cybersecurity Crossword Puzzles
Project Three Part Two 2021-10-15
Across
- Cyber ___ refers to fundamental cybersecurity best practices that an organization's security practitioners and users can undertake.
- a kind of bullying or harassment that takes place via the internet.
- The skill of writing and solving codes, or the study of codes.
- a structure or scheme consisting of a set of algorithms that converts plaintext to the ciphertext to encode or decode messages securely.
- cryptography is the study of ___ communications mechanisms that restrict access to a message's contents to just the sender and intended receiver.
- a digital certificate is a ___ or electronic password that uses cryptography and the public key infrastructure to authenticate the validity of a device, server, or user.digital Certificate
Down
- Cyberstalking is the use of the ____ or other electronic means to stalk or harass an individual, group, or organization.
- the technique of defending vital systems and sensitive data against cyber-attacks.
- any hostile operation aimed at computer information systems, computer networks, infrastructures, or personal computers.
- A person in an existing photograph or video is replaced with someone else's likeness in synthetic media.
10 Clues: The skill of writing and solving codes, or the study of codes. • a kind of bullying or harassment that takes place via the internet. • the technique of defending vital systems and sensitive data against cyber-attacks. • A person in an existing photograph or video is replaced with someone else's likeness in synthetic media. • ...
Cybersecurity (year 09) 2022-12-12
Across
- people who are paid to legally hack into computer systems
- hackers who use tools downloaded from the internet that allow them to hack with little technical knowledge
- Manipulating people to get their personal information
- malware that collects info about the user and sends it back to criminals
Down
- type of malware that encrypts your data until you pay
- attack done by flooding a website with lots of requests
- attack where the criminal tries to maintain a conversation with the victim
- Law that looks after your data
- kind of access Computer Misuse Act protects from
- attacker watches their victim to get sensitive information
- an attack involving an email designed to look official
- malware that hides in legitimate software
- checks incoming and outgoing network traffic
13 Clues: Law that looks after your data • malware that hides in legitimate software • checks incoming and outgoing network traffic • kind of access Computer Misuse Act protects from • type of malware that encrypts your data until you pay • Manipulating people to get their personal information • an attack involving an email designed to look official • ...
Cybersecurity - LMC Style 2022-10-11
Across
- Malicious software
- ___ Engineering. Hackers us this skill to trick people into revealing private information .
- Software that collects data about a user and transmits it over the internet without the user’s knowledge/permission.
- A technology used when working remote that secures information going to/from LMC’s servers.
- Software Usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.
- A technology that allows us to access our files through the internet from anywhere in the world. Hint: it also brings rain.
- A group of computers, printers and devices that are interconnected.
Down
- A system that relies upon encryption techniques rather than banks to regulate the generation of units of currency and verify the transfer of funds.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- A process of encoding messages to keep them secret, so only “authorized” parties can read it.
- Who do you call for help?
- A sequence of words (spaces and punctuation too) used for authentication.
- Piece of code that replicates itself in order to spread the infection to other connected computers.
13 Clues: Malicious software • Who do you call for help? • A group of computers, printers and devices that are interconnected. • A sequence of words (spaces and punctuation too) used for authentication. • ___ Engineering. Hackers us this skill to trick people into revealing private information . • ...
Cybersecurity (year 09) 2022-12-12
Across
- an attack involving an email designed to look official
- people who are paid to legally hack into computer systems
- malware that collects info about the user and sends it back to criminals
- Manipulating people to get their personal information
- attacker watches their victim to get sensitive information
- malware that hides in legitimate software
Down
- hackers who use tools downloaded from the internet that allow them to hack with little technical knowledge
- attack where the criminal tries to maintain a conversation with the victim
- kind of access Computer Misuse Act protects from
- Law that looks after your data
- type of malware that encrypts your data until you pay
- checks incoming and outgoing network traffic
- attack done by flooding a website with lots of requests
13 Clues: Law that looks after your data • malware that hides in legitimate software • checks incoming and outgoing network traffic • kind of access Computer Misuse Act protects from • type of malware that encrypts your data until you pay • Manipulating people to get their personal information • an attack involving an email designed to look official • ...
CyberSecurity Month Crossword 2024-10-10
Across
- You should install this on your computer to detect and remove malicious software
- The process of proving your identity with a username and password
- Software that is designed to disrupt, damage, or gain unauthorized access to your computer
- ___________ backup - A way to protect important files by saving copies offsite or in the cloud
- A set of rules created to ensure security, such as not reusing passwords
Down
- Emails pretending to be from legitimate sources to steal personal info
- This type of "attack" involves tricking people into giving away personal information
- "Public ________ should not be used for sensitive tasks like banking."
- A software designed to protect against malicious software
- A security measure that sends a code to your phone to verify your login
- “_______ encryption” - Technology that scrambles data so it can only be read by authorized users
- What you should never share with others, even if they seem trustworthy
- A strong, unique _______ should be used for each account
- An attack where hackers encrypt your data and demand money to unlock it
- "_____ your devices regularly" - Important action to prevent unauthorized access
15 Clues: A strong, unique _______ should be used for each account • A software designed to protect against malicious software • The process of proving your identity with a username and password • Emails pretending to be from legitimate sources to steal personal info • "Public ________ should not be used for sensitive tasks like banking." • ...
Elicia's Birthday Crossword 2023-05-04
Across
- the college Elicia is going to
- how many siblings does Elicia have
- career path Elicia wants to enter
- the month Elicia was born
- a birthday dessert
- an instrument Elicia plays
- author of Elicia's favourite books
Down
- how old is elicia turning
- the colour of Elicia's room
- the day of the week Elicia on which was born
- how does elicia take her coffee
- the genre of music Elicia listens to most
12 Clues: a birthday dessert • how old is elicia turning • the month Elicia was born • an instrument Elicia plays • the colour of Elicia's room • the college Elicia is going to • how does elicia take her coffee • career path Elicia wants to enter • how many siblings does Elicia have • author of Elicia's favourite books • the genre of music Elicia listens to most • ...
Banking and SCM 2025-05-16
Across
- Loan charge or bank account earnings
- the person or business that provides goods
- Charges for services or tuition payments
- end user of a product
- the business that sells goods in small quantity
- integrating technology into financial services
- the total amount of goods in stock
Down
- Corporate Purchasing
- online Protection against hackers
- Managing and planning the flow of goods
- put money in business
- Handy, suitable and easy to use
12 Clues: Corporate Purchasing • end user of a product • put money in business • Handy, suitable and easy to use • online Protection against hackers • the total amount of goods in stock • Loan charge or bank account earnings • Managing and planning the flow of goods • Charges for services or tuition payments • the person or business that provides goods • ...
Testdf puzzlesd 2022-08-15
Across
- A string of words used to gain access to system or service which is easier to remember than a random combination of symbols and letters
- Use this feature in Outlook to report all suspicious email at work
- The act of having the content or recipient address(es) of a previously legitimate delivered email (with an attachment or link) replaced with a malicious version
- Cyberattacks can be targeted at anyone in the organisation. Who is responsible for Cybersecurity in your organisation?
- The Cybersecurity Awareness month occurs in <month>
Down
- A technique to manipulate a person to gain unauthorised access to a system or network and steal sensitive data or disperse malware
- Use this to make your passphrase harder to crack
- Authentication method identifying individuals based on their physical features
- You received an email with a suspicious link, attachment or with misspelling. What could this email be attempting to do?
- A malicious software that can infect your computer resulting in data theft and intrusion of your organisation
10 Clues: Use this to make your passphrase harder to crack • The Cybersecurity Awareness month occurs in <month> • Use this feature in Outlook to report all suspicious email at work • Authentication method identifying individuals based on their physical features • ...
IT Vocabulary 2022-05-04
Across
- a type of social engineering attack often used to steal user data including login credentials and credit card numbers
- device that uses integrated circuit assemblies to store data persistently, typically using flash memory
- responsible for an organization’s overarching cybersecurity, which can include prevention, incident response (IR), compliance, and risk management.
- use a computer to gain unauthorized access to data in a system
- a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker
Down
- one kind of technology that stores the operating system, applications, and data files
- also referred to as junk email
- a set of computers sharing resources located together.
- attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic utilizing multiple compromised systems
- a group of information security experts responsible for the protection against, detection of and response to an organization's cybersecurity incidents.
10 Clues: also referred to as junk email • a set of computers sharing resources located together. • use a computer to gain unauthorized access to data in a system • one kind of technology that stores the operating system, applications, and data files • device that uses integrated circuit assemblies to store data persistently, typically using flash memory • ...
Super Secret Security Crossword Puzzle 2024-05-31
Across
- itelligence exhibited by machines, particularly computer systems.
- one or more locations from which network monitoring and control, or network management, is exercised over a computer, telecommunication or satellite network.
- a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- "gift" or "present" in Arabic.
- a team of experts that proactively monitor and respond to cybersecurity incidents.
- a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
Down
- the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change.
- an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
- a physical or logical sub-network that separates an internal local area network (LAN) from other untrusted networks, usually the Internet.
- a technique through which a cybercriminal disguises themselves as a known or trusted source.
10 Clues: "gift" or "present" in Arabic. • itelligence exhibited by machines, particularly computer systems. • a team of experts that proactively monitor and respond to cybersecurity incidents. • a technique through which a cybercriminal disguises themselves as a known or trusted source. • ...
Malachi 2024-12-02
9 Clues: My max squat • What I value • My backup plan • The sport I play • A qoute I live by • What I´m interested in • what i value in a friend • What i do on my free time • what i´d like to major and study for the rest of my life
Computer science 2025-11-06
Across
- machine that can learn and think
- programs that make computer useful
- the language programmers use
- informations and analysed
- protecting data from online threats
- the process of creating and improving software
Down
- a machine that process data and performs tasks
- step-by-step problem solving
- the tools and systems built using science
9 Clues: informations and analysed • the language programmers use • step-by-step problem solving • machine that can learn and think • programs that make computer useful • protecting data from online threats • the tools and systems built using science • a machine that process data and performs tasks • the process of creating and improving software
Cybersecurity Unit 2 Terminology 2022-09-13
Across
- A machine that requests a webpage using a web browser.
- A Wireshark data capture file that contains packet information of network traffic.
- A network interface card is a physical component on a computer or device that provides connectivity to a network.
- In network security, it allows or denies packets based on source and destinations addresses, ports, or protocols.
- The arrangement of the various elements (computers,routers, switches, etc) of a network.
- A (distributed) denial of service attack that targets websites and web servers with the intention of bringing the services they provide to a halt.
- Transmission Control Protocol used to establish and maintain connections over a computer network.
- An agreed-upon method for communication.
- A code that defines every structure on an HTML page, such as text, images, and links. HTML tags begin with the less-than (<) character and end with greater-than (>) .
- An operating system similar in concept to the Windows OS but used more often to host routers and web servers.
- Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it.
- A part of a process or system that is seen by the user and typically provides functionality to the user.
- A small local area network of computers and devices.
- A piece of software or a sequence of commands that takes advantage of a vulnerability in a computer system to cause unexpected behavior to occur.
- A machine that responds to a request received.
- An identifying number for hosts and servers on the internet.
- The buying and selling of goods or services over the internet.
- it helps the reader of the program understand the code, especially when working on code with other people.
- A way for a computer to identify specific programs and manage their activity.
- When hackers can use their knowledge of a web server's directory structure to craft URL addresses and navigate to locations that are unreferenced and unlinked in a website.
- A file that contains an official record of activities that occur on a computer.
- A computer, typically one on a network.
- Preserving the accuracy of information and validating its source.
- A database in which data is organized into collections of similar data, called tables. It uses relationships to define how data in one table can relate to data in another table.
- A computer that delivers files forming web pages across a network to requesting clients.
- Problems, faults, and bugs in the program that are exploitable, allowing attackers access to the computer on which the program is running.
- A starting point for data analysis. It is the initial data set used in later comparisons.
