cybersecurity Crossword Puzzles

Cyber Safety 2024-08-06

Cyber Safety crossword puzzle
Across
  1. - Bullying online
  2. - Being safe online
  3. - Putting agressive presure on someone
  4. - Stands up against bullies
Down
  1. - Protecting systems
  2. - Supporting bullies
  3. - Sites that are accessed using a web browser
  4. - Connected computers share resources

8 Clues: - Bullying online- Being safe online- Protecting systems- Supporting bullies- Stands up against bullies- Connected computers share resources- Putting agressive presure on someone- Sites that are accessed using a web browser

Digital Literacy Vocabulary 2025-10-21

Digital Literacy Vocabulary crossword puzzle
Across
  1. data tracking system to make suggestions to the viewer
  2. everything you do online
  3. think like a human
  4. protection online
  5. realistic but fake video
  6. reputable source has this
Down
  1. critical thinking when reading news online
  2. having a certain viewpoint towards something
  3. a place where information comes from
  4. false or misleading information

10 Clues: protection onlinethink like a humaneverything you do onlinerealistic but fake videoreputable source has thisfalse or misleading informationa place where information comes fromcritical thinking when reading news onlinehaving a certain viewpoint towards somethingdata tracking system to make suggestions to the viewer

TTS TIK Neysha 8D 2025-10-12

TTS TIK Neysha 8D crossword puzzle
Across
  1. proses masuk ke sebuah sistem
  2. ketika perangkat berhenti merespon secara permanen
  3. tempat penyimpanan file
  4. perangkat lunak yang bisa merusak sistem
  5. perlindungan terhadap ancaman digital
Down
  1. otak komputer, nama lain CPU
  2. jenis malware yang bisa menyebar dan merusak data
  3. sebutan program komputer
  4. sebutan alamat web
  5. salinan data untuk cadangan

10 Clues: sebutan alamat webtempat penyimpanan filesebutan program komputersalinan data untuk cadanganotak komputer, nama lain CPUproses masuk ke sebuah sistemperlindungan terhadap ancaman digitalperangkat lunak yang bisa merusak sistemjenis malware yang bisa menyebar dan merusak dataketika perangkat berhenti merespon secara permanen

Shayaans Life 2023-01-11

Shayaans Life crossword puzzle
Across
  1. My favorite game
  2. what I have as another pet
  3. what i think my future job is going to be
  4. pc
  5. what is aphone
Down
  1. where i used to live
  2. what i do
  3. something better than cookies
  4. what is the base of a computer
  5. what I have as a pet

10 Clues: pcwhat i dowhat is aphoneMy favorite gamewhere i used to livewhat I have as a petwhat I have as another petsomething better than cookieswhat is the base of a computerwhat i think my future job is going to be

CYBER SECURITY 2023-09-20

CYBER SECURITY crossword puzzle
Across
  1. to steal sensitive information
  2. malware
  3. protection of computing systems and data that these systems store
  4. set of rules
Down
  1. the virtual and dynamic space created by the machine clones
  2. protecting info.from inauthorized parties
  3. attack data to web application
  4. malicious software
  5. attack uses trial & attack method
  6. automated process

10 Clues: malwareset of rulesautomated processmalicious softwareto steal sensitive informationattack data to web applicationattack uses trial & attack methodprotecting info.from inauthorized partiesthe virtual and dynamic space created by the machine clonesprotection of computing systems and data that these systems store

Week 6-7 spelling 2016-03-01

Week 6-7 spelling crossword puzzle
Across
  1. a decorative plate to finish motor vehicles
  2. to be someone's favorite
  3. a device to look at stars
  4. you usually hit BALLS with this
  5. to put up with something
  6. to think or believe that something is true
  7. to cancel something
Down
  1. to blend in
  2. to be safe online
  3. a device to look at very very small things
  4. to make a continuous low humming sound
  5. an area of land
  6. to make up your mind
  7. to secretly get married
  8. the past tense of strive

15 Clues: to blend inan area of landto be safe onlineto cancel somethingto make up your mindto secretly get marriedto be someone's favoriteto put up with somethingthe past tense of strivea device to look at starsyou usually hit BALLS with thisto make a continuous low humming sounda device to look at very very small things...

PeopleTec Engineering Week 2024-02-12

PeopleTec Engineering Week crossword puzzle
Across
  1. operations security
  2. exploratory programming marathon session
  3. use of scientific discoveries for practical purposes
  4. people first, technology always
  5. cyberattack prevention measures
  6. composing instructions for a computer to follow
  7. individual that provides products or services to the government
  8. Information technology role responsible for data security
Down
  1. representation of a real-world system
  2. training algorithms to create self-learning models
  3. designing and experimenting with a model
  4. connected computer systems
  5. professional problem solver
  6. next generation...
  7. document attesting to a level of achievement

15 Clues: next generation...operations securityconnected computer systemsprofessional problem solverpeople first, technology alwayscyberattack prevention measuresrepresentation of a real-world systemexploratory programming marathon sessiondesigning and experimenting with a modeldocument attesting to a level of achievement...

Cyberbullying 2024-05-02

Cyberbullying crossword puzzle
Across
  1. Platforms where cyberbullying often occurs.
  2. Connected to the internet.
  3. Malicious digital intrusion.
  4. Online harassment targeting high school students.
  5. Person who intimidates or mistreats others.
  6. Persistent online abuse or intimidation.
  7. Measures taken to protect against online threats.
Down
  1. Individual singled out for cyberbullying.
  2. Moral principles governing online behavior.
  3. Person who posts provocative or offensive messages.
  4. Without a known identity.
  5. Someone subjected to cyberbullying.
  6. Illegal activities carried out online.
  7. Relating to electronic technology.
  8. Online space for real-time communication.

15 Clues: Without a known identity.Connected to the internet.Malicious digital intrusion.Relating to electronic technology.Someone subjected to cyberbullying.Illegal activities carried out online.Persistent online abuse or intimidation.Individual singled out for cyberbullying.Online space for real-time communication....

Browsing safely 2025-06-19

Browsing safely crossword puzzle
Across
  1. hoaxing or misleading
  2. harming or harassing using information technology
  3. illegal entry in computer
  4. illegal method to get money
  5. security to prevent cybercrime
  6. disturbs normal functioning of computer
  7. act of stealing and misusing someone's personal information
  8. building a face friendship
  9. any information about a person can be found
  10. conduct a terrosism by computer
Down
  1. protects from virus
  2. any criminal activity intended to harm anyone using computer
  3. complaining against cybercrime
  4. that helps in preventing unauthorised access to your computer
  5. protects from cyber crime

15 Clues: protects from virushoaxing or misleadingillegal entry in computerprotects from cyber crimebuilding a face friendshipillegal method to get moneycomplaining against cybercrimesecurity to prevent cybercrimeconduct a terrosism by computerdisturbs normal functioning of computerany information about a person can be found...

Brain Harvest 2025-09-18

Brain Harvest crossword puzzle
Across
  1. Connection of computers… or professionals.
  2. Kevin Costner baseball arena.
  3. The way kids sit these days, with applesauce (2 wds).
  4. Psychological bias effect, or glow above head.
  5. Business advantage… or a physics principle.
  6. First line of cybersecurity defense.
Down
  1. Bavarian beer-and-brats festival.
  2. Exit plan to gather crops?
  3. Cult-classic 1993 witchy Disney movie (2 wds).
  4. Patron saint of the internet.
  5. The Friendly Ghost.
  6. Late-night work shift.
  7. Balance sheet positives.
  8. Spooky arachnid creation.
  9. Payoff metric for a project, abbr.

15 Clues: The Friendly Ghost.Late-night work shift.Balance sheet positives.Spooky arachnid creation.Exit plan to gather crops?Kevin Costner baseball arena.Patron saint of the internet.Bavarian beer-and-brats festival.Payoff metric for a project, abbr.First line of cybersecurity defense.Connection of computers… or professionals....

Crossword - Harold Benjamin 2023-09-08

Crossword - Harold Benjamin crossword puzzle
Across
  1. Financial institution licensed
  2. Stationery company
  3. Fraudulent practice of acquiring sensitive data via emails
  4. Document sent via telecommunications
  5. Concealing management of illegally earnt money
  6. Protection of computer systems and networks
  7. Secured lending partner (last name)
  8. Goddess of health
  9. Client booking system at HH
  10. Transfer of property from one to another
  11. Private client partner (last name)
Down
  1. Equitable and fair treatment
  2. Operations director (last name)
  3. Dishonest persuasion with a gift or money
  4. Process of taking legal action
  5. Emailing system at HB
  6. Folder of court documents
  7. Offsite archiving company
  8. Case management system at HB
  9. Qualified legal professional
  10. Managing partner (last name)

21 Clues: Goddess of healthStationery companyEmailing system at HBFolder of court documentsOffsite archiving companyClient booking system at HHEquitable and fair treatmentCase management system at HBQualified legal professionalManaging partner (last name)Financial institution licensedProcess of taking legal actionOperations director (last name)...

TTS INFORMATIKA DARA CANTIKA DINSKY X-G 2025-04-10

TTS INFORMATIKA DARA CANTIKA DINSKY X-G crossword puzzle
Across
  1. tugas cybersecurity engineer
  2. tujuan diseminasi konten
  3. urutan hasil pencarian
  4. tugas web developer
  5. manfaat pendaftaran HAKI
  6. menyimpan data website
  7. tugas programmer
  8. contoh search engine
  9. konsekuensi pelanggaran HAKI
  10. metode validasi konten negatif
  11. apa itu merek dagang?
  12. konsekuensi konten negatif
  13. platform diseminasi konten digital
  14. tugas data scientist
  15. tantangan validasi konten negatif
Down
  1. kepentingan unsur budaya
  2. tujuan validasi konten negatif
  3. pencegahan pelanggaran budaya
  4. tugas search engine
  5. tugas database administrator
  6. apa itu hak cipta?
  7. apa itu konten negatif?
  8. contoh konten digital berunsur budaya
  9. apa itu paten?
  10. proses pencarian data website

25 Clues: apa itu paten?tugas programmerapa itu hak cipta?tugas search enginetugas web developercontoh search enginetugas data scientistapa itu merek dagang?urutan hasil pencarianmenyimpan data websiteapa itu konten negatif?kepentingan unsur budayatujuan diseminasi kontenmanfaat pendaftaran HAKIkonsekuensi konten negatiftugas cybersecurity engineer...

Jessie & Kurt 2025-03-24

Jessie & Kurt crossword puzzle
Across
  1. Jessie's profession
  2. Kurt's middle name
  3. The proposal location
  4. Kurt's favorite pizza
  5. What College did Jessie go to
  6. How did they meet
  7. What month did they get engaged
  8. First date location
  9. Jessie's middle name
  10. Kurt's profession
  11. How many siblings does Kurt have
Down
  1. What TV show are they currently binging
  2. Where was their first vacation
  3. Jessies favorite food
  4. Where was their last trip together
  5. Favorite hobby together
  6. Jessie's birthday month
  7. Kurt's birthday month
  8. What College did Kurt go to
  9. What is their pet's name
  10. How many years have they been together
  11. How many siblings does Jessie have

22 Clues: How did they meetKurt's professionKurt's middle nameJessie's professionFirst date locationJessie's middle nameJessies favorite foodThe proposal locationKurt's birthday monthKurt's favorite pizzaFavorite hobby togetherJessie's birthday monthWhat is their pet's nameWhat College did Kurt go toWhat College did Jessie go toWhere was their first vacation...

