cybersecurity Crossword Puzzles
bytetrails7 2025-02-25
Across
- Storing data over the internet
- Protecting data from unauthorized access
- Software managing hardware and software resources
- Virtual representation of physical hardware
Down
- Device that connects multiple networks
- A column in a table
- Secures data by converting it to a coded form
- Smallest unit of data in computing
- High-level programming language
- Set of vertices connected by edges
10 Clues: A column in a table • Storing data over the internet • High-level programming language • Smallest unit of data in computing • Set of vertices connected by edges • Device that connects multiple networks • Protecting data from unauthorized access • Virtual representation of physical hardware • Secures data by converting it to a coded form • ...
ONBOARDING 2025-10-06
Across
- A barrier that blocks malicious network traffic
- Core principle of honesty and moral conduct
- Unexpected danger or uncertainty that may cause loss
- Protection against unauthorized access to computer systems
- Ensuring responsibility and answerability
Down
- Planning for potential future risks
- Professional review of compliance and controls
- Safeguard for confidential information
- Evidence-based evaluation in auditing
- Moralprinciple guiding fair behavior
10 Clues: Planning for potential future risks • Moralprinciple guiding fair behavior • Evidence-based evaluation in auditing • Safeguard for confidential information • Ensuring responsibility and answerability • Core principle of honesty and moral conduct • Professional review of compliance and controls • A barrier that blocks malicious network traffic • ...
ONBOARDING 2025-10-06
Across
- A barrier that blocks malicious network traffic
- Core principle of honesty and moral conduct
- Unexpected danger or uncertainty that may cause loss
- Protection against unauthorized access to computer systems
- Ensuring responsibility and answerability
Down
- Planning for potential future risks
- Professional review of compliance and controls
- Safeguard for confidential information
- Evidence-based evaluation in auditing
- Moralprinciple guiding fair behavior
10 Clues: Planning for potential future risks • Moralprinciple guiding fair behavior • Evidence-based evaluation in auditing • Safeguard for confidential information • Ensuring responsibility and answerability • Core principle of honesty and moral conduct • Professional review of compliance and controls • A barrier that blocks malicious network traffic • ...
TTS INFORMATIKA (Dipta 8D) 2025-10-13
Across
- Kondisi komputer yang berhenti bekerja mendadak
- Papan utama tempat semua komponen komputer terhubung
- Jalan pintas untuk membuka file atau aplikasi
- Keluar dari sistem komputer
Down
- Keamanan dunia maya
- Tampilan awal layar komputer
- Mode menyimpan data sebelum komputer dimatikan
- Sistem keamanan jaringan untuk mencegah akses tidak sah
- Jenis malware yang menular ke file
- Program untuk mengatur unduhan
10 Clues: Keamanan dunia maya • Keluar dari sistem komputer • Tampilan awal layar komputer • Program untuk mengatur unduhan • Jenis malware yang menular ke file • Jalan pintas untuk membuka file atau aplikasi • Mode menyimpan data sebelum komputer dimatikan • Kondisi komputer yang berhenti bekerja mendadak • Papan utama tempat semua komponen komputer terhubung • ...
Safety & Risk Awareness Month 2025-10-12
Across
- Formal review to ensure standards are met.
- Screenings to monitor health & well-being.
- Ensures a safe remote work environment.
- Word or phrase used to access systems.
- A proactive measure to prevent incidents.
- The state of being informed and alert.
- Protecting systems from online threats.
Down
- Process of identifying potential hazards.
- Keeping sensitive data safe from exposure.
- Understanding potential risks.
- A scam email pretending to be legitimate.
- Measures taken to avoid danger or harm.
- Possibility of loss or harm.
- Digitally altered video.
- Valuable digital information.
- Adhering to rules and regulations.
16 Clues: Digitally altered video. • Possibility of loss or harm. • Valuable digital information. • Understanding potential risks. • Adhering to rules and regulations. • Word or phrase used to access systems. • The state of being informed and alert. • Ensures a safe remote work environment. • Measures taken to avoid danger or harm. • Protecting systems from online threats. • ...
CWiCS Cybersecurity Crossword Event 2021-02-25
Across
- A _____________ breach targeted 130 accounts, including those of past presidents and Elon Musk, resulted in attackers swindling $121,000 in Bitcoin through nearly 300 transactions
- This is a well-known banking trojan that steals credentials and other sensitive information from an infected machine.
- The telecom service provider became the victim of a Magecart card-skimming attack.
- This app's "Find Friends" feature could have exposed user's profile data and phone numbers (Jan 2021)
- Which Hotel had the breach Hackers gained access to over 10 million guest records .including Justin Bieber, Twitter CEO Jack Dorsey, and government officials
- A now-defunct online service that had been previously selling access to data hacked from other websites, 21 arrested in UK
- Hackers target Microsoft ___ machines running which servers to deploy backdoors and other kinds of malware
- International hotel chain disclosed a data breach of 5.2 million hotel guests, making it their second data breach hitting them
- This pharmacy chain announced an error within their mobile app's messaging feature exposing names, prescription numbers and drug names
- This unsecured component of Mailfire’s was breached, the hacker had access to over 320 million records from notifications being pushed out to Mailfire clients.
- Milpitas, Calif.-based platform security vendor ----------------- had compromised NetExtender VPN client and SMB-oriented Secure Mobile Access
Down
- -- based cyber attacks rose 630% between January and April 2020
- Trojan functioning as a downloader or dropper of other malwares
- Hacker remotely controlled, and clicked on various functions on the screen to change the level of sodium hydroxide to over 100 times its normal levels, at _________ Water Treatment Plant
- __________ Confusion Supply-Chain Attack Hit Over 35 High-Profile Companies
- Even in 2021, the Top 10 from ___ is the most effective first step towards changing the software development culture within your org
- Hosted on this cloud, a massive US property and demography database exposed 200 million records (March 2020)
- Hackers are now using this Google service to bypass web security and steal credit cards
- Hackers hit Nebraska Medical Center with --------------- and stole patient data
- The university paid a $1.14 million ransom to hackers in order to save COVID-19 research.
- Malicious code was sneaked into updates to this SolarWinds software
- Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug
- Since -------, the US FBI reported a 300% increase in reported cybercrimes
- LodaRAT Windows Malware Now Also Targets ______ Devices
- Malware designed to steal sensitive information stored on an infected device comes back disguised as a Game launcher
25 Clues: LodaRAT Windows Malware Now Also Targets ______ Devices • Trojan functioning as a downloader or dropper of other malwares • -- based cyber attacks rose 630% between January and April 2020 • Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug • Malicious code was sneaked into updates to this SolarWinds software • ...
Cybersecurity Unit 3 Terminology 2022-10-10
Across
- A base-16 number system. The extra digits are represented by the letters a through f, so all digits in hex are 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f.
- Wired Equivalent Privacy is a security algorithm used in wireless networks.
- The Maximum Transmission Unit is the maximum amount of bytes than can be packaged into frame data.
- A wireless access point is a device provides connectivity to a network.
- An operating system similar in concept to the Windows OS but used more often to host routers and web servers.
- A media access control addresses is unique numeric code that is assigned to networking hardware components (typically a network interface card or NIC) that is built into computers and mobile devices.
- The selective process of allowing or restricting the availability of a resource.
- The fourth and last phase of ethical hacking in which the security professionals fix the system vulnerabilities uncovered in the previous phases.
- The act of starting or launching a process. The new processes is a child process of a parent process..
- The operation of joining character strings end-to-end.
- A device that plots a graph of signal strength (vertical axis) versus frequency (horizontal axis).
- A standard that computers use to represent letters , numbers, and symbols. (It stands for American Standard Code for Information Interchange.)
- The first phase of ethical hacking, which involves probing of the network to understand its structure and to see what services are open and running.
- A collection of files on a computer, logically grouped together.
Down
- A program that allows a user to enter commands to interact with an operating system.
- An exchange of messages that prove the identity of users and computers in a system.
- The third phase of ethical hacking, which involves launching exploits at targeted vulnerabilities to see if they are genuine exposures on the system.
- It can have two meanings in computer terminology: it can be a specific application or function such as email, chat, etc. or it can refer to a specific part of an application, such as transmitting the data of a webpage
- Pronounced "ganoo" or "g.noo", it is a UNIX-like operating system.
- A very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden, allowing the user to focus on the details that are important for the task at hand.
- The second phase of ethical hacking, which involves taking a closer look at the services and software running on the hosts.
- A starting point for data analysis. It is the initial data set used in later comparisons.
- An input value to a command.
- Software that is is freely available to anyone who wants to use it. Users can modify it and distribute it however they want.
- A method of transferring and organizing data over a network using packets, which contain routing information along with the data.
- A process in UNIX that runs without user input.
- An attack where a malicious user changes and corrupts the MAC-IP address information on a target computer.
- A network communication protocol occurring in the data link layer 2 and physical layer 1 of the OSI model.
28 Clues: An input value to a command. • A process in UNIX that runs without user input. • The operation of joining character strings end-to-end. • A collection of files on a computer, logically grouped together. • Pronounced "ganoo" or "g.noo", it is a UNIX-like operating system. • A wireless access point is a device provides connectivity to a network. • ...
Cybersecurity Awareness Month Crossword 2023-09-21
Across
- Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
- A cybersecurity risk that originates from within an organization (2 words).
- A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
- A mechanism for creating a secure connection between a computing device and a computer network
- The ability of individuals to understand and exercise control over how information about themselves may be used by others.
- Unsolicited emails sent to many addresses.
- A process or measure used to verify a user's identity.
- Part of the internet that isn't indexed by search engines.
- Faking the sending address of a transmission to gain illegal entry into a secure system.
- An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities (2 words).
- The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization (2 words).
- Computer programs that can block, detect, and remove viruses and other malware.
- A type of malware that denies a user's access to a system or data until a sum of money is paid.
Down
- The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
- A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
- Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
- Software that compromises the operation of a system by performing an unauthorized function or process.
- A string of characters used to authenticate an identity.
- Extra copies of computer files that can be used to restore files that are lost or damaged.
- A flaw or weakness in an information system that could be exploited.
- An unauthorized user who attempts to or gains access to an information system.
- A collection of computers compromised by malicious code and controlled across a network.
- Software designed to block malware from entering protected networks.
- Converting data into a form that cannot be easily understood by unauthorized people.
24 Clues: Unsolicited emails sent to many addresses. • A process or measure used to verify a user's identity. • A string of characters used to authenticate an identity. • Part of the internet that isn't indexed by search engines. • A flaw or weakness in an information system that could be exploited. • Software designed to block malware from entering protected networks. • ...
2024 Cybersecurity Awareness Month 2024-09-17
Across
- A digital document used to verify the identity of a user or device online
- Software used to detect, prevent, and remove malicious software
- A security risk that originates from within the organization, often involving employees
- A tool that records keystrokes on a keyboard, often used to steal sensitive information
- The process of verifying a user or device
- A person who uses technical skills to exploit systems or networks
- The unauthorized access and retrieval of sensitive information from a system
- A type of malware that locks users out of their systems until a ransom is paid
- A hidden way of bypassing security controls in a system
- A string of characters used to authenticate access to a system or account
Down
- A software update designed to fix vulnerabilities or bugs
- An attempt to damage, disrupt, or gain unauthorized access to a computer or network
- Software designed to disrupt, damage, or gain unauthorized access to a computer system
- A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
- A network security system that monitors and controls incoming and outgoing traffic
- A vulnerability in software that is taken advantage of by hackers to carry out attacks
- A virtual private network that allows secure remote access to a network over the internet
- The use of deception to manipulate individuals into divulging confidential information
- The process used by an organization to handle and recover from a cyberattack
- An additional security layer that requires a second form of verification beyond a password
- The process of converting information or data into a code to prevent unauthorized access
- Software that gathers information from a user's device without their knowledge
22 Clues: The process of verifying a user or device • A hidden way of bypassing security controls in a system • A software update designed to fix vulnerabilities or bugs • Software used to detect, prevent, and remove malicious software • A person who uses technical skills to exploit systems or networks • ...
CIS178 - Cybersecurity Crossword Puzzle 2023-07-13
Across
- bring your own device
- code that protects data
- malicious software
- transmit information without users knowledge
- penetration testers
- wont allow changes to system’s settings
- illegally exploit network vulnerabilities
- identifies device connected to internet
- high traffic creates web shutdown
- vulnerable free wireless hotspots
- practicing to identify cyber threats
- software to carry out cyberattacks
- preventan d remove malware infections
- harrassing others over online platforms
Down
- propaganda to steal personal information
- downloaded apps disguised malicious attacks
- virtual private network
- exploits vulnerabilities in software
- helps remember passwords encrypted
- unauthorized users gain access
- attacks users until pay ransom
- clicking on hidden links
- tries to steal personal data
- software preventing access to networks
- scrambling sensitive data
25 Clues: malicious software • penetration testers • bring your own device • virtual private network • code that protects data • clicking on hidden links • scrambling sensitive data • tries to steal personal data • unauthorized users gain access • attacks users until pay ransom • high traffic creates web shutdown • vulnerable free wireless hotspots • helps remember passwords encrypted • ...