- In a command, they are used to specify different variations, sometimes supplying additional input to the command or requesting different styles of output from the command.
Down
- Ensuring that information resources and services are accessible in a timely manner.
- Keeping sensitive information out of unwanted hands.
- Performing a computer attack to evaluate the security of a
- It can have two meanings in computer terminology:a) it can be a specific application or function such as email, chat, etc. b) it can refer to a specific part of an application, such as transmitting the data of a webpage
- Software that replicates and infects many computers, turning the computer into a "zombie". Zombie devices are remotely controlled by an attacker for malicious purposes.
- The way an organization structures and organizes the information that is required by their employees and/or customers.
- system The hardware and software used to help organize and analyze data.
- Analyze something without interfering or affecting it.
- Refers to the action of watching and analyzing network traffic at the packet level.
- A type of exploit in which the attacker inserts malicious client-side code into webpages to steal data, take control of a computer, run malicious code, or achieve a phishing scam.
- A computer, typically one on a network. It can also be referred to as a machine or a system.
- In terms of computer science, it means to increase a system's security and reduce its vulnerabilities.
- Reverse the encryption process, making the data human-readable again.
- system. The extra digits are represented by the letters a through f, so all digits in hex are 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f. You can also see hex numbers in all capitals A through F.
- A three-way communication method using SYN (synchronize), SYN-ACK (synchronize=acknowledge), and ACK (acknowledge) to establishing a connection between
- They are best known for developing standards in the computer and electronics industries.
- A human-based attack in which the malicious user intercepts communication between the victim's computer and the internet.
- Data that is stored in a router in table format. It contains addresses of known networks (other routers), ones that have already been discovered and used.
- The Organizationally Unique Identifier is the first half of the MAC address, designating the manufacturer of the network device.
- It is a very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden, allowing the user to focus on the details that are important for the task at hand.
- Transport Layer Security is a security protocol that uses encryption at a lower level of abstraction.
- Software and hardware that track all keyboard clicks, including back spaces, to discover usernames, passwords, credit card numbers, and other sensitive information.
- Software running with elevated privileges to control a computer or to gain access to restricted accounts and data.
- A network device that controls and filters data between networks, either wired or wireless. It is a specific type of "gateway", a device that acts as a gate between two networks.
- A media access control (MAC) addresses is unique numeric code that is assigned to networking hardware components (typically a network interface card or NIC) that is built into computers and mobile devices. The code is assigned by the manufacturer, includes their unique identification number, and never changes.
- Often referred to as hex, it is a base-16
- The acronym for "Uniform Resource Locator". The systematic way to find specific web addresses and web pages.
- A note in a program that describes what the code is doing. Adding them is very good programming practice,
- A part of a process or system that is not seen by the user. It provides a supporting function on behalf of the main process.
- Small units of data, transmitted on a network. Collected together, they compose some larger data, such as a document, a website, a movie, etc.
58 Clues: A computer, typically one on a network. • An agreed-upon method for communication. • Often referred to as hex, it is a base-16 • A machine that responds to a request received. • Keeping sensitive information out of unwanted hands. • A small local area network of computers and devices. • A machine that requests a webpage using a web browser. • ...
Cybersecurity Unit 2 Terminology 2022-09-15
Across
- The way an organization structures and organizes the information that is required by their employees and/or customers.
- Performing a computer attack to evaluate the security of a system.
- A computer typically one on a network.
- An agreed-upon method for communication.
- A file that contains an official record of activities that occur on a computer.
- The acronym for "Uniform Resource Locator". The systematic way to find specific web addresses and web pages.
- A human-based attack in which the malicious user intercepts communication between the victim's computer and the internet.
- It is a very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden allowing the user to focus on the details that are important for the task at hand.
- A way for a computer to identify specific programs and manage their activity.
- Preserving the accuracy of information and validating its source.
- A network device that controls and filters data between networks either wired or wireless. It is a specific type of "gateway" a device that acts as a gate between two networks.
- A piece of software or a sequence of commands that takes advantage of a vulnerability in a computer system to cause unexpected behavior to occur.
- Transmission Control Protocol used to establish and maintain connections over a computer network.
- Refers to the action of watching and analyzing network traffic at the packet level.
- An identifying number for hosts and servers on the internet.
- Software running with elevated privileges to control a computer or to gain access to restricted accounts and data.
- It can have two meanings in computer terminology: a) it can be a specific application or function such as email chat etc. b) it can refer to a specific part of an application such as transmitting the data of a web page
- Keeping sensitive information out of unwanted hands.
- A type of exploit in which the attacker inserts malicious client-side code into webpages to steal data take control of a computer run malicious code or achieve a phishing scam.
- In a command flags are used to specify different variations sometimes supplying additional input to the command or requesting different styles of output from the command.
- Often referred to as hex it is a base-16 number system.
- Problems faults and bugs in the program that are exploitable allowing attackers access to the computer on which the program is running.
- A database in which data is organized into collections of similar data called tables. It uses relationships to define how data in one table can relate to data in another table.
- In network security it allows or denies packets based on source and destinations addresses ports or protocols.
- baseline A starting point for data analysis. It is the initial data set used in later comparisons.
- Ensuring that information resources and services are accessible in a timely manner.
- Analyze something without interfering or affecting it.
Down
- The arrangement of the various elements (computers routers switches etc) of a network.
- Small units of data transmitted on a network. Collected together they compose some larger data such as a document a website a movie etc.
- Software that locks your computer or makes it inoperable requiring you to pay someone to remove it.
- Software that replicates and infects many computers turning the computer into a "zombie". Zombie devices are remotely controlled by an attacker for malicious purposes.
- The hardware and software used to help organize and analyze data.
- A code that defines every structure on an HTML page such as text images and links.
- A (distributed) denial of service attack that targets websites and web servers with the intention of bringing the services they provide to a halt.
- Data that is stored in a router in table format. It contains addresses of known networks (other routers) ones that have already been discovered and used.
- When hackers can use their knowledge of a web server's directory structure to craft URL addresses and navigate to locations that are unreferenced and unlinked in a website.
- A Wireshark data capture file that contains packet information of network traffic.
- Transport Layer Security is a security protocol that uses encryption at a lower level of abstraction.
- In terms of computer science it means to increase a systems security and reduce its vulnerabilities.
- A machine that requests a webpage using a web browser.
- A machine that responds to a request received.
- A computer that delivers files forming web pages across a network to requesting clients.
- The buying and selling of goods or services over the internet.
- A note in a program that describes what the code is doing.
- A computer typically one on a network.
- Software and hardware that track all keyboard clicks including back spaces to discover usernames passwords credit card numbers and other sensitive information.
- A three-way communication method using SYN (synchronize) SYN-ACK (synchronize=acknowledge) and ACK (acknowledge) to establishing a connection between hosts.
- A small local area network of computers and devices.
- An operating system similar in concept to the Windows OS but used more often to host routers and web servers.
49 Clues: A computer typically one on a network. • A computer typically one on a network. • An agreed-upon method for communication. • A machine that responds to a request received. • Keeping sensitive information out of unwanted hands. • A small local area network of computers and devices. • A machine that requests a webpage using a web browser. • ...
Cybersecurity Crossword Puzzle - MP 2023-01-27
Across
- transforms plaintext into ciphertext
- key used to decrypt
- trap for cyber criminals
- unsolicited emails
- tricked into clicking
- intrusive computer software
- key to encrypt and decrypt
- helps prevent hackers and viruses
- hidden horse surprise
- malware that collects personal data
- hides users location
Down
- unwanted pop up ads
- used to detect viruses network
- program that allows remote access
- person who harms your computer
- protects data by scrambling it
- error on software
- malware that reproduces itself
- ethical hacker
- form of internet communication
- peripherals connected as one entity.
21 Clues: ethical hacker • error on software • unsolicited emails • unwanted pop up ads • key used to decrypt • hides users location • tricked into clicking • hidden horse surprise • trap for cyber criminals • key to encrypt and decrypt • intrusive computer software • used to detect viruses network • person who harms your computer • protects data by scrambling it • malware that reproduces itself • ...
Cybersecurity Month - October 2023 2023-05-19
Across
- TRSL's IT team stays on top of this so don't you fall for it either
- Not gonna fry up anything with this catch
- out to get you and your information
- always best to use your own instead of a public or free charging station
- If public, not the best connection for work-related tasks or any sensitive and/or personal info
- malicious software that can infiltrate a network(s)
- I can be dangerous so don't open me unless you know I'm safe
- If you don't know the source, do not ____ the data.
- hacker operating in cyberspace
- Being alert to avoid potential dangers or risks
- If you get a __ ___from someone you don't know, no response is best of all
- scammers can give you a ring too
Down
- Scammers use this trick to redirect your browser
- Your fingers do the talking but don't fall for this threat
- Leave it this section to handle your PC needs, please.
- when a "big fish" is targeted
- An ___ ___ calls at 3 am with a fraud alert from your bank. Hang up and call your bank directly, ASAP.
- FortiToken or Google
- Instead of just a single word, this is also great for a great password
- I should be unique and not reused
- If something seems too good to be true, you should feel this way.
- always do this when stepping away from your PC
- use this to type in the URL
- share carefully on these profiles
- method of communication in lieu of "snail mail"
25 Clues: FortiToken or Google • use this to type in the URL • when a "big fish" is targeted • hacker operating in cyberspace • scammers can give you a ring too • I should be unique and not reused • share carefully on these profiles • out to get you and your information • Not gonna fry up anything with this catch • always do this when stepping away from your PC • ...
CIS178 Cybersecurity Crossword Puzzle 2023-07-26
Across
- people bullying others online
- software that destroys information on your computer
- someone who attempts to get your information
- detection to shield against viruses
- software that hackers use to spy on you
- someone is tricked on clicking on an object
- software that hijacks your system and wants money
- malware that spreads to devices and slows down everything
- software to keep intruders out
- two or more computers connected together
- hackers change an IP address to seem real
Down
- multiple steps to access your account
- series of numbers that allow devices to connect to the internet
- owners permission to hack into their network
- connecting computers on a private network
- a scam that seems real
- hacker breaking into your computer data
- computers that are connected as one entity
- password to access your device
- a type of storage for your information
20 Clues: a scam that seems real • people bullying others online • password to access your device • software to keep intruders out • detection to shield against viruses • multiple steps to access your account • a type of storage for your information • software that hackers use to spy on you • hacker breaking into your computer data • two or more computers connected together • ...
MAHIM SIKDER-Cybersecurity Crossword 2023-09-07
Across
- a client/server protocol that automatically provides an IP host with its IP address, subnet mask and default gateway.
- a process that verifies a user's identity and ensures that they have authorization, before providing them with access to information.
- a copy of data that is used if original data is unavailable.
- a scheme that takes money or other valuables from an unsuspecting victim.
- a process in which data is converted to code, in order to prevent unauthorized access.
- a malware that denies users access to their files. The attacker demands money from the user, in order for them to get their information back.
- process of copying data from the internet to your computer.
- a communication method that electronic devices use to deliver and receive messages electronically.
- software that hackers use to steal data,damage or destroy computers/computer systems.
Down
- protection of networks,data and devices from criminal use.
- a software used to detect and destroy viruses.
- A number used to track someones financial information.(EVERYONE GETS THIS NUMBER AT BIRTH).
- this word is short for organization(s) that provides access to the Internet.
- string of characters used to access authorization.
- a set of instructions, data or programs used by computers to operate and execute specific tasks.
- known as the address of a web page.
- a system that changes domain name into IP-addresses.
- advertisement that promote product or services to the user. Sometimes this can lead to malicious websites.
- a device that connects two or more packet-switched networks. Uses ip-Addresses.
- authentication method that requires the user to provide more than one verification information.
20 Clues: known as the address of a web page. • a software used to detect and destroy viruses. • string of characters used to access authorization. • a system that changes domain name into IP-addresses. • protection of networks,data and devices from criminal use. • process of copying data from the internet to your computer. • ...