TEMA 2 2025-10-24

TEMA 2 crossword puzzle
Across
  1. Promosi produk melalui media sosial
  2. Aktivitas jual-beli tanpa uang tunai
  3. Layanan pengiriman barang berbasis digital
  4. Sistem keamanan data digital
  5. Uang digital yang digunakan secara global
  6. Platform untuk membangun toko online
  7. Teknologi untuk mengenali wajah atau suara
  8. Penyimpanan data online
Down
  1. , Analisis data untuk strategi bisnis digital
  2. Platform untuk belajar atau kursus online
  3. Alat pembayaran otomatis di toko online
  4. Pembayaran digital via ponsel
  5. Teknologi komunikasi internet cepat
  6. Model bisnis online berbasis internet
  7. Platform jual-beli online
  8. Teknologi untuk transaksi cepat dan aman
  9. , Layanan streaming konten digital
  10. Sistem manajemen konten website
  11. ,Perangkat lunak untuk mengelola bisnis online
  12. Layanan transportasi berbasis aplikasi

20 Clues: Penyimpanan data onlinePlatform jual-beli onlineSistem keamanan data digitalPembayaran digital via ponselSistem manajemen konten website, Layanan streaming konten digitalPromosi produk melalui media sosialTeknologi komunikasi internet cepatAktivitas jual-beli tanpa uang tunaiPlatform untuk membangun toko onlineModel bisnis online berbasis internet...

AWS 2024-08-14

AWS crossword puzzle
Across
  1. O D D U O
  2. P T R A B
  3. M E O L A
  4. C L O U D
  5. T R A D A
  6. I N I U B
  7. S O N I A
Down
  1. T U M P N
  2. Z E M T G
  3. O 1 O S T
  4. I C T C L
  5. T R A N S
  6. A N E O S

13 Clues: T U M P NZ E M T GO 1 O S TI C T C LO D D U OT R A N SP T R A BM E O L AC L O U DT R A D AA N E O SI N I U BS O N I A

October Cybersecurity Month 2019-09-19

October Cybersecurity Month crossword puzzle
Across
  1. A device you should not plug in
  2. Last name of the head of IT
  3. Location of the Bank's Disaster Recovery Site
  4. Type of an Operating system
  5. key word used to send secure email
  6. Programs installed on your phone are called?
  7. Think before you -- ?
Down
  1. A type of malware that encrypts your file
  2. Something you should never share
  3. A type of an email scam
  4. Department to call for computer problem
  5. Location of the Bank's head quarter
  6. Northern Bank's Mission Statement
  7. Password should always be?
  8. A way to access the bank resources remotely

15 Clues: Think before you -- ?A type of an email scamPassword should always be?Last name of the head of ITType of an Operating systemA device you should not plug inSomething you should never shareNorthern Bank's Mission Statementkey word used to send secure emailLocation of the Bank's head quarterDepartment to call for computer problem...

October Cybersecurity Month 2019-09-19

October Cybersecurity Month crossword puzzle
Across
  1. Something you should never share
  2. A type of an email scam
  3. Location of the Bank's Disaster Recovery Site
  4. Northern Bank's Mission Statement
  5. Last name of the head of IT
  6. Department to call for computer problem
  7. Location of the Bank's head quarter
  8. Password should always be?
Down
  1. A type of malware that encrypts your file
  2. Type of an Operating system
  3. Think before you -- ?
  4. A way to access the bank resources remotely
  5. Programs installed on your phone are called?
  6. key word used to send secure email
  7. A device you should not plug in

15 Clues: Think before you -- ?A type of an email scamPassword should always be?Type of an Operating systemLast name of the head of ITA device you should not plug inSomething you should never shareNorthern Bank's Mission Statementkey word used to send secure emailLocation of the Bank's head quarterDepartment to call for computer problem...

Cybersecurity Week 2025 2025-08-27

Cybersecurity Week 2025 crossword puzzle
Across
  1. Publishing someone's personal information online without their consent
  2. Users are tricked into revealing sensitive information to gain access to a system
  3. A form a social engineering that is done via email or other messages
  4. Area of study where machines are programmed to reason, learn and act similar to human intelligence
  5. Software that causes damage to data and software
  6. A network device used to separate an internal network from an external network, usually the Internet
  7. Software to disrupt, damage or gain unauthorised access to a computer system
  8. Any or a combination of usernames, passwords or biometrics to access a system
Down
  1. Type of attack that overwhelms a system or network with excessive requests, making it unusable to legitimate users
  2. A technique used to disguise the sender's identity to gain sensitive information
  3. A method of writing that disguises a message
  4. Type of threat that has the potential to or cause actual damage that can be done to an organisation by a person with authorized access to systems
  5. Malicious software that prevents access to a system until a ransom is paid
  6. Sofware that automatically subjects a user to advertisements
  7. A person who uses computers to gain unauthorized access to data

15 Clues: A method of writing that disguises a messageSoftware that causes damage to data and softwareSofware that automatically subjects a user to advertisementsA person who uses computers to gain unauthorized access to dataA form a social engineering that is done via email or other messages...

Cybersecurity and Cryptography 2024-10-17

Cybersecurity and Cryptography crossword puzzle
Across
  1. What device monitors and controls incoming and outgoing network traffic?
  2. What is a digital document that verifies the ownership of a public key?
  3. term describes a weakness in a system that can be exploited by threats?
  4. What is the process of converting data into a fixed-size string of characters for security?
  5. What is the process of converting plaintext into ciphertext to protect information?
  6. What is the process of converting ciphertext back into plaintext?
  7. What type of malware disguises itself as legitimate software?
  8. What type of malware records keystrokes made by a user?
Down
  1. What is a physical or digital object used to prove identity in security systems?
  2. What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
  3. What term refers to malicious software designed to harm or exploit devices?
  4. What term refers to the permission to enter or use a system or network?
  5. What protocol secures data sent over the internet by encrypting it?
  6. What is the process of verifying the identity of a user or system?
  7. What is the process of creating copies of data to restore in case of loss?

15 Clues: What type of malware records keystrokes made by a user?What type of malware disguises itself as legitimate software?What is the process of converting ciphertext back into plaintext?What is the process of verifying the identity of a user or system?What protocol secures data sent over the internet by encrypting it?...

Elise Cybersecurity Crossword 2026-04-02

Elise Cybersecurity Crossword crossword puzzle
Across
  1. String of characters used to gain access to something online.
  2. Self-replicating malware that consumes bandwidth.
  3. Type of backup: a complete copy of all files
  4. Malware that secretly installs itself and steals personal data.
  5. Slowest but most cost-effective method of storing large volumes of data.
  6. Security control: measures implemented for physical structure.
  7. Malware that attaches itself to legitimate files, spreads, and replicates.
  8. Backup Location: stores backup files at an alternative location
  9. Security control: hardware or software solutions focused on protecting data
Down
  1. Unwanted malware that installs on your device, often bundled with free apps via pop-ups.
  2. Authentication method that uses two or more pieces of evidence that prove a users identity.
  3. Most common method of storing back-up filed, physical.
  4. Type of manipulation to trick a human and exploit their vunerabilites.
  5. Backup Location: on premises for fast access and recovery
  6. Type of backup: copies daily

15 Clues: Type of backup: copies dailyType of backup: a complete copy of all filesSelf-replicating malware that consumes bandwidth.Most common method of storing back-up filed, physical.Backup Location: on premises for fast access and recoveryString of characters used to gain access to something online....

Ernest Cybersecurity Crossword 2026-04-02

Ernest Cybersecurity Crossword crossword puzzle
Across
  1. Malicious code that spreads by attaching itself to files
  2. Fake messages that try to trick you into giving personal information
  3. Software that secretly collects user information
  4. Extra login security requiring two forms of verification
  5. Software designed to harm or exploit a computer or network
  6. The process of verifying a user's identity
  7. Software that detects and removes malware
  8. Malware that locks files and demands payment to unlock them
  9. A security system that blocks unauthorized access to a network
  10. Scrambling data so only authorized users can read it
  11. Someone who gains unauthorized access to systems
Down
  1. The trail of information you leave online
  2. Malware that spreads automatically without user action
  3. A secret word used to access an account
  4. When private information is exposed or stolen

15 Clues: A secret word used to access an accountThe trail of information you leave onlineSoftware that detects and removes malwareThe process of verifying a user's identityWhen private information is exposed or stolenSoftware that secretly collects user informationSomeone who gains unauthorized access to systems...

NAVFAC's Ten Capabilities 2023-02-13

NAVFAC's Ten Capabilities crossword puzzle
Across
  1. ________Facilities and Equipment Engineering
  2. detailed coordination of a complex operation involving people, facilities, or supplies.
  3. NAVFAC Capabilities: ______ & Construction
  4. NEPA requirement: Environmental __________
  5. a proposed or planned undertaking
  6. NAVFAC Capabilities: Environmental ___________
  7. Real Estate _________ and Management
  8. Basic physical and organizational structures and facilities
  9. ________ Handling Ashore Procurement
Down
  1. Protection against criminal or unauthorized use of electronic data
  2. Military Construction Acronym
  3. _______ and Facilities Operations
  4. ___________ Conservation: Health assessment of natural and cultural resources
  5. NAVFAC Capabilities: _________ & Facility Operations
  6. _________ Vehicles provide transportation services

15 Clues: Military Construction Acronym_______ and Facilities Operationsa proposed or planned undertakingReal Estate _________ and Management________ Handling Ashore ProcurementNAVFAC Capabilities: ______ & ConstructionNEPA requirement: Environmental __________________Facilities and Equipment EngineeringNAVFAC Capabilities: Environmental ___________...

Issue 1 2023-04-14

Issue 1 crossword puzzle
Across
  1. Teacher in charge of MagTV
  2. Farm behind Magnolia
  3. Water sports (not necessarily just swimming)
  4. Vietnamese Dual Language Immersion Program
  5. Magnolia _______ Institute
  6. City we're located in
Down
  1. Girls' soccer and ________ made it to CIF
  2. The classic writing tool for students (that always seems to go missing when you need it)
  3. Book and _____ Club
  4. Associated Student Body
  5. Room 404 teacher
  6. Medical pathway, BITA, and JROTC are ___ programs
  7. Teacher in charge of Theater classes

13 Clues: Room 404 teacherBook and _____ ClubFarm behind MagnoliaCity we're located inAssociated Student BodyTeacher in charge of MagTVMagnolia _______ InstituteTeacher in charge of Theater classesGirls' soccer and ________ made it to CIFVietnamese Dual Language Immersion ProgramWater sports (not necessarily just swimming)...

Digital Learning 2025-10-13

Digital Learning crossword puzzle
Across
  1. — Machines that learn and think
  2. — Using tech to improve processes
  3. — Protection from online threats
  4. — Making new things with tech
  5. — Working as a team online
Down
  1. — Skill to read and use information well
  2. — Channels for stories and news online
  3. — Smooth and confident tech use
  4. — Abilities for digital success
  5. — Tools that help communication and info
  6. — Turning paper into data
  7. — Gadgets that connect us digitally
  8. — Doing right with online actions
  9. — Innovations shaping the future

14 Clues: — Turning paper into data— Working as a team online— Making new things with tech— Smooth and confident tech use— Abilities for digital success— Machines that learn and think— Protection from online threats— Innovations shaping the future— Using tech to improve processes— Doing right with online actions— Gadgets that connect us digitally...

Nicole & Sam 2023-04-26

Nicole & Sam crossword puzzle
Across
  1. What is Sam's favorite color?
  2. Nicole's major in college
  3. The couple's favorite football team
  4. Where they went the night they met
  5. Sam's major in college
  6. The bride's new last name
Down
  1. Groom's middle name
  2. Who is the couple's dog?
  3. Bride's first name
  4. Name of restaurant where the couple had their first date
  5. Where Sam went to college
  6. Where Nicole went to college
  7. Who made the first move?
  8. number of years together

14 Clues: Bride's first nameGroom's middle nameSam's major in collegeWho is the couple's dog?Who made the first move?number of years togetherWhere Sam went to collegeNicole's major in collegeThe bride's new last nameWhere Nicole went to collegeWhat is Sam's favorite color?Where they went the night they metThe couple's favorite football team...

words related to AI 2025-10-25

words related to AI crossword puzzle
Across
  1. teaching an AI model using examples
  2. step-by-step process AI uses to make decisions
  3. the ability to identify objects or faces
  4. moral principles guiding decisions
  5. unfairness in AI decisions
  6. protection against digital attacks
Down
  1. the ability to think and reason
  2. use of machines to do human tasks
  3. information collected for analysis
  4. global computer network
  5. overeliance on technology
  6. AI program that talks with users
  7. protection of personal information
  8. physical AI machine

14 Clues: physical AI machineglobal computer networkovereliance on technologyunfairness in AI decisionsthe ability to think and reasonAI program that talks with usersuse of machines to do human tasksinformation collected for analysismoral principles guiding decisionsprotection of personal informationprotection against digital attacks...

