cybersecurity Crossword Puzzles

bytetrails7 2025-02-25

bytetrails7 crossword puzzle
Across
  1. Storing data over the internet
  2. Protecting data from unauthorized access
  3. Software managing hardware and software resources
  4. Virtual representation of physical hardware
Down
  1. Device that connects multiple networks
  2. A column in a table
  3. Secures data by converting it to a coded form
  4. Smallest unit of data in computing
  5. High-level programming language
  6. Set of vertices connected by edges

10 Clues: A column in a tableStoring data over the internetHigh-level programming languageSmallest unit of data in computingSet of vertices connected by edgesDevice that connects multiple networksProtecting data from unauthorized accessVirtual representation of physical hardwareSecures data by converting it to a coded form...

ONBOARDING 2025-10-06

ONBOARDING crossword puzzle
Across
  1. A barrier that blocks malicious network traffic
  2. Core principle of honesty and moral conduct
  3. Unexpected danger or uncertainty that may cause loss
  4. Protection against unauthorized access to computer systems
  5. Ensuring responsibility and answerability
Down
  1. Planning for potential future risks
  2. Professional review of compliance and controls
  3. Safeguard for confidential information
  4. Evidence-based evaluation in auditing
  5. Moralprinciple guiding fair behavior

10 Clues: Planning for potential future risksMoralprinciple guiding fair behaviorEvidence-based evaluation in auditingSafeguard for confidential informationEnsuring responsibility and answerabilityCore principle of honesty and moral conductProfessional review of compliance and controlsA barrier that blocks malicious network traffic...

ONBOARDING 2025-10-06

ONBOARDING crossword puzzle
Across
  1. A barrier that blocks malicious network traffic
  2. Core principle of honesty and moral conduct
  3. Unexpected danger or uncertainty that may cause loss
  4. Protection against unauthorized access to computer systems
  5. Ensuring responsibility and answerability
Down
  1. Planning for potential future risks
  2. Professional review of compliance and controls
  3. Safeguard for confidential information
  4. Evidence-based evaluation in auditing
  5. Moralprinciple guiding fair behavior

10 Clues: Planning for potential future risksMoralprinciple guiding fair behaviorEvidence-based evaluation in auditingSafeguard for confidential informationEnsuring responsibility and answerabilityCore principle of honesty and moral conductProfessional review of compliance and controlsA barrier that blocks malicious network traffic...

TTS INFORMATIKA (Dipta 8D) 2025-10-13

TTS INFORMATIKA (Dipta 8D) crossword puzzle
Across
  1. Kondisi komputer yang berhenti bekerja mendadak
  2. Papan utama tempat semua komponen komputer terhubung
  3. Jalan pintas untuk membuka file atau aplikasi
  4. Keluar dari sistem komputer
Down
  1. Keamanan dunia maya
  2. Tampilan awal layar komputer
  3. Mode menyimpan data sebelum komputer dimatikan
  4. Sistem keamanan jaringan untuk mencegah akses tidak sah
  5. Jenis malware yang menular ke file
  6. Program untuk mengatur unduhan

10 Clues: Keamanan dunia mayaKeluar dari sistem komputerTampilan awal layar komputerProgram untuk mengatur unduhanJenis malware yang menular ke fileJalan pintas untuk membuka file atau aplikasiMode menyimpan data sebelum komputer dimatikanKondisi komputer yang berhenti bekerja mendadakPapan utama tempat semua komponen komputer terhubung...

Safety & Risk Awareness Month 2025-10-12

Safety & Risk Awareness Month crossword puzzle
Across
  1. Formal review to ensure standards are met.
  2. Screenings to monitor health & well-being.
  3. Ensures a safe remote work environment.
  4. Word or phrase used to access systems.
  5. A proactive measure to prevent incidents.
  6. The state of being informed and alert.
  7. Protecting systems from online threats.
Down
  1. Process of identifying potential hazards.
  2. Keeping sensitive data safe from exposure.
  3. Understanding potential risks.
  4. A scam email pretending to be legitimate.
  5. Measures taken to avoid danger or harm.
  6. Possibility of loss or harm.
  7. Digitally altered video.
  8. Valuable digital information.
  9. Adhering to rules and regulations.