Cybersecurity Awareness Month Crossword 2023-09-27
Across
- A process or measure used to verify a user's identity.
- A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
- Software that compromises the operation of a system by performing an unauthorized function or process.
- Converting Data into a form that cannot be easily understood by unauthorized people.
- A flaw or weakness in an information system that could be exploited.
- A string of characters used to authenticate an identity.
- Extra copies of computer files that can be used to restore files that are lost or damaged.
- A mechanism for creating a secure connection between a computing device and a computer network
- A type of malware that denies a user's access to a system or data until a sum of money is paid.
- A collection of computers compromised by malicious code and controlled across a network.
- Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
Down
- The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization
- The ability of individuals to understand and exercise control over how information about themselves may be used by others.
- Software designed to block malware from entering protected networks.
- Faking the sending address of a transmission to gain illegal entry into a secure system.
- Part of the Internet that isn't indexed by search engines.
- An unauthorized user who attempts to or gains access to an information system.
- an individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- Computer programs that can block, detect, and remove viruses and other malware.
- A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
- A cybersecurity risk that originates from within an organization.
- The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
- Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
- Unsolicited emails sent to many addresses.
24 Clues: Unsolicited emails sent to many addresses. • A process or measure used to verify a user's identity. • A string of characters used to authenticate an identity. • Part of the Internet that isn't indexed by search engines. • A cybersecurity risk that originates from within an organization. • Software designed to block malware from entering protected networks. • ...
LETERASI KINANSIAL 2025-11-13
Across
- technologi finansial
- interaksi digital untuk menjaga data pribadi
- uang yang disisihkan untuk masa depan
- perdagangan yang memanfaatkan teknologi informasi dan komunikasi di abad ke-21
- mengelola uang dan mengambil keputusan keuangan yang bijak
- penanaman keuntungan di masa depan
- lembaga yanga mengelola pasar modal
- alat tukar yang sah
- lembaga keuangan bukan bank
Down
- dokumen sebagai bukti simpanan di bank
- internasi sosial
- kemudahan mendapat berita dimana saja kapan saja
- sikap yang perlu di hindari dalam mengelola uang
- daftar pengeluaran dan pemasukan dan pemasukan keuangan
- tantangan dalam transaksi digital
- pembayaran non-tunai menggunakan app di ponsel
- tempat jual beli daring
- berinteraksi menggunakan tenologi digital
- pembayaran memindai kode untuk transaksi
- lembaga keuangan yang menerima simpanan
20 Clues: internasi sosial • alat tukar yang sah • technologi finansial • tempat jual beli daring • lembaga keuangan bukan bank • tantangan dalam transaksi digital • penanaman keuntungan di masa depan • lembaga yanga mengelola pasar modal • uang yang disisihkan untuk masa depan • dokumen sebagai bukti simpanan di bank • lembaga keuangan yang menerima simpanan • ...
Harris 20th Anniversary 2022-10-14
Across
- What sport/activity does Chris play
- Where did Melissa grow up?
- Where did they live when they got married?
- What is the Harris family dogs name?
- What volcano did the Harris family climb in Hawaii?
- Who is Melissa's favorite singer?
- Where did they Chris & Melissa get married?
Down
- What is Chris' profession?
- What are Chris & Melissa's kids middle
- Who is Chris' favorite rapper?
- What cruise line did they sail on when they
- married?
12 Clues: married? • What is Chris' profession? • Where did Melissa grow up? • Who is Chris' favorite rapper? • Who is Melissa's favorite singer? • What sport/activity does Chris play • What is the Harris family dogs name? • What are Chris & Melissa's kids middle • Where did they live when they got married? • What cruise line did they sail on when they • ...
example 2023-07-06
Across
- A “tunnel” for private network browsing:
- The collection, use, sharing, storage, destruction, or processing of PI that is provided by an individual in connection with obtaining a product, service, or employment, including an individual’s choice on how their PI is used.
- Be client obsessed, champion our people, lead with integrity, own it, and win as one are examples of TIAA’s:
- What malware propagates without a host program?
- A _____ review is done quarterly to review privileged access.
- What is the most common attack vector for malware?
- TIAA’s ______ promotes a culture of inclusion, diversity and equity by connecting associates across diverse perspectives, wide-ranging talents and unique experiences.
- A targeted form of phishing that is customized for specific individuals within a specific organization.
- What does GCSAM stand for?
- Suspicious sender address, invalid branding, appealing to emotions, sense of urgency, invalid URL’s, request for sensitive data, spelling errors, requests to click links, and signatures are all __________ of phishing attempts.
Down
- Who founded TIAA?
- Malware that limits users access until a ransom is paid.
- A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.
- Who is the security awareness program’s mascot?
- What is TIAA’s social impact hashtag?
- Be the change by delivering lifetime income for all with investments that build a better world is TIAA’s:
- When somebody sends an e-mail with a link to a bogus website it is called:
- In 2021 TIAA cybersecurity expanded to become TIAA _____ cybersecurity.
- The probability of exposure or loss of assets is considered?
19 Clues: Who founded TIAA? • What does GCSAM stand for? • What is TIAA’s social impact hashtag? • A “tunnel” for private network browsing: • Who is the security awareness program’s mascot? • What malware propagates without a host program? • What is the most common attack vector for malware? • Malware that limits users access until a ransom is paid. • ...
CRACCon2024 2023-12-25
7 Clues: Stolen data • You like to play • Pay to get your data • The popular buzzword • Get paid for hunting bugs • What do you want to learn? • poses as a legitimate sender
technology 2025-05-14
Across
- Fifth-generation mobile network technology
- Distributed ledger technology for cryptocurrencies
- Electric car company founded by Elon Musk
- Internet-based computing service model
- Network of interconnected smart devices
Down
- World’s largest search engine
- Technology protecting networks from attacks
- Computer system mimicking human intelligence
8 Clues: World’s largest search engine • Internet-based computing service model • Network of interconnected smart devices • Electric car company founded by Elon Musk • Fifth-generation mobile network technology • Technology protecting networks from attacks • Computer system mimicking human intelligence • Distributed ledger technology for cryptocurrencies
Cyber Security Awareness 2023-03-04
Across
- Using encryption and other security technologies to protect online activities and prevent unauthorized access to sensitive information.
- A common form of social engineering that involves sending fraudulent emails or messages in order to steal information or spread malware.
- The practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
- A mindset and set of behaviors that prioritize cybersecurity and make it a fundamental part of organizational culture.
- Policies and procedures for safeguarding sensitive data and ensuring its confidentiality, integrity, and availability.
- The process of identifying, assessing, and mitigating cyber risks in order to protect against cyber attacks.
Down
- Tools and techniques for detecting and removing malicious software, including viruses, worms, and Trojans.
- A targeted form of phishing that involves customized messages designed to deceive a specific individual or group.
- Strategies for creating strong, unique passwords and protecting them from unauthorized access.
- Techniques used by cybercriminals to manipulate individuals into revealing sensitive information or taking harmful actions.
- Best practices for keeping digital devices and online accounts clean and secure.
- Best practices for staying safe while browsing the internet, including avoiding risky websites and downloading files from trusted sources.
12 Clues: Best practices for keeping digital devices and online accounts clean and secure. • Strategies for creating strong, unique passwords and protecting them from unauthorized access. • Tools and techniques for detecting and removing malicious software, including viruses, worms, and Trojans. • ...
KM Week 10 2021-10-11
Across
- Smart Nation through Digital _________
- An intellectual property
- ________ citizen through e-participation
- Increase in digital usage has brought about the need to protect data, infrastructure and networks from growing cyber threats.
- in the eco-system of Digital Economy.
- A KMS
- A communication tool
Down
- The Government, _____ and Society are closely
- an advantage to move towards digital economy
- One of the KM processes
- structural resource
- An impact/ area of concern for digital society
- We need an update of this to move to a digital future
- Infrastructural resources
- He conceived the concept of KM
15 Clues: A KMS • structural resource • A communication tool • One of the KM processes • An intellectual property • Infrastructural resources • He conceived the concept of KM • in the eco-system of Digital Economy. • Smart Nation through Digital _________ • ________ citizen through e-participation • an advantage to move towards digital economy • The Government, _____ and Society are closely • ...
GEN-Z TRENDS 2025-03-27
Across
- A field combining AI and Engineering
- GenZ slang for stylish outfits
- A famous anime known for its huge number of episodes
- The tech behind chatGPT
- A viral Gen Z meme
- A growing field focused on protecting data and network
Down
- Next level gaming and training
- Usually done in netflix on long series's
- Act of cutting off communication without warning
- Slang for Delusional
- Action packed franchise ni Keanu Reeves
- On top of Gen Z's screen time
- a fusion of biology and technology
- A cruicial skill for GenZ learners
- DCU Counterpart of Iron Man
15 Clues: A viral Gen Z meme • Slang for Delusional • The tech behind chatGPT • DCU Counterpart of Iron Man • On top of Gen Z's screen time • Next level gaming and training • GenZ slang for stylish outfits • a fusion of biology and technology • A cruicial skill for GenZ learners • A field combining AI and Engineering • Action packed franchise ni Keanu Reeves • ...
Solve Our Story 2025-09-28
Across
- How did Amy and David meet?
- Amy’s favorite band?
- What branch of the military was David in?
- Where did Amy go for her bachelorette party?
- What TV show is produced by the bride?
- Bride’s hometown?
- What does Amy’s family call her?
Down
- Where they said “I love you” for the first time?
- Where did Amy go to college?
- Groom’s hometown?
- The hotel bar where Amy and David had their first date?
- What does David have his masters in?
- What does David’s family call him?
- What is David’s favorite sport?
- Where did David go for his bachelor party?
15 Clues: Groom’s hometown? • Bride’s hometown? • Amy’s favorite band? • How did Amy and David meet? • Where did Amy go to college? • What is David’s favorite sport? • What does Amy’s family call her? • What does David’s family call him? • What does David have his masters in? • What TV show is produced by the bride? • What branch of the military was David in? • ...
Cybersecurity Crossword Puzzle 2024-02-01
Across
- Passwords should not contain your
- Sikorsky Facility Security Officer (FSO)
- Strategy to protect sensitive information (operational security)
- Assured File Transfers (AFTs) should only be performed by a trained
- If you see something
- A company's most valuable asset
Down
- Report all security incidents to
- Sikorsky Classified Cybersecurity Manager
- Access is granted based on clearance level and
9 Clues: If you see something • A company's most valuable asset • Report all security incidents to • Passwords should not contain your • Sikorsky Facility Security Officer (FSO) • Sikorsky Classified Cybersecurity Manager • Access is granted based on clearance level and • Strategy to protect sensitive information (operational security) • ...
Crossword 2025-08-10
Across
- New generation of wireless network technology
- New business, often tech-focused and innovative
- Protection against online threats
- Company known for graphics cards and AI chips
- Internet-based computing and storage
- Step-by-step problem-solving procedure in computing
- A digital virtual world concept
Down
- Popular AI language model by OpenAI
- Distributed ledger technology supporting Bitcoin
- Unmanned flying device used for delivery or photos
- Electric car company known for tech innovation
- A type of computing using quantum mechanics
- Intelligence demonstrated by machines.
- Digital or virtual money
14 Clues: Digital or virtual money • A digital virtual world concept • Protection against online threats • Popular AI language model by OpenAI • Internet-based computing and storage • Intelligence demonstrated by machines. • A type of computing using quantum mechanics • New generation of wireless network technology • Company known for graphics cards and AI chips • ...