Cybersecurity 2022-11-01

Cybersecurity crossword puzzle
Across
  1. A strong password has at least __ characters
  2. Is this a strong password: Muff1n M@n!!
  3. Should you make your password 5 characters?
  4. The best passwords have lowercase and __ letters
Down
  1. The best passwords are easy to ____
  2. ___ should use a unsecure password

6 Clues: ___ should use a unsecure passwordThe best passwords are easy to ____Is this a strong password: Muff1n M@n!!Should you make your password 5 characters?A strong password has at least __ charactersThe best passwords have lowercase and __ letters

Cybersecurity 2023-08-14

Cybersecurity crossword puzzle
Across
  1. Designed to deny a user or organisation access to files on their computer.
  2. The act of compromising digital devices and networks through unauthorized access to an account or computer system.
  3. An attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
Down
  1. Intrusive software developed to steal data and damage or destroy computers and computer systems.
  2. When attackers attempt to trick users into doing 'the wrong thing.
  3. Process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.

6 Clues: When attackers attempt to trick users into doing 'the wrong thing.Designed to deny a user or organisation access to files on their computer.Intrusive software developed to steal data and damage or destroy computers and computer systems.The act of compromising digital devices and networks through unauthorized access to an account or computer system....

Cybersecurity 2024-02-29

Cybersecurity crossword puzzle
Across
  1. is a cyber attack intended to redirect a website's traffic to another, fake site
  2. PIN numbers.
  3. is the act of creating a scenario where the victim gives out personal information
Down
  1. is observing a person's private information over their shoulder e.g. cashpoint
  2. is a technique of fraudulently obtaining private information, often using email or SMS.
  3. Malicious software is called?

6 Clues: PIN numbers.Malicious software is called?is observing a person's private information over their shoulder e.g. cashpointis a cyber attack intended to redirect a website's traffic to another, fake siteis the act of creating a scenario where the victim gives out personal information...

Cybersecurity 2025-11-24

Cybersecurity crossword puzzle
Across
  1. Malware that attaches to files and spreads when the files are shared
  2. Raw facts or figures that can be collected and stored
  3. bullying online
Down
  1. Fake emails or messages designed to trick people into revealing personal information
  2. people looking over your shoulder
  3. Software that automatically displays unwanted advertisements

6 Clues: bullying onlinepeople looking over your shoulderRaw facts or figures that can be collected and storedSoftware that automatically displays unwanted advertisementsMalware that attaches to files and spreads when the files are sharedFake emails or messages designed to trick people into revealing personal information

Cybersecurity 2024-01-09

Cybersecurity crossword puzzle
Across
  1. Software update to fix vulnerabilities
  2. A secret code to access your account
  3. Malicious code that can harm your computer
Down
  1. Process of converting data to prevent unauthorized access
  2. Type of social engineering attack
  3. Protective barrier against unauthorized access

6 Clues: Type of social engineering attackA secret code to access your accountSoftware update to fix vulnerabilitiesMalicious code that can harm your computerProtective barrier against unauthorized accessProcess of converting data to prevent unauthorized access

Cybersecurity 2022-09-29

Cybersecurity crossword puzzle
Across
  1. An attack that attempts to make an online service unavailable by overwhelming it with traffic from multiple sources.
  2. Attacker invents a scenario in order to convince the victim to give them data or money.
  3. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
  1. Sending an email designed to trick the recipient into giving away personal information
  2. Any malware that misleads users of its true intent.
  3. Someone that gains unauthorised access to a device or sever.

6 Clues: Any malware that misleads users of its true intent.Someone that gains unauthorised access to a device or sever.Sending an email designed to trick the recipient into giving away personal informationAttacker invents a scenario in order to convince the victim to give them data or money....

Topic 1 - 4 Vocabulary 2026-02-13

Topic 1 - 4 Vocabulary crossword puzzle
Across
  1. Proof of purchase
  2. A group of related episodes
  3. Money you can spend in a shop instead of cash
  4. Visual images used to explain information
  5. Being friendly and welcoming
  6. The main person in a story
  7. An official public statement
  8. A custom passed down through generations
  9. A system that chooses online content
Down
  1. Protection against digital attacks
  2. Rules of a company
  3. A short news titl
  4. To look at websites
  5. A regularly updated online journal
  6. A public display of art
  7. A shop or manufacturer guarantee
  8. Money returned to a customer
  9. Not working properly

18 Clues: Proof of purchaseA short news titlRules of a companyTo look at websitesNot working properlyA public display of artThe main person in a storyA group of related episodesBeing friendly and welcomingMoney returned to a customerAn official public statementA shop or manufacturer guaranteeProtection against digital attacks...

Information Security Terms 2024-01-31

Information Security Terms crossword puzzle
Across
  1. Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
  2. A software vulnerability that is exploited by attackers before the vendor releases a fix.
  3. of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
  4. Response: The process of responding to and managing the aftermath of a cybersecurity incident.
  5. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  6. Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
  7. The process of converting data into a code to prevent unauthorized access.
  8. Weaknesses in a system that can be exploited by threats to compromise its security.
Down
  1. Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
  2. Software designed to detect and remove malicious software from a computer.
  3. The process of verifying the identity of a user, system, or device.
  4. Security: Security measures to protect network endpoints, such as computers and mobile devices.
  5. Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
  6. A network security device that monitors and controls incoming and outgoing network traffic.
  7. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  8. A software update designed to fix vulnerabilities or improve security.

16 Clues: The process of verifying the identity of a user, system, or device.A software update designed to fix vulnerabilities or improve security.Software designed to detect and remove malicious software from a computer.The process of converting data into a code to prevent unauthorized access....

Cybersecurity : Keselamatan Sosial Media 2023-06-02

Cybersecurity : Keselamatan Sosial Media crossword puzzle
Across
  1. Fikir sebelum __
  2. Kebiasaan phishing dilakukan melalui __
  3. Sejenis malware yang menyerang komputer sehingga dituntut tebusan
  4. Set strict __ pada akaun media sosial
  5. Perbuatan mencuri maklumat peribadi seseorang
  6. Sejenis scam menggunakan e-mel atau mesej
  7. Sejenis bully yang berlaku dalam talian
Down
  1. Sosial media merupakan satu rangkaian __
  2. Cyberbully dilakukan melalui text, imej dan __
  3. Tutup __ lama
  4. Maklumat peribadi
  5. Amalan melindungi rangkaian daripada serangan digital

12 Clues: Tutup __ lamaFikir sebelum __Maklumat peribadiSet strict __ pada akaun media sosialKebiasaan phishing dilakukan melalui __Sejenis bully yang berlaku dalam talianSosial media merupakan satu rangkaian __Sejenis scam menggunakan e-mel atau mesejPerbuatan mencuri maklumat peribadi seseorangCyberbully dilakukan melalui text, imej dan __...

Tech Talk 2024-03-23

Tech Talk crossword puzzle
Across
  1. Machine mimicking human intelligence
  2. Machines that work like humans
  3. Global network of computers
  4. A place you can visit without leaving your chair
  5. Math behind problem-solving
  6. Can be plug in many devices
  7. The brain of a computer
  8. Protects your computer from attacks
Down
  1. A field that protect computer systems,networks from digital attacks.
  2. Graphics processor unit
  3. Physical parts of a computer
  4. Getting a file from the internet
  5. A collection of data
  6. Malicious software
  7. The programs of computer
  8. Needs a mouse and keyboard

16 Clues: Malicious softwareA collection of dataGraphics processor unitThe brain of a computerThe programs of computerNeeds a mouse and keyboardGlobal network of computersMath behind problem-solvingCan be plug in many devicesPhysical parts of a computerMachines that work like humansGetting a file from the internetProtects your computer from attacks...

Cybersecurity 2022-08-15

Cybersecurity crossword puzzle
Across
  1. Flying mammal
  2. The United States' first state-specific consumer privacy law
  3. Has a trunk
  4. Man's best friend
Down
  1. Large marsupial
  2. Likes to chase mice

6 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase miceThe United States' first state-specific consumer privacy law

Cybersecurity 2022-11-01

Cybersecurity crossword puzzle
Across
  1. A strong password has at least __ characters
  2. Is this a strong password: Muff1n M@n!!
  3. Should you make your password 5 characters?
  4. The best passwords have lowercase and __ letters
Down
  1. The best passwords are easy to ____
  2. ___ should use a unsecure password

6 Clues: ___ should use a unsecure passwordThe best passwords are easy to ____Is this a strong password: Muff1n M@n!!Should you make your password 5 characters?A strong password has at least __ charactersThe best passwords have lowercase and __ letters

Technology in PMI 2024-04-19

Technology in PMI crossword puzzle
Across
  1. problem solver, creator
  2. a machine that compresses the leaves
  3. new creative ideas
Down
  1. design trial phase
  2. online safety
  3. base or foundation
  4. a simplified model or imitation of an object or a process
  5. detects changes

8 Clues: online safetydetects changesdesign trial phasebase or foundationnew creative ideasproblem solver, creatora machine that compresses the leavesa simplified model or imitation of an object or a process

Lesson 1.3 2023-03-08

Lesson 1.3 crossword puzzle
Across
  1. they mitigate vulnerabilities
  2. its top priority is make money
  3. personal identity information
  4. financial information
Down
  1. it's a byproduct of technological change
  2. bugs and …
  3. arise new security issues
  4. a weakness or a lack of countermeasures

8 Clues: bugs and …financial informationarise new security issuesthey mitigate vulnerabilitiespersonal identity informationits top priority is make moneya weakness or a lack of countermeasuresit's a byproduct of technological change

NCSAM 2021 Crossword 2021-08-05

NCSAM 2021 Crossword crossword puzzle
Across
  1. TIAA’s associates are our company’s first and best line of _______ against cyber criminals.
  2. Smart devices such as Amazon Alexa, Google Speakers, and Smart Appliances are examples of what?
  3. What malware propagates without a host program?
  4. Tips to keep your home office secure: _____ your computer when you step away, and shut it down at the end of the day.
  5. A _____ is email monitoring designed to prevent unwanted email and deliver good email. Messages that this will block include spam, phishing attacks, malware or fraudulent content.
  6. What does the A in CAP stand for?
  7. What TIAA Cybersecurity team manages the full lifecycle of user access to applications and systems. Hint: _______ and Access Management
  8. What malware encrypts files and demands money for the decryption key?
  9. This year Cyber has rebranded as TIAA _____ Cybersecurity
Down
  1. What is the last name of the TIAA Bank CISO?
  2. A good way to secure your devices at home is by regularly _______
  3. What type of attack do patches not prevent against?
  4. The probability of exposure or loss of assets is considered what?
  5. What type of information is private and identifies people?
  6. What technology allows information sent over the internet to remain private or confidential?
  7. What do most modern websites use to provide encryption?
  8. Which industry is most targeted by social engineers?
  9. Multifactor _____ adds extra layers of security when logging in.
  10. A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.

19 Clues: What does the A in CAP stand for?What is the last name of the TIAA Bank CISO?What malware propagates without a host program?What type of attack do patches not prevent against?Which industry is most targeted by social engineers?What do most modern websites use to provide encryption?This year Cyber has rebranded as TIAA _____ Cybersecurity...

Cybersecurity 2020-08-24

Cybersecurity crossword puzzle
Across
  1. Proposito informatico de detectar virus
  2. Estafa que busca sacrte datos bancarios, o tarjetas
  3. Se quedan con tu informacion como la de ingreso, nombre de usuario no espian
Down
  1. Sofwtare malo que esta hecho para meterse infiltradamente a una computadora
  2. Programas que no son originales y que te cambian y inhabilitan el acceso a tu computadora
  3. Hace que no pueda entrar nadie infiltrado a tu computadora

6 Clues: Proposito informatico de detectar virusEstafa que busca sacrte datos bancarios, o tarjetasHace que no pueda entrar nadie infiltrado a tu computadoraSofwtare malo que esta hecho para meterse infiltradamente a una computadoraSe quedan con tu informacion como la de ingreso, nombre de usuario no espian...