16 Clues: Digitally altered video.Possibility of loss or harm.Valuable digital information.Understanding potential risks.Adhering to rules and regulations.Word or phrase used to access systems.The state of being informed and alert.Ensures a safe remote work environment.Measures taken to avoid danger or harm.Protecting systems from online threats....

CWiCS Cybersecurity Crossword Event 2021-02-25

CWiCS Cybersecurity Crossword Event crossword puzzle
Across
  1. A _____________ breach targeted 130 accounts, including those of past presidents and Elon Musk, resulted in attackers swindling $121,000 in Bitcoin through nearly 300 transactions
  2. This is a well-known banking trojan that steals credentials and other sensitive information from an infected machine.
  3. The telecom service provider became the victim of a Magecart card-skimming attack.
  4. This app's "Find Friends" feature could have exposed user's profile data and phone numbers (Jan 2021)
  5. Which Hotel had the breach Hackers gained access to over 10 million guest records .including Justin Bieber, Twitter CEO Jack Dorsey, and government officials
  6. A now-defunct online service that had been previously selling access to data hacked from other websites, 21 arrested in UK
  7. Hackers target Microsoft ___ machines running which servers to deploy backdoors and other kinds of malware
  8. International hotel chain disclosed a data breach of 5.2 million hotel guests, making it their second data breach hitting them
  9. This pharmacy chain announced an error within their mobile app's messaging feature exposing names, prescription numbers and drug names
  10. This unsecured component of Mailfire’s was breached, the hacker had access to over 320 million records from notifications being pushed out to Mailfire clients.
  11. Milpitas, Calif.-based platform security vendor ----------------- had compromised NetExtender VPN client and SMB-oriented Secure Mobile Access
Down
  1. -- based cyber attacks rose 630% between January and April 2020
  2. Trojan functioning as a downloader or dropper of other malwares
  3. Hacker remotely controlled, and clicked on various functions on the screen to change the level of sodium hydroxide to over 100 times its normal levels, at _________ Water Treatment Plant
  4. __________ Confusion Supply-Chain Attack Hit Over 35 High-Profile Companies
  5. Even in 2021, the Top 10 from ___ is the most effective first step towards changing the software development culture within your org
  6. Hosted on this cloud, a massive US property and demography database exposed 200 million records (March 2020)
  7. Hackers are now using this Google service to bypass web security and steal credit cards
  8. Hackers hit Nebraska Medical Center with --------------- and stole patient data
  9. The university paid a $1.14 million ransom to hackers in order to save COVID-19 research.
  10. Malicious code was sneaked into updates to this SolarWinds software
  11. Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation Bug
  12. Since -------, the US FBI reported a 300% increase in reported cybercrimes
  13. LodaRAT Windows Malware Now Also Targets ______ Devices
  14. Malware designed to steal sensitive information stored on an infected device comes back disguised as a Game launcher

25 Clues: LodaRAT Windows Malware Now Also Targets ______ DevicesTrojan functioning as a downloader or dropper of other malwares-- based cyber attacks rose 630% between January and April 2020Apple Patches 10-Year-Old macOS ____ Root Privilege Escalation BugMalicious code was sneaked into updates to this SolarWinds software...