Topic 3 AI & Competition Law 2024-11-15
Across
- Rules governing AI development and implementation
- When AI systems independently coordinate to avoid competition
- Large technology firms influencing markets
- Control by a major player in a market
- Internet-based computing and storage services
- Technology that mimics human thinking and learning
- Moral principles governing behavior
- Unfair preference in decision-making
Down
- Safeguarding personal information
- Charging different prices based on user data
- Organization for global trade rules
- Ensures fairness and innovation in markets
- Clarity in AI decision-making processes
- Protecting systems and networks from attacks
14 Clues: Safeguarding personal information • Organization for global trade rules • Moral principles governing behavior • Unfair preference in decision-making • Control by a major player in a market • Clarity in AI decision-making processes • Large technology firms influencing markets • Ensures fairness and innovation in markets • Charging different prices based on user data • ...
Computing Vocabulary 2019-12-04
Across
- Small device to store data on the go
- The amount of space available
- Most of the time you do it illegally
- Smaller than a rat
- Part of a computer that reads information
- Synonym of information
- We also call it the Web
- System of computer equipment & programs
- Computers that are connected together
Down
- Desktop machine
- Combination of letters and numbers
- Protection system making use of the internet
- Someone who uses a product, machine or service
- Software designed to damage
- A set of mathematical instructions or rules
- Identifying data ; Biscuit
- Computer program
- Central computer from which other computers get information
- Accessing information without permission
- All the equipment necessary to run a computer
20 Clues: Desktop machine • Computer program • Smaller than a rat • Synonym of information • We also call it the Web • Identifying data ; Biscuit • Software designed to damage • The amount of space available • Combination of letters and numbers • Small device to store data on the go • Most of the time you do it illegally • Computers that are connected together • ...
Sip and Solve 2024-04-05
Across
- What month did they begin dating?
- Where is their honeymoon location?
- What is Adonis' middle name?
- What is Eimear's eye colour?
- How they first meet?
- Where do they live?
- What is Eimear's job?
- How many years have they been together?
- What is the name of their dog?
- Where was Eimear born?
Down
- What is Adonis' job?
- What car do they drive?
- Where was their first date?
- What instrument does Eimear learn?
- Where did they get engaged?
- What is Eimear's birth month?
- What is Eimear's middle name?
- What is Adonis' favourite hobby?
- What is Adonis' eye colour?
- What is Adonis' birth month?
- Where was Adonis born?
- Where was their first holiday?
22 Clues: Where do they live? • What is Adonis' job? • How they first meet? • What is Eimear's job? • Where was Adonis born? • Where was Eimear born? • What car do they drive? • Where was their first date? • Where did they get engaged? • What is Adonis' eye colour? • What is Adonis' middle name? • What is Eimear's eye colour? • What is Adonis' birth month? • What is Eimear's birth month? • ...
Pineapple #2 2023-05-05
Across
- slithering coding language
- Pokemon Cards for REAL men
- fictional school with one of the worst student safety track records
- Heath Ledger or an otaku with an ungodly amount of rizz
- rock band that just "Can't Stop"
- Ghibli mastermind Miyazaki
- Your favorite cybersecurity student
- One who is "virtually insane"
- a site that is full of idiots and dank memes
- Psych lead James Roday
- Star Trek captain with a terrible "Rocketman" cover
Down
- that old meme you had as your background for a while
- Cocaine sadly not included anymore
- "Ride of The Valkyries" Composer
- They're finally making GTA VI
- "I think therefore I'm"
- Feline from Fukuhara
- based smash main
- Soulsborne mastermind Miyazaki
- Kentaro Miura's masterpiece
20 Clues: based smash main • Feline from Fukuhara • Psych lead James Roday • "I think therefore I'm" • slithering coding language • Pokemon Cards for REAL men • Ghibli mastermind Miyazaki • Kentaro Miura's masterpiece • They're finally making GTA VI • One who is "virtually insane" • Soulsborne mastermind Miyazaki • "Ride of The Valkyries" Composer • rock band that just "Can't Stop" • ...
TTS INFORMATIKA 2025-04-10
Across
- tugas programer
- Platform untuk diseminasi konten budaya?
- Contoh search engine?
- Metode validasi konten negatif?
- itu konten negatif
- menghindari pelanggaran budaya?
- penting unsur budaya dalam konten digital?
- yang di maksud indexing
- Tugas data scientist?
- pendaftaran HAKI
- itu hak cipta
- Konsekuensi konten negatif?
Down
- Tujuan validasi konten negatif?
- itu ranking?
- diseminasi konten budaya?
- yang di maksud paten
- Tugas cybersecurity engineer?
- konten digital berunsur budaya?
- Tugas web developer?
- Tugas database administrator?
- fungsi utama search engine?.
- itu crawling?
- itu merek dagang
- Tantangan validasi konten negatif?
- Konsekuensi pelanggaran HAKI
25 Clues: itu ranking? • itu crawling? • itu hak cipta • tugas programer • itu merek dagang • pendaftaran HAKI • itu konten negatif • yang di maksud paten • Tugas web developer? • Contoh search engine? • Tugas data scientist? • yang di maksud indexing • diseminasi konten budaya? • Konsekuensi konten negatif? • fungsi utama search engine?. • Konsekuensi pelanggaran HAKI • Tugas cybersecurity engineer? • ...
How well do you know POOL/PACT? 2025-02-19
Across
- Executive Director
- HR Oversight Committee Chair
- POOL/PACT's Learning Management System
- Month of this year's HR Leadership Conference
- Email notice of significant change in law or practice
- POOL/PACT's EAP
- Organization-wide assessment program
- How often this newsletter comes out
- PACT Chair
- Cybersecurity expert
- Type of grant available to members to attend conferences
- Summary of HR services for the fiscal year
- POOL Chair
Down
- Claims management company
- Flagship certificate program for managers
- Location of this year's HR Leadership Conference
- What POOL/PACT HR is currently tracking
- Main HR contact
- This year's Thursday night event at the annual board meeting
- Funding provided to attain HR certification
- Month of POOL/PACT's annual board meeting
21 Clues: PACT Chair • POOL Chair • POOL/PACT's EAP • Main HR contact • Executive Director • Cybersecurity expert • Claims management company • HR Oversight Committee Chair • How often this newsletter comes out • Organization-wide assessment program • POOL/PACT's Learning Management System • What POOL/PACT HR is currently tracking • Flagship certificate program for managers • ...
Puzzle on Digitalisation (Ansgar O & Olivia U) 2025-10-07
Across
- Raw facts or information
- Watching or listening online in real time
- Protecting systems and data from attacks
- Pocket computer with apps and calls
- A new idea or improvement
- Machine ability to mimic human thinking
- Interactive digital classroom display
- Global network of computers
- Entering username and password to access
- Software used to surf the web
Down
- Company behind Windows and Office
- Turning paper or analog into digital form
- Copy of data for safety
- Scannable digital code for quick access
- Engineering of automated machines
- Writing instructions (code) for computers
- Doing several tasks at once
- Connected devices exchanging information
- Remote servers accessed online
- Programmes that run on computers
- Send files from device to the internet
21 Clues: Copy of data for safety • Raw facts or information • A new idea or improvement • Doing several tasks at once • Global network of computers • Software used to surf the web • Remote servers accessed online • Programmes that run on computers • Company behind Windows and Office • Engineering of automated machines • Pocket computer with apps and calls • ...
Sondre's Christmas Crossword 2023-12-26
Across
- Sarah's favorite "The office" character
- Name of the species of the big boi fish Sarah caught
- Month of Sondre's birthday
- One of Sarah's favorite vegetables
- Indie band from Norwich, UK
- Country with the most snow
- Soon to be patented bike
- Homeless cat
- Country that Canada has been at war with for almost 40 years
- Sarah's totally real and true favorite tv-show ;)
Down
- Sondre's field of study
- National park in the west of Canada that Sarah has visited
- Sarah's favorite League of Legends champion
- Sarah's favorite tea
- Good girl
- Good boy
- Subject of the class that had a field trip in Sarah's dream
17 Clues: Good boy • Good girl • Homeless cat • Sarah's favorite tea • Sondre's field of study • Soon to be patented bike • Month of Sondre's birthday • Country with the most snow • Indie band from Norwich, UK • One of Sarah's favorite vegetables • Sarah's favorite "The office" character • Sarah's favorite League of Legends champion • Sarah's totally real and true favorite tv-show ;) • ...
Information Technology 2023-05-10
Across
- Desarrollo
- Comunicaciones
- Computación en la nube
- Apoyo técnico
- Innovar
- Programador
- Analista de malware
- Perspectiva
- Habilidades
- Fuerza laboral
- Ciencia de datos
- Compañías empresariales
- Operaciones comerciales
- Desarrollador web
- Ilimitado
- Implementación
- Productividad
- Ingeniero de software
- Recreación
- Microsoft
Down
- Soporte de escritorio
- Plataformas
- Software
- Sostenibilidad
- Habilidades
- Aplicaciones
- Hoja de cálculo
- Conocimientos técnicos
- Automatización
- Servicio de ayuda
- Programas
- Base de datos
- Gerencia
- Desarrollador de software
- Acceso a la información
- Inteligencia artificial
- Liderazgo
- Tecnología de la información (TI)
- Complejidad
- Ciberseguridad
- Educación
- soporte
- Mantenimiento
- Análisis
- Avance
- Hardware
- Gerente IT
- Conocimiento
- Robótica
49 Clues: Avance • Innovar • soporte • Software • Gerencia • Análisis • Hardware • Robótica • Programas • Liderazgo • Educación • Ilimitado • Microsoft • Desarrollo • Recreación • Plataformas • Habilidades • Programador • Perspectiva • Complejidad • Habilidades • Gerente IT • Aplicaciones • Conocimiento • Apoyo técnico • Base de datos • Mantenimiento • Productividad • Sostenibilidad • Comunicaciones • Automatización • Fuerza laboral • Ciberseguridad • ...
RU ITEC411 Chapter 5 Crime and Security 2025-03-16
Across
- something that will spread one its own
- information gathering software
- a network of computers being controlled
- returning what has been lost to its owner
- something that needs a host to spread
- being locked out of a computer or system until someone is paid
- digital world
- something disguised as something else
- sending out messages impersonating someone or something
- deception for someone's gain
Down
- bad software
- obstructing or ruining something
- to be kept secret
- stealing someone's information for impersonation
- instruction sets
- spying on someone or something
- a soft spot in a piece of software
- manipulatively finding information out about someone or something
- team to manage cybersecurity incidents
- using a spoofed website to steal information
20 Clues: bad software • digital world • instruction sets • to be kept secret • deception for someone's gain • information gathering software • spying on someone or something • obstructing or ruining something • a soft spot in a piece of software • something that needs a host to spread • something disguised as something else • something that will spread one its own • ...
Lushi & John's Wedding 2025-02-22
Across
- Lushi’s favorite dessert
- Favorite shared activity
- Lushi’s favorite cuisine
- John’s go-to drink
- City they live in
- Lushi’s favorite holiday
- Who is older between them
- John’s hometown
- Total number of their dogs
- John’s favorite food
- Name of their corgi
- Color of John’s eyes
- Place where John proposed
Down
- University John attended
- First date restaurant
- Total countries visited together
- John’s favorite video game
- francisco City where they met
- First international trip destination
- John’s work industry
- John’s favorite music band
- Lushi’s favorite color
- Month of their engagement
- Month of dating anniversary
- Their dream honeymoon destination
- John’s middle name
- Lushi’s favorite time of year
- Lushi’s favorite board game
28 Clues: John’s hometown • City they live in • John’s go-to drink • John’s middle name • Name of their corgi • John’s work industry • John’s favorite food • Color of John’s eyes • First date restaurant • Lushi’s favorite color • University John attended • Lushi’s favorite dessert • Favorite shared activity • Lushi’s favorite cuisine • Lushi’s favorite holiday • Month of their engagement • ...
Sorav 2025-05-13
Across
- a key when you put in the computer
- a internet connection
- when you see in screen
- A malicious program designed to harm or disrupt computer system
- actually like a mouse but better
- when you type the input
- use for click or type letter
- a like a browser
- Protection of computer systems and data from unauthorised access and attacks
- like a menu in the website
- open another homepage
Down
- Programs and operating systems that run on computers and devices.