Cybersecurity 2025-03-28

Cybersecurity crossword puzzle
Across
  1. artificial image or video (a series of images) generated by a special kind of machine learning called “deep” learning
  2. The practice of protecting systems, networks, and programs from digital attacks
  3. a type of cyber-attack where attackers impersonate a trusted entity to trick individuals into revealing sensitive information, such as passwords, credit card numbers, or personal data
Down
  1. When you got a phishing email, you should (_____) by clicking report phishing button in Outlook.
  2. how many KUB(TYREX) stations in PTTEP YADANA Asset in total
  3. What is the minimum number of characters for PTTEP YADANA Asset user accounts

6 Clues: how many KUB(TYREX) stations in PTTEP YADANA Asset in totalWhat is the minimum number of characters for PTTEP YADANA Asset user accountsThe practice of protecting systems, networks, and programs from digital attacksWhen you got a phishing email, you should (_____) by clicking report phishing button in Outlook....

Puzzle #4 2024-05-07

Puzzle #4 crossword puzzle
Across
  1. corrective action/suggestions for improvement
  2. proof
  3. process effected by management to provide reasonable assurance
  4. daily paid union
  5. an illegal act for financial or personal gain
  6. protecting sensitive information from unauthorised persons
Down
  1. monthly paid union
  2. formal statement of organisation's goal and objectives
  3. protecting systems, networks, and programs from digital attacks
  4. proper disclosure of financial information
  5. competing interest
  6. highest governing body
  7. event/action that negatively affects the achievement of objectives

13 Clues: proofdaily paid unionmonthly paid unioncompeting interesthighest governing bodyproper disclosure of financial informationcorrective action/suggestions for improvementan illegal act for financial or personal gainformal statement of organisation's goal and objectivesprotecting sensitive information from unauthorised persons...

#InfraNet Cyber Awareness 2022-10-13

#InfraNet Cyber Awareness crossword puzzle
Across
  1. Security or house
  2. Password attack method
  3. Doesn'trequire a host file to replicate itself
  4. This horse can stampede your security defenses
  5. Who is responsible for cybersecurity
  6. Verifying identity
  7. Unauthorized access to a network
  8. Scrambling text into an unreadable format
  9. Similar to a password
Down
  1. Any crime committed electronically
  2. Watches where you go on the internet
  3. Multi-factor authentication
  4. Cyber awareness month
  5. Wireless technology using short-wave UHF radio waves
  6. Attack attempt to acquire personal information
  7. Prevents unauthorized access to or from a private network
  8. The address of a webpage
  9. Program that is designed to automate tasks
  10. Chief information security officer

19 Clues: Security or houseVerifying identityCyber awareness monthSimilar to a passwordPassword attack methodThe address of a webpageMulti-factor authenticationUnauthorized access to a networkAny crime committed electronicallyChief information security officerWatches where you go on the internetWho is responsible for cybersecurity...

Xoxo 2024-12-23

Xoxo crossword puzzle
Across
  1. Home of the panthers
  2. Serial killer TV show
  3. My favorite shoe store
  4. My least favorite word
  5. A group of mutants
Down
  1. what I’d like to do to your bells
  2. Protection of the internet
  3. Fingers of the foot
  4. what is your best trait

9 Clues: A group of mutantsFingers of the footHome of the panthersSerial killer TV showMy favorite shoe storeMy least favorite wordwhat is your best traitProtection of the internetwhat I’d like to do to your bells

Information Security Terms 2024-01-31

Information Security Terms crossword puzzle
Across
  1. Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
  2. A software vulnerability that is exploited by attackers before the vendor releases a fix.
  3. of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
  4. Response: The process of responding to and managing the aftermath of a cybersecurity incident.
  5. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  6. Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
  7. The process of converting data into a code to prevent unauthorized access.
  8. Weaknesses in a system that can be exploited by threats to compromise its security.
Down
  1. Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
  2. Software designed to detect and remove malicious software from a computer.
  3. The process of verifying the identity of a user, system, or device.
  4. Security: Security measures to protect network endpoints, such as computers and mobile devices.
  5. Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
  6. A network security device that monitors and controls incoming and outgoing network traffic.
  7. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  8. A software update designed to fix vulnerabilities or improve security.

16 Clues: The process of verifying the identity of a user, system, or device.A software update designed to fix vulnerabilities or improve security.Software designed to detect and remove malicious software from a computer.The process of converting data into a code to prevent unauthorized access....

Binalyze Crossword 2025-05-09

Binalyze Crossword crossword puzzle
Across
  1. The system or device under investigation in a forensic acquisition.
  2. What is the name of Binalyze’s new AI-powered tool?
  3. What was the name of Binalyze's first product designed to collect evidence from a single machine?
  4. A personality assessment framework that categorizes individuals based on dominant behavioral traits to improve workplace communication and collaboration.
  5. A cybersecurity specialist who creates and improves systems to detect malicious activity by analyzing behaviors, tuning detection rules, and staying ahead of evolving threats. ... Engineer
  6. At which conference did Binalyze win the Best Security Investigation Platform award?
Down
  1. Who at Binalyze is known for their passion for antique items?
  2. The type of log or trace left behind by users or malware that forensics experts analyze.
  3. At which competition did Binalyze win the Gold award in the Incident Analysis & Response Solution category?
  4. In Binalyze's guiding philosophy OODA, what does the letter D stand for?
  5. What is the name of the advanced analysis engine developed by the Binalyze team, designed to outperform rule-based tools like YARA and Sigma in analyzing cybersecurity incidents?
  6. In which Gartner category is Binalyze listed?

12 Clues: In which Gartner category is Binalyze listed?What is the name of Binalyze’s new AI-powered tool?Who at Binalyze is known for their passion for antique items?The system or device under investigation in a forensic acquisition.In Binalyze's guiding philosophy OODA, what does the letter D stand for?...

4IR Technologies Pillars 2023-09-11

4IR Technologies Pillars crossword puzzle
Across
  1. 4IR Sense element (C)
  2. 4IR Sense element (I)
  3. 4IR Analysis element (C)
  4. 4IR Act element (3)
  5. 4IR Act element (A)
  6. 4IR Analysis element (B)
Down
  1. 4IR Sense element (C)
  2. 4IR Act element (S)
  3. 4IR Analysis element (A)
  4. 4IR Act element (A)

10 Clues: 4IR Act element (S)4IR Act element (3)4IR Act element (A)4IR Act element (A)4IR Sense element (C)4IR Sense element (C)4IR Sense element (I)4IR Analysis element (A)4IR Analysis element (C)4IR Analysis element (B)

ict 2023-09-16

ict crossword puzzle
Across
  1. unwanted and unsolicited email.
  2. machine that processes data.
  3. a structured collection of data.
  4. prevents data loss.
  5. writing code to instruct a computer.
  6. helps data find its way
  7. return to an initial state.
  8. Usually in one location.
  9. online storage and computing resources.
  10. blocks unwanted traffic
Down
  1. connects devices in a network.
  2. step-by-step procedure for solving a problem.
  3. wireless data transfer technology.
  4. programs that run on a computer.
  5. protecting computer systems from threats.
  6. a global network of connected computers.
  7. technology that allows data transmission without physical connections.
  8. keeps data secure.
  9. electroniconic communication method for sending and receiving messages.
  10. the global system of interconnected computer networks.

20 Clues: keeps data secure.prevents data loss.helps data find its wayblocks unwanted trafficUsually in one location.return to an initial state.machine that processes data.connects devices in a network.unwanted and unsolicited email.a structured collection of data.programs that run on a computer.wireless data transfer technology....

Cybersecurity Awareness Month 2024-10-16

Cybersecurity Awareness Month crossword puzzle
Across
  1. A type of malware that demands payment in exchange for restoring access to data
  2. A type of malicious software that replicates itself by attaching to other programs or files, potentially causing harm to computer systems, networks, or data.
  3. Creating a copy of data to prevent its loss in case of a disaster or data breach
  4. A type of software that is designed to damage or exploit a computer system
  5. The process of converting data into a secure format to prevent unauthorized access and ensure confidentiality.
  6. The potential for loss or damage when a threat exploits a vulnerability, often assessed in terms of likelihood and impact on organizational assets.
  7. The process of verifying the identity of a user, device, or system
Down
  1. A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
  2. Type of malware that allows an attacker to remotely control a system or network
  3. A network that encrypts internet connections and helps secure remote access to a network
  4. Adhering to regulatory requirements and industry standards for data protection and privacy in cloud environments
  5. Unsolicited, unwanted, and often malicious messages sent in bulk.
  6. Attack where an attacker gains unauthorized access to a system or network
  7. The act of revising software or systems to fix vulnerabilities and enhance security against emerging threats.

14 Clues: Unsolicited, unwanted, and often malicious messages sent in bulk.The process of verifying the identity of a user, device, or systemAttack where an attacker gains unauthorized access to a system or networkA type of software that is designed to damage or exploit a computer system...

Cybersecurity Awareness Month 2024-10-18

Cybersecurity Awareness Month crossword puzzle
Across
  1. Common type of cyberattack where the hacker encrypts your files and demands payment.
  2. A ____ test is performed to identify vulnerabilities in a system.
  3. This form of attack tries to trick you into giving personal information via fake websites or emails.
  4. A phishing attack done over the phone.
  5. The process of verifying someone's identity.
  6. A strong, complex one helps protect your accounts.
Down
  1. A person who attempts to gain unauthorized access to your system.
  2. A type of phishing attack done over text messages.
  3. A software that fights off malicious viruses and malware.
  4. The backbone of secure communication online, abbreviated as SSL.
  5. Protection against unauthorized changes to data.
  6. Multi-Factor Authentication is shortened to this.
  7. A harmful program disguised as legitimate software.
  8. A malicious code that spreads from computer to computer.

14 Clues: A phishing attack done over the phone.The process of verifying someone's identity.Protection against unauthorized changes to data.Multi-Factor Authentication is shortened to this.A type of phishing attack done over text messages.A strong, complex one helps protect your accounts.A harmful program disguised as legitimate software....

CROSSWORD 2023-01-12

CROSSWORD crossword puzzle
Across
  1. The art of cooking.
  2. Learns to handle and drive large machines.
  3. Focuses on fighting fires.
  4. Information Technology.
  5. Learns to teach young children.
  6. Deals with teeth.
  7. The art of mending metals.
  8. Dog, cat, and pet care.
  9. Digital photography, planning, and recording.
  10. Heating, ventilation, and air Conditioning.
Down
  1. Builds and constructs things.
  2. Learns how to do procedures on people in need.
  3. Hair, makeup, and nails.
  4. Learns to keep devices safe and secure.
  5. Laws, justice, and how to enforce them.
  6. Learns to design and print.
  7. Nursing and saving lives.
  8. Learns to do auto care and maintenance.
  9. Installs, removes, and repairs electric.

19 Clues: Deals with teeth.The art of cooking.Information Technology.Dog, cat, and pet care.Hair, makeup, and nails.Nursing and saving lives.Focuses on fighting fires.The art of mending metals.Learns to design and print.Builds and constructs things.Learns to teach young children.Learns to keep devices safe and secure.Laws, justice, and how to enforce them....

NUCORPERS 2025-07-27

NUCORPERS crossword puzzle
Across
  1. – What we aim for in business and people
  2. – Helps us grow and improve
  3. – Driving improvement through new ideas
  4. – What we strive to deliver with excellence
  5. – Our company name
  6. – A key HR service
  7. – Our plan to reach our goals
  8. – The process for welcoming new employees
Down
  1. – The structure of how tasks move
  2. – One of our core values
  3. – Protects our systems and data
  4. – Staying aligned with regulations
  5. – What guides our long-term direction
  6. – What makes our efforts stronger
  7. – A measure of performance (Key Performance Indicator)

15 Clues: – Our company name– A key HR service– One of our core values– Helps us grow and improve– Our plan to reach our goals– Protects our systems and data– The structure of how tasks move– What makes our efforts stronger– Staying aligned with regulations– What guides our long-term direction– Driving improvement through new ideas...