Cybersecurity Unit 3 Terminology 2022-10-10

Cybersecurity Unit 3 Terminology crossword puzzle
Across
  1. A base-16 number system. The extra digits are represented by the letters a through f, so all digits in hex are 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f.
  2. Wired Equivalent Privacy is a security algorithm used in wireless networks.
  3. The Maximum Transmission Unit is the maximum amount of bytes than can be packaged into frame data.
  4. A wireless access point is a device provides connectivity to a network.
  5. An operating system similar in concept to the Windows OS but used more often to host routers and web servers.
  6. A media access control addresses is unique numeric code that is assigned to networking hardware components (typically a network interface card or NIC) that is built into computers and mobile devices.
  7. The selective process of allowing or restricting the availability of a resource.
  8. The fourth and last phase of ethical hacking in which the security professionals fix the system vulnerabilities uncovered in the previous phases.
  9. The act of starting or launching a process. The new processes is a child process of a parent process..
  10. The operation of joining character strings end-to-end.
  11. A device that plots a graph of signal strength (vertical axis) versus frequency (horizontal axis).
  12. A standard that computers use to represent letters , numbers, and symbols. (It stands for American Standard Code for Information Interchange.)
  13. The first phase of ethical hacking, which involves probing of the network to understand its structure and to see what services are open and running.
  14. A collection of files on a computer, logically grouped together.
Down
  1. A program that allows a user to enter commands to interact with an operating system.
  2. An exchange of messages that prove the identity of users and computers in a system.
  3. The third phase of ethical hacking, which involves launching exploits at targeted vulnerabilities to see if they are genuine exposures on the system.
  4. It can have two meanings in computer terminology: it can be a specific application or function such as email, chat, etc. or it can refer to a specific part of an application, such as transmitting the data of a webpage
  5. Pronounced "ganoo" or "g.noo", it is a UNIX-like operating system.
  6. A very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden, allowing the user to focus on the details that are important for the task at hand.
  7. The second phase of ethical hacking, which involves taking a closer look at the services and software running on the hosts.
  8. A starting point for data analysis. It is the initial data set used in later comparisons.
  9. An input value to a command.
  10. Software that is is freely available to anyone who wants to use it. Users can modify it and distribute it however they want.
  11. A method of transferring and organizing data over a network using packets, which contain routing information along with the data.
  12. A process in UNIX that runs without user input.
  13. An attack where a malicious user changes and corrupts the MAC-IP address information on a target computer.
  14. A network communication protocol occurring in the data link layer 2 and physical layer 1 of the OSI model.

28 Clues: An input value to a command.A process in UNIX that runs without user input.The operation of joining character strings end-to-end.A collection of files on a computer, logically grouped together.Pronounced "ganoo" or "g.noo", it is a UNIX-like operating system.A wireless access point is a device provides connectivity to a network....

Cybersecurity Awareness Month Crossword 2023-09-21

Cybersecurity Awareness Month Crossword crossword puzzle
Across
  1. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  2. A cybersecurity risk that originates from within an organization (2 words).
  3. A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
  4. A mechanism for creating a secure connection between a computing device and a computer network
  5. The ability of individuals to understand and exercise control over how information about themselves may be used by others.
  6. Unsolicited emails sent to many addresses.
  7. A process or measure used to verify a user's identity.
  8. Part of the internet that isn't indexed by search engines.
  9. Faking the sending address of a transmission to gain illegal entry into a secure system.
  10. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities (2 words).
  11. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization (2 words).
  12. Computer programs that can block, detect, and remove viruses and other malware.
  13. A type of malware that denies a user's access to a system or data until a sum of money is paid.
Down
  1. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
  2. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  3. Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
  4. Software that compromises the operation of a system by performing an unauthorized function or process.
  5. A string of characters used to authenticate an identity.
  6. Extra copies of computer files that can be used to restore files that are lost or damaged.
  7. A flaw or weakness in an information system that could be exploited.
  8. An unauthorized user who attempts to or gains access to an information system.
  9. A collection of computers compromised by malicious code and controlled across a network.
  10. Software designed to block malware from entering protected networks.
  11. Converting data into a form that cannot be easily understood by unauthorized people.

24 Clues: Unsolicited emails sent to many addresses.A process or measure used to verify a user's identity.A string of characters used to authenticate an identity.Part of the internet that isn't indexed by search engines.A flaw or weakness in an information system that could be exploited.Software designed to block malware from entering protected networks....

2024 Cybersecurity Awareness Month 2024-09-17

2024 Cybersecurity Awareness Month crossword puzzle
Across
  1. A digital document used to verify the identity of a user or device online
  2. Software used to detect, prevent, and remove malicious software
  3. A security risk that originates from within the organization, often involving employees
  4. A tool that records keystrokes on a keyboard, often used to steal sensitive information
  5. The process of verifying a user or device
  6. A person who uses technical skills to exploit systems or networks
  7. The unauthorized access and retrieval of sensitive information from a system
  8. A type of malware that locks users out of their systems until a ransom is paid
  9. A hidden way of bypassing security controls in a system
  10. A string of characters used to authenticate access to a system or account
Down
  1. A software update designed to fix vulnerabilities or bugs
  2. An attempt to damage, disrupt, or gain unauthorized access to a computer or network
  3. Software designed to disrupt, damage, or gain unauthorized access to a computer system
  4. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
  5. A network security system that monitors and controls incoming and outgoing traffic
  6. A vulnerability in software that is taken advantage of by hackers to carry out attacks
  7. A virtual private network that allows secure remote access to a network over the internet
  8. The use of deception to manipulate individuals into divulging confidential information
  9. The process used by an organization to handle and recover from a cyberattack
  10. An additional security layer that requires a second form of verification beyond a password
  11. The process of converting information or data into a code to prevent unauthorized access
  12. Software that gathers information from a user's device without their knowledge