- a device portable
- like a smart home
- The physical components of a computer or electronic device
- charge your device
- type the code
- when you unlock your device
- big object for the computer
- a part of computer
20 Clues: type the code • a like a browser • a device portable • like a smart home • charge your device • a part of computer • a internet connection • open another homepage • when you see in screen • when you type the input • like a menu in the website • when you unlock your device • big object for the computer • use for click or type letter • actually like a mouse but better • ...
Infor 2025-01-26
Across
- Maumere yang mampu mendeskripsi
- Membuka lampiran surel
- orang yang mendeskripsikan peretasan
- Menandakan bahwa hacking merupakan pengertian
- Nama lain dari kesalahan
- Tidak perlu menumpuk keprogaman lain
- pembuatan buku the cookers
- Akroni bobot network
- Adalah kejahatan di dunia
- salah satu kejahatan sosial yang berpengaruh pada kesehatan mental
Down
- Makna yang disampaikan oleh serangkaian representasi yang merupakan hasil pemrosesan data disebut
- Perangkat lunak yang menempel
- Gunakan activit atau activity internasional
- data berasal dari kata dalam bahasa latin datum yang artinya
- Virus yang menyebar di dunia
- keamanan informasi internet adalah
- Pada tahun 1988 sebuah program komputer yang dikenal sebagai
- badan siber dan sandi negara
- Merupakan Malware yang tampak kagoda
- Teknologi keamanan yang lebih baik dengan pembentukan
20 Clues: Akroni bobot network • Membuka lampiran surel • Nama lain dari kesalahan • Adalah kejahatan di dunia • pembuatan buku the cookers • Virus yang menyebar di dunia • badan siber dan sandi negara • Perangkat lunak yang menempel • Maumere yang mampu mendeskripsi • keamanan informasi internet adalah • orang yang mendeskripsikan peretasan • Merupakan Malware yang tampak kagoda • ...
Let's explore the kept.pro Eco System 2024-12-13
Across
- Robyne's call sign
- Required for work from home success
- Tab to find Client Services specific information?
- Name of software platform to help categorize expenses
- One of the flywheel components
- System used by all clients
- Pod name
- Client payroll platform
- What we are
- A kept.pro core value
- Accurate, timely and complete financials are part of this
Down
- One-stop shop for kept.pro information
- Item we are all responsible for
- One of the internal programs we use
- Part of kept.GROW
- Tab where you can find info on Google Workspace
- Name of our outside IT support company
- Tab to find out about kept.pro team members
- Tab to see Google Classroom classes
- Essential for working together
20 Clues: Pod name • What we are • Part of kept.GROW • Robyne's call sign • A kept.pro core value • Client payroll platform • System used by all clients • One of the flywheel components • Essential for working together • Item we are all responsible for • One of the internal programs we use • Required for work from home success • Tab to see Google Classroom classes • ...
SISTEM KOMPUTER 2025-09-08
Across
- : Singkatan dari Central Processing Unit.
- : Bahasa pemrograman yang populer untuk web.
- : Singkatan dari Hypertext Markup Language.
- : Media penyimpanan berbentuk cakram optik.
- : Perangkat yang digunakan untuk memasukkan data ke komputer.
- : Protokol pengiriman surat elektronik.
- : Perangkat lunak untuk mengolah kata.
- : Singkatan dari Uniform Resource Locator.
- : Sistem operasi buatan Microsoft.
- : Istilah untuk keamanan informasi di dunia digital.
- : Jaringan global yang menghubungkan komputer di seluruh dunia.
Down
- : Bahasa pemrograman yang identik dengan logo cangkir kopi.
- : Bagian komputer yang menyimpan data secara permanen.
- : Perangkat keras untuk mencetak dokumen.
- : Singkatan dari Random Access Memory.
- : Sistem operasi berbasis open source.
- : Aplikasi untuk membuat presentasi.
- : Singkatan dari Graphics Interchange Format.
- : Penyimpanan berbasis awan dari Google.
- : Perangkat keras untuk menampilkan hasil proses.
20 Clues: : Sistem operasi buatan Microsoft. • : Aplikasi untuk membuat presentasi. • : Sistem operasi berbasis open source. • : Perangkat lunak untuk mengolah kata. • : Perangkat keras untuk mencetak dokumen. • : Protokol pengiriman surat elektronik. • : Bahasa pemrograman yang populer untuk web. • : Singkatan dari Random Access Memory. • ...
Exploring our Ecosystem 2025-01-15
Across
- essential for working together
- one of the internal programs we use
- system used by all clients
- name of software platform to help categorize expenses
- what we are
- one-stop shop for kept.pro information
- required for work-from-home success
- accruate, timely and complete financials are a part of this
- tab to find out about kept.pro team members
- a kept.pro core value
Down
- tab to see Google Classroom courses
- name of a pod
- name of our outside IT support
- one of the flywheel components
- client payroll platform
- tab to find Client Services specific information
- tab where you can find info on Google Workspace
- item we are all responsible for
- James' call sign
- part of kept.GROW
20 Clues: what we are • name of a pod • James' call sign • part of kept.GROW • a kept.pro core value • client payroll platform • system used by all clients • name of our outside IT support • essential for working together • one of the flywheel components • item we are all responsible for • tab to see Google Classroom courses • one of the internal programs we use • ...
The Print Puzzler 2025-03-26
Across
- GOAL OF MOST CAMPAIGNS
- A NEW COMPANY
- SIC 27
- NOBODY GETS LEFT OUT
- MORALLY RIGHT AND WRONG
- WHERE PINE LIVES
- RENOWNED BUSINESS PUBLICATION
- MALICIOUS HACKER
- TRY FOR THE FIRST TIME
- WELL KNOWN WISCONSIN PRINTER
- IMPACTS SOCIAL MEDIA
- COMMONLY FOUND ON WALLS OR DESKS
- THE P IN PMS
- BILLBOARDS, TAXIS AND POSTERS
- MAY ONE DAY REPLACE SICS
Down
- A NEW COMPANY
- INTEGRATING SALES AND MARKETING
- ITS ALWAYS RAISED
- PAPER CUTTER
- EMAIL WITH COLOR
- HELD EVERY 4 YEARS IN DUSSELDORF, GERMANY
- COMPANY SIZE
- CRM AND AUTOMATION SW
- USED TO PERSONALIZE YOUR EXPERIENCE
- WHATS IN IT FOR ME
- BOSTON VENUE
- ETHICAL CYBERSECURITY
- ENHANCE YOUR DATA
- BEST WAY TO MEET PEOPLE
29 Clues: SIC 27 • PAPER CUTTER • COMPANY SIZE • BOSTON VENUE • THE P IN PMS • A NEW COMPANY • A NEW COMPANY • EMAIL WITH COLOR • WHERE PINE LIVES • MALICIOUS HACKER • ITS ALWAYS RAISED • ENHANCE YOUR DATA • WHATS IN IT FOR ME • NOBODY GETS LEFT OUT • IMPACTS SOCIAL MEDIA • CRM AND AUTOMATION SW • ETHICAL CYBERSECURITY • GOAL OF MOST CAMPAIGNS • TRY FOR THE FIRST TIME • MORALLY RIGHT AND WRONG • ...
Natalie and Robbie 2024-07-01
Across
- The couple's favorite singer.
- The food Robbie hates but Natalie insists on making.
- Robbie's first roommate.
- The month Robbie proposed.
- Robbie's least favorite household chore.
- The grade Natalie teaches.
- The city they got engaged in.
- What is the name of Natalie and Robbie's cat?
- Who made the first move?
Down
- Who said I love you first?
- The elementary school Natalie and Robbie first met (Forest __)
- Natalie's least favorite household chore.
- Natalie and Robbie's eye color.
- What field does Robbie work in?
- Number of dresses Natalie tried on.
- Number of years Natalie and Robbie dated.
- What college did they attend?
- Total number of bridesmaids and groomsmen.
- The shape of the engagment ring.
- Natalie and Robbie's favorite condiment.
20 Clues: Robbie's first roommate. • Who made the first move? • Who said I love you first? • The month Robbie proposed. • The grade Natalie teaches. • The couple's favorite singer. • The city they got engaged in. • What college did they attend? • Natalie and Robbie's eye color. • What field does Robbie work in? • The shape of the engagment ring. • Number of dresses Natalie tried on. • ...
Unit 11-Cyber Security 2023-09-15
7 Clues: harmful software • digital illegal activity • network security barrier • isolated testing environment • protection of digital resources • unique physical characteristics for authentication • scam in which attackers trick people into disclosing confidential information
Biometrics 2025-04-03
Across
- basic rights
- safety measures taken for protection
- to take full advantage of and benefit from
- something so easy that you cant mess it up
Down
- software programs that protect you while online
- following a trend just because everyone else is
- weaknesses in a security system
- to illegally enter into someone's computer
- to avoid or get around
- a gap in security
10 Clues: basic rights • a gap in security • to avoid or get around • weaknesses in a security system • safety measures taken for protection • to illegally enter into someone's computer • to take full advantage of and benefit from • something so easy that you cant mess it up • software programs that protect you while online • following a trend just because everyone else is
Chapter 15 Globalism: Information, Communication, and The Digital Revolution 2024-12-10
Across
- Devices used for computing and connecting online.
- Method for delivering messages electronically.
- Process of converting data into a secure code.
- Storing data on remote servers accessed via the Internet.
- Portable electronic device for accessing information.
- Software that performs malicious activities.
- Online platform for social interaction.
Down
- Digital means of connecting people worldwide.
- Measure to protect networks and systems.
- Global system for mobile communication.
- Widespread sharing of digital media.
11 Clues: Widespread sharing of digital media. • Global system for mobile communication. • Online platform for social interaction. • Measure to protect networks and systems. • Software that performs malicious activities. • Digital means of connecting people worldwide. • Method for delivering messages electronically. • Process of converting data into a secure code. • ...
Operation DigiVyuh 2025-01-27
Across
- - Converting data into a code to protect it
- - Entity that issues digital certificates
- - Stealing someone's personal information
- - Sending unwanted bulk messages
Down
- - Protecting systems from digital attacks
- - A secure way to sign electronic documents
- - Fraudulent attempt to steal sensitive information
- - Unauthorized access to computer systems
- - Police unit for investigating cyber crimes
- - Part of the IT Act dealing with computer offenses
- - Indian law for cyber crimes (abbreviation)
11 Clues: - Sending unwanted bulk messages • - Protecting systems from digital attacks • - Entity that issues digital certificates • - Unauthorized access to computer systems • - Stealing someone's personal information • - A secure way to sign electronic documents • - Converting data into a code to protect it • - Police unit for investigating cyber crimes • ...
Guess The word 2022-06-27
Across
- The act of obeying an order, rule, or request
- Possibility of loss or injury
- Group of people for decision making
- An event that is either unpleasant or unusual
- An official inspection
- A set of guidelines
Down
- Report certain types of wrongdoing
- Protection of internet-connected system
- of conduct A set of rules
- of interest Clash between personal and professional duties
10 Clues: A set of guidelines • An official inspection • of conduct A set of rules • Possibility of loss or injury • Report certain types of wrongdoing • Group of people for decision making • Protection of internet-connected system • The act of obeying an order, rule, or request • An event that is either unpleasant or unusual • ...