Profesi dan peluang usaha dibildang tkjt 2023-11-17

Profesi dan peluang usaha dibildang tkjt crossword puzzle
Across
  1. memastikan perusahaan mematuhi peraturan dan standar keamanan TI
  2. pembuat konten
  3. mengelola dan memelihara jaringan komputer perusahaan
  4. bertanggung jawab memelihara jaringan komputer
  5. mengkroordinasikan proyek proyek TI
Down
  1. yang mengelola jaringan komputer
  2. membangun dan mengembangkan situs web
  3. memberikan pelatihan tentang penggunaan teknologi
  4. yang mengembangkan kecerdasan buatan
  5. yang menjaga keamanan terhadap sistem insfastrukur TI

10 Clues: pembuat kontenyang mengelola jaringan komputermengkroordinasikan proyek proyek TIyang mengembangkan kecerdasan buatanmembangun dan mengembangkan situs webbertanggung jawab memelihara jaringan komputermemberikan pelatihan tentang penggunaan teknologiyang menjaga keamanan terhadap sistem insfastrukur TI...

Guess me If you Can 2022-06-29

Guess me If you Can crossword puzzle
Across
  1. Moral philosophy
  2. of conduct A set of rules
  3. An event that is either unpleasant or unusual
  4. The act of obeying an order, rule, or request
  5. Possibility of loss or injury
  6. A set of guidelines
Down
  1. An official inspection
  2. One who reports suspected wrongdoing
  3. Verification of the identity
  4. Protection of internet-connected system

10 Clues: Moral philosophyA set of guidelinesAn official inspectionof conduct A set of rulesVerification of the identityPossibility of loss or injuryOne who reports suspected wrongdoingProtection of internet-connected systemAn event that is either unpleasant or unusualThe act of obeying an order, rule, or request

Guess Me If You Can 2022-06-29

Guess Me If You Can crossword puzzle
Across
  1. Moral philosophy
  2. of conduct A set of rules
  3. An event that is either unpleasant or unusual
  4. The act of obeying an order, rule, or request
  5. Possibility of loss or injury
  6. A set of guidelines
Down
  1. An official inspection
  2. One who reports suspected wrongdoing
  3. Verification of the identity
  4. Protection of internet-connected system

10 Clues: Moral philosophyA set of guidelinesAn official inspectionof conduct A set of rulesVerification of the identityPossibility of loss or injuryOne who reports suspected wrongdoingProtection of internet-connected systemAn event that is either unpleasant or unusualThe act of obeying an order, rule, or request

Shayaans Life 2023-01-11

Shayaans Life crossword puzzle
Across
  1. My favorite game
  2. what is aphone
  3. an animal I hate
  4. my favorite food
  5. where i used to live
Down
  1. what i think my future job is going to be
  2. are something better than cookies
  3. what I have as another pet
  4. what is the base code of a computer
  5. what I have as a pet

10 Clues: what is aphoneMy favorite gamean animal I hatemy favorite foodwhat I have as a petwhere i used to livewhat I have as another petare something better than cookieswhat is the base code of a computerwhat i think my future job is going to be

M3 test crossword 2023-06-14

M3 test crossword crossword puzzle
Across
  1. Stops electricity from flowing, rubber.
  2. Power from water.
  3. Happens again and again.
  4. Power from Earth's heat.
  5. Online protection.
Down
  1. Power lines connecting power supplies to homes in a large area.
  2. Measures the voltage in the circuit.
  3. Makes power and electricity.
  4. If it's high, power is low.
  5. Allows electricity to flow, metal.

10 Clues: Power from water.Online protection.Happens again and again.Power from Earth's heat.If it's high, power is low.Makes power and electricity.Allows electricity to flow, metal.Measures the voltage in the circuit.Stops electricity from flowing, rubber.Power lines connecting power supplies to homes in a large area.

Family Puzzle Time! 2022-01-11

Family Puzzle Time! crossword puzzle
Across
  1. A game completed by all three (human) family members
  2. Messengers for Demon Slayers
  3. The most dignified gentleman in the house
  4. The go-to nightly unwind YouTube videos
  5. Katie's favorite novel!
  6. Both our favorite burger AND a character on Venture Brothers
Down
  1. Taylor's favorite dinner food
  2. Beckett's college major!
  3. Toss a coin to this guy
  4. He loves nighttime belly pets!
  5. Please don't tell people how he lives
  6. He loves to play on the bachelor pad
  7. Our favorite doggo!
  8. This guy loves to grind...

14 Clues: Our favorite doggo!Toss a coin to this guyKatie's favorite novel!Beckett's college major!This guy loves to grind...Messengers for Demon SlayersTaylor's favorite dinner foodHe loves nighttime belly pets!He loves to play on the bachelor padPlease don't tell people how he livesThe go-to nightly unwind YouTube videos...

Telecom Olympics 2020 2020-04-10

Telecom Olympics 2020 crossword puzzle
Across
  1. Making copies of data
  2. Tech Support Company
  3. Don't open ___ from people you don't know
  4. WCTA is ____ years old
  5. Use ____ passwords
  6. The capacity of a telecom line to carry signals
  7. Network security system used to stop unauthorized access
  8. Communication over a distance
  9. A piece of code that is capable of destroying data
Down
  1. Board President
  2. NIST involves strategies for ____
  3. The activity of defrauding by posing as a legit business
  4. Someone who seeks to exploit weaknesses in a network
  5. What is a CDR?

14 Clues: What is a CDR?Board PresidentUse ____ passwordsTech Support CompanyMaking copies of dataWCTA is ____ years oldCommunication over a distanceNIST involves strategies for ____Don't open ___ from people you don't knowThe capacity of a telecom line to carry signalsA piece of code that is capable of destroying data...

Compleanno 2025-12-17

Compleanno crossword puzzle
Across
  1. dove andiamo a mangiare
  2. la bionda dalla quale vai sempre con i tuoi colleghi
  3. l'ambito lavorativo per combattere gli hacker
  4. la tua macchina dei sogni
  5. la canzone che più ci rappresenta
  6. nomignolo
  7. dove ci siamo conosciuti
Down
  1. il prof che odi
  2. la nobile artedi sopravvivere
  3. la battaglia tra un pasto e l'altro
  4. la materia che ti ha fatto venire gli incubi
  5. l'appuntamento fisso di ogni Ottobre
  6. si trova ANCHE a New York
  7. come ti chiamo

14 Clues: nomignolocome ti chiamoil prof che odidove andiamo a mangiaredove ci siamo conosciutila tua macchina dei sognisi trova ANCHE a New Yorkla nobile artedi sopravviverela canzone che più ci rappresentala battaglia tra un pasto e l'altrol'appuntamento fisso di ogni Ottobrela materia che ti ha fatto venire gli incubi...

Garrett & Angie 2024-04-23

Garrett & Angie crossword puzzle
Across
  1. The city where Garrett proposed
  2. Angie's favorite type of wine
  3. Garrett's college degree
  4. Their favorite sport to watch together
  5. Couples' favorite sport to play together
  6. The current city the couple lives in
  7. The # of years the couple has been together
Down
  1. Couples' favorite TV show to watch together
  2. The sport Garrett played in college
  3. Garrett's middle name
  4. Angie's middle name
  5. City where Angie was born
  6. The state where the couple went to college
  7. Angie's college degree

14 Clues: Angie's middle nameGarrett's middle nameAngie's college degreeGarrett's college degreeCity where Angie was bornAngie's favorite type of wineThe city where Garrett proposedThe sport Garrett played in collegeThe current city the couple lives inTheir favorite sport to watch togetherCouples' favorite sport to play together...

cs 2025-09-25

cs crossword puzzle
Across
  1. The name of a company that should not be used in any password.
  2. A great place to share vacation pics… and for hackers to gather info about you.
  3. If you leave your seat, hit Windows + L — don’t forget to ___ your PC!
  4. Paycheque.pdf.exe isn’t a paycheque. It’s an ___ pretending to be one. (Hint: look at the extension!)
  5. An AI buddy who can explain cybersecurity… or ruin the surprise in your crossword puzzle
  6. The reps and workouts your brain needs to stay sharp against cyber threats.
  7. A tasty little file that lives in your browser and remembers your logins, shopping cart, and site preferences (but sadly, not chocolate chip).
Down
  1. Who’s responsible for cybersecurity? Not just IT. It’s ___’s job.
  2. That free online PDF tool that shrank your file… and smuggled in malware like the horse at Troy. THREAT.
  3. That “urgent” email from bill.gates@micros0ft.com offering you free money.
  4. Picking up the phone to ask, “Hey, did you really send me that email?”
  5. When someone slips in behind you through a locked door… or the thing you do with hotdogs before the big game.
  6. One wrong __ is all it takes to turn a normal day into “call IT, we’ve got a problem.”

13 Clues: The name of a company that should not be used in any password.Who’s responsible for cybersecurity? Not just IT. It’s ___’s job.If you leave your seat, hit Windows + L — don’t forget to ___ your PC!Picking up the phone to ask, “Hey, did you really send me that email?”That “urgent” email from bill.gates@micros0ft.com offering you free money....

test 2025-08-27

test crossword puzzle
Across
  1. Who’s responsible for cybersecurity? Not just IT. It’s ___’s job.
  2. If you leave your seat, hit Windows + L — don’t forget to ___ your PC!
  3. Paycheque.pdf.exe isn’t a paycheque. It’s an ___ pretending to be one. (Hint: look at the extension!)
  4. The reps and workouts your brain needs to stay sharp against cyber threats.
  5. When someone slips in behind you through a locked door… or the thing you do with hotdogs before the big game.
  6. One wrong __ is all it takes to turn a normal day into “call IT, we’ve got a problem.”
  7. That free online PDF tool that shrank your file… and smuggled in malware like the horse at Troy. THREAT.
  8. A great place to share vacation pics… and for hackers to gather info about you.
Down
  1. The name of a company that should not be used in any password.
  2. An AI buddy who can explain cybersecurity… or ruin the surprise in your crossword puzzle
  3. Picking up the phone to ask, “Hey, did you really send me that email?”
  4. That “urgent” email from bill.gates@micros0ft.com offering you free money.
  5. A tasty little file that remembers your logins, shopping cart, and site preferences (but sadly, not chocolate chip).

13 Clues: The name of a company that should not be used in any password.Who’s responsible for cybersecurity? Not just IT. It’s ___’s job.If you leave your seat, hit Windows + L — don’t forget to ___ your PC!Picking up the phone to ask, “Hey, did you really send me that email?”That “urgent” email from bill.gates@micros0ft.com offering you free money....

Product Cybersecurity Awareness 2023-10-09

Product Cybersecurity Awareness crossword puzzle
Across
  1. - weakness of an asset or control that can be exploited by one or more threats
  2. - property that information is not made available or disclosed to unauthorized individuals, entities, or processes
  3. part that is logically and technically separable
  4. - object that has value, or contributes to value
  5. - the process of encoding information to protect information from unauthorized access
  6. - property of being accessible and usable on demand by an authorized entity
  7. - provision of assurance that a claimed characteristic of an entity is correct
  8. - property of accuracy and completeness
Down
  1. - a segment of code or a program designed to take advantage of a flaw in a computer system
  2. - security process that determines a user or service's level of access
  3. - the assurance that someone cannot deny the validity of something
  4. - occurrence or change of a particular set of circumstances
  5. - estimate of magnitude of damage or physical harm from a damage scenario
  6. - person, group, or organization that carries out an attack path

14 Clues: - property of accuracy and completenesspart that is logically and technically separable- object that has value, or contributes to value- occurrence or change of a particular set of circumstances- person, group, or organization that carries out an attack path- the assurance that someone cannot deny the validity of something...