22 Clues: The process of verifying a user or deviceA hidden way of bypassing security controls in a systemA software update designed to fix vulnerabilities or bugsSoftware used to detect, prevent, and remove malicious softwareA person who uses technical skills to exploit systems or networks...

CIS178 - Cybersecurity Crossword Puzzle 2023-07-13

CIS178 - Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. bring your own device
  2. code that protects data
  3. malicious software
  4. transmit information without users knowledge
  5. penetration testers
  6. wont allow changes to system’s settings
  7. illegally exploit network vulnerabilities
  8. identifies device connected to internet
  9. high traffic creates web shutdown
  10. vulnerable free wireless hotspots
  11. practicing to identify cyber threats
  12. software to carry out cyberattacks
  13. preventan d remove malware infections
  14. harrassing others over online platforms
Down
  1. propaganda to steal personal information
  2. downloaded apps disguised malicious attacks
  3. virtual private network
  4. exploits vulnerabilities in software
  5. helps remember passwords encrypted
  6. unauthorized users gain access
  7. attacks users until pay ransom
  8. clicking on hidden links
  9. tries to steal personal data
  10. software preventing access to networks
  11. scrambling sensitive data

25 Clues: malicious softwarepenetration testersbring your own devicevirtual private networkcode that protects dataclicking on hidden linksscrambling sensitive datatries to steal personal dataunauthorized users gain accessattacks users until pay ransomhigh traffic creates web shutdownvulnerable free wireless hotspotshelps remember passwords encrypted...

Cybersecurity Crossword Mod 9 2025-03-15

Cybersecurity Crossword Mod 9 crossword puzzle
Across
  1. Easier to remember and longer
  2. Short and complex, harder to remember
  3. Item or Message used in phishing
  4. Phishing using QR Codes
  5. Security method using physical traits
  6. Hidden devices on ATM's or readers
  7. Encrypted network connection
  8. Authorization that requires two logins
  9. Malware hiding in files that spread
  10. Phishing high-profile individuals
Down
  1. Record all things typed on keyboard
  2. Infected ads on legit websites
  3. Someone with unauthorized access
  4. BitWarden is a password ______
  5. Fooling a user to gain access
  6. Self-replicating malware
  7. Seemingly legit, but is fake
  8. Malware that encrypts files
  9. Phishing over the phone
  10. Phising via text messages

20 Clues: Phishing using QR CodesPhishing over the phoneSelf-replicating malwarePhising via text messagesMalware that encrypts filesSeemingly legit, but is fakeEncrypted network connectionEasier to remember and longerFooling a user to gain accessInfected ads on legit websitesBitWarden is a password ______Someone with unauthorized access...

Middle-School Cybersecurity Crossword 2025-04-30

Middle-School Cybersecurity Crossword crossword puzzle
Across
  1. Sneaky grabbing of data
  2. A trick to steal money or info
  3. Software that secretly watches you
  4. Scrambling data into code
  5. Fake messages to steal info
  6. Pops up ads and may track you
  7. Bullying someone online
  8. Malware that hides as something safe
  9. A flaw in software used by hackers
  10. Records what you type
  11. Pretending to be someone else online
  12. Staying safe online
Down
  1. Sharing private info without permission
  2. Protection against online threats
  3. Bad software that harms devices
  4. Hiding your real identity online
  5. Unwanted or junk messages
  6. Locks files, demands money to unlock
  7. Network of hacked devices used for attacks
  8. Posting to upset or annoy people
  9. Misleading headline to get clicks
  10. Software that blocks viruses
  11. Person who breaks into computer systems

23 Clues: Staying safe onlineRecords what you typeSneaky grabbing of dataBullying someone onlineUnwanted or junk messagesScrambling data into codeFake messages to steal infoSoftware that blocks virusesPops up ads and may track youA trick to steal money or infoBad software that harms devicesHiding your real identity onlinePosting to upset or annoy people...