Cybersecurity Unit 10 Crossword 2025-03-20
Across
- impacts availability and requires redundancy
- updates and changes in one component may impact others
- timely removal of access to minimize risks
- older or outdated software
- realizing that you are not encrypting data, using weak passwords and outdated technology
- step-by-step instructions for security measures
- focusing on ensuring you are following regulatory requirements such as HIPPA
- influences user behaviors
- define requirements for security controls and configurations
Down
- guides access provisioning for new employees
- predefinied responses for security incidents
- includes checking things such as your incident response plan to make sure it is sufficient enough
- common during updates or performance issues
- establish organizational stances on security aspects
- specify what items are allowed
- Developing an action plan, implementing new security controls and tracking progress
- specify what items are denied
- Never trust, always verify
- this type of restart requires restarting a particular component
19 Clues: influences user behaviors • older or outdated software • Never trust, always verify • specify what items are denied • specify what items are allowed • timely removal of access to minimize risks • common during updates or performance issues • guides access provisioning for new employees • impacts availability and requires redundancy • ...
crossword 01 2025-04-21
Across
- By laws
- The art of sticking to something like a rule
- The act of studying something closely
- To improve or make more precise
Down
- Favoring one thing over other
- The process of reducing danger
- Use of technology to reduce human intervention in a process
- Following regulation
- The quality of doing something well without wasting time
- Protection of digital information from cyberattacks
10 Clues: By laws • Following regulation • Favoring one thing over other • The process of reducing danger • To improve or make more precise • The act of studying something closely • The art of sticking to something like a rule • Protection of digital information from cyberattacks • The quality of doing something well without wasting time • ...
Spectrum Degree Programs 2023-10-18
6 Clues: Employee relations • Budgeting and money • Protecting computers • Ideas to interest customers • Tracking expenses and payments • Understanding formulas to gather data
Harris 20th Anniversary 2022-10-14
Across
- What sport/activity does Chris play
- Where did Melissa grow up?
- Where did they live when they got married?
- What is the Harris family dogs name?
- What volcano did the Harris family climb in Hawaii?
- Who is Melissa's favorite singer?
- Where did they Chris & Melissa get married?
Down
- What is Chris' profession?
- What are Chris & Melissa's kids middle
- Who is Chris' favorite rapper?
- What cruise line did they sail on when they
- married?
12 Clues: married? • What is Chris' profession? • Where did Melissa grow up? • Who is Chris' favorite rapper? • Who is Melissa's favorite singer? • What sport/activity does Chris play • What is the Harris family dogs name? • What are Chris & Melissa's kids middle • Where did they live when they got married? • What cruise line did they sail on when they • ...
If Ever You're Bored 2022-09-07
Across
- my favorite food you cook
- my college major
- my favorite song from Renaissance
- the first food place we've ever been together to
- your first car's name
- our son's name
Down
- place we celebrated when we thought we were going to get accepted into our first "dream" apt.
- my car's name
- my mother's name
- type of car i want in the future
- what we are going to be in the future
- you and Miracle
12 Clues: my car's name • our son's name • you and Miracle • my college major • my mother's name • your first car's name • my favorite food you cook • type of car i want in the future • my favorite song from Renaissance • what we are going to be in the future • the first food place we've ever been together to • ...
Cybersecurity 2022-09-08
smple 2023-09-20
Internet 2023-09-14
Across
- - Electronic communication method.
- - Protecting against online threats.
- - A secret code to access accounts.
- - Real-time text-based conversation online.
- - Software used to access the internet.
- - Malicious software that can harm your computer.
- - Small digital images used to express emotions.
- - Prefix for media platforms like Facebook and Twitter.
- - Device that directs internet traffic.
Down
- - Wireless internet connection.
- - Online buying and selling of goods.
- - Watching videos or listening to music online.
- - A collection of web pages.
- - Getting files from the internet to your device.
- - What you do on Google to find information.
15 Clues: - A collection of web pages. • - Wireless internet connection. • - Electronic communication method. • - A secret code to access accounts. • - Protecting against online threats. • - Online buying and selling of goods. • - Software used to access the internet. • - Device that directs internet traffic. • - Real-time text-based conversation online. • ...
IJTIMOIY MEDIADA TAHdID VA XAVF-XATARLAR 2025-11-06
Across
- Ijtimoiy tarmoqlarda foydalanuvchini himoyalovchi asosiy narsa
- Raqamli sohada xavfsizlikni ta’minlovchi davlat tizimi
- Kiberxavfsizlikni ta’minlash uchun ishlatiladigan raqamli vosita
- Tarmoqdagi foydalanuvchini ifodalovchi belgilar majmuasi
- Ma’lumotni himoya qiluvchi belgilar ketma-ketligi
- “Axborot xavfsizligi” fanining inglizcha nomi
- Ijtimoiy mediadan ortiqcha foydalanish oqibatida paydo bo‘ladigan ruhiy holat
- MADANIYAT Yoshlarning ijtimoiy tarmoqlardan to‘g‘ri foydalanish madaniyati
Down
- Internetdagi yolg‘on profil nomi
- Foydalanuvchini tanimasdan do‘stlik so‘rovi yuboruvchi shaxs
- Internetdagi zararli dasturlar turi (🦠)
- Ijtimoiy tarmoqlarda shaxsga nisbatan haqoratli yozish — onlayn zo‘ravonlik nomi
- Shaxsiy axborotni o‘g‘irlash bilan shug‘ullanuvchi kiberjinoyatchi
- Axborotni ruxsatsiz olish — bu qanday jinoyat
- Internet orqali noto‘g‘ri yoki yolg‘on axborot tarqatish
15 Clues: Internetdagi yolg‘on profil nomi • Internetdagi zararli dasturlar turi (🦠) • Axborotni ruxsatsiz olish — bu qanday jinoyat • “Axborot xavfsizligi” fanining inglizcha nomi • Ma’lumotni himoya qiluvchi belgilar ketma-ketligi • Raqamli sohada xavfsizlikni ta’minlovchi davlat tizimi • Tarmoqdagi foydalanuvchini ifodalovchi belgilar majmuasi • ...
SETU’s Women in Tech Cybersecurity Crossword 2025-11-10
Across
- British codebreaker who worked with Turing
- Classic cryptography participant
- Led Apollo software engineering
- First computer programmer, namesake of a U.S. DoD language
- Founded the Institute for Women and Technology
- Google's 'Security Princess', Project Zero lead
- Expert in cybersecurity workforce development
Down
- Emerging computing paradigm exploiting superposition
- Researcher in formal methods and cryptography
- Pioneered Microsoft’s bug bounty program
- Coined 'debugging' after removing a moth from a computer
- Insider adversary model in threat modelling
- Created the Spanning Tree Protocol; 'Mother of the Internet'
- Digital forensics and OSINT expert
- The eavesdropper in cryptography scenarios
15 Clues: Led Apollo software engineering • Classic cryptography participant • Digital forensics and OSINT expert • Pioneered Microsoft’s bug bounty program • British codebreaker who worked with Turing • The eavesdropper in cryptography scenarios • Insider adversary model in threat modelling • Researcher in formal methods and cryptography • ...
Unit 1-3 vocab 2024-03-14
Across
- Watering crops
- Farm animals like cows and chickens
- Picking crops when they're ready
- Person who plays sports
- security Making sure everyone has enough to eat
- rotation Changing what you plant to help the soil
- Computer steps to solve problems
- identity How you show yourself on the internet
- Keeping nature safe for the future
- Food for plants
- Underground water source
Down
- literacy Knowing how to use the internet well
- Trick emails trying to get private info
- Keeping computers safe
- Buying and selling online
- Watching videos on the internet without downloading
- detox Taking a break from screens and devices
- Long time with no rain
- gaming Playing games on the internet with others
- storage Keeping files on the internet, not your computer
20 Clues: Watering crops • Food for plants • Keeping computers safe • Long time with no rain • Person who plays sports • Underground water source • Buying and selling online • Picking crops when they're ready • Computer steps to solve problems • Keeping nature safe for the future • Farm animals like cows and chickens • Trick emails trying to get private info • ...
THE FRIENDS 2023-04-20
Across
- ashley's most used phrase
- what maria gets on her face when she's outside
- a class we all share
- kaylee's biggest feature
- the man the myth the situationship
- the groupchat that we all have together
- the teacher that is better than woolley
- chaine's dead name
- ariany could never live with out this
- kaylee and ashley are poor...
Down
- ashley's stem major
- ariany, kaylee, ashley all have in common
- our last year here:(
- ariany is lacking her...
- what maria is (foreign)
- ariany gives you this when you speak
- emily thinks she looks like this when her hair is up (in spanish)
- chaine is pretty in...
18 Clues: chaine's dead name • ashley's stem major • our last year here:( • a class we all share • chaine is pretty in... • what maria is (foreign) • ariany is lacking her... • kaylee's biggest feature • ashley's most used phrase • kaylee and ashley are poor... • the man the myth the situationship • ariany gives you this when you speak • ariany could never live with out this • ...
Module 1 Introductory Course Telehealth 2017-03-02
Across
- acronym for information and communication technology
- word used interchangeably with telecare
- used to monitor vital signs remotely
- nurses engaged in remote service delivery
- computer-based medical records
- the ability of computers to exchange information
- measures taken to protect computer/computer systems
- the use of smartphones to provide healthcare
Down
- virtual, medical, health, and educational services
- in real time
- emerging umbrella term; intersection of technology and healthcare
- live visual connection between two or more people
- the "e" in this term stands for many things
- term referring to teleconsultations
- electronic component used to provide input and detect changes
15 Clues: in real time • computer-based medical records • term referring to teleconsultations • used to monitor vital signs remotely • word used interchangeably with telecare • nurses engaged in remote service delivery • the "e" in this term stands for many things • the use of smartphones to provide healthcare • the ability of computers to exchange information • ...
Useful Vocab 2023-11-22
Across
- Cooking style
- Newness
- The process of providing or obtaining the food necessary for health and growth
- Small electronic devices with a specific function
- The activity of visiting interesting places, especially as a tourist
- The ability to use, understand, and evaluate information across digital platforms
- Physical activity
- A place where people live or stay, such as a hotel or guesthouse
Down
- Conditions or practices conducive to maintaining health and preventing disease
- Techniques and therapies aimed at controlling stress levels for better mental health
- Place to stay
- Literacy Competence in using digital information
- Security
- Health
- The place to which someone or something is going or being sent
- Schedule
- A planned route or journey
17 Clues: Health • Newness • Security • Schedule • Place to stay • Cooking style • Physical activity • A planned route or journey • Literacy Competence in using digital information • Small electronic devices with a specific function • The place to which someone or something is going or being sent • A place where people live or stay, such as a hotel or guesthouse • ...
Security Audit Quiz SET C 2025-11-18
Across
- NIST CSF function focused on safeguarding assets.
- Level of harm from a compromise.
- Testing to confirm proper implementation.
- The defined boundary of an audit.
- Critical element of CIA triad.
- The probability of a threat exploiting a vulnerability.
- Final step of an audit process.
Down
- Unauthorized attempt to access a system.
- Ability to track actions back to individuals or systems.
- Adhering to required standards or regulations.
- A potential cause of an unwanted incident.
- A weakness that can be exploited.
- U.S. body responsible for cybersecurity standards.
- Checking compliance to documented requirements.
- measures implemented to reduce risk.
15 Clues: Critical element of CIA triad. • Final step of an audit process. • Level of harm from a compromise. • A weakness that can be exploited. • The defined boundary of an audit. • measures implemented to reduce risk. • Unauthorized attempt to access a system. • Testing to confirm proper implementation. • A potential cause of an unwanted incident. • ...
Technology 2024-01-26
Across
- Smallest unity of information
- Small electronic devices that make your life easier.
- Electronic devices that you can wear as accessories.
- About conersing analog information to a digital ones.
- Intenet of things.
- To protect systems or data from cybernetics attacks.
- Programmable machine to automate processes
Down
- The smallest technology.
- It's used to talk
- A process or set of rules
- Msurament and analysis about unique physical of everyone.
- Aereal no tipulated devices
- Can make tridimensional images to crate optical illusions.
- Generally, the not physical about a computer.
- To protect data encoding the information.
15 Clues: It's used to talk • Intenet of things. • The smallest technology. • A process or set of rules • Aereal no tipulated devices • Smallest unity of information • To protect data encoding the information. • Programmable machine to automate processes • Generally, the not physical about a computer. • Small electronic devices that make your life easier. • ...