Cybersecurity Crossword Mod 9 2025-03-15
Across
- Easier to remember and longer
- Short and complex, harder to remember
- Item or Message used in phishing
- Phishing using QR Codes
- Security method using physical traits
- Hidden devices on ATM's or readers
- Encrypted network connection
- Authorization that requires two logins
- Malware hiding in files that spread
- Phishing high-profile individuals
Down
- Record all things typed on keyboard
- Infected ads on legit websites
- Someone with unauthorized access
- BitWarden is a password ______
- Fooling a user to gain access
- Self-replicating malware
- Seemingly legit, but is fake
- Malware that encrypts files
- Phishing over the phone
- Phising via text messages
20 Clues: Phishing using QR Codes • Phishing over the phone • Self-replicating malware • Phising via text messages • Malware that encrypts files • Seemingly legit, but is fake • Encrypted network connection • Easier to remember and longer • Fooling a user to gain access • Infected ads on legit websites • BitWarden is a password ______ • Someone with unauthorized access • ...
Middle-School Cybersecurity Crossword 2025-04-30
Across
- Sneaky grabbing of data
- A trick to steal money or info
- Software that secretly watches you
- Scrambling data into code
- Fake messages to steal info
- Pops up ads and may track you
- Bullying someone online
- Malware that hides as something safe
- A flaw in software used by hackers
- Records what you type
- Pretending to be someone else online
- Staying safe online
Down
- Sharing private info without permission
- Protection against online threats
- Bad software that harms devices
- Hiding your real identity online
- Unwanted or junk messages
- Locks files, demands money to unlock
- Network of hacked devices used for attacks
- Posting to upset or annoy people
- Misleading headline to get clicks
- Software that blocks viruses
- Person who breaks into computer systems
23 Clues: Staying safe online • Records what you type • Sneaky grabbing of data • Bullying someone online • Unwanted or junk messages • Scrambling data into code • Fake messages to steal info • Software that blocks viruses • Pops up ads and may track you • A trick to steal money or info • Bad software that harms devices • Hiding your real identity online • Posting to upset or annoy people • ...
Cracking the Cybersecurity Code 2024-12-08
Across
- The obligation to explain, justify, and take responsibility for decisions or actions.
- Facts and statistics collected together for reference or analysis, foundational to AI systems.
- The branch of medicine dealing with the prevention, diagnosis, and treatment of cancer.
- The measurement and statistical analysis of people's physical and behavioral characteristics.
- A term used to describe intelligence created by humans, often associated with machine learning.
- The study of genomes, which has applications in AI-driven preventive medicine.
- Adhering to rules, regulations, or standards, especially in data privacy and security.
- The quality of being open and honest, crucial in ethical AI development.
Down
- The branch of medicine concerned with the study and treatment of eye disorders.
- The introduction of new ideas, methods, or technologies.
- The process of converting information into a code to prevent unauthorized access.
- The ability to acquire and apply knowledge and skills, often simulated by AI systems.
- A rule or directive made and maintained by an authority, often to ensure ethical AI practices.
- The process of identifying a condition or disease, often enhanced by AI in healthcare.
- The science of diagnosing, treating, and preventing illness.
- Tailored specifically to an individual, especially in medicine or treatment.
- A set of rules or steps followed by computers to solve problems or perform tasks.
- Relating to moral principles or the branch of knowledge dealing with them.
- The act of forecasting or anticipating an event or outcome.
- A term associated with advanced computing that poses both opportunities and threats to cybersecurity.
20 Clues: The introduction of new ideas, methods, or technologies. • The act of forecasting or anticipating an event or outcome. • The science of diagnosing, treating, and preventing illness. • The quality of being open and honest, crucial in ethical AI development. • Relating to moral principles or the branch of knowledge dealing with them. • ...
Cybersecurity Terms and Definitions 2025-12-09
Across
- Connection between a computer and a modem on radio frequencies that allows accessing the internet without being connected to wires
- A website or program that allows users to talk with lots of people at once, like texting on the internet instead of the phone
- Code or software that can replicate itself, is usually sent through email attachments and can damage computers and hard drives
- Using the internet to send a copy of a file from one website, system, program, computer or device to another
- A program that runs on a computer
- Physical computer equipment and related machines and parts
- Software put on a computer to spy and collect and send information to cybercriminals
- An online record of all the websites a user visits and the emails a user sends, which can stay even after deleting their browser history and emails
- Letters and messages sent from one computer or device to another computer or device
- Malicious software or code used to steal information and damage devices
Down
- Software that tries to stop viruses or malware from attacking a computer or other device
- A small packet of software that lets a website or browser track users by storing some of their information, such as what clothing online shoppers like
- Anything done to protect computers, devices and software from cybercrimes
- Websites that allow users to post comments and have conversations with other users, for example, in online classes
- Playing games on the internet by oneself or with other players
- A security system usually made up of hardware and software that blocks hackers, viruses and other malicious threats from a computer
- Any illegal activity done on the internet
- The introductory page of a website
- Software or code that shows unwanted ads such as pop-ups on a device
- Any unwelcome and unwanted e-mail or junk mail, including repeated comments on another's post
- A type of cyberattack in which someone pretends to be a trustworthy person, website or organization to get victims to share their username, password or other personal information
- A camera built into or attached to a computer that can send video online
- The part of an internet address after the final period that identifies the type of organization using a website (e.g., .gov or .com)
- Harmful actions such as repeatedly making fun of and intimidating others online through email, texting, social media and even gaming apps
- Internet gamers who intentionally cause problems and/or cyberbully other gamers
25 Clues: A program that runs on a computer • The introductory page of a website • Any illegal activity done on the internet • Physical computer equipment and related machines and parts • Playing games on the internet by oneself or with other players • Software or code that shows unwanted ads such as pop-ups on a device • ...
Topic 7 - Development of Computer Industry and Law 2024-05-02
Across
- In Malaysia, a core legislation in governing the communications and multimedia industry is called
- What vendor is ranked first for the semiconductor industry in 2018
- Sector that handles communication on a global scale and create infrastructure that allows any type of data sending
- Computer system resources and services that can be accessed over the cloud
- Cyber law exists to handle cybersecurity and…
- Digital form of value that can be used as a token for transaction electronically
- The act of analyzing data, create conclusion about that information, and make a future prediction out of it is called
- Devices of information-age products are called
- Law that cover all internet-related technologies and provide a legal system for controlling it is called
- Hardware component that acts as the “brain” of a desktop computer, that could performs both arithmetic and operations, is called
Down
- Institution that is responsible for the abuse of telecommunicating services done by the industries in that certain sector is called
- In telecommunication industry, who manufacture and sell telecommunications equipment
- Design/infrastructure of information resource that can be navigated efficiently
- The process of protecting systems, data, and networks from cyber attacks is called
- In telecommunication industry, who operate and provide access to deliver services via internet
- Major segments of telecommunication industry besides equipment vendors and service providers
- The most important legislation that applies to telecoms (including internet)
- What is the leading computer manufacturing company that based in Taiwan
- What institution that serve as the telecommunications regulator in Malaysia
- Two of the most leading countries that controlled more than 80% of the semiconductor industry are U.S. and…
20 Clues: Cyber law exists to handle cybersecurity and… • Devices of information-age products are called • What vendor is ranked first for the semiconductor industry in 2018 • What is the leading computer manufacturing company that based in Taiwan • Computer system resources and services that can be accessed over the cloud • ...
GCSAM 2023 2023-07-10
Across
- A “tunnel” for private network browsing:
- The collection, use, sharing, storage, destruction, or processing of PI that is provided by an individual in connection with obtaining a product, service, or employment, including an individual’s choice on how their PI is used.
- Be client obsessed, champion our people, lead with integrity, own it, and win as one are examples of TIAA’s:
- What malware propagates without a host program?
- A _____ review is done quarterly to review privileged access.
- What is the most common attack vector for malware?
- TIAA’s ______ promotes a culture of inclusion, diversity and equity by connecting associates across diverse perspectives, wide-ranging talents and unique experiences.
- A targeted form of phishing that is customized for specific individuals within a specific organization.
- What does GCSAM stand for?
- Suspicious sender address, invalid branding, appealing to emotions, sense of urgency, invalid URL’s, request for sensitive data, spelling errors, requests to click links, and signatures are all __________ of phishing attempts.
Down
- Who founded TIAA?
- Malware that limits users access until a ransom is paid.
- A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.
- Who is the security awareness program’s mascot?
- What is TIAA’s social impact hashtag?
- Be the change by delivering lifetime income for all with investments that build a better world is TIAA’s:
- When somebody sends an e-mail with a link to a bogus website it is called:
- In 2021 TIAA cybersecurity expanded to become TIAA _____ cybersecurity.
- The probability of exposure or loss of assets is considered?
19 Clues: Who founded TIAA? • What does GCSAM stand for? • What is TIAA’s social impact hashtag? • A “tunnel” for private network browsing: • Who is the security awareness program’s mascot? • What malware propagates without a host program? • What is the most common attack vector for malware? • Malware that limits users access until a ransom is paid. • ...
Reasons why Singapore is Safe / Not Safe 2024-07-23
Across
- Public cooperation via [] like SGSecure.
- Advanced surveillance and cybersecurity[]
- Robust laws and proactive Internal [] Department
- [] platforms spreading extremist ideologies.
Down
- terrorist may target tourist hotspots
- Potential for reduced vigilance over time.
- [] to regional terrorist hotspots.
- Emphasis on racial and religious [] reduces radicalisation.
8 Clues: [] to regional terrorist hotspots. • terrorist may target tourist hotspots • Public cooperation via [] like SGSecure. • Advanced surveillance and cybersecurity[] • Potential for reduced vigilance over time. • [] platforms spreading extremist ideologies. • Robust laws and proactive Internal [] Department • Emphasis on racial and religious [] reduces radicalisation.
Future Jobs 2022-01-15
Across
- discontinue a job here and offer it in another country
- a specialist who’s an authority on something
- can continue for a long time
- a plan
- safety
- outdated and old-fashioned
Down
- someone who takes on gig work
- what we expect to happen in the future
- intelligence advanced computer software
- someone who starts a new company
- work temporary work on a specific project
- protecting systems, networks, and programs from digital attacks
12 Clues: a plan • safety • outdated and old-fashioned • can continue for a long time • someone who takes on gig work • someone who starts a new company • what we expect to happen in the future • intelligence advanced computer software • work temporary work on a specific project • a specialist who’s an authority on something • discontinue a job here and offer it in another country • ...
Big 8 Ideas of Cyber 2024-01-11
Across
- worth a great deal
- doing the right thing online
- Always conected world
- synonym for electronic
- a staemnt of intent to damage
Down
- keeping computers safe and sound
- imaginng what could go wrong and figuring out how to stop it
- the application of conceptual knowledge
- It's like the key to a magical fortress and how to build it
- navigating dangers online
- the big impact of cybersecurity choices
- keeping secerets safe online
12 Clues: worth a great deal • Always conected world • synonym for electronic • navigating dangers online • doing the right thing online • keeping secerets safe online • a staemnt of intent to damage • keeping computers safe and sound • the application of conceptual knowledge • the big impact of cybersecurity choices • It's like the key to a magical fortress and how to build it • ...
cybersicuritie eng briac 2024-03-13
Across
- A barrier against network threats
- Harmful software
- is a network of private computers that have been infected with malicious software and are controlled as a group without the owners' knowledge.
- Fixing software vulnerabilities
- Protection against online threats
- Leaking sensitive information have 1 space (_)
- Unauthorized access
Down
- Double security confirmation for login have 1 space (_)
- Online assault
- Weakness in security
- Tricking people to reveal private information
- Scrambling data to keep it secret
12 Clues: Online assault • Harmful software • Unauthorized access • Weakness in security • Fixing software vulnerabilities • A barrier against network threats • Scrambling data to keep it secret • Protection against online threats • Tricking people to reveal private information • Leaking sensitive information have 1 space (_) • Double security confirmation for login have 1 space (_) • ...
IO LA SO 2023-05-31
Across
- Truffa informatica via e-mail
- Programma di videoscrittura creato da Microsoft
- Il foglio di Excel è fatto di righe e ....
- Icona da cliccare per segnalare un sospetto phishing
- Non lasciare mai il tuo dispositivo aziendale....
- Programma di social networking aziendale
- Programma per fogli di calcolo
Down
- Sicurezza informatica (ingl.)
- Riunione organizzata attraverso la piattaforma Zoom
- Teams permette di lavorare e modificare ......files condivisi
- Strumento per realizzare presentazioni illustrate
- Programma di posta elettronica
12 Clues: Sicurezza informatica (ingl.) • Truffa informatica via e-mail • Programma di posta elettronica • Programma per fogli di calcolo • Programma di social networking aziendale • Il foglio di Excel è fatto di righe e .... • Programma di videoscrittura creato da Microsoft • Strumento per realizzare presentazioni illustrate • Non lasciare mai il tuo dispositivo aziendale.... • ...
AI in Cybersecurity 2025-10-20
Across
- – Permission to enter a system.
- – Short for Artificial Intelligence.
- – A crime AI can help detect.
- – Harmful software detected by AI.
- – To protect data by converting it into code.
- – What we do to teach AI models.
Down
- – Automated programs that can attack or protect systems.
- – What AI learns from.
- – The goal of cybersecurity.
- – A warning sent when AI detects a threat.
- – A common target for cyberattacks.
- – What hackers use to fool people.