Cybersecurity is Awesome 2019-11-28

Cybersecurity is Awesome crossword puzzle
Across
  1. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key.
  2. An attack that tricks a user into clicking a webpage element which is invisible or disguised as another element, which may allow attackers to steal credentials or reveal other confidential information.
  3. Second component of the famous InfoSec triad.
  4. A function that can be used to map data of arbitrary size to fixed-size values.
  5. A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
  6. An attack that aims to access files and directories that are stored outside the web root folder.
  7. Third component of the famous InfoSec triad.
Down
  1. An attack where the attacker secretly relays and possibly alters the communications between two parties.
  2. The original name of AES, a specification used for the encryption of electronic data.
  3. A method of trying to gather personal information using deceptive e-mails and websites.
  4. First component of the famous InfoSec triad.
  5. An attack where the attacker submits many passwords / passphrases with the hope of eventually guessing it correctly.
  6. A web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database.
  7. _________ occurs when a program tries to store more data in a temporary storage area than it can hold.

14 Clues: First component of the famous InfoSec triad.Third component of the famous InfoSec triad.Second component of the famous InfoSec triad.A function that can be used to map data of arbitrary size to fixed-size values.The original name of AES, a specification used for the encryption of electronic data....

Crossword on Cybersecurity 2024-12-23

Crossword on Cybersecurity crossword puzzle
Across
  1. The process of taking plain text and scrambling it into an unreadable format
  2. A secure network that allows users to connect to the internet privately and safely
  3. information that a website puts on a user's computer.
  4. Threatening behavior facilitated through electronic means such as texting.
  5. The “a” in the C-I-A Triad
  6. A collection of compromised computers used to perform coordinated attacks
  7. The second "D" in DDO
  8. Fraudulent text messages purporting to be from reputable companies in order to trick individuals into revealing personal information.
Down
  1. The "U" in url
  2. Hardware or software designed to prevent unauthorized access to or from a private network
  3. The “I” in the C-I-A Triad
  4. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction
  5. A type of malicious software designed to block access to a computer system until a sum of money is paid
  6. Unauthorized access to a network, information systems, or application.

14 Clues: The "U" in urlThe second "D" in DDOThe “I” in the C-I-A TriadThe “a” in the C-I-A Triadinformation that a website puts on a user's computer.Unauthorized access to a network, information systems, or application.A collection of compromised computers used to perform coordinated attacks...

Cybersecurity Awareness month 2025-09-30

Cybersecurity Awareness month crossword puzzle
Across
  1. The process of converting information into a code for security
  2. A saved copy of data for recovery after loss or attack
  3. A software update that fixes security vulnerabilities
  4. Manipulating people into revealing confidential information
  5. Software that secretly monitors your computer activities
Down
  1. Malicious software that locks files until a payment is made
  2. A login method requiring two forms of verification
  3. A scam email or message tricking you into giving personal information
  4. A network of infected devices controlled remotely
  5. A program that detects and removes malicious software
  6. A secret string used to secure accounts
  7. Malicious software designed to damage or gain access to a system
  8. A network security system that blocks unauthorized access
  9. A service that creates a secure tunnel for internet traffic

14 Clues: A secret string used to secure accountsA network of infected devices controlled remotelyA login method requiring two forms of verificationA program that detects and removes malicious softwareA software update that fixes security vulnerabilitiesA saved copy of data for recovery after loss or attack...

Nathaniel Cybersecurity Crossword 2026-04-02

Nathaniel Cybersecurity Crossword crossword puzzle
Across
  1. a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source
  2. malicious code that replicates by independently exploiting vulnerabilities in networks.
  3. holds a computer system, or the data it contains, captive until the target makes a payment
  4. an attacker requests personal information from a party in exchange for something, like a gift.
  5. displays annoying pop-ups to generate revenue for its authors
  6. non-technical means for a criminal to gather information on a target
  7. malware that carries out malicious operations under the guise of a desired operation such as playing an online game
Down
  1. software that enables a criminal to obtain information about a user’s computer activities.
  2. phishing using voice communication technology
  3. takes advantage of programming errors or design flaws to grant the criminal elevated access to network resources and data.
  4. malicious software
  5. This type of malware remains inactive until that trigger event happens.
  6. program or code introduced by a criminal who has compromised a system.
  7. modifies the operating system to create a backdoor.
  8. malicious executable code attached to another executable file, such as a legitimate program.

15 Clues: malicious softwarephishing using voice communication technologymodifies the operating system to create a backdoor.displays annoying pop-ups to generate revenue for its authorsnon-technical means for a criminal to gather information on a targetprogram or code introduced by a criminal who has compromised a system....

SANS CyberSecurity Crossword 2021-01-11

SANS CyberSecurity Crossword crossword puzzle
Across
  1. A network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
  2. An attempt by hackers to damage or destroy a computer network or system.
  3. Computational Procedure
  4. Conceals the data’s original meaning to prevent it from being known or used.
  5. A software exploit that involves a combination of attacks against different vulnerabilities (7,6)
  6. A standalone malware computer program that replicates itself in order to spread to other computers
  7. Used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. (9,4)
  8. Text files with small pieces of data
  9. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Down
  1. Designed to detect and destroy computer viruses
  2. Any malicious computer program which is used to hack into a computer by misleading users of its true intent.(6,5)
  3. A large number of compromised computers
  4. The activity of defrauding an online account holder of financial information by posing as a legitimate company.
  5. Often installed after a compromise happens (4,4)

14 Clues: Computational ProcedureText files with small pieces of dataA large number of compromised computersDesigned to detect and destroy computer virusesOften installed after a compromise happens (4,4)An attempt by hackers to damage or destroy a computer network or system.Conceals the data’s original meaning to prevent it from being known or used....

Cybersecurity Awareness Month 2024-10-16

Cybersecurity Awareness Month crossword puzzle
Across
  1. A type of malware that demands payment in exchange for restoring access to data
  2. A type of malicious software that replicates itself by attaching to other programs or files, potentially causing harm to computer systems, networks, or data.
  3. Creating a copy of data to prevent its loss in case of a disaster or data breach
  4. A type of software that is designed to damage or exploit a computer system
  5. The process of converting data into a secure format to prevent unauthorized access and ensure confidentiality.
  6. The potential for loss or damage when a threat exploits a vulnerability, often assessed in terms of likelihood and impact on organizational assets.
  7. The process of verifying the identity of a user, device, or system
Down
  1. A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
  2. Type of malware that allows an attacker to remotely control a system or network
  3. A network that encrypts internet connections and helps secure remote access to a network
  4. Adhering to regulatory requirements and industry standards for data protection and privacy in cloud environments
  5. Unsolicited, unwanted, and often malicious messages sent in bulk.
  6. Attack where an attacker gains unauthorized access to a system or network
  7. The act of revising software or systems to fix vulnerabilities and enhance security against emerging threats.

14 Clues: Unsolicited, unwanted, and often malicious messages sent in bulk.The process of verifying the identity of a user, device, or systemAttack where an attacker gains unauthorized access to a system or networkA type of software that is designed to damage or exploit a computer system...

Draeko Cybersecurity Crossword 2024-10-26

Draeko Cybersecurity Crossword crossword puzzle
Across
  1. A form of malware that encrypts a user’s data and demands payment to unlock it.
  2. Malware that gathers information about a person or organization without their knowledge.
  3. Malware that gathers information about a person or organization without their knowledge.
  4. A network security device or software that monitors and controls incoming and outgoing traffic.
  5. A simulated cyberattack to evaluate the security of a system.
  6. An extra layer of security requiring two forms of identification for access.
Down
  1. The psychological manipulation of people to disclose confidential information.
  2. Software intentionally designed to cause damage, such as viruses, worms, and Trojans.
  3. The process of converting information into a code to prevent unauthorized access.
  4. A type of social engineering attack where attackers trick users into revealing personal information.
  5. A trial-and-error method used to guess passwords or encryption keys.
  6. An attack where multiple systems flood a target, causing denial of service.
  7. A tool that encrypts internet traffic and hides a user’s IP address.
  8. A flaw in software that is unknown to the vendor and, therefore, unpatched.
  9. A network of infected devices controlled remotely by a hacker, typically to launch large-scale attacks.

15 Clues: A simulated cyberattack to evaluate the security of a system.A trial-and-error method used to guess passwords or encryption keys.A tool that encrypts internet traffic and hides a user’s IP address.An attack where multiple systems flood a target, causing denial of service.A flaw in software that is unknown to the vendor and, therefore, unpatched....

Puzzle 2023-01-13

Puzzle crossword puzzle
Across
  1. we comply this compliance
  2. Financial platform for business
  3. Password Manager
  4. Our own ERP
  5. we protect from malicious attacks
Down
  1. I am Zoho’s new bee for calibri
  2. As a manufacturer we ship this
  3. I help you plan and visualise
  4. Zoho’s attempt on server less journey

9 Clues: Our own ERPPassword Managerwe comply this complianceI help you plan and visualiseAs a manufacturer we ship thisI am Zoho’s new bee for calibriFinancial platform for businesswe protect from malicious attacksZoho’s attempt on server less journey

Cybersecurity Awareness 2023-10-12

Cybersecurity Awareness crossword puzzle
Across
  1. Tool that helps users create, save, and manage passwords
  2. Fraudulent practice of sending emails or other messages pretending to be from a legitimate source trying to convince you to click on a link
  3. A phishing attack conducted by phone
  4. A person who engages in criminal activity by means of computers or the internet
Down
  1. Being protected against criminal or unauthorized use of electronic data, or the measures taken to achieve this
  2. Multifactor Authentication
  3. A secret word or phrase that must be used to gain access to something
  4. Use of deception to manipulate individuals into divulging confidential or personal information
  5. Malicious software designed to block access to a computer system until a sum of money is paid

9 Clues: Multifactor AuthenticationA phishing attack conducted by phoneTool that helps users create, save, and manage passwordsA secret word or phrase that must be used to gain access to somethingA person who engages in criminal activity by means of computers or the internet...

Cybersecurity Puzzle 2024-10-14

Cybersecurity Puzzle crossword puzzle
Across
  1. using historical data and advanced predictive algorithms
  2. AI- driven systems demonstrate this against evolving threats
  3. One of the databases used in the study
  4. a form of network intrusion
  5. pose an ever-growing challenge to security
Down
  1. researchers argue that this approach will simplify cybersecurity
  2. A form of cyber applications of AI bas
  3. A critical concern against AI systems
  4. one of the various facets of cyber security

9 Clues: a form of network intrusionA critical concern against AI systemsA form of cyber applications of AI basOne of the databases used in the studypose an ever-growing challenge to securityone of the various facets of cyber securityusing historical data and advanced predictive algorithmsAI- driven systems demonstrate this against evolving threats...

Cybersecurity crossword 2024-11-07

Cybersecurity crossword crossword puzzle
Across
  1. A secure network that hides your IP address and encrypts your internet connection to protect privacy.
  2. An affordable mini-computer for learning.
  3. A security method that requires two forms of verification
Down
  1. A software that lets you run different operating systems on the same computer.
  2. The process of converting information into a code to stop unauthorized access.
  3. A weakness in a system that can be exploited to gain unauthorized access.
  4. Software that secretly monitors and collects data without the user's consent.
  5. Attack where an intruder intercepts to spy on or alter an exchange.
  6. An attack method that tries all possible combinations to guess a password or encryption key.

9 Clues: An affordable mini-computer for learning.A security method that requires two forms of verificationAttack where an intruder intercepts to spy on or alter an exchange.A weakness in a system that can be exploited to gain unauthorized access.Software that secretly monitors and collects data without the user's consent....

Cybersecurity Puzzle! 2024-12-03

Cybersecurity Puzzle! crossword puzzle
Across
  1. Unauthorized access to or manipulation of computer systems.
  2. A program that protects your computer from viruses
  3. A network security device that monitors and controls incoming and outgoing traffic.
  4. A process used to confirm the identity of a user.
Down
  1. A method of stealing personal information by pretending to be a trustworthy source.
  2. A type of software designed to harm or exploit systems
  3. A weak point in a system that can be exploited.
  4. A secret code used to secure data.
  5. A person who attempts to gain unauthorized access to networks.

