions about a website
- someone who targets a person online
- victim of a cyberbully
14 Clues: An online letter • your online history • victim of a cyberbully • someone who targets a person online • program that can mess up your device • someone who can see your private info • person who stands up to the cyberbully • rude words that are usually CAPITALIZED • information that you can't share online • when someone steals your identity illegally • ...