12 Clues: – What AI learns from. • – The goal of cybersecurity. • – A crime AI can help detect. • – Permission to enter a system. • – What we do to teach AI models. • – Harmful software detected by AI. • – What hackers use to fool people. • – A common target for cyberattacks. • – Short for Artificial Intelligence. • – A warning sent when AI detects a threat. • ...
Cybersecurity/Web Design 2019-11-05
Across
- to scramble information so that it can be sent safely over the Internet
- Hacking’ - Testing a computer systems to find security vulnerabilities
- Audience
- is the branch of Computer Science that deals with online threats, how to keep data safe and preventing cybercrime (criminal activity carried out using a computer/computer networks)
- preferred way to present/layout digital material
- attack intended to direct a website’s traffic to another fake site by hacking a DNS server or redirecting the computer electronically.
- to help protect a computer network from unauthorised access
- reason for which the website has been created e.g. to entertain
Down
- Testing
- a secret word to unlock a device – must include numbers/special characters
- by reproducing itself or infecting other programs by modifying them.
- to use and understand
- a user is sent a fake email that looks like it is from a bank/business hoping to gather personal information.
- simple way to get passwords/PIN numbers by criminals standing behind you and watching.
14 Clues: Testing • Audience • to use and understand • preferred way to present/layout digital material • to help protect a computer network from unauthorised access • reason for which the website has been created e.g. to entertain • by reproducing itself or infecting other programs by modifying them. • Hacking’ - Testing a computer systems to find security vulnerabilities • ...
Cybersecurity Awareness Crossword 2025-08-27
Across
- when unauthorized access to data or a system is made (hacked)
- an mfa type that is related to something unique to you; ie- fingerprint, facial recognition, etc.
- uses more than one type of authentication to verify a user identity
- proves someone's identity; Rayburn Use for access into ERCOT MIS
- global network (web) of computers that are connected and can share information with each other
Down
- to check that something is correct
- malicious software that locks your files until a demanded payment is made
- malicious software
- stored in your browser to track users across websites and remember preferences; "Third-Party ___ "
- habits, practices, and procedures that individuals and organizations use to maintain their digital health and security
- "___ Trust"; a model where no one is trusted by default
- a software update
- malicious email, generally attempts to get you to click a link or download a malicious file
13 Clues: a software update • malicious software • to check that something is correct • "___ Trust"; a model where no one is trusted by default • when unauthorized access to data or a system is made (hacked) • proves someone's identity; Rayburn Use for access into ERCOT MIS • uses more than one type of authentication to verify a user identity • ...
Cybersecurity (year 09) 2022-12-12
Across
- people who are paid to legally hack into computer systems
- hackers who use tools downloaded from the internet that allow them to hack with little technical knowledge
- Manipulating people to get their personal information
- malware that collects info about the user and sends it back to criminals
Down
- type of malware that encrypts your data until you pay
- attack done by flooding a website with lots of requests
- attack where the criminal tries to maintain a conversation with the victim
- Law that looks after your data
- kind of access Computer Misuse Act protects from
- attacker watches their victim to get sensitive information
- an attack involving an email designed to look official
- malware that hides in legitimate software
- checks incoming and outgoing network traffic
13 Clues: Law that looks after your data • malware that hides in legitimate software • checks incoming and outgoing network traffic • kind of access Computer Misuse Act protects from • type of malware that encrypts your data until you pay • Manipulating people to get their personal information • an attack involving an email designed to look official • ...
day two - know your coworker 2022-03-27
Across
- shortest POV (__ minutes)
- POV?
- To which cybersecurity framework is Pentera mapped?
Down
- Morgan's end of night in Greece
- first of 2022
- Dor's favorite fruit
- How much RAM is needed for a Pentera RAN installation
- Maayan's second name
- One of Pentera's features
- Who said "Tenerife is great and dolphins are amazing but... Q1 isn't over yet!"
10 Clues: POV? • first of 2022 • Dor's favorite fruit • Maayan's second name • shortest POV (__ minutes) • One of Pentera's features • Morgan's end of night in Greece • To which cybersecurity framework is Pentera mapped? • How much RAM is needed for a Pentera RAN installation • Who said "Tenerife is great and dolphins are amazing but... Q1 isn't over yet!"
Technology 2024-03-18
Across
- Wireless technology for short-range communication.
- Security barrier for network traffic.
- Software that manages computer resources.
- Protection of computer systems from theft or damage.
Down
- Writing instructions for computers to execute.
- Measurement and analysis of unique physical characteristics.
- Software for accessing the internet.
- Global Positioning System for location tracking.
- This vast network connects computers worldwide.
- Artificial Intelligence Software
10 Clues: Artificial Intelligence Software • Software for accessing the internet. • Security barrier for network traffic. • Software that manages computer resources. • Writing instructions for computers to execute. • This vast network connects computers worldwide. • Global Positioning System for location tracking. • Wireless technology for short-range communication. • ...
byte trail 3 2025-03-05
Across
- Secures data by converting it to a coded form
- Software managing hardware and software resources
- Smallest unit of data in computing
- Storing data over the internet
- Device that connects multiple networks
Down
- Virtual representation of physical hardware
- High-level programming language
- Protecting data from unauthorized access
- A column in a table
- Set of vertices connected by edges
10 Clues: A column in a table • Storing data over the internet • High-level programming language • Set of vertices connected by edges • Smallest unit of data in computing • Device that connects multiple networks • Protecting data from unauthorized access • Virtual representation of physical hardware • Secures data by converting it to a coded form • ...
STEM Crossword 2025-08-19
Across
- – Creating new ideas, tools, or methods.
- Exploration – Study and travel beyond Earth.
- – Using math or computers to simulate real-world systems.
- – The study of the natural world.
- – Protecting digital information.
Down
- Energy – Energy from sun, wind, or water.
- – The language of STEM.
- – Applying science to make tools or systems.
- – Designing and building solutions.
- – Science, Technology, Engineering, and Mathematics.
10 Clues: – The language of STEM. • – The study of the natural world. • – Protecting digital information. • – Designing and building solutions. • – Creating new ideas, tools, or methods. • Energy – Energy from sun, wind, or water. • – Applying science to make tools or systems. • Exploration – Study and travel beyond Earth. • – Science, Technology, Engineering, and Mathematics. • ...
We Make IT Happen 2025-05-15
Across
- Programs that run on a computer
- A global system connecting computers
- Machine used for calculations and information
- A group of connected devices
- Organized collection of data
Down
- Physical parts of a computer
- Protection against online threats
- A person who writes computer code
- A step-by-step process used in computing
- Technology involving machines that do tasks
10 Clues: Physical parts of a computer • A group of connected devices • Organized collection of data • Programs that run on a computer • Protection against online threats • A person who writes computer code • A global system connecting computers • A step-by-step process used in computing • Technology involving machines that do tasks • Machine used for calculations and information
Internet Safety Crossword 2021-02-11
Across
- information information that can identify someone
- securing information on the internet
- can be trusted
- if something makes you feel sad or uncomfortable tell a _______ adult trusted
- software intended to do damage to computers
- someone who witnesses but doesn't participate
Down
- information about a person found online
- bullying using technology
- a person who stands up for someone else
- good manners online
- too much information
11 Clues: can be trusted • good manners online • too much information • bullying using technology • securing information on the internet • information about a person found online • a person who stands up for someone else • software intended to do damage to computers • someone who witnesses but doesn't participate • information information that can identify someone • ...
Safety & Risk Awareness Month 2025-10-12
Across
- Adhering to rules and regulations.
- A scam email pretending to be legitimate.
- Process of identifying potential hazards.
- Digitally altered video.
- Protecting systems from online threats.
- Understanding potential risks.
- Valuable digital information.
Down
- Word or phrase used to access systems
- Screenings to monitor health & well-being.
- Checklist Ensures a safe remote work environment.
- The state of being informed and alert.
- Possibility of loss or harm.
- A proactive measure to prevent incidents.
- Formal review to ensure standards are met.
- Keeping sensitive data safe from exposure.
- Measures taken to avoid danger or harm.
16 Clues: Digitally altered video. • Possibility of loss or harm. • Valuable digital information. • Understanding potential risks. • Adhering to rules and regulations. • Word or phrase used to access systems • The state of being informed and alert. • Protecting systems from online threats. • Measures taken to avoid danger or harm. • A scam email pretending to be legitimate. • ...
Cybersecurity Unit 2 Terminology 2022-09-13
Across
- A machine that requests a webpage using a web browser.
- A Wireshark data capture file that contains packet information of network traffic.
- A network interface card is a physical component on a computer or device that provides connectivity to a network.
- In network security, it allows or denies packets based on source and destinations addresses, ports, or protocols.
- The arrangement of the various elements (computers,routers, switches, etc) of a network.
- A (distributed) denial of service attack that targets websites and web servers with the intention of bringing the services they provide to a halt.
- Transmission Control Protocol used to establish and maintain connections over a computer network.
- An agreed-upon method for communication.
- A code that defines every structure on an HTML page, such as text, images, and links. HTML tags begin with the less-than (<) character and end with greater-than (>) .
- An operating system similar in concept to the Windows OS but used more often to host routers and web servers.
- Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it.
- A part of a process or system that is seen by the user and typically provides functionality to the user.
- A small local area network of computers and devices.
- A piece of software or a sequence of commands that takes advantage of a vulnerability in a computer system to cause unexpected behavior to occur.
- A machine that responds to a request received.
- An identifying number for hosts and servers on the internet.
- The buying and selling of goods or services over the internet.
- it helps the reader of the program understand the code, especially when working on code with other people.
- A way for a computer to identify specific programs and manage their activity.
- When hackers can use their knowledge of a web server's directory structure to craft URL addresses and navigate to locations that are unreferenced and unlinked in a website.
- A file that contains an official record of activities that occur on a computer.
- A computer, typically one on a network.
- Preserving the accuracy of information and validating its source.
- A database in which data is organized into collections of similar data, called tables. It uses relationships to define how data in one table can relate to data in another table.
- A computer that delivers files forming web pages across a network to requesting clients.
- Problems, faults, and bugs in the program that are exploitable, allowing attackers access to the computer on which the program is running.
- A starting point for data analysis. It is the initial data set used in later comparisons.
- In a command, they are used to specify different variations, sometimes supplying additional input to the command or requesting different styles of output from the command.
Down
- Ensuring that information resources and services are accessible in a timely manner.
- Keeping sensitive information out of unwanted hands.
- Performing a computer attack to evaluate the security of a
- It can have two meanings in computer terminology:a) it can be a specific application or function such as email, chat, etc. b) it can refer to a specific part of an application, such as transmitting the data of a webpage
- Software that replicates and infects many computers, turning the computer into a "zombie". Zombie devices are remotely controlled by an attacker for malicious purposes.
- The way an organization structures and organizes the information that is required by their employees and/or customers.
- system The hardware and software used to help organize and analyze data.
- Analyze something without interfering or affecting it.
- Refers to the action of watching and analyzing network traffic at the packet level.
- A type of exploit in which the attacker inserts malicious client-side code into webpages to steal data, take control of a computer, run malicious code, or achieve a phishing scam.
- A computer, typically one on a network. It can also be referred to as a machine or a system.
- In terms of computer science, it means to increase a system's security and reduce its vulnerabilities.
- Reverse the encryption process, making the data human-readable again.
- system. The extra digits are represented by the letters a through f, so all digits in hex are 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f. You can also see hex numbers in all capitals A through F.
- A three-way communication method using SYN (synchronize), SYN-ACK (synchronize=acknowledge), and ACK (acknowledge) to establishing a connection between
- They are best known for developing standards in the computer and electronics industries.
- A human-based attack in which the malicious user intercepts communication between the victim's computer and the internet.
- Data that is stored in a router in table format. It contains addresses of known networks (other routers), ones that have already been discovered and used.
- The Organizationally Unique Identifier is the first half of the MAC address, designating the manufacturer of the network device.
- It is a very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden, allowing the user to focus on the details that are important for the task at hand.
- Transport Layer Security is a security protocol that uses encryption at a lower level of abstraction.
- Software and hardware that track all keyboard clicks, including back spaces, to discover usernames, passwords, credit card numbers, and other sensitive information.
- Software running with elevated privileges to control a computer or to gain access to restricted accounts and data.
- A network device that controls and filters data between networks, either wired or wireless. It is a specific type of "gateway", a device that acts as a gate between two networks.
- A media access control (MAC) addresses is unique numeric code that is assigned to networking hardware components (typically a network interface card or NIC) that is built into computers and mobile devices. The code is assigned by the manufacturer, includes their unique identification number, and never changes.
- Often referred to as hex, it is a base-16
- The acronym for "Uniform Resource Locator". The systematic way to find specific web addresses and web pages.
- A note in a program that describes what the code is doing. Adding them is very good programming practice,
- A part of a process or system that is not seen by the user. It provides a supporting function on behalf of the main process.
- Small units of data, transmitted on a network. Collected together, they compose some larger data, such as a document, a website, a movie, etc.
58 Clues: A computer, typically one on a network. • An agreed-upon method for communication. • Often referred to as hex, it is a base-16 • A machine that responds to a request received. • Keeping sensitive information out of unwanted hands. • A small local area network of computers and devices. • A machine that requests a webpage using a web browser. • ...
Cybersecurity Unit 2 Terminology 2022-09-15
Across
- The way an organization structures and organizes the information that is required by their employees and/or customers.