Cracking the Cybersecurity Code 2024-12-08

Cracking the Cybersecurity Code crossword puzzle
Across
  1. The obligation to explain, justify, and take responsibility for decisions or actions.
  2. Facts and statistics collected together for reference or analysis, foundational to AI systems.
  3. The branch of medicine dealing with the prevention, diagnosis, and treatment of cancer.
  4. The measurement and statistical analysis of people's physical and behavioral characteristics.
  5. A term used to describe intelligence created by humans, often associated with machine learning.
  6. The study of genomes, which has applications in AI-driven preventive medicine.
  7. Adhering to rules, regulations, or standards, especially in data privacy and security.
  8. The quality of being open and honest, crucial in ethical AI development.
Down
  1. The branch of medicine concerned with the study and treatment of eye disorders.
  2. The introduction of new ideas, methods, or technologies.
  3. The process of converting information into a code to prevent unauthorized access.
  4. The ability to acquire and apply knowledge and skills, often simulated by AI systems.
  5. A rule or directive made and maintained by an authority, often to ensure ethical AI practices.
  6. The process of identifying a condition or disease, often enhanced by AI in healthcare.
  7. The science of diagnosing, treating, and preventing illness.
  8. Tailored specifically to an individual, especially in medicine or treatment.
  9. A set of rules or steps followed by computers to solve problems or perform tasks.
  10. Relating to moral principles or the branch of knowledge dealing with them.
  11. The act of forecasting or anticipating an event or outcome.
  12. A term associated with advanced computing that poses both opportunities and threats to cybersecurity.

20 Clues: The introduction of new ideas, methods, or technologies.The act of forecasting or anticipating an event or outcome.The science of diagnosing, treating, and preventing illness.The quality of being open and honest, crucial in ethical AI development.Relating to moral principles or the branch of knowledge dealing with them....

Cybersecurity Terms and Definitions 2025-12-09

Cybersecurity Terms and Definitions crossword puzzle
Across
  1. Connection between a computer and a modem on radio frequencies that allows accessing the internet without being connected to wires
  2. A website or program that allows users to talk with lots of people at once, like texting on the internet instead of the phone
  3. Code or software that can replicate itself, is usually sent through email attachments and can damage computers and hard drives
  4. Using the internet to send a copy of a file from one website, system, program, computer or device to another
  5. A program that runs on a computer
  6. Physical computer equipment and related machines and parts
  7. Software put on a computer to spy and collect and send information to cybercriminals
  8. An online record of all the websites a user visits and the emails a user sends, which can stay even after deleting their browser history and emails
  9. Letters and messages sent from one computer or device to another computer or device
  10. Malicious software or code used to steal information and damage devices
Down
  1. Software that tries to stop viruses or malware from attacking a computer or other device
  2. A small packet of software that lets a website or browser track users by storing some of their information, such as what clothing online shoppers like
  3. Anything done to protect computers, devices and software from cybercrimes
  4. Websites that allow users to post comments and have conversations with other users, for example, in online classes
  5. Playing games on the internet by oneself or with other players
  6. A security system usually made up of hardware and software that blocks hackers, viruses and other malicious threats from a computer
  7. Any illegal activity done on the internet
  8. The introductory page of a website
  9. Software or code that shows unwanted ads such as pop-ups on a device
  10. Any unwelcome and unwanted e-mail or junk mail, including repeated comments on another's post
  11. A type of cyberattack in which someone pretends to be a trustworthy person, website or organization to get victims to share their username, password or other personal information
  12. A camera built into or attached to a computer that can send video online
  13. The part of an internet address after the final period that identifies the type of organization using a website (e.g., .gov or .com)
  14. Harmful actions such as repeatedly making fun of and intimidating others online through email, texting, social media and even gaming apps
  15. Internet gamers who intentionally cause problems and/or cyberbully other gamers

25 Clues: A program that runs on a computerThe introductory page of a websiteAny illegal activity done on the internetPhysical computer equipment and related machines and partsPlaying games on the internet by oneself or with other playersSoftware or code that shows unwanted ads such as pop-ups on a device...