9 Clues: A secret code used to secure data.A weak point in a system that can be exploited.A process used to confirm the identity of a user.A program that protects your computer from virusesA type of software designed to harm or exploit systemsUnauthorized access to or manipulation of computer systems....

Cybersecurity Crossword 2025-04-21

Cybersecurity Crossword crossword puzzle
Across
  1. What type of accounts are most likely to get hacked?
  2. A 13 character password would take about 359,000 ___ to crack
  3. The method to crack passwords by trying all sorts of combinations
  4. Over __% of people use passwords of things that are important to them
  5. "123456" and this are the two most commonly used passwords
Down
  1. Are at a higher risk of password hacking due to their use of the internet and their risky behaviors
  2. "_____ stuffing" is when already stolen/leaked information is used to hack into an account
  3. Who fell victim to a credential stuffing incident in 2020?
  4. Dictionary attacks use ____ words to try and guess passwords

9 Clues: What type of accounts are most likely to get hacked?Who fell victim to a credential stuffing incident in 2020?"123456" and this are the two most commonly used passwordsDictionary attacks use ____ words to try and guess passwordsA 13 character password would take about 359,000 ___ to crack...

Cybersecurity Attacks 2023-04-15

Cybersecurity Attacks crossword puzzle
Across
  1. With _____, the victim’s system is held hostage until they agree to pay money to the attacker.
  2. A _____ attack occurs when a malicious actor sends emails that seem to be coming from trusted, legitimate sources in an attempt to grab sensitive information from the target.
  3. In a _____ attack, a hacker embeds malicious code into an insecure website.
  4. A _____ attack gets its name from the “brutish” or simple methodology employed by the attack. The attacker simply tries to guess the login credentials of someone with access to the target system.
Down
  1. A _____ attack uses a malicious program that is hidden inside a seemingly legitimate one
  2. _____ types of cyber attacks refer to breaches in cybersecurity that make it possible for an attacker to eavesdrop on the data sent back and forth between two people, networks, or computers.
  3. A _____ attack is designed to overwhelm the resources of a system to the point where it is unable to reply to legitimate service requests.
  4. _____ infects a computer and changes how it functions, destroys data, or spies on the user or network traffic as it passes through.
  5. With _____, a hacker alters DNS records to send traffic to a fake website.

9 Clues: With _____, a hacker alters DNS records to send traffic to a fake website.In a _____ attack, a hacker embeds malicious code into an insecure website.A _____ attack uses a malicious program that is hidden inside a seemingly legitimate oneWith _____, the victim’s system is held hostage until they agree to pay money to the attacker....

Cybersecurity puzzle 2023-04-21

Cybersecurity puzzle crossword puzzle
Across
  1. related to your identity or personal information
  2. looking over someones shoulder to get information
  3. a file or code
  4. takes over your computer
Down
  1. the opposite to a virus
  2. knowledge obtained from investigating
  3. a type of malware that can copy itself
  4. data
  5. a network of computer infected by malware
  6. and individual who uses computer networking to overcome a technical problem

10 Clues: dataa file or codethe opposite to a virustakes over your computerknowledge obtained from investigatinga type of malware that can copy itselfa network of computer infected by malwarerelated to your identity or personal informationlooking over someones shoulder to get information...

Cybersecurity 2.2 2022-02-22

Cybersecurity 2.2 crossword puzzle
Across
  1. Software running with elevated privileges to control a computer or to gain access to restricted accounts and data
  2. Problems, faults, and bugs in the program that are exploitable, allowing attackers access to the computer on which the program is running
  3. A file that contains an official record of activities that occur on a computer
  4. software that replicates and infects many computers, turning the computer into a "zombie"
  5. Reverse the encryption process, making the data human-readable again
Down
  1. A human-based attack in which the malicious user intercepts communication between the victim's computer and the internet
  2. Software and hardware that track all keyboard clicks, including back spaces, to discover usernames, passwords, credit card numbers, and other sensitive information
  3. Small units of data, transmitted on a network. Collected together, they compose some larger data, such as a document, a website, a movie, etc
  4. Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it

9 Clues: Reverse the encryption process, making the data human-readable againA file that contains an official record of activities that occur on a computersoftware that replicates and infects many computers, turning the computer into a "zombie"Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it...

Cybersecurity Month 2022-10-13

Cybersecurity Month crossword puzzle
Across
  1. ________ Information must be protected from leaks or accidental exposure.
  2. Button in Outlook to report suspicious email or phishing in one click.
  3. _______ Period is the length of time information assets are maintained for an authorized person.
  4. Security _______ is a single or series of unwanted or unexpected information Security Events
Down
  1. What is celebrated in October?
  2. Information is accessible to authorized users.
  3. Information is accurate, complete, and reliable.
  4. Mail that seeks to offer services, products, or advertisements but it could be from either a genuine company or a cybercriminal trying to trick you.
  5. A Security ______ is an identified occurrence within a system, service, or network that may be security relevant.

9 Clues: What is celebrated in October?Information is accessible to authorized users.Information is accurate, complete, and reliable.Button in Outlook to report suspicious email or phishing in one click.________ Information must be protected from leaks or accidental exposure....

Majors and Concentrations 2022-01-26

Majors and Concentrations crossword puzzle
Across
  1. learns to protect on a digital platform
  2. the scientific study of mind and behavior
  3. works with chemicals and beakers
  4. spends a lot of time with a calculator
  5. studies the ocean
  6. synthesizes math science and creativity to build things
Down
  1. studies how to effectively target consumers
  2. synthesizes biology and chemistry
  3. clinicals are part of the program
  4. studies the past
  5. lights...camera...action!
  6. the study of living organisms

12 Clues: studies the paststudies the oceanlights...camera...action!the study of living organismsworks with chemicals and beakerssynthesizes biology and chemistryclinicals are part of the programspends a lot of time with a calculatorlearns to protect on a digital platformthe scientific study of mind and behaviorstudies how to effectively target consumers...

NAVFAC Capabilities 2023-02-16

NAVFAC Capabilities crossword puzzle
Across
  1. NEPA regulations requirement
  2. ________ Handling Ashore Procurement
  3. ________Facilities and Equipment Engineering
  4. Protection against criminal or unauthorized use of electronic data
  5. Basic physical and organizational structures and facilities
  6. Real Estate _________ and Management
Down
  1. _______ and Facilities Operations
  2. _________ Vehicles provide transportation services
  3. Relating to impact of human activity on the natural world
  4. Proposed or planned undertaking
  5. NAVFAC Capabilities: ______ & Construction
  6. Detailed coordination of a complex operation involving people, facilities, or supplies.

12 Clues: NEPA regulations requirementProposed or planned undertaking_______ and Facilities Operations________ Handling Ashore ProcurementReal Estate _________ and ManagementNAVFAC Capabilities: ______ & Construction________Facilities and Equipment Engineering_________ Vehicles provide transportation services...

Majors and Concentrations 2022-01-26

Majors and Concentrations crossword puzzle
Across
  1. studies the past
  2. studies the ocean
  3. lights...camera...action!
  4. spends a lot of time with a calculator
  5. the study of living organisms
Down
  1. studies how to effectively target consumers
  2. the scientific study of mind and behavior
  3. clinicals are part of the program
  4. synthesizes biology and chemistry
  5. learns to protect on a digital platform
  6. works with chemicals and beakers
  7. synthesizes math science and creativity to build things

12 Clues: studies the paststudies the oceanlights...camera...action!the study of living organismsworks with chemicals and beakersclinicals are part of the programsynthesizes biology and chemistryspends a lot of time with a calculatorlearns to protect on a digital platformthe scientific study of mind and behaviorstudies how to effectively target consumers...

Tech 2025-07-11

Tech crossword puzzle
Across
  1. Approval
  2. practice of protecting computer systems
  3. Disguises itself as an legitimate program
  4. Science Technology engineering & mathematics
  5. Program used to keep intruders out
  6. Naazharae Smith
Down
  1. ensures that resources are only granted to those users who are entitled to them
  2. Damages & disables computers systems
  3. Attempt to trick users
  4. attacker that lurks on your network for extended periods
  5. Hijacks system and encrypts files
  6. software designed to detect and remove malware

12 Clues: ApprovalNaazharae SmithAttempt to trick usersHijacks system and encrypts filesProgram used to keep intruders outDamages & disables computers systemspractice of protecting computer systemsDisguises itself as an legitimate programScience Technology engineering & mathematicssoftware designed to detect and remove malware...

Cybersecurity Month 2022-07-29

Cybersecurity Month crossword puzzle
Across
  1. A specifically configured server, also known as decoy server, designed to attract and monitor intruders in a manner such that their actions do not affect production systems
  2. A malware software that seems legitimate enough that users voluntarily install them onto their computers, allowing the malware to infect their systems.
  3. a form of cyberattack that infect and spread through computer systems without an action from the user; they can operate on their own and spread by exploiting vulnerabilities within the victim's operating system
  4. A large number of compromised computers that are used to create and send spam or viruses or flood a network with messages such as a denial-of-service attack
  5. Finding and exploiting vulnerabilities in a system or on a website
Down
  1. The process of taking an unencrypted message (plaintext), applying a mathematical function to it (encryption algorithm with a key) and producing an encrypted message (ciphertext)
  2. This is a type of electronic mail (email) attack that attempts to convince a user that the originator is genuine, by with the intention of obtaining information for use in social engineering
  3. A highly sophisticated cyber threat as criminals work hard to make spoofed emails and websites appear as realistic and possible
  4. disrupts computer operations, gathers sensitive information or gains access to private computer systems through the use of code, scripts, active content and other forms of software; abbreviation for malicious software

9 Clues: Finding and exploiting vulnerabilities in a system or on a websiteA highly sophisticated cyber threat as criminals work hard to make spoofed emails and websites appear as realistic and possibleA malware software that seems legitimate enough that users voluntarily install them onto their computers, allowing the malware to infect their systems....

Cybersecurity Ylan 2024-11-07

Cybersecurity Ylan crossword puzzle
Across
  1. A test used to verify if a user is human and not a robot.
  2. A program that protects your computer from viruses.
  3. Network of devices connected to the internet to exchange data.
  4. A company that makes equipment and software to help connect and protect computer networks.
  5. A secret part of the internet, often used for anonymous activities.
Down
  1. A unique number that identifies a computer or device on the internet or a network.
  2. A protocol used to connect and control a remote computer.
  3. A secret word or code to log in.
  4. A person who tries to break into computers illegally.

9 Clues: A secret word or code to log in.A program that protects your computer from viruses.A person who tries to break into computers illegally.A protocol used to connect and control a remote computer.A test used to verify if a user is human and not a robot.Network of devices connected to the internet to exchange data....

JD 2024-12-20

JD crossword puzzle
Across
  1. b
  2. 3
  3. 30
  4. x
  5. 28
  6. i
  7. 10
  8. 20
  9. z
  10. 22
  11. p
  12. m
  13. 14
  14. 4
  15. 25
  16. o
  17. 12
  18. 26
  19. u
  20. 18
  21. 8
  22. w
  23. 13
  24. 21
  25. e
  26. h
  27. 29
  28. q
  29. 11
  30. r
Down
  1. 1
  2. c
  3. a
  4. v
  5. k
  6. 24
  7. 32
  8. 31
  9. j
  10. 19
  11. 27
  12. 23
  13. t
  14. 7
  15. 6
  16. 2
  17. d
  18. 5
  19. f
  20. y
  21. l
  22. j
  23. 15
  24. s
  25. 33
  26. 16
  27. 17
  28. g
  29. 9
  30. n

60 Clues: 1bc3avkxijt7z62dpm5f4ylojus8wg9enhqr243032281031192723202214251226151813331617212911

Future of Technology 2025-11-17

Future of Technology crossword puzzle
Across
  1. Next generation mobile network after 5G
  2. Protection of computers and networks
  3. Technology enabling space travel and exploration
  4. Group of autonomous robots or drones working together
  5. Discarded electronic devices
  6. Digital currency and related technologies
  7. Decentralized digital ledger technology
  8. Study of genes and DNA manipulation
  9. Machines that perform tasks autonomously
  10. Securing data by encoding information
Down
  1. Immersive computer-generated environment
  2. A city enhanced with IoT technology
  3. Augmented reality technology
  4. Technology using extremely small particles
  5. Popular cryptocurrency abbreviation
  6. AI systems that learn from data
  7. Advanced computing using qubits
  8. Study of biological systems used in future medicine
  9. Brain–computer interface technology
  10. Energy from sustainable sources

20 Clues: Augmented reality technologyDiscarded electronic devicesAI systems that learn from dataAdvanced computing using qubitsEnergy from sustainable sourcesA city enhanced with IoT technologyPopular cryptocurrency abbreviationStudy of genes and DNA manipulationBrain–computer interface technologyProtection of computers and networks...