- Performing a computer attack to evaluate the security of a system.
- A computer typically one on a network.
- An agreed-upon method for communication.
- A file that contains an official record of activities that occur on a computer.
- The acronym for "Uniform Resource Locator". The systematic way to find specific web addresses and web pages.
- A human-based attack in which the malicious user intercepts communication between the victim's computer and the internet.
- It is a very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden allowing the user to focus on the details that are important for the task at hand.
- A way for a computer to identify specific programs and manage their activity.
- Preserving the accuracy of information and validating its source.
- A network device that controls and filters data between networks either wired or wireless. It is a specific type of "gateway" a device that acts as a gate between two networks.
- A piece of software or a sequence of commands that takes advantage of a vulnerability in a computer system to cause unexpected behavior to occur.
- Transmission Control Protocol used to establish and maintain connections over a computer network.
- Refers to the action of watching and analyzing network traffic at the packet level.
- An identifying number for hosts and servers on the internet.
- Software running with elevated privileges to control a computer or to gain access to restricted accounts and data.
- It can have two meanings in computer terminology: a) it can be a specific application or function such as email chat etc. b) it can refer to a specific part of an application such as transmitting the data of a web page
- Keeping sensitive information out of unwanted hands.
- A type of exploit in which the attacker inserts malicious client-side code into webpages to steal data take control of a computer run malicious code or achieve a phishing scam.
- In a command flags are used to specify different variations sometimes supplying additional input to the command or requesting different styles of output from the command.
- Often referred to as hex it is a base-16 number system.
- Problems faults and bugs in the program that are exploitable allowing attackers access to the computer on which the program is running.
- A database in which data is organized into collections of similar data called tables. It uses relationships to define how data in one table can relate to data in another table.
- In network security it allows or denies packets based on source and destinations addresses ports or protocols.
- baseline A starting point for data analysis. It is the initial data set used in later comparisons.
- Ensuring that information resources and services are accessible in a timely manner.
- Analyze something without interfering or affecting it.
Down
- The arrangement of the various elements (computers routers switches etc) of a network.
- Small units of data transmitted on a network. Collected together they compose some larger data such as a document a website a movie etc.
- Software that locks your computer or makes it inoperable requiring you to pay someone to remove it.
- Software that replicates and infects many computers turning the computer into a "zombie". Zombie devices are remotely controlled by an attacker for malicious purposes.
- The hardware and software used to help organize and analyze data.
- A code that defines every structure on an HTML page such as text images and links.
- A (distributed) denial of service attack that targets websites and web servers with the intention of bringing the services they provide to a halt.
- Data that is stored in a router in table format. It contains addresses of known networks (other routers) ones that have already been discovered and used.
- When hackers can use their knowledge of a web server's directory structure to craft URL addresses and navigate to locations that are unreferenced and unlinked in a website.
- A Wireshark data capture file that contains packet information of network traffic.
- Transport Layer Security is a security protocol that uses encryption at a lower level of abstraction.
- In terms of computer science it means to increase a systems security and reduce its vulnerabilities.
- A machine that requests a webpage using a web browser.
- A machine that responds to a request received.
- A computer that delivers files forming web pages across a network to requesting clients.
- The buying and selling of goods or services over the internet.
- A note in a program that describes what the code is doing.
- A computer typically one on a network.
- Software and hardware that track all keyboard clicks including back spaces to discover usernames passwords credit card numbers and other sensitive information.
- A three-way communication method using SYN (synchronize) SYN-ACK (synchronize=acknowledge) and ACK (acknowledge) to establishing a connection between hosts.
- A small local area network of computers and devices.
- An operating system similar in concept to the Windows OS but used more often to host routers and web servers.
49 Clues: A computer typically one on a network. • A computer typically one on a network. • An agreed-upon method for communication. • A machine that responds to a request received. • Keeping sensitive information out of unwanted hands. • A small local area network of computers and devices. • A machine that requests a webpage using a web browser. • ...
Cybersecurity Crossword Puzzle - MP 2023-01-27
Across
- transforms plaintext into ciphertext
- key used to decrypt
- trap for cyber criminals
- unsolicited emails
- tricked into clicking
- intrusive computer software
- key to encrypt and decrypt
- helps prevent hackers and viruses
- hidden horse surprise
- malware that collects personal data
- hides users location
Down
- unwanted pop up ads
- used to detect viruses network
- program that allows remote access
- person who harms your computer
- protects data by scrambling it
- error on software
- malware that reproduces itself
- ethical hacker
- form of internet communication
- peripherals connected as one entity.
21 Clues: ethical hacker • error on software • unsolicited emails • unwanted pop up ads • key used to decrypt • hides users location • tricked into clicking • hidden horse surprise • trap for cyber criminals • key to encrypt and decrypt • intrusive computer software • used to detect viruses network • person who harms your computer • protects data by scrambling it • malware that reproduces itself • ...
Cybersecurity Month - October 2023 2023-05-19
Across
- TRSL's IT team stays on top of this so don't you fall for it either
- Not gonna fry up anything with this catch
- out to get you and your information
- always best to use your own instead of a public or free charging station
- If public, not the best connection for work-related tasks or any sensitive and/or personal info
- malicious software that can infiltrate a network(s)
- I can be dangerous so don't open me unless you know I'm safe
- If you don't know the source, do not ____ the data.
- hacker operating in cyberspace
- Being alert to avoid potential dangers or risks
- If you get a __ ___from someone you don't know, no response is best of all
- scammers can give you a ring too
Down
- Scammers use this trick to redirect your browser
- Your fingers do the talking but don't fall for this threat
- Leave it this section to handle your PC needs, please.
- when a "big fish" is targeted
- An ___ ___ calls at 3 am with a fraud alert from your bank. Hang up and call your bank directly, ASAP.
- FortiToken or Google
- Instead of just a single word, this is also great for a great password
- I should be unique and not reused
- If something seems too good to be true, you should feel this way.
- always do this when stepping away from your PC
- use this to type in the URL
- share carefully on these profiles
- method of communication in lieu of "snail mail"
25 Clues: FortiToken or Google • use this to type in the URL • when a "big fish" is targeted • hacker operating in cyberspace • scammers can give you a ring too • I should be unique and not reused • share carefully on these profiles • out to get you and your information • Not gonna fry up anything with this catch • always do this when stepping away from your PC • ...
CIS178 Cybersecurity Crossword Puzzle 2023-07-26
Across
- people bullying others online
- software that destroys information on your computer
- someone who attempts to get your information
- detection to shield against viruses
- software that hackers use to spy on you
- someone is tricked on clicking on an object
- software that hijacks your system and wants money
- malware that spreads to devices and slows down everything
- software to keep intruders out
- two or more computers connected together
- hackers change an IP address to seem real
Down
- multiple steps to access your account
- series of numbers that allow devices to connect to the internet
- owners permission to hack into their network
- connecting computers on a private network
- a scam that seems real
- hacker breaking into your computer data
- computers that are connected as one entity
- password to access your device
- a type of storage for your information
20 Clues: a scam that seems real • people bullying others online • password to access your device • software to keep intruders out • detection to shield against viruses • multiple steps to access your account • a type of storage for your information • software that hackers use to spy on you • hacker breaking into your computer data • two or more computers connected together • ...
MAHIM SIKDER-Cybersecurity Crossword 2023-09-07
Across
- a client/server protocol that automatically provides an IP host with its IP address, subnet mask and default gateway.
- a process that verifies a user's identity and ensures that they have authorization, before providing them with access to information.
- a copy of data that is used if original data is unavailable.
- a scheme that takes money or other valuables from an unsuspecting victim.
- a process in which data is converted to code, in order to prevent unauthorized access.
- a malware that denies users access to their files. The attacker demands money from the user, in order for them to get their information back.
- process of copying data from the internet to your computer.
- a communication method that electronic devices use to deliver and receive messages electronically.
- software that hackers use to steal data,damage or destroy computers/computer systems.
Down
- protection of networks,data and devices from criminal use.
- a software used to detect and destroy viruses.
- A number used to track someones financial information.(EVERYONE GETS THIS NUMBER AT BIRTH).
- this word is short for organization(s) that provides access to the Internet.
- string of characters used to access authorization.
- a set of instructions, data or programs used by computers to operate and execute specific tasks.
- known as the address of a web page.
- a system that changes domain name into IP-addresses.
- advertisement that promote product or services to the user. Sometimes this can lead to malicious websites.
- a device that connects two or more packet-switched networks. Uses ip-Addresses.
- authentication method that requires the user to provide more than one verification information.
20 Clues: known as the address of a web page. • a software used to detect and destroy viruses. • string of characters used to access authorization. • a system that changes domain name into IP-addresses. • protection of networks,data and devices from criminal use. • process of copying data from the internet to your computer. • ...
Cybersecurity Awareness Month Crossword 2023-09-27
Across
- A process or measure used to verify a user's identity.
- A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
- Software that compromises the operation of a system by performing an unauthorized function or process.
- Converting Data into a form that cannot be easily understood by unauthorized people.
- A flaw or weakness in an information system that could be exploited.
- A string of characters used to authenticate an identity.
- Extra copies of computer files that can be used to restore files that are lost or damaged.
- A mechanism for creating a secure connection between a computing device and a computer network
- A type of malware that denies a user's access to a system or data until a sum of money is paid.
- A collection of computers compromised by malicious code and controlled across a network.
- Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
Down
- The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization
- The ability of individuals to understand and exercise control over how information about themselves may be used by others.
- Software designed to block malware from entering protected networks.
- Faking the sending address of a transmission to gain illegal entry into a secure system.
- Part of the Internet that isn't indexed by search engines.
- An unauthorized user who attempts to or gains access to an information system.
- an individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- Computer programs that can block, detect, and remove viruses and other malware.
- A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
- A cybersecurity risk that originates from within an organization.
- The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
- Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
- Unsolicited emails sent to many addresses.
24 Clues: Unsolicited emails sent to many addresses. • A process or measure used to verify a user's identity. • A string of characters used to authenticate an identity. • Part of the Internet that isn't indexed by search engines. • A cybersecurity risk that originates from within an organization. • Software designed to block malware from entering protected networks. • ...
Kisner Wedding 2025-04-01
Across
- Our dog's name
- Name of our church
- What we're doing for our honeymoon
- Furthers we've traveled together
- Our favorite video game
- Said "I love you" first
- Number of years together
- Nickname Ryan calls Elissa
- Elissa's job title
- Elissa's birth month
Down
- Name of the hike where they got lost
- Ryan's birth month
- Artist we listen to together most often
- Instrument Elissa played in school
- Where we made our wedding bands
- Where Ryan proposed
- Ryan's eye color
- Elissa's second middle name
- Favorite Carlisle ice cream spot
- Street we live on
- Ryan's bachelor's degree
- The bigger foodie
- Our favorite food to eat together
- Ryan's favorite sports team
- Our first dance song
25 Clues: Our dog's name • Ryan's eye color • Street we live on • The bigger foodie • Ryan's birth month • Name of our church • Elissa's job title • Where Ryan proposed • Our first dance song • Elissa's birth month • Our favorite video game • Said "I love you" first • Ryan's bachelor's degree • Number of years together • Nickname Ryan calls Elissa • Elissa's second middle name • ...
TTS INFORMATIKA (Dara Cantika Dinsky X-G) 2025-04-10
Across
- itu merek dagang
- yang di Maksud hak cipta
- konten digital berunsur budaya?
- Konsekuensi konten negatif?
- Konsekuensi pelanggaran HAKI
- Tujuan validasi konten negatif?
- Tugas cybersecurity engineer?
- itu ranking?
- fungsi utama search engine?.
- penting unsur budaya dalam konten digital?
- untuk diseminasi konten budaya?
- itu konten negatif
- Tugas web developer?
- tugas programer
Down
- manfaat pendaftaran HAKI
- itu crawling?
- diseminasi konten budaya?
- Tugas database administrator?
- itu paten
- itu indexing
- Tugas data scientist?
- Tantangan validasi konten negatif?
- search engine?
- Metode validasi konten negatif?
- menghindari pelanggaran budaya?
25 Clues: itu paten • itu indexing • itu ranking? • itu crawling? • search engine? • tugas programer • itu merek dagang • itu konten negatif • Tugas web developer? • Tugas data scientist? • manfaat pendaftaran HAKI • yang di Maksud hak cipta • diseminasi konten budaya? • Konsekuensi konten negatif? • Konsekuensi pelanggaran HAKI • fungsi utama search engine?. • Tugas database administrator? • ...
Cybersecurity - LMC Style 2022-10-11
Across
- Malicious software
- ___ Engineering. Hackers us this skill to trick people into revealing private information .
- Software that collects data about a user and transmits it over the internet without the user’s knowledge/permission.
- A technology used when working remote that secures information going to/from LMC’s servers.
- Software Usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.
- A technology that allows us to access our files through the internet from anywhere in the world. Hint: it also brings rain.
- A group of computers, printers and devices that are interconnected.
Down
- A system that relies upon encryption techniques rather than banks to regulate the generation of units of currency and verify the transfer of funds.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- A process of encoding messages to keep them secret, so only “authorized” parties can read it.
- Who do you call for help?
- A sequence of words (spaces and punctuation too) used for authentication.
- Piece of code that replicates itself in order to spread the infection to other connected computers.