Technology 2024-01-26
Across
- Smallest unity of information
- Small electronic devices that make your life easier.
- Electronic devices that you can wear as accessories.
- About conersing analog information to a digital ones.
- Intenet of things.
- To protect systems or data from cybernetics attacks.
- Programmable machine to automate processes
Down
- The smallest technology.
- It's used to talk
- A process or set of rules
- Msurament and analysis about unique physical of everyone.
- Aereal no tipulated devices
- Can make tridimensional images to crate optical illusions.
- Generally, the not physical about a computer.
- To protect data encoding the information.
15 Clues: It's used to talk • Intenet of things. • The smallest technology. • A process or set of rules • Aereal no tipulated devices • Smallest unity of information • To protect data encoding the information. • Programmable machine to automate processes • Generally, the not physical about a computer. • Small electronic devices that make your life easier. • ...
AI 2024-07-12
Across
- A celestial body or a digital storage?
- Computer's systematic steps for problem-solving
- Digital lock and key
- What AI craves to learn and grow
- Dogecoin or Shiba Inu
- Satellite navigator
- Physical form of AI doing everything from vaccuming to surgery
- Will probably take over the world by 2050
Down
- AI that creates content faster than your caffeinated coworker
- Your digital pal who's always up for a chat, no matter what (7 lette
- Identity recognition with a touch!
- Digital Bodyguard
- Pocket sized device that tells you everything from time to time
- Next-gen computing
- Augmented reality
15 Clues: Digital Bodyguard • Augmented reality • Next-gen computing • Satellite navigator • Digital lock and key • Dogecoin or Shiba Inu • What AI craves to learn and grow • Identity recognition with a touch! • A celestial body or a digital storage? • Will probably take over the world by 2050 • Computer's systematic steps for problem-solving • ...
11.2 Cabinet Departments and Independent Agencies 2021-04-22
Across
- counterterrorism, cybersecurity, aviation security, border security, port security, maritime security, administration and enforcement of our immigration laws, protection of our national leaders, protection of critical infrastructure, cybersecurity, detection of and protection against chemical, biological and nuclear threats to the homeland, and response to disasters.
- providing the military forces needed to deter war and protect the security of our country.
- the health of all Americans and providing essential human services.
- enforcing the laws of the United States federal government
- representing U.S. businesses within the President's Cabinet, interacting with communities, businesses, universities, and American workers, and promoting economic growth, job creation, and balanced economic development.
- manages public lands and minerals, national parks, and wildlife refuges and upholds Federal trust responsibilities to Indian tribes and Native Alaskans.
- national policy and programs that address America's housing needs, that improve and develop the Nation's communities, and enforce fair housing laws.
- manage the liquidity of a business.
Down
- planning and coordinating federal transportation projects. It also sets safety regulations for all major modes of transportation.
- integrating life-long healthcare services to eligible military veterans at the 1700 VA medical centers and outpatient clinics located throughout the country.
- oversees the American farming industry
- the management and distribution of the federal budget for education initiatives.
- what is the title of the head of the executive branch departments?
- laws affecting the workplace, unions, and issues pertaining to business-to-employee relationships.
14 Clues: manage the liquidity of a business. • oversees the American farming industry • enforcing the laws of the United States federal government • what is the title of the head of the executive branch departments? • the health of all Americans and providing essential human services. • the management and distribution of the federal budget for education initiatives. • ...
Cybersecurity Awareness Month 2023 2023-09-21
Across
- An email attack in which a cybercriminal attempts to disguise themselves as a trusted source..
- Cybersecurity Awareness Month
- A person who uses computers to gain unauthorized access to data.
- A form of phishing in which an attacker uses a compelling text message to trick targeted recipients into clicking a link and sending the attacker private information or downloading malicious software to a smartphone.
- This type of information includes your name, address, phone number, email address, bank account information, IP address, etc.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- A person who commits fraud or participates in a dishonest scheme.
- The practice of protecting critical systems and sensitive information from digital attacks.
- A manipulation technique that exploits human error to gain private information, access or valuables.(Two words)
Down
- This is the most common form of cybercrime. Roughly 90% of all data breaches start with one of these emails.
- The fraudulent practice of making phone calls or leaving voice messages pretending to be from reputable companies in order to trick individuals in to revealing personal information, such as bank details and card numbers.
- A sequence of words or text used to control access to a computer; similar to a password.
- Facebook, Instagram, TikTok, etc.(Two words)
- This type of information includes race or ethnicity, health and medical information, political or religious beliefs, etc.
- The address of a webpage. Check the validity of it before clicking on it.
15 Clues: Cybersecurity Awareness Month • Facebook, Instagram, TikTok, etc.(Two words) • A person who uses computers to gain unauthorized access to data. • A person who commits fraud or participates in a dishonest scheme. • The address of a webpage. Check the validity of it before clicking on it. • ...
DIGITAL CITIZENSHIP DAY 2024-10-14
Across
- anything shared online, like text or images
- someone who impacts others through social media
- controls for who sees your info
- tricking you to share personal info
- being real, even online!
- your computer's protective wall against threats
- someone who stirs up trouble online
- a virtual way to connect with someone new
- unauthorized access to someone else's computer or account
- hurtful words sent through screens
Down
- protection against online threats
- the trace you leave behind online
- a tool that keeps your online actions private
- legal protection for creative works and ideas
- tiny pictures that express feelings!
- your secret code for online access
- time spent gazing at your device
- unwanted emails that clutter your inbox
- your personal space on websites
19 Clues: being real, even online! • controls for who sees your info • your personal space on websites • time spent gazing at your device • protection against online threats • the trace you leave behind online • your secret code for online access • hurtful words sent through screens • tricking you to share personal info • someone who stirs up trouble online • ...
Guess The Word 2022-06-27
Across
- blower Report certain types of wrongdoing
- Group of people for decision making
- of conduct A set of rules
- The act of obeying an order, rule, or request
- Possibility of loss or injury
Down
- A set of guidelines
- Protection of internet-connected system
- An official inspection
- An event that is either unpleasant or unusual
- of interest Clash between personal and professional duties
10 Clues: A set of guidelines • An official inspection • of conduct A set of rules • Possibility of loss or injury • Group of people for decision making • Protection of internet-connected system • blower Report certain types of wrongdoing • An event that is either unpleasant or unusual • The act of obeying an order, rule, or request • ...
Crossword #2 2025-09-07
Across
- Harvest Fest's star performer
- Office responsible for prospective student tours
- Java's "fruity" event during Laurentian Weekend
- "My Son The Doctor" opening band
- Department found on the third floor of Johnson Hall of Science
Down
- Recently deceased Italian designer
- SLU's newest major
- Theme cottage newly relocated to 72 Park St
- The Singing _____, famous for their red blazers
- Editor-in-chief Donnellan-Doser
10 Clues: SLU's newest major • Harvest Fest's star performer • Editor-in-chief Donnellan-Doser • "My Son The Doctor" opening band • Recently deceased Italian designer • Theme cottage newly relocated to 72 Park St • The Singing _____, famous for their red blazers • Java's "fruity" event during Laurentian Weekend • Office responsible for prospective student tours • ...
FY26-Q1 2025-10-15
Across
- Workstation compliance training goes live in this month
- Under privacy law, it means “forget about me”
- Leaves the forum when they don’t consent to one
- EU regulation keeping the financial sector in check
- Top-performing Market for SBS
- Helps out with meeting notes
Down
- If DORA’s vertical, NIS2 must be this
- Cybersecurity Awareness Month theme this year
- Complete by November: “Secure use of ___”
- January training: “Call ___”
- CCPA fine was issued in this country
11 Clues: January training: “Call ___” • Helps out with meeting notes • Top-performing Market for SBS • CCPA fine was issued in this country • If DORA’s vertical, NIS2 must be this • Complete by November: “Secure use of ___” • Cybersecurity Awareness Month theme this year • Under privacy law, it means “forget about me” • Leaves the forum when they don’t consent to one • ...
NAVFAC Capabilities 2023-02-15
Across
- ________Facilities and Equipment Engineering
- Definition: detailed coordination of a complex operation involving people, facilities, or supplies.
- Definition: a proposed or planned undertaking
- Definition: Relating to impact of human activity on the natural world
- Definition: Protection against criminal or unauthorized use of electronic data
- Definition: Basic physical and organizational structures and facilities
- ________ Handling Ashore Procurement
Down
- NAVFAC Capabilities: _________ & Facility Operations
- _______ and Facilities Operations
- _________ Vehicles provide transportation services
- Real Estate _________ and Management
- NAVFAC Capabilities: ______ & Construction
- NEPA regulations requirement
13 Clues: NEPA regulations requirement • _______ and Facilities Operations • Real Estate _________ and Management • ________ Handling Ashore Procurement • NAVFAC Capabilities: ______ & Construction • ________Facilities and Equipment Engineering • Definition: a proposed or planned undertaking • _________ Vehicles provide transportation services • ...
Reasons why Singapore is Safe / Not Safe 2024-07-23
Across
- emphasis on racial and religious [] reduces radicalisation
- [] to regional terrorist hotspots
- strong [] measures and proactive Internal [] Department
Down
- reduced vigilance over time
- public cooperation via programmes like []
- online platforms spreading [] ideologies
- advanced surveillance and cybersecurity[]
7 Clues: reduced vigilance over time • [] to regional terrorist hotspots • online platforms spreading [] ideologies • public cooperation via programmes like [] • advanced surveillance and cybersecurity[] • strong [] measures and proactive Internal [] Department • emphasis on racial and religious [] reduces radicalisation
Cybersecurity 2022-09-08
Phishing Crossword 2023-10-14
7 Clues: a fake email address • an extra layer of security • an email that tricks people • commonly hunted by fisherman • a way scams try to reach you • protects against online threats • A scammer is trying to rush you
CYBER CROSSSWORD 2022-10-29
7 Clues: gatekeeper of computer • stealing of information • information technology security • imitating others to gain some information • using computer power to generate cryptocurrency • one who illegally tries to breach others' system • malware preventing users from accessing their system
Module 1 Introductory Course Telehealth 2017-03-02
Across
- acronym for information and communication technology
- word used interchangeably with telecare
- used to monitor vital signs remotely
- nurses engaged in remote service delivery
- computer-based medical records
- the ability of computers to exchange information
- measures taken to protect computer/computer systems
- the use of smartphones to provide healthcare
Down
- virtual, medical, health, and educational services
- in real time
- emerging umbrella term; intersection of technology and healthcare
- live visual connection between two or more people
- the "e" in this term stands for many things
- term referring to teleconsultations
- electronic component used to provide input and detect changes
15 Clues: in real time • computer-based medical records • term referring to teleconsultations • used to monitor vital signs remotely • word used interchangeably with telecare • nurses engaged in remote service delivery • the "e" in this term stands for many things • the use of smartphones to provide healthcare • the ability of computers to exchange information • ...
Reynolds and Reynolds Puzzle 2025-06-17
Across
- On Auto Selling accessories at the dealership
- AI Flare of genius in automotive intelligence
- Experts in Dealership Cybersecurity and IT Management
- Access to every touchpoint your customers have with your entire dealership
- Trak Stores, tracks, and audits your keys. First word.
- Provide customers accurate service estimates in seconds (abbr.)
- Pay All-in-one payment processing solution for dealerships
- Podcast Featuring Greg Uland
Down
- Sales stage before signatures
- Parts Runner
- Just ask Avery
- _ _ _ _ Newsletter
- Pad Sign and store deal documents electronically from the beginning.
- Anywhere Dealership-wide approach to sell and service vehicles
- IGNITE RMS
15 Clues: IGNITE RMS • Parts Runner • Just ask Avery • _ _ _ _ Newsletter • Podcast Featuring Greg Uland • Sales stage before signatures • On Auto Selling accessories at the dealership • AI Flare of genius in automotive intelligence • Experts in Dealership Cybersecurity and IT Management • Trak Stores, tracks, and audits your keys. First word. • ...