Spanish-English Tech Words (Use - to separate words) 2025-11-21

Spanish-English Tech Words (Use - to separate words) crossword puzzle
Across
  1. Plataforma
  2. Obsoleto
  3. Datos
  4. (Realidad Virutal)
  5. Motor de busqueda
  6. Tecnofobo
  7. Inalamambrico
  8. Punto de acceso
  9. Iniciar Session
  10. Caerse
  11. Captura de pantalla
  12. Cargar
  13. copia de seguridad
  14. Descargar
  15. Servidor
  16. Permitir
  17. Mejorar
  18. DEVELOPER Desorallador de software
  19. Provedor de Internet
Down
  1. DEVICE Dispositivo Inteligente
  2. Estar en Linea
  3. Actualizar
  4. Tecnologia Ponible
  5. Adjuntar
  6. Navegar
  7. Adricululares
  8. Ciberseguridad
  9. Artilugio / Aparato
  10. BROWSER Navegador
  11. Gama
  12. Alta tecnologia
  13. Red Social
  14. Registrarse
  15. Abarcar
  16. Rastrear
  17. Ultima Generacion
  18. Experto Technologico
  19. Amplio
  20. Interfaz amigable
  21. Software Gratuito

40 Clues: GamaDatosCaerseCargarAmplioNavegarAbarcarMejorarAdjuntarObsoletoRastrearServidorPermitirTecnofoboDescargarPlataformaActualizarRed SocialRegistrarseAdriculularesInalamambricoEstar en LineaCiberseguridadAlta tecnologiaPunto de accesoIniciar SessionMotor de busquedaBROWSER NavegadorUltima GeneracionInterfaz amigableSoftware GratuitoTecnologia Ponible...

klausimai 2023-05-17

klausimai crossword puzzle
Across
  1. Kas yra „object-oriented programming“?
  2. Kas yra žurnalavimas?
  3. Kas yra „data cente?
  4. Kas yra „software development life cycle“?
  5. Kas yra „operating system“?
  6. Kas yra „network protocol“?
  7. Kas yra „serveris“?
  8. Kas yra „cloud computing“?
  9. Kas yra „version control“?
  10. Kas yra „URL“?
  11. Kas yra „cybersecurity“?
  12. Kas yra „cache“?
  13. Kas yra „cyber attack“?
  14. Kas yra „bug“
  15. Kas yra „router“?
  16. Kas yra „firewall“?
Down
  1. Kas yra „artificial intelligence“?
  2. Kas yra „RAM“?
  3. Kas yra „encryption“?
  4. Kas yra „HTML“?
  5. Kas yra „API“?
  6. Kas yra „data backup“?
  7. Kas yra „malware“?
  8. Kas yra „database management system“?
  9. Kas yra algoritmas
  10. Kas yra duomenų bazė?
  11. Kas yra „programming language“?
  12. Kas yra „data mining“?
  13. Kas yra „open source“?
  14. Kas yra „user interface“?

30 Clues: Kas yra „bug“Kas yra „RAM“?Kas yra „API“?Kas yra „URL“?Kas yra „HTML“?Kas yra „cache“?Kas yra „router“?Kas yra „malware“?Kas yra algoritmasKas yra „serveris“?Kas yra „firewall“?Kas yra „data cente?Kas yra „encryption“?Kas yra žurnalavimas?Kas yra duomenų bazė?Kas yra „data backup“?Kas yra „data mining“?Kas yra „open source“?Kas yra „cyber attack“?...

jihana dwi a_xf 18 2025-04-15

jihana dwi a_xf 18 crossword puzzle
Across
  1. Platform konten digital
  2. Scientist / Menganalisis data
  3. Memblokir akses ke situs atau konten
  4. Memfilter konten negatif
  5. Konten video di platform digital
  6. Memblokir konten negatif
  7. Hak eksklusif penemuan
  8. Melindungi karya intelektual dan penemuan
  9. Izin menggunakan karya orang lain
  10. Cipta / Melindungi karya intelektual
  11. Tanda produk atau jasa
  12. Tag yang membantu mesin pencari
  13. Versi lama halaman web
  14. Melindungi sistem dari serangan
  15. Konten menyebar cepat di media sosial
Down
  1. Operator pencarian lanjutan
  2. Memeriksa keaslian konten
  3. Developer / Mengembangkan situs web
  4. Memblokir akses ke situs atau konten
  5. Mengembangkan perangkat lunak
  6. Cari hasil dari situs tertentu
  7. Mempengaruhi audiens di media sosial
  8. Cari file dengan tipe tertentu
  9. Merancang antarmuka pengguna
  10. Konten digital yang berubah

25 Clues: Hak eksklusif penemuanTanda produk atau jasaVersi lama halaman webPlatform konten digitalMemfilter konten negatifMemblokir konten negatifMemeriksa keaslian kontenOperator pencarian lanjutanKonten digital yang berubahMerancang antarmuka penggunaScientist / Menganalisis dataMengembangkan perangkat lunakCari hasil dari situs tertentu...

Services Marketing - Sec D 2026-03-12

Services Marketing - Sec D crossword puzzle
Across
  1. – Electronic transactions for service payments.
  2. – Mobile application providing services.
  3. – Tailoring service experiences for customers.
  4. – Digital ecosystem for service exchange.
  5. – Online system connecting service providers and users.
  6. – Tools used to enhance service delivery.
  7. – Services delivered via cloud computing.
  8. – Protection of digital service platforms.
Down
  1. – Delivering services from remote locations.
  2. – Service provided through the internet.
  3. – Adapting services to individual needs.
  4. – Buying and selling services online.
  5. – Using data to improve service decisions.
  6. – Use of technology to perform service tasks.
  7. – Automated system answering customer queries.
  8. – Service delivered electronically via digital platforms.
  9. – Technology enabling intelligent service automation.
  10. – Healthcare services delivered remotely.
  11. – Customers participating in value creation.
  12. – Group collaborating digitally across locations.

20 Clues: – Buying and selling services online.– Service provided through the internet.– Adapting services to individual needs.– Mobile application providing services.– Digital ecosystem for service exchange.– Healthcare services delivered remotely.– Tools used to enhance service delivery.– Services delivered via cloud computing....

Jenny and Nate 2023-01-19

Jenny and Nate crossword puzzle
Across
  1. Jenny is the _________ of her siblings
  2. What God has _______, let not man separate
  3. State where honeymoon will be
  4. Relationship of flower girl (Esther) to Jenny
  5. Name of wedding venue
  6. ”Mawiage, mawiage, is what ______ us together today”
  7. Nate’s birthday month
  8. Jenny's major
  9. The couple's favorite author, hint: Narnia
Down
  1. _____ is patient and kind
  2. Nate’s hometown, hint: rhymes with “mutton”
  3. Jenny played this sport in high school
  4. Nate plays this instrument
  5. Nate's major
  6. The formal event to declare a marriage
  7. Jenny’s birthday month
  8. First date, hint: Omaha Art Museum
  9. You may now _____ the bride
  10. Who drinks coffee black? Him or her
  11. Class Nate and Jenny met in

20 Clues: Nate's majorJenny's majorName of wedding venueNate’s birthday monthJenny’s birthday month_____ is patient and kindNate plays this instrumentYou may now _____ the brideClass Nate and Jenny met inState where honeymoon will beFirst date, hint: Omaha Art MuseumWho drinks coffee black? Him or herJenny is the _________ of her siblings...

Семинар 4 Ш.Ирмүүн B25FA2204 2026-02-26

Семинар 4 Ш.Ирмүүн B25FA2204 crossword puzzle
Across
  1. Displays images and text
  2. Error in a program
  3. Step-by-step problem-solving procedure
  4. A collection of saved information
  5. Information produced by a computer
  6. Unprepared raw facts
  7. Physical components of a computer
  8. Data entered into a computer
  9. Programs and applications that run on a computer
  10. To enter a system
  11. Type of learning
Down
  1. Computer that provides services to others
  2. One of the most famous AI
  3. Process of verifying user identity
  4. Copy of data stored for recovery
  5. Place where data is kept
  6. Processed data with meaning
  7. Organized collection of structured data
  8. A person who uses a computer
  9. Protection of digital systems and data

20 Clues: Type of learningTo enter a systemError in a programUnprepared raw factsDisplays images and textPlace where data is keptOne of the most famous AIProcessed data with meaningData entered into a computerA person who uses a computerCopy of data stored for recoveryA collection of saved informationPhysical components of a computer...

Future of Technology 2025-11-17

Future of Technology crossword puzzle
Across
  1. Popular cryptocurrency abbreviation
  2. Study of genes and DNA manipulation
  3. Immersive computer-generated environment
  4. Securing data by encoding information
  5. Machines that perform tasks autonomously
  6. Decentralized digital ledger technology
  7. A city enhanced with IoT technology
  8. Group of autonomous robots or drones working together
  9. Digital currency and related technologies
  10. Next generation mobile network after 5G
Down
  1. Energy from sustainable sources
  2. Technology enabling space travel and exploration
  3. Study of biological systems used in future medicine
  4. Brain–computer interface technology
  5. Discarded electronic devices
  6. AI systems that learn from data
  7. Advanced computing using qubits
  8. Augmented reality technology
  9. Protection of computers and networks
  10. Technology using extremely small particles

20 Clues: Discarded electronic devicesAugmented reality technologyEnergy from sustainable sourcesAI systems that learn from dataAdvanced computing using qubitsPopular cryptocurrency abbreviationBrain–computer interface technologyStudy of genes and DNA manipulationA city enhanced with IoT technologyProtection of computers and networks...

Cybersecurity 3 2024-07-30

Cybersecurity 3 crossword puzzle
Across
  1. Org at this level perform annual vulnerability scan
  2. Level 5 in CMM framework
  3. one of network scanning tool
  4. ... server - one of the observation class in VA
  5. ... configuration another observation class in VA
Down
  1. Team is tasked to conduct testing with objective to break app
  2. Type of testing which is concerned only with input-output ... box
  3. PT is by nature ...
  4. one of the tools used to conduct unauthenticated scan

9 Clues: PT is by nature ...Level 5 in CMM frameworkone of network scanning tool... server - one of the observation class in VA... configuration another observation class in VAOrg at this level perform annual vulnerability scanone of the tools used to conduct unauthenticated scanTeam is tasked to conduct testing with objective to break app...

CyberSecurity 2 2024-07-24

CyberSecurity 2 crossword puzzle
Across
  1. New team structure which combines application support and new work
  2. IAM differentiates between Authenticate and ...
  3. Non-human identity example
  4. Category A3 in top 10 application weaknesses
Down
  1. weakness in application
  2. Failures related to hardcoded passwords
  3. faster method of code delivery
  4. We differentiate betn User and ...
  5. ISO27000 has 14 different categories of ...

9 Clues: weakness in applicationNon-human identity examplefaster method of code deliveryWe differentiate betn User and ...Failures related to hardcoded passwordsISO27000 has 14 different categories of ...Category A3 in top 10 application weaknessesIAM differentiates between Authenticate and ......