13 Clues: Malicious software • Who do you call for help? • A group of computers, printers and devices that are interconnected. • A sequence of words (spaces and punctuation too) used for authentication. • ___ Engineering. Hackers us this skill to trick people into revealing private information . • ...
Cybersecurity (year 09) 2022-12-12
Across
- an attack involving an email designed to look official
- people who are paid to legally hack into computer systems
- malware that collects info about the user and sends it back to criminals
- Manipulating people to get their personal information
- attacker watches their victim to get sensitive information
- malware that hides in legitimate software
Down
- hackers who use tools downloaded from the internet that allow them to hack with little technical knowledge
- attack where the criminal tries to maintain a conversation with the victim
- kind of access Computer Misuse Act protects from
- Law that looks after your data
- type of malware that encrypts your data until you pay
- checks incoming and outgoing network traffic
- attack done by flooding a website with lots of requests
13 Clues: Law that looks after your data • malware that hides in legitimate software • checks incoming and outgoing network traffic • kind of access Computer Misuse Act protects from • type of malware that encrypts your data until you pay • Manipulating people to get their personal information • an attack involving an email designed to look official • ...
CyberSecurity Month Crossword 2024-10-10
Across
- You should install this on your computer to detect and remove malicious software
- The process of proving your identity with a username and password
- Software that is designed to disrupt, damage, or gain unauthorized access to your computer
- ___________ backup - A way to protect important files by saving copies offsite or in the cloud
- A set of rules created to ensure security, such as not reusing passwords
Down
- Emails pretending to be from legitimate sources to steal personal info
- This type of "attack" involves tricking people into giving away personal information
- "Public ________ should not be used for sensitive tasks like banking."
- A software designed to protect against malicious software
- A security measure that sends a code to your phone to verify your login
- “_______ encryption” - Technology that scrambles data so it can only be read by authorized users
- What you should never share with others, even if they seem trustworthy
- A strong, unique _______ should be used for each account
- An attack where hackers encrypt your data and demand money to unlock it
- "_____ your devices regularly" - Important action to prevent unauthorized access
15 Clues: A strong, unique _______ should be used for each account • A software designed to protect against malicious software • The process of proving your identity with a username and password • Emails pretending to be from legitimate sources to steal personal info • "Public ________ should not be used for sensitive tasks like banking." • ...
CS Month Week 2 2023-09-14
Across
- _______ Control: The practice of restricting access to resources based on user roles and permissions to prevent unauthorized access.
- Cybersecurity _______:A structured approach that defines guidelines and best practices for securing information systems.
- _______ Response: A planned approach to managing and mitigating the impact of a cybersecurity incident.
- _______ of Service: An attack that overwhelms a system, network, or website with excessive traffic, rendering it inaccessible.
- The process of verifying the identity of a user, system, or device to grant access to resources.
Down
- ______ Breach: Unauthorized access, acquisition, or disclosure of sensitive data, often involving large amounts of personal or confidential information.
- _______Testing: Ethical hacking conducted to identify vulnerabilities and assess the security of a system or network
- Malware that encrypts a victim’s data and demands payment (ransom) for its decryption.
8 Clues: Malware that encrypts a victim’s data and demands payment (ransom) for its decryption. • The process of verifying the identity of a user, system, or device to grant access to resources. • _______ Response: A planned approach to managing and mitigating the impact of a cybersecurity incident. • ...
Telecom Olympics 2021 2021-05-04
Across
- Network security system used to stop unauthorized access
- Someone who seeks to exploit weaknesses in a network
- Making copies of data
- Tech Support Company
- Communications over a distance
- Don't open ____ from people you don't know
- Use ____ passwords
Down
- What is a CDR?
- A piece of code that is capable of destroying data
- The capacity of a telecom line to carry signals
- The activity of defrauding by posting as a legitimate business
- NIST involves strategies for ____
- Board President
13 Clues: What is a CDR? • Board President • Use ____ passwords • Tech Support Company • Making copies of data • Communications over a distance • NIST involves strategies for ____ • Don't open ____ from people you don't know • The capacity of a telecom line to carry signals • A piece of code that is capable of destroying data • Someone who seeks to exploit weaknesses in a network • ...
Office of Performance Management and Internal Controls 2021-03-05
Across
- Intentional deceptive action
- Periodic comparison of source documents
- Office directed by Lt. Col. Terry
- Last name of OPMIC Information Security Officer
- Training due April 15th by all employees
Down
- Synonym for bloom, blossom and singing birds
- Control working in less than optimal condition
- Reduces the risk of error and inefficiency
- Acronym for Information Security Officer
- Complete acronym for internal control standards
- Last name of Internal Audit Manager
- The end toward which effort is directed
- Evaluation document with code of ethics
13 Clues: Intentional deceptive action • Office directed by Lt. Col. Terry • Last name of Internal Audit Manager • Periodic comparison of source documents • The end toward which effort is directed • Evaluation document with code of ethics • Acronym for Information Security Officer • Training due April 15th by all employees • Reduces the risk of error and inefficiency • ...
August Crossword Puzzle 2024-08-18
Across
- Hero of a movie-turned-musical playing at the Kennedy Center
- Spielberg blockbuster approaching its 50th anniversary
- environmental certification for buildings
- site of the 2024 Olympics
- ___ Sullivan, 14-year-old signed with the Major Soccer League
- new Academic Dean
- ____ Richard, transgender tennis player
Down
- recently infamous cybersecurity company
- students may go to France, for instance (acronym)
- Chamber Chorus trip location
- controversial location for Olympic open-course swimming
- Charlie xcx album associated with the Harris campaign
- new Democratic presidential candidate
13 Clues: new Academic Dean • site of the 2024 Olympics • Chamber Chorus trip location • new Democratic presidential candidate • recently infamous cybersecurity company • ____ Richard, transgender tennis player • environmental certification for buildings • students may go to France, for instance (acronym) • Charlie xcx album associated with the Harris campaign • ...
Elicia's Birthday Crossword 2023-05-04
Across
- the college Elicia is going to
- how many siblings does Elicia have
- career path Elicia wants to enter
- the month Elicia was born
- a birthday dessert
- an instrument Elicia plays
- author of Elicia's favourite books
Down
- how old is elicia turning
- the colour of Elicia's room
- the day of the week Elicia on which was born
- how does elicia take her coffee
- the genre of music Elicia listens to most
12 Clues: a birthday dessert • how old is elicia turning • the month Elicia was born • an instrument Elicia plays • the colour of Elicia's room • the college Elicia is going to • how does elicia take her coffee • career path Elicia wants to enter • how many siblings does Elicia have • author of Elicia's favourite books • the genre of music Elicia listens to most • ...
Banking and SCM 2025-05-16
Across
- Loan charge or bank account earnings
- the person or business that provides goods
- Charges for services or tuition payments
- end user of a product
- the business that sells goods in small quantity
- integrating technology into financial services
- the total amount of goods in stock
Down
- Corporate Purchasing
- online Protection against hackers
- Managing and planning the flow of goods
- put money in business
- Handy, suitable and easy to use
12 Clues: Corporate Purchasing • end user of a product • put money in business • Handy, suitable and easy to use • online Protection against hackers • the total amount of goods in stock • Loan charge or bank account earnings • Managing and planning the flow of goods • Charges for services or tuition payments • the person or business that provides goods • ...
Malachi 2024-12-02
9 Clues: My max squat • What I value • My backup plan • The sport I play • A qoute I live by • What I´m interested in • what i value in a friend • What i do on my free time • what i´d like to major and study for the rest of my life
Computer science 2025-11-06
Across
- machine that can learn and think
- programs that make computer useful
- the language programmers use
- informations and analysed
- protecting data from online threats
- the process of creating and improving software
Down
- a machine that process data and performs tasks
- step-by-step problem solving
- the tools and systems built using science
9 Clues: informations and analysed • the language programmers use • step-by-step problem solving • machine that can learn and think • programs that make computer useful • protecting data from online threats • the tools and systems built using science • a machine that process data and performs tasks • the process of creating and improving software
Testdf puzzlesd 2022-08-15
Across
- A string of words used to gain access to system or service which is easier to remember than a random combination of symbols and letters
- Use this feature in Outlook to report all suspicious email at work
- The act of having the content or recipient address(es) of a previously legitimate delivered email (with an attachment or link) replaced with a malicious version
- Cyberattacks can be targeted at anyone in the organisation. Who is responsible for Cybersecurity in your organisation?
- The Cybersecurity Awareness month occurs in <month>
Down
- A technique to manipulate a person to gain unauthorised access to a system or network and steal sensitive data or disperse malware
- Use this to make your passphrase harder to crack
- Authentication method identifying individuals based on their physical features
- You received an email with a suspicious link, attachment or with misspelling. What could this email be attempting to do?
- A malicious software that can infect your computer resulting in data theft and intrusion of your organisation
10 Clues: Use this to make your passphrase harder to crack • The Cybersecurity Awareness month occurs in <month> • Use this feature in Outlook to report all suspicious email at work • Authentication method identifying individuals based on their physical features • ...
IT Vocabulary 2022-05-04
Across
- a type of social engineering attack often used to steal user data including login credentials and credit card numbers
- device that uses integrated circuit assemblies to store data persistently, typically using flash memory
- responsible for an organization’s overarching cybersecurity, which can include prevention, incident response (IR), compliance, and risk management.
- use a computer to gain unauthorized access to data in a system
- a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker
Down
- one kind of technology that stores the operating system, applications, and data files
- also referred to as junk email
- a set of computers sharing resources located together.
- attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic utilizing multiple compromised systems
- a group of information security experts responsible for the protection against, detection of and response to an organization's cybersecurity incidents.
10 Clues: also referred to as junk email • a set of computers sharing resources located together. • use a computer to gain unauthorized access to data in a system • one kind of technology that stores the operating system, applications, and data files • device that uses integrated circuit assemblies to store data persistently, typically using flash memory • ...
Super Secret Security Crossword Puzzle 2024-05-31
Across
- itelligence exhibited by machines, particularly computer systems.
- one or more locations from which network monitoring and control, or network management, is exercised over a computer, telecommunication or satellite network.
- a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- "gift" or "present" in Arabic.
- a team of experts that proactively monitor and respond to cybersecurity incidents.
- a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
Down
- the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change.
- an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
- a physical or logical sub-network that separates an internal local area network (LAN) from other untrusted networks, usually the Internet.
- a technique through which a cybercriminal disguises themselves as a known or trusted source.
10 Clues: "gift" or "present" in Arabic. • itelligence exhibited by machines, particularly computer systems. • a team of experts that proactively monitor and respond to cybersecurity incidents. • a technique through which a cybercriminal disguises themselves as a known or trusted source. • ...
Project Three Part Two 2021-10-15
Across
- Cyber ___ refers to fundamental cybersecurity best practices that an organization's security practitioners and users can undertake.
- a kind of bullying or harassment that takes place via the internet.
- The skill of writing and solving codes, or the study of codes.
- a structure or scheme consisting of a set of algorithms that converts plaintext to the ciphertext to encode or decode messages securely.
- cryptography is the study of ___ communications mechanisms that restrict access to a message's contents to just the sender and intended receiver.
- a digital certificate is a ___ or electronic password that uses cryptography and the public key infrastructure to authenticate the validity of a device, server, or user.digital Certificate
Down
- Cyberstalking is the use of the ____ or other electronic means to stalk or harass an individual, group, or organization.
- the technique of defending vital systems and sensitive data against cyber-attacks.
- any hostile operation aimed at computer information systems, computer networks, infrastructures, or personal computers.
- A person in an existing photograph or video is replaced with someone else's likeness in synthetic media.
10 Clues: The skill of writing and solving codes, or the study of codes. • a kind of bullying or harassment that takes place via the internet. • the technique of defending vital systems and sensitive data against cyber-attacks. • A person in an existing photograph or video is replaced with someone else's likeness in synthetic media. • ...
LETERASI KINANSIAL 2025-11-13
Across
- technologi finansial
- interaksi digital untuk menjaga data pribadi
- uang yang disisihkan untuk masa depan
- perdagangan yang memanfaatkan teknologi informasi dan komunikasi di abad ke-21
- mengelola uang dan mengambil keputusan keuangan yang bijak
- penanaman keuntungan di masa depan
- lembaga yanga mengelola pasar modal
- alat tukar yang sah
- lembaga keuangan bukan bank
Down
- dokumen sebagai bukti simpanan di bank
- internasi sosial
- kemudahan mendapat berita dimana saja kapan saja
- sikap yang perlu di hindari dalam mengelola uang
- daftar pengeluaran dan pemasukan dan pemasukan keuangan
- tantangan dalam transaksi digital
- pembayaran non-tunai menggunakan app di ponsel
- tempat jual beli daring
- berinteraksi menggunakan tenologi digital
- pembayaran memindai kode untuk transaksi
- lembaga keuangan yang menerima simpanan
20 Clues: internasi sosial • alat tukar yang sah • technologi finansial • tempat jual beli daring • lembaga keuangan bukan bank • tantangan dalam transaksi digital • penanaman keuntungan di masa depan • lembaga yanga mengelola pasar modal • uang yang disisihkan untuk masa depan • dokumen sebagai bukti simpanan di bank • lembaga keuangan yang menerima simpanan • ...