Computer number system and Internet 2025-05-29
Across
- Number system that consists of 16 digits
- Also known as unethical hackers
- Using illegal methods to get money
- Code that a computer only understands
- A popular antivirus software
- Harming using information technology in a deliberate manner
- Attacked first and then forced to pay money to stop attacks
Down
- Number system that consists of 8 digits
- Illegal entry into a computer system
- Number system consisting of 10 digits
- A program that disrupts the normal functioning
- Program designed to protect networks and computers
- Misusing someone's personal information
- Hoaxing or misleading a person
- To conduct terrorism through computers and internet
15 Clues: A popular antivirus software • Hoaxing or misleading a person • Also known as unethical hackers • Using illegal methods to get money • Illegal entry into a computer system • Number system consisting of 10 digits • Code that a computer only understands • Number system that consists of 8 digits • Misusing someone's personal information • ...
Security Audit Quiz 2025-11-18
Across
- The probability of a threat exploiting a vulnerability.
- NIST CSF function focused on safeguarding assets
- Final step of an audit process.
- Checking compliance to documented requirements.
- A weakness that can be exploited.
- A potential cause of an unwanted incident.
- Ability to track actions back to individuals or systems.
- U.S. body responsible for cybersecurity standards.
Down
- The defined boundary of an audit.
- measures implemented to reduce risk.
- Level of harm from a compromise.
- Unauthorized attempt to access a system.
- Critical element of CIA triad.
- Testing to confirm proper implementation.
- Adhering to required standards or regulations.
15 Clues: Critical element of CIA triad. • Final step of an audit process. • Level of harm from a compromise. • The defined boundary of an audit. • A weakness that can be exploited. • measures implemented to reduce risk. • Unauthorized attempt to access a system. • Testing to confirm proper implementation. • A potential cause of an unwanted incident. • ...
2016-06-23
Across
- if someone gives you _______
- play tennis with it
- live next door to you
- step by step
- to measure heart rate
- another word for drunk
- there was a ______ of items on the shelf
Down
- put on the internet to stop viruses and bullies
- fellow members
- you are so _______ for not feeding the pet
- the ____ in the supermarket was packed full of people
- given to you after you buy an item
- not clear of plain
- an optical instrument
- a wedge like tool with a cutting edge at the end of the blade
- a French expression for accomplishment Or success
16 Clues: step by step • fellow members • not clear of plain • play tennis with it • live next door to you • an optical instrument • to measure heart rate • another word for drunk • if someone gives you _______ • given to you after you buy an item • there was a ______ of items on the shelf • you are so _______ for not feeding the pet • put on the internet to stop viruses and bullies • ...
Technology Vocabulary Words 2023-05-08
Across
- a global computer network
- Central processing unit
- an electronic device for storing and processing data
- a series of coded software instructions
- stores data on a disk
- a programing language
- Artificial intelligence
- example- crome
- you send this on a computer
Down
- interconnected computing devices that can exchange data
- an organized collection of information on a computer system
- a device used for multiple purposes
- the state of being protected against the criminal or unauthorized use of electronic data
- physical components of a computer
- facts and statistics collected together for reference or analysis
- a set of instructions used to operate computer tasks
16 Clues: example- crome • stores data on a disk • a programing language • Central processing unit • Artificial intelligence • a global computer network • you send this on a computer • physical components of a computer • a device used for multiple purposes • a series of coded software instructions • an electronic device for storing and processing data • ...
The Big Friday Crossword 2025-04-25
Across
- - The best of AI
- – A unit of image resolution equivalent to 1000000 pixels
- League - Inclusive rights to Europe’s second tier football competition
- – Your grandparents love this brand
- – Isaac newton
- – You can see my insides but I don’t exist. Yet you can still make calls.
- – A big partner specialising in computing and gaming.
- – the biggest show out at the moment available on Now Entertainment through EE
- – Free with ess plus up
Down
- – and chill
- – Assumptive sell
- – Find Ted Lasso here
- – Movie star who has close ties to EE
- – Im not fast but I still work
- – Cybersecurity with…
- – Nintendo’s newest console launch
16 Clues: – and chill • – Isaac newton • - The best of AI • – Assumptive sell • – Find Ted Lasso here • – Cybersecurity with… • – Free with ess plus up • – Im not fast but I still work • – Nintendo’s newest console launch • – Your grandparents love this brand • – Movie star who has close ties to EE • – A big partner specialising in computing and gaming. • ...
Science & Technological Progress 2025-11-27
Across
- reality – Technology that overlays digital images onto the real world.
- engineer(ing) – Modifying genes to change biological traits.
- – Conducting tests to discover something new.
- – A new idea, method, or device.
- – A major scientific discovery.
- – Science at the level of atoms and molecules.
- reality – A computer-generated 3D environment.
- – Protecting computer networks from attacks.
Down
- – Using machines to perform tasks without human input.
- – Technology dealing with robot design and use.
- exploration – Study and travel beyond Earth.
- – Highly advanced; modern.
- concerns – Moral issues linked to new technology.
- – Information used for analysis.
- – Technology applied to living organisms.
- (Artificial intelligence) – Machines that can think or learn.
16 Clues: – Highly advanced; modern. • – A major scientific discovery. • – Information used for analysis. • – A new idea, method, or device. • – Technology applied to living organisms. • exploration – Study and travel beyond Earth. • – Protecting computer networks from attacks. • – Conducting tests to discover something new. • – Science at the level of atoms and molecules. • ...
CyberSecurity Awareness 2020-09-29
Across
- a method used to get you to click on malware
- everyone must use their's when entering building
- information not meant for sharing
- often hidden in email attachments
Down
- take sensitive conversations somewhere _______
- meant for specific employees only
- unique way of authenticating yourself
- when our information is compromised
8 Clues: meant for specific employees only • information not meant for sharing • often hidden in email attachments • when our information is compromised • unique way of authenticating yourself • a method used to get you to click on malware • take sensitive conversations somewhere _______ • everyone must use their's when entering building
Cybersecurity Awareness 2021-09-24
Cybersecurity Crossword 2024-10-29
Across
- Any software designed intentionally to cause damage to a computer, server, or network.
- A type of malware that encrypts your files and demands payment for their release.
- Rubber Ducky devices often perform a ______ injection attack in order to run unauthorized commands.
- An attacker sends a fake email pretending to be a trusted entity in a ______ attack.
Down
- A ______ records each key pressed on a keyboard, often to steal passwords.
- A process of converting information into ciphertext to prevent unauthorized access, usually applied in ransomware attacks.
- Short range wireless technology used in wireless earbuds and smartwatches but can be hacked by also used by devices like Flipper Zero.
- Artificial intelligence can create a ______, where someone’s face or voice is replaced or altered to appear realistic.
8 Clues: A ______ records each key pressed on a keyboard, often to steal passwords. • A type of malware that encrypts your files and demands payment for their release. • An attacker sends a fake email pretending to be a trusted entity in a ______ attack. • Any software designed intentionally to cause damage to a computer, server, or network. • ...
Cybersecurity Safeguards 2024-03-19
Across
- something you create so only you can access accounts
- believing someone will keep you safe
- ridges that help you grab onto objects
- all the information about you that makes you different from other people
Down
- another word for internet safety
- to keep safe from harm
- to be free from danger or harm
- information you don't want everyone to know
8 Clues: to keep safe from harm • to be free from danger or harm • another word for internet safety • believing someone will keep you safe • ridges that help you grab onto objects • information you don't want everyone to know • something you create so only you can access accounts • all the information about you that makes you different from other people
Cybersecurity Crossword 2025-07-15
Across
- A type of malicious software that demands money to unlock your files.
- The process of turning data into something more secure so people can't understand it.
- Software that secretly monitors your actions on a computer or phone.
Down
- A harmful program that tricks you into thinking it's something safe.
- A hidden method of accessing a computer system without the user's knowledge.
- A digital document that verifies the identity of a website or server.
- Self-replicating malware that spreads across networks, often causing damage.
- A scam that uses fake emails or websites to steal personal information.
8 Clues: A harmful program that tricks you into thinking it's something safe. • Software that secretly monitors your actions on a computer or phone. • A digital document that verifies the identity of a website or server. • A type of malicious software that demands money to unlock your files. • A scam that uses fake emails or websites to steal personal information. • ...
Current affairs: Recent global and national event. 2025-10-28
Across
- Process where people vote for leaders.
- Measure of a country's economic output (abbr).
- Biological preparation to boost immunity.
- Penalties applied by countries for policy reasons.
Down
- Practice of protecting internet systems.
- Artificial Intelligence (abbr).
- International climate conference in 2023 (abbr).
- General rise in prices over time.
8 Clues: Artificial Intelligence (abbr). • General rise in prices over time. • Process where people vote for leaders. • Practice of protecting internet systems. • Biological preparation to boost immunity. • Measure of a country's economic output (abbr). • International climate conference in 2023 (abbr). • Penalties applied by countries for policy reasons.
CHPW Cybersecurity 2019-10-28
Across
- caused by programming weaknesses in software
- CHPW's secure email gateway
- software that redirects your browse, or monitor the websites you visit
Down
- software that captures your keystrokes
- people who seek to exploit weaknesses in software and computer systems
- when to report if your computer or mobile device becomes lost or stolen
- code that exploits programming weaknesses of software
- type of malicious code
8 Clues: type of malicious code • CHPW's secure email gateway • software that captures your keystrokes • caused by programming weaknesses in software • code that exploits programming weaknesses of software • people who seek to exploit weaknesses in software and computer systems • software that redirects your browse, or monitor the websites you visit • ...
CyberSecurity 1 2024-08-15
Across
- online bullying
- a user that did not have permission
- intent to do something to be helpful
- someone who accesses things that are not theirs
- intent to do something for bad reasons
- a user who did have permission
Down
- Acronym for Personal Identifiable Information
- a user who did not have permission but did not cause harm
8 Clues: online bullying • a user who did have permission • a user that did not have permission • intent to do something to be helpful • intent to do something for bad reasons • Acronym for Personal Identifiable Information • someone who accesses things that are not theirs • a user who did not have permission but did not cause harm
Cybersecurity 1 2024-05-07
Across
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
- A weakness or flaw in a system that can be exploited by attackers.
- The process of converting data into a code to prevent unauthorized access.
Down
- The process of verifying the identity of a user or system.
- A barrier that monitors and controls incoming and outgoing network traffic.
- A deliberate attempt to compromise the security, availability, or integrity of computer systems or networks.
- A cyberattack method via email that involves tricking individuals into disclosing sensitive information.
- A secret combination of characters used to authenticate users and protect accounts.
8 Clues: The process of verifying the identity of a user or system. • A weakness or flaw in a system that can be exploited by attackers. • The process of converting data into a code to prevent unauthorized access. • A barrier that monitors and controls incoming and outgoing network traffic. • ...
Cybersecurity Crosswords 2024-10-17
Across
- Any incident that results in unauthorized access to computer data, applications, networks or devices. It results in information being accessed without authorization
- Program that maliciously takes advantage of vulnerabilities or security flaws in software
- The act of disguising a communication from an unknown source as being from a known, trusted source by impersonating a domain
- Two or more ways of authentication e.g. pincodes,OTPs
Down
- The process of protecting information or data by scrambling it in such a way that only the parties who have the key to unscramble it can access it
- Fraudulent Email sent to people to share their personal info by pretending to be legitimate business or person
- A type of malware or malicious software that can replicate rapidly and spread across devices within a network
- Any kind of unwanted, unsolicited digital communication that gets sent out in bulk via emails and messages
8 Clues: Two or more ways of authentication e.g. pincodes,OTPs • Program that maliciously takes advantage of vulnerabilities or security flaws in software • Any kind of unwanted, unsolicited digital communication that gets sent out in bulk via emails and messages • ...