Harris 20th Anniversary 2022-10-14
Across
- What sport/activity does Chris play
- Where did Melissa grow up?
- Where did they live when they got married?
- What is the Harris family dogs name?
- What volcano did the Harris family climb in Hawaii?
- Who is Melissa's favorite singer?
- Where did they Chris & Melissa get married?
Down
- What is Chris' profession?
- What are Chris & Melissa's kids middle
- Who is Chris' favorite rapper?
- What cruise line did they sail on when they
- married?
12 Clues: married? • What is Chris' profession? • Where did Melissa grow up? • Who is Chris' favorite rapper? • Who is Melissa's favorite singer? • What sport/activity does Chris play • What is the Harris family dogs name? • What are Chris & Melissa's kids middle • Where did they live when they got married? • What cruise line did they sail on when they • ...
CRACCon2024 2023-12-25
7 Clues: Stolen data • You like to play • Pay to get your data • The popular buzzword • Get paid for hunting bugs • What do you want to learn? • poses as a legitimate sender
technology 2025-05-14
Across
- Fifth-generation mobile network technology
- Distributed ledger technology for cryptocurrencies
- Electric car company founded by Elon Musk
- Internet-based computing service model
- Network of interconnected smart devices
Down
- World’s largest search engine
- Technology protecting networks from attacks
- Computer system mimicking human intelligence
8 Clues: World’s largest search engine • Internet-based computing service model • Network of interconnected smart devices • Electric car company founded by Elon Musk • Fifth-generation mobile network technology • Technology protecting networks from attacks • Computer system mimicking human intelligence • Distributed ledger technology for cryptocurrencies
Cyber Security Awareness 2023-03-04
Across
- Using encryption and other security technologies to protect online activities and prevent unauthorized access to sensitive information.
- A common form of social engineering that involves sending fraudulent emails or messages in order to steal information or spread malware.
- The practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
- A mindset and set of behaviors that prioritize cybersecurity and make it a fundamental part of organizational culture.
- Policies and procedures for safeguarding sensitive data and ensuring its confidentiality, integrity, and availability.
- The process of identifying, assessing, and mitigating cyber risks in order to protect against cyber attacks.
Down
- Tools and techniques for detecting and removing malicious software, including viruses, worms, and Trojans.
- A targeted form of phishing that involves customized messages designed to deceive a specific individual or group.
- Strategies for creating strong, unique passwords and protecting them from unauthorized access.
- Techniques used by cybercriminals to manipulate individuals into revealing sensitive information or taking harmful actions.
- Best practices for keeping digital devices and online accounts clean and secure.
- Best practices for staying safe while browsing the internet, including avoiding risky websites and downloading files from trusted sources.
12 Clues: Best practices for keeping digital devices and online accounts clean and secure. • Strategies for creating strong, unique passwords and protecting them from unauthorized access. • Tools and techniques for detecting and removing malicious software, including viruses, worms, and Trojans. • ...
example 2023-07-06
Across
- A “tunnel” for private network browsing:
- The collection, use, sharing, storage, destruction, or processing of PI that is provided by an individual in connection with obtaining a product, service, or employment, including an individual’s choice on how their PI is used.
- Be client obsessed, champion our people, lead with integrity, own it, and win as one are examples of TIAA’s:
- What malware propagates without a host program?
- A _____ review is done quarterly to review privileged access.
- What is the most common attack vector for malware?
- TIAA’s ______ promotes a culture of inclusion, diversity and equity by connecting associates across diverse perspectives, wide-ranging talents and unique experiences.
- A targeted form of phishing that is customized for specific individuals within a specific organization.
- What does GCSAM stand for?
- Suspicious sender address, invalid branding, appealing to emotions, sense of urgency, invalid URL’s, request for sensitive data, spelling errors, requests to click links, and signatures are all __________ of phishing attempts.
Down
- Who founded TIAA?
- Malware that limits users access until a ransom is paid.
- A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.
- Who is the security awareness program’s mascot?
- What is TIAA’s social impact hashtag?
- Be the change by delivering lifetime income for all with investments that build a better world is TIAA’s:
- When somebody sends an e-mail with a link to a bogus website it is called:
- In 2021 TIAA cybersecurity expanded to become TIAA _____ cybersecurity.
- The probability of exposure or loss of assets is considered?
19 Clues: Who founded TIAA? • What does GCSAM stand for? • What is TIAA’s social impact hashtag? • A “tunnel” for private network browsing: • Who is the security awareness program’s mascot? • What malware propagates without a host program? • What is the most common attack vector for malware? • Malware that limits users access until a ransom is paid. • ...
KM Week 10 2021-10-11
Across
- Smart Nation through Digital _________
- An intellectual property
- ________ citizen through e-participation
- Increase in digital usage has brought about the need to protect data, infrastructure and networks from growing cyber threats.
- in the eco-system of Digital Economy.
- A KMS
- A communication tool
Down
- The Government, _____ and Society are closely
- an advantage to move towards digital economy
- One of the KM processes
- structural resource
- An impact/ area of concern for digital society
- We need an update of this to move to a digital future
- Infrastructural resources
- He conceived the concept of KM
15 Clues: A KMS • structural resource • A communication tool • One of the KM processes • An intellectual property • Infrastructural resources • He conceived the concept of KM • in the eco-system of Digital Economy. • Smart Nation through Digital _________ • ________ citizen through e-participation • an advantage to move towards digital economy • The Government, _____ and Society are closely • ...
GEN-Z TRENDS 2025-03-27
Across
- A field combining AI and Engineering
- GenZ slang for stylish outfits
- A famous anime known for its huge number of episodes
- The tech behind chatGPT
- A viral Gen Z meme
- A growing field focused on protecting data and network
Down
- Next level gaming and training
- Usually done in netflix on long series's
- Act of cutting off communication without warning
- Slang for Delusional
- Action packed franchise ni Keanu Reeves
- On top of Gen Z's screen time
- a fusion of biology and technology
- A cruicial skill for GenZ learners
- DCU Counterpart of Iron Man
15 Clues: A viral Gen Z meme • Slang for Delusional • The tech behind chatGPT • DCU Counterpart of Iron Man • On top of Gen Z's screen time • Next level gaming and training • GenZ slang for stylish outfits • a fusion of biology and technology • A cruicial skill for GenZ learners • A field combining AI and Engineering • Action packed franchise ni Keanu Reeves • ...
Solve Our Story 2025-09-28
Across
- How did Amy and David meet?
- Amy’s favorite band?
- What branch of the military was David in?
- Where did Amy go for her bachelorette party?
- What TV show is produced by the bride?
- Bride’s hometown?
- What does Amy’s family call her?
Down
- Where they said “I love you” for the first time?
- Where did Amy go to college?
- Groom’s hometown?
- The hotel bar where Amy and David had their first date?
- What does David have his masters in?
- What does David’s family call him?
- What is David’s favorite sport?
- Where did David go for his bachelor party?
15 Clues: Groom’s hometown? • Bride’s hometown? • Amy’s favorite band? • How did Amy and David meet? • Where did Amy go to college? • What is David’s favorite sport? • What does Amy’s family call her? • What does David’s family call him? • What does David have his masters in? • What TV show is produced by the bride? • What branch of the military was David in? • ...
Cybersecurity Crossword Puzzle 2024-02-01
Across
- Passwords should not contain your
- Sikorsky Facility Security Officer (FSO)
- Strategy to protect sensitive information (operational security)
- Assured File Transfers (AFTs) should only be performed by a trained
- If you see something
- A company's most valuable asset
Down
- Report all security incidents to
- Sikorsky Classified Cybersecurity Manager
- Access is granted based on clearance level and
9 Clues: If you see something • A company's most valuable asset • Report all security incidents to • Passwords should not contain your • Sikorsky Facility Security Officer (FSO) • Sikorsky Classified Cybersecurity Manager • Access is granted based on clearance level and • Strategy to protect sensitive information (operational security) • ...
Crossword 2025-08-10
Across
- New generation of wireless network technology
- New business, often tech-focused and innovative
- Protection against online threats
- Company known for graphics cards and AI chips
- Internet-based computing and storage
- Step-by-step problem-solving procedure in computing
- A digital virtual world concept
Down
- Popular AI language model by OpenAI
- Distributed ledger technology supporting Bitcoin
- Unmanned flying device used for delivery or photos
- Electric car company known for tech innovation
- A type of computing using quantum mechanics
- Intelligence demonstrated by machines.
- Digital or virtual money
14 Clues: Digital or virtual money • A digital virtual world concept • Protection against online threats • Popular AI language model by OpenAI • Internet-based computing and storage • Intelligence demonstrated by machines. • A type of computing using quantum mechanics • New generation of wireless network technology • Company known for graphics cards and AI chips • ...
Topic 3 AI & Competition Law 2024-11-15
Across
- Rules governing AI development and implementation
- When AI systems independently coordinate to avoid competition
- Large technology firms influencing markets
- Control by a major player in a market
- Internet-based computing and storage services
- Technology that mimics human thinking and learning
- Moral principles governing behavior
- Unfair preference in decision-making
Down
- Safeguarding personal information
- Charging different prices based on user data
- Organization for global trade rules
- Ensures fairness and innovation in markets
- Clarity in AI decision-making processes
- Protecting systems and networks from attacks
14 Clues: Safeguarding personal information • Organization for global trade rules • Moral principles governing behavior • Unfair preference in decision-making • Control by a major player in a market • Clarity in AI decision-making processes • Large technology firms influencing markets • Ensures fairness and innovation in markets • Charging different prices based on user data • ...
Cybersecurity Unit 10 Crossword 2025-03-20
Across
- impacts availability and requires redundancy
- updates and changes in one component may impact others
- timely removal of access to minimize risks
- older or outdated software
- realizing that you are not encrypting data, using weak passwords and outdated technology
- step-by-step instructions for security measures
- focusing on ensuring you are following regulatory requirements such as HIPPA
- influences user behaviors
- define requirements for security controls and configurations
Down
- guides access provisioning for new employees
- predefinied responses for security incidents
- includes checking things such as your incident response plan to make sure it is sufficient enough
- common during updates or performance issues
- establish organizational stances on security aspects
- specify what items are allowed
- Developing an action plan, implementing new security controls and tracking progress
- specify what items are denied
- Never trust, always verify
- this type of restart requires restarting a particular component
19 Clues: influences user behaviors • older or outdated software • Never trust, always verify • specify what items are denied • specify what items are allowed • timely removal of access to minimize risks • common during updates or performance issues • guides access provisioning for new employees • impacts availability and requires redundancy • ...
Information Technology 2023-05-10
Across
- Desarrollo
- Comunicaciones
- Computación en la nube
- Apoyo técnico
- Innovar
- Programador
- Analista de malware
- Perspectiva
- Habilidades
- Fuerza laboral
- Ciencia de datos
- Compañías empresariales
- Operaciones comerciales
- Desarrollador web
- Ilimitado
- Implementación
- Productividad
- Ingeniero de software
- Recreación
- Microsoft
Down
- Soporte de escritorio
- Plataformas
- Software
- Sostenibilidad
- Habilidades
- Aplicaciones
- Hoja de cálculo
- Conocimientos técnicos
- Automatización
- Servicio de ayuda
- Programas
- Base de datos
- Gerencia
- Desarrollador de software
- Acceso a la información
- Inteligencia artificial
- Liderazgo
- Tecnología de la información (TI)
- Complejidad
- Ciberseguridad
- Educación
- soporte
- Mantenimiento
- Análisis
- Avance
- Hardware
- Gerente IT
- Conocimiento
- Robótica
49 Clues: Avance • Innovar • soporte • Software • Gerencia • Análisis • Hardware • Robótica • Programas • Liderazgo • Educación • Ilimitado • Microsoft • Desarrollo • Recreación • Plataformas • Habilidades • Programador • Perspectiva • Complejidad • Habilidades • Gerente IT • Aplicaciones • Conocimiento • Apoyo técnico • Base de datos • Mantenimiento • Productividad • Sostenibilidad • Comunicaciones • Automatización • Fuerza laboral • Ciberseguridad • ...
RU ITEC411 Chapter 5 Crime and Security 2025-03-16
Across
- something that will spread one its own
- information gathering software
- a network of computers being controlled
- returning what has been lost to its owner
- something that needs a host to spread
- being locked out of a computer or system until someone is paid
- digital world
- something disguised as something else
- sending out messages impersonating someone or something
- deception for someone's gain
Down
- bad software
- obstructing or ruining something
- to be kept secret
- stealing someone's information for impersonation
- instruction sets
- spying on someone or something
- a soft spot in a piece of software
- manipulatively finding information out about someone or something
- team to manage cybersecurity incidents
- using a spoofed website to steal information
20 Clues: bad software • digital world • instruction sets • to be kept secret • deception for someone's gain • information gathering software • spying on someone or something • obstructing or ruining something • a soft spot in a piece of software • something that needs a host to spread • something disguised as something else • something that will spread one its own • ...
Lushi & John's Wedding 2025-02-22
Across
- Lushi’s favorite dessert
- Favorite shared activity
- Lushi’s favorite cuisine
- John’s go-to drink
- City they live in
- Lushi’s favorite holiday
- Who is older between them
- John’s hometown
- Total number of their dogs
- John’s favorite food
- Name of their corgi
- Color of John’s eyes
- Place where John proposed
Down
- University John attended
- First date restaurant
- Total countries visited together
- John’s favorite video game
- francisco City where they met
- First international trip destination
- John’s work industry
- John’s favorite music band
- Lushi’s favorite color
- Month of their engagement
- Month of dating anniversary
- Their dream honeymoon destination
- John’s middle name
- Lushi’s favorite time of year
- Lushi’s favorite board game
28 Clues: John’s hometown • City they live in • John’s go-to drink • John’s middle name • Name of their corgi • John’s work industry • John’s favorite food • Color of John’s eyes • First date restaurant • Lushi’s favorite color • University John attended • Lushi’s favorite dessert • Favorite shared activity • Lushi’s favorite cuisine • Lushi’s favorite holiday • Month of their engagement • ...
Sorav 2025-05-13
Across
- a key when you put in the computer
- a internet connection
- when you see in screen
- A malicious program designed to harm or disrupt computer system
- actually like a mouse but better
- when you type the input
- use for click or type letter
- a like a browser
- Protection of computer systems and data from unauthorised access and attacks
- like a menu in the website
- open another homepage
Down
- Programs and operating systems that run on computers and devices.
- a device portable
- like a smart home
- The physical components of a computer or electronic device
- charge your device
- type the code
- when you unlock your device
- big object for the computer
- a part of computer
20 Clues: type the code • a like a browser • a device portable • like a smart home • charge your device • a part of computer • a internet connection • open another homepage • when you see in screen • when you type the input • like a menu in the website • when you unlock your device • big object for the computer • use for click or type letter • actually like a mouse but better • ...
Infor 2025-01-26
Across
- Maumere yang mampu mendeskripsi
- Membuka lampiran surel
- orang yang mendeskripsikan peretasan
- Menandakan bahwa hacking merupakan pengertian
- Nama lain dari kesalahan
- Tidak perlu menumpuk keprogaman lain
- pembuatan buku the cookers
- Akroni bobot network
- Adalah kejahatan di dunia
- salah satu kejahatan sosial yang berpengaruh pada kesehatan mental
Down
- Makna yang disampaikan oleh serangkaian representasi yang merupakan hasil pemrosesan data disebut
- Perangkat lunak yang menempel
- Gunakan activit atau activity internasional
- data berasal dari kata dalam bahasa latin datum yang artinya
- Virus yang menyebar di dunia
- keamanan informasi internet adalah
- Pada tahun 1988 sebuah program komputer yang dikenal sebagai
- badan siber dan sandi negara
- Merupakan Malware yang tampak kagoda
- Teknologi keamanan yang lebih baik dengan pembentukan
20 Clues: Akroni bobot network • Membuka lampiran surel • Nama lain dari kesalahan • Adalah kejahatan di dunia • pembuatan buku the cookers • Virus yang menyebar di dunia • badan siber dan sandi negara • Perangkat lunak yang menempel • Maumere yang mampu mendeskripsi • keamanan informasi internet adalah • orang yang mendeskripsikan peretasan • Merupakan Malware yang tampak kagoda • ...
Let's explore the kept.pro Eco System 2024-12-13
Across
- Robyne's call sign
- Required for work from home success
- Tab to find Client Services specific information?
- Name of software platform to help categorize expenses
- One of the flywheel components
- System used by all clients
- Pod name
- Client payroll platform
- What we are
- A kept.pro core value
- Accurate, timely and complete financials are part of this
Down
- One-stop shop for kept.pro information
- Item we are all responsible for
- One of the internal programs we use
- Part of kept.GROW
- Tab where you can find info on Google Workspace
- Name of our outside IT support company
- Tab to find out about kept.pro team members
- Tab to see Google Classroom classes
- Essential for working together
20 Clues: Pod name • What we are • Part of kept.GROW • Robyne's call sign • A kept.pro core value • Client payroll platform • System used by all clients • One of the flywheel components • Essential for working together • Item we are all responsible for • One of the internal programs we use • Required for work from home success • Tab to see Google Classroom classes • ...
SISTEM KOMPUTER 2025-09-08
Across
- : Singkatan dari Central Processing Unit.
- : Bahasa pemrograman yang populer untuk web.
- : Singkatan dari Hypertext Markup Language.
- : Media penyimpanan berbentuk cakram optik.
- : Perangkat yang digunakan untuk memasukkan data ke komputer.
- : Protokol pengiriman surat elektronik.
- : Perangkat lunak untuk mengolah kata.
- : Singkatan dari Uniform Resource Locator.
- : Sistem operasi buatan Microsoft.
- : Istilah untuk keamanan informasi di dunia digital.
- : Jaringan global yang menghubungkan komputer di seluruh dunia.
Down
- : Bahasa pemrograman yang identik dengan logo cangkir kopi.
- : Bagian komputer yang menyimpan data secara permanen.
- : Perangkat keras untuk mencetak dokumen.
- : Singkatan dari Random Access Memory.
- : Sistem operasi berbasis open source.
- : Aplikasi untuk membuat presentasi.
- : Singkatan dari Graphics Interchange Format.
- : Penyimpanan berbasis awan dari Google.
- : Perangkat keras untuk menampilkan hasil proses.
20 Clues: : Sistem operasi buatan Microsoft. • : Aplikasi untuk membuat presentasi. • : Sistem operasi berbasis open source. • : Perangkat lunak untuk mengolah kata. • : Perangkat keras untuk mencetak dokumen. • : Protokol pengiriman surat elektronik. • : Bahasa pemrograman yang populer untuk web. • : Singkatan dari Random Access Memory. • ...
Sondre's Christmas Crossword 2023-12-26
Across
- Sarah's favorite "The office" character
- Name of the species of the big boi fish Sarah caught
- Month of Sondre's birthday
- One of Sarah's favorite vegetables
- Indie band from Norwich, UK
- Country with the most snow
- Soon to be patented bike
- Homeless cat
- Country that Canada has been at war with for almost 40 years
- Sarah's totally real and true favorite tv-show ;)
Down
- Sondre's field of study
- National park in the west of Canada that Sarah has visited
- Sarah's favorite League of Legends champion
- Sarah's favorite tea
- Good girl
- Good boy
- Subject of the class that had a field trip in Sarah's dream
17 Clues: Good boy • Good girl • Homeless cat • Sarah's favorite tea • Sondre's field of study • Soon to be patented bike • Month of Sondre's birthday • Country with the most snow • Indie band from Norwich, UK • One of Sarah's favorite vegetables • Sarah's favorite "The office" character • Sarah's favorite League of Legends champion • Sarah's totally real and true favorite tv-show ;) • ...
Exploring our Ecosystem 2025-01-15
Across
- essential for working together
- one of the internal programs we use
- system used by all clients
- name of software platform to help categorize expenses
- what we are
- one-stop shop for kept.pro information
- required for work-from-home success
- accruate, timely and complete financials are a part of this
- tab to find out about kept.pro team members
- a kept.pro core value
Down
- tab to see Google Classroom courses
- name of a pod
- name of our outside IT support
- one of the flywheel components
- client payroll platform
- tab to find Client Services specific information
- tab where you can find info on Google Workspace
- item we are all responsible for
- James' call sign
- part of kept.GROW
20 Clues: what we are • name of a pod • James' call sign • part of kept.GROW • a kept.pro core value • client payroll platform • system used by all clients • name of our outside IT support • essential for working together • one of the flywheel components • item we are all responsible for • tab to see Google Classroom courses • one of the internal programs we use • ...
The Print Puzzler 2025-03-26
Across
- GOAL OF MOST CAMPAIGNS
- A NEW COMPANY
- SIC 27
- NOBODY GETS LEFT OUT
- MORALLY RIGHT AND WRONG
- WHERE PINE LIVES
- RENOWNED BUSINESS PUBLICATION
- MALICIOUS HACKER
- TRY FOR THE FIRST TIME
- WELL KNOWN WISCONSIN PRINTER
- IMPACTS SOCIAL MEDIA
- COMMONLY FOUND ON WALLS OR DESKS
- THE P IN PMS
- BILLBOARDS, TAXIS AND POSTERS
- MAY ONE DAY REPLACE SICS
Down
- A NEW COMPANY
- INTEGRATING SALES AND MARKETING
- ITS ALWAYS RAISED
- PAPER CUTTER
- EMAIL WITH COLOR
- HELD EVERY 4 YEARS IN DUSSELDORF, GERMANY
- COMPANY SIZE
- CRM AND AUTOMATION SW
- USED TO PERSONALIZE YOUR EXPERIENCE
- WHATS IN IT FOR ME
- BOSTON VENUE
- ETHICAL CYBERSECURITY
- ENHANCE YOUR DATA
- BEST WAY TO MEET PEOPLE
29 Clues: SIC 27 • PAPER CUTTER • COMPANY SIZE • BOSTON VENUE • THE P IN PMS • A NEW COMPANY • A NEW COMPANY • EMAIL WITH COLOR • WHERE PINE LIVES • MALICIOUS HACKER • ITS ALWAYS RAISED • ENHANCE YOUR DATA • WHATS IN IT FOR ME • NOBODY GETS LEFT OUT • IMPACTS SOCIAL MEDIA • CRM AND AUTOMATION SW • ETHICAL CYBERSECURITY • GOAL OF MOST CAMPAIGNS • TRY FOR THE FIRST TIME • MORALLY RIGHT AND WRONG • ...
Natalie and Robbie 2024-07-01
Across
- The couple's favorite singer.
- The food Robbie hates but Natalie insists on making.
- Robbie's first roommate.
- The month Robbie proposed.
- Robbie's least favorite household chore.
- The grade Natalie teaches.
- The city they got engaged in.
- What is the name of Natalie and Robbie's cat?
- Who made the first move?
Down
- Who said I love you first?
- The elementary school Natalie and Robbie first met (Forest __)
- Natalie's least favorite household chore.
- Natalie and Robbie's eye color.
- What field does Robbie work in?
- Number of dresses Natalie tried on.
- Number of years Natalie and Robbie dated.
- What college did they attend?
- Total number of bridesmaids and groomsmen.
- The shape of the engagment ring.
- Natalie and Robbie's favorite condiment.
20 Clues: Robbie's first roommate. • Who made the first move? • Who said I love you first? • The month Robbie proposed. • The grade Natalie teaches. • The couple's favorite singer. • The city they got engaged in. • What college did they attend? • Natalie and Robbie's eye color. • What field does Robbie work in? • The shape of the engagment ring. • Number of dresses Natalie tried on. • ...
Computing Vocabulary 2019-12-04
Across
- Small device to store data on the go
- The amount of space available
- Most of the time you do it illegally
- Smaller than a rat
- Part of a computer that reads information
- Synonym of information
- We also call it the Web
- System of computer equipment & programs
- Computers that are connected together
Down
- Desktop machine
- Combination of letters and numbers
- Protection system making use of the internet
- Someone who uses a product, machine or service
- Software designed to damage
- A set of mathematical instructions or rules
- Identifying data ; Biscuit
- Computer program
- Central computer from which other computers get information
- Accessing information without permission
- All the equipment necessary to run a computer
20 Clues: Desktop machine • Computer program • Smaller than a rat • Synonym of information • We also call it the Web • Identifying data ; Biscuit • Software designed to damage • The amount of space available • Combination of letters and numbers • Small device to store data on the go • Most of the time you do it illegally • Computers that are connected together • ...
Sip and Solve 2024-04-05
Across
- What month did they begin dating?
- Where is their honeymoon location?
- What is Adonis' middle name?
- What is Eimear's eye colour?
- How they first meet?
- Where do they live?
- What is Eimear's job?
- How many years have they been together?
- What is the name of their dog?
- Where was Eimear born?
Down
- What is Adonis' job?
- What car do they drive?
- Where was their first date?
- What instrument does Eimear learn?
- Where did they get engaged?
- What is Eimear's birth month?
- What is Eimear's middle name?
- What is Adonis' favourite hobby?
- What is Adonis' eye colour?
- What is Adonis' birth month?
- Where was Adonis born?
- Where was their first holiday?
22 Clues: Where do they live? • What is Adonis' job? • How they first meet? • What is Eimear's job? • Where was Adonis born? • Where was Eimear born? • What car do they drive? • Where was their first date? • Where did they get engaged? • What is Adonis' eye colour? • What is Adonis' middle name? • What is Eimear's eye colour? • What is Adonis' birth month? • What is Eimear's birth month? • ...
Pineapple #2 2023-05-05
Across
- slithering coding language
- Pokemon Cards for REAL men
- fictional school with one of the worst student safety track records
- Heath Ledger or an otaku with an ungodly amount of rizz
- rock band that just "Can't Stop"
- Ghibli mastermind Miyazaki
- Your favorite cybersecurity student
- One who is "virtually insane"
- a site that is full of idiots and dank memes
- Psych lead James Roday
- Star Trek captain with a terrible "Rocketman" cover
Down
- that old meme you had as your background for a while
- Cocaine sadly not included anymore
- "Ride of The Valkyries" Composer
- They're finally making GTA VI
- "I think therefore I'm"
- Feline from Fukuhara
- based smash main
- Soulsborne mastermind Miyazaki
- Kentaro Miura's masterpiece
20 Clues: based smash main • Feline from Fukuhara • Psych lead James Roday • "I think therefore I'm" • slithering coding language • Pokemon Cards for REAL men • Ghibli mastermind Miyazaki • Kentaro Miura's masterpiece • They're finally making GTA VI • One who is "virtually insane" • Soulsborne mastermind Miyazaki • "Ride of The Valkyries" Composer • rock band that just "Can't Stop" • ...
TTS INFORMATIKA 2025-04-10
Across
- tugas programer
- Platform untuk diseminasi konten budaya?
- Contoh search engine?
- Metode validasi konten negatif?
- itu konten negatif
- menghindari pelanggaran budaya?
- penting unsur budaya dalam konten digital?
- yang di maksud indexing
- Tugas data scientist?
- pendaftaran HAKI
- itu hak cipta
- Konsekuensi konten negatif?
Down
- Tujuan validasi konten negatif?
- itu ranking?
- diseminasi konten budaya?
- yang di maksud paten
- Tugas cybersecurity engineer?
- konten digital berunsur budaya?
- Tugas web developer?
- Tugas database administrator?
- fungsi utama search engine?.
- itu crawling?
- itu merek dagang
- Tantangan validasi konten negatif?
- Konsekuensi pelanggaran HAKI
25 Clues: itu ranking? • itu crawling? • itu hak cipta • tugas programer • itu merek dagang • pendaftaran HAKI • itu konten negatif • yang di maksud paten • Tugas web developer? • Contoh search engine? • Tugas data scientist? • yang di maksud indexing • diseminasi konten budaya? • Konsekuensi konten negatif? • fungsi utama search engine?. • Konsekuensi pelanggaran HAKI • Tugas cybersecurity engineer? • ...
How well do you know POOL/PACT? 2025-02-19
Across
- Executive Director
- HR Oversight Committee Chair
- POOL/PACT's Learning Management System
- Month of this year's HR Leadership Conference
- Email notice of significant change in law or practice
- POOL/PACT's EAP
- Organization-wide assessment program
- How often this newsletter comes out
- PACT Chair
- Cybersecurity expert
- Type of grant available to members to attend conferences
- Summary of HR services for the fiscal year
- POOL Chair
Down
- Claims management company
- Flagship certificate program for managers
- Location of this year's HR Leadership Conference
- What POOL/PACT HR is currently tracking
- Main HR contact
- This year's Thursday night event at the annual board meeting
- Funding provided to attain HR certification
- Month of POOL/PACT's annual board meeting
21 Clues: PACT Chair • POOL Chair • POOL/PACT's EAP • Main HR contact • Executive Director • Cybersecurity expert • Claims management company • HR Oversight Committee Chair • How often this newsletter comes out • Organization-wide assessment program • POOL/PACT's Learning Management System • What POOL/PACT HR is currently tracking • Flagship certificate program for managers • ...
Puzzle on Digitalisation (Ansgar O & Olivia U) 2025-10-07
Across
- Raw facts or information
- Watching or listening online in real time
- Protecting systems and data from attacks
- Pocket computer with apps and calls
- A new idea or improvement
- Machine ability to mimic human thinking
- Interactive digital classroom display
- Global network of computers
- Entering username and password to access
- Software used to surf the web
Down
- Company behind Windows and Office
- Turning paper or analog into digital form
- Copy of data for safety
- Scannable digital code for quick access
- Engineering of automated machines
- Writing instructions (code) for computers
- Doing several tasks at once
- Connected devices exchanging information
- Remote servers accessed online
- Programmes that run on computers
- Send files from device to the internet
21 Clues: Copy of data for safety • Raw facts or information • A new idea or improvement • Doing several tasks at once • Global network of computers • Software used to surf the web • Remote servers accessed online • Programmes that run on computers • Company behind Windows and Office • Engineering of automated machines • Pocket computer with apps and calls • ...
Unit 11-Cyber Security 2023-09-15
7 Clues: harmful software • digital illegal activity • network security barrier • isolated testing environment • protection of digital resources • unique physical characteristics for authentication • scam in which attackers trick people into disclosing confidential information
Chapter 15 Globalism: Information, Communication, and The Digital Revolution 2024-12-10
Across
- Devices used for computing and connecting online.
- Method for delivering messages electronically.
- Process of converting data into a secure code.
- Storing data on remote servers accessed via the Internet.
- Portable electronic device for accessing information.
- Software that performs malicious activities.
- Online platform for social interaction.
Down
- Digital means of connecting people worldwide.
- Measure to protect networks and systems.
- Global system for mobile communication.
- Widespread sharing of digital media.
11 Clues: Widespread sharing of digital media. • Global system for mobile communication. • Online platform for social interaction. • Measure to protect networks and systems. • Software that performs malicious activities. • Digital means of connecting people worldwide. • Method for delivering messages electronically. • Process of converting data into a secure code. • ...
Operation DigiVyuh 2025-01-27
Across
- - Converting data into a code to protect it
- - Entity that issues digital certificates
- - Stealing someone's personal information
- - Sending unwanted bulk messages
Down
- - Protecting systems from digital attacks
- - A secure way to sign electronic documents
- - Fraudulent attempt to steal sensitive information
- - Unauthorized access to computer systems
- - Police unit for investigating cyber crimes
- - Part of the IT Act dealing with computer offenses
- - Indian law for cyber crimes (abbreviation)
11 Clues: - Sending unwanted bulk messages • - Protecting systems from digital attacks • - Entity that issues digital certificates • - Unauthorized access to computer systems • - Stealing someone's personal information • - A secure way to sign electronic documents • - Converting data into a code to protect it • - Police unit for investigating cyber crimes • ...
Guess The word 2022-06-27
Across
- The act of obeying an order, rule, or request
- Possibility of loss or injury
- Group of people for decision making
- An event that is either unpleasant or unusual
- An official inspection
- A set of guidelines
Down
- Report certain types of wrongdoing
- Protection of internet-connected system
- of conduct A set of rules
- of interest Clash between personal and professional duties
10 Clues: A set of guidelines • An official inspection • of conduct A set of rules • Possibility of loss or injury • Report certain types of wrongdoing • Group of people for decision making • Protection of internet-connected system • The act of obeying an order, rule, or request • An event that is either unpleasant or unusual • ...
crossword 01 2025-04-21
Across
- By laws
- The art of sticking to something like a rule
- The act of studying something closely
- To improve or make more precise
Down
- Favoring one thing over other
- The process of reducing danger
- Use of technology to reduce human intervention in a process
- Following regulation
- The quality of doing something well without wasting time
- Protection of digital information from cyberattacks
10 Clues: By laws • Following regulation • Favoring one thing over other • The process of reducing danger • To improve or make more precise • The act of studying something closely • The art of sticking to something like a rule • Protection of digital information from cyberattacks • The quality of doing something well without wasting time • ...
Biometrics 2025-04-03
Across
- basic rights
- safety measures taken for protection
- to take full advantage of and benefit from
- something so easy that you cant mess it up
Down
- software programs that protect you while online
- following a trend just because everyone else is
- weaknesses in a security system
- to illegally enter into someone's computer
- to avoid or get around
- a gap in security
10 Clues: basic rights • a gap in security • to avoid or get around • weaknesses in a security system • safety measures taken for protection • to illegally enter into someone's computer • to take full advantage of and benefit from • something so easy that you cant mess it up • software programs that protect you while online • following a trend just because everyone else is
Spectrum Degree Programs 2023-10-18
6 Clues: Employee relations • Budgeting and money • Protecting computers • Ideas to interest customers • Tracking expenses and payments • Understanding formulas to gather data
Harris 20th Anniversary 2022-10-14
Across
- What sport/activity does Chris play
- Where did Melissa grow up?
- Where did they live when they got married?
- What is the Harris family dogs name?
- What volcano did the Harris family climb in Hawaii?
- Who is Melissa's favorite singer?
- Where did they Chris & Melissa get married?
Down
- What is Chris' profession?
- What are Chris & Melissa's kids middle
- Who is Chris' favorite rapper?
- What cruise line did they sail on when they
- married?
12 Clues: married? • What is Chris' profession? • Where did Melissa grow up? • Who is Chris' favorite rapper? • Who is Melissa's favorite singer? • What sport/activity does Chris play • What is the Harris family dogs name? • What are Chris & Melissa's kids middle • Where did they live when they got married? • What cruise line did they sail on when they • ...
If Ever You're Bored 2022-09-07
Across
- my favorite food you cook
- my college major
- my favorite song from Renaissance
- the first food place we've ever been together to
- your first car's name
- our son's name
Down
- place we celebrated when we thought we were going to get accepted into our first "dream" apt.
- my car's name
- my mother's name
- type of car i want in the future
- what we are going to be in the future
- you and Miracle
12 Clues: my car's name • our son's name • you and Miracle • my college major • my mother's name • your first car's name • my favorite food you cook • type of car i want in the future • my favorite song from Renaissance • what we are going to be in the future • the first food place we've ever been together to • ...
Unit 1-3 vocab 2024-03-14
Across
- Watering crops
- Farm animals like cows and chickens
- Picking crops when they're ready
- Person who plays sports
- security Making sure everyone has enough to eat
- rotation Changing what you plant to help the soil
- Computer steps to solve problems
- identity How you show yourself on the internet
- Keeping nature safe for the future
- Food for plants
- Underground water source
Down
- literacy Knowing how to use the internet well
- Trick emails trying to get private info
- Keeping computers safe
- Buying and selling online
- Watching videos on the internet without downloading
- detox Taking a break from screens and devices
- Long time with no rain
- gaming Playing games on the internet with others
- storage Keeping files on the internet, not your computer
20 Clues: Watering crops • Food for plants • Keeping computers safe • Long time with no rain • Person who plays sports • Underground water source • Buying and selling online • Picking crops when they're ready • Computer steps to solve problems • Keeping nature safe for the future • Farm animals like cows and chickens • Trick emails trying to get private info • ...
Module 1 Introductory Course Telehealth 2017-03-02
Across
- acronym for information and communication technology
- word used interchangeably with telecare
- used to monitor vital signs remotely
- nurses engaged in remote service delivery
- computer-based medical records
- the ability of computers to exchange information
- measures taken to protect computer/computer systems
- the use of smartphones to provide healthcare
Down
- virtual, medical, health, and educational services
- in real time
- emerging umbrella term; intersection of technology and healthcare
- live visual connection between two or more people
- the "e" in this term stands for many things
- term referring to teleconsultations
- electronic component used to provide input and detect changes
15 Clues: in real time • computer-based medical records • term referring to teleconsultations • used to monitor vital signs remotely • word used interchangeably with telecare • nurses engaged in remote service delivery • the "e" in this term stands for many things • the use of smartphones to provide healthcare • the ability of computers to exchange information • ...
Useful Vocab 2023-11-22
Across
- Cooking style
- Newness
- The process of providing or obtaining the food necessary for health and growth
- Small electronic devices with a specific function
- The activity of visiting interesting places, especially as a tourist
- The ability to use, understand, and evaluate information across digital platforms
- Physical activity
- A place where people live or stay, such as a hotel or guesthouse
Down
- Conditions or practices conducive to maintaining health and preventing disease
- Techniques and therapies aimed at controlling stress levels for better mental health
- Place to stay
- Literacy Competence in using digital information
- Security
- Health
- The place to which someone or something is going or being sent
- Schedule
- A planned route or journey
17 Clues: Health • Newness • Security • Schedule • Place to stay • Cooking style • Physical activity • A planned route or journey • Literacy Competence in using digital information • Small electronic devices with a specific function • The place to which someone or something is going or being sent • A place where people live or stay, such as a hotel or guesthouse • ...
Security Audit Quiz SET C 2025-11-18
Across
- NIST CSF function focused on safeguarding assets.
- Level of harm from a compromise.
- Testing to confirm proper implementation.
- The defined boundary of an audit.
- Critical element of CIA triad.
- The probability of a threat exploiting a vulnerability.
- Final step of an audit process.
Down
- Unauthorized attempt to access a system.
- Ability to track actions back to individuals or systems.
- Adhering to required standards or regulations.
- A potential cause of an unwanted incident.
- A weakness that can be exploited.
- U.S. body responsible for cybersecurity standards.
- Checking compliance to documented requirements.
- measures implemented to reduce risk.
15 Clues: Critical element of CIA triad. • Final step of an audit process. • Level of harm from a compromise. • A weakness that can be exploited. • The defined boundary of an audit. • measures implemented to reduce risk. • Unauthorized attempt to access a system. • Testing to confirm proper implementation. • A potential cause of an unwanted incident. • ...
THE FRIENDS 2023-04-20
Across
- ashley's most used phrase
- what maria gets on her face when she's outside
- a class we all share
- kaylee's biggest feature
- the man the myth the situationship
- the groupchat that we all have together
- the teacher that is better than woolley
- chaine's dead name
- ariany could never live with out this
- kaylee and ashley are poor...
Down
- ashley's stem major
- ariany, kaylee, ashley all have in common
- our last year here:(
- ariany is lacking her...
- what maria is (foreign)
- ariany gives you this when you speak
- emily thinks she looks like this when her hair is up (in spanish)
- chaine is pretty in...
18 Clues: chaine's dead name • ashley's stem major • our last year here:( • a class we all share • chaine is pretty in... • what maria is (foreign) • ariany is lacking her... • kaylee's biggest feature • ashley's most used phrase • kaylee and ashley are poor... • the man the myth the situationship • ariany gives you this when you speak • ariany could never live with out this • ...