Topic 7 - Development of Computer Industry and Law 2024-05-02

Topic 7 - Development of Computer Industry and Law crossword puzzle
Across
  1. In Malaysia, a core legislation in governing the communications and multimedia industry is called
  2. What vendor is ranked first for the semiconductor industry in 2018
  3. Sector that handles communication on a global scale and create infrastructure that allows any type of data sending
  4. Computer system resources and services that can be accessed over the cloud
  5. Cyber law exists to handle cybersecurity and…
  6. Digital form of value that can be used as a token for transaction electronically
  7. The act of analyzing data, create conclusion about that information, and make a future prediction out of it is called
  8. Devices of information-age products are called
  9. Law that cover all internet-related technologies and provide a legal system for controlling it is called
  10. Hardware component that acts as the “brain” of a desktop computer, that could performs both arithmetic and operations, is called
Down
  1. Institution that is responsible for the abuse of telecommunicating services done by the industries in that certain sector is called
  2. In telecommunication industry, who manufacture and sell telecommunications equipment
  3. Design/infrastructure of information resource that can be navigated efficiently
  4. The process of protecting systems, data, and networks from cyber attacks is called
  5. In telecommunication industry, who operate and provide access to deliver services via internet
  6. Major segments of telecommunication industry besides equipment vendors and service providers
  7. The most important legislation that applies to telecoms (including internet)
  8. What is the leading computer manufacturing company that based in Taiwan
  9. What institution that serve as the telecommunications regulator in Malaysia
  10. Two of the most leading countries that controlled more than 80% of the semiconductor industry are U.S. and…

20 Clues: Cyber law exists to handle cybersecurity and…Devices of information-age products are calledWhat vendor is ranked first for the semiconductor industry in 2018What is the leading computer manufacturing company that based in TaiwanComputer system resources and services that can be accessed over the cloud...

GCSAM 2023 2023-07-10

GCSAM 2023 crossword puzzle
Across
  1. A “tunnel” for private network browsing:
  2. The collection, use, sharing, storage, destruction, or processing of PI that is provided by an individual in connection with obtaining a product, service, or employment, including an individual’s choice on how their PI is used.
  3. Be client obsessed, champion our people, lead with integrity, own it, and win as one are examples of TIAA’s:
  4. What malware propagates without a host program?
  5. A _____ review is done quarterly to review privileged access.
  6. What is the most common attack vector for malware?
  7. TIAA’s ______ promotes a culture of inclusion, diversity and equity by connecting associates across diverse perspectives, wide-ranging talents and unique experiences.
  8. A targeted form of phishing that is customized for specific individuals within a specific organization.
  9. What does GCSAM stand for?
  10. Suspicious sender address, invalid branding, appealing to emotions, sense of urgency, invalid URL’s, request for sensitive data, spelling errors, requests to click links, and signatures are all __________ of phishing attempts.
Down
  1. Who founded TIAA?
  2. Malware that limits users access until a ransom is paid.
  3. A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.
  4. Who is the security awareness program’s mascot?
  5. What is TIAA’s social impact hashtag?
  6. Be the change by delivering lifetime income for all with investments that build a better world is TIAA’s:
  7. When somebody sends an e-mail with a link to a bogus website it is called:
  8. In 2021 TIAA cybersecurity expanded to become TIAA _____ cybersecurity.
  9. The probability of exposure or loss of assets is considered?

19 Clues: Who founded TIAA?What does GCSAM stand for?What is TIAA’s social impact hashtag?A “tunnel” for private network browsing:Who is the security awareness program’s mascot?What malware propagates without a host program?What is the most common attack vector for malware?Malware that limits users access until a ransom is paid....

Reasons why Singapore is Safe / Not Safe 2024-07-23

Reasons why Singapore is Safe / Not Safe crossword puzzle
Across
  1. Public cooperation via [] like SGSecure.
  2. Advanced surveillance and cybersecurity[]
  3. Robust laws and proactive Internal [] Department
  4. [] platforms spreading extremist ideologies.
Down
  1. terrorist may target tourist hotspots
  2. Potential for reduced vigilance over time.
  3. [] to regional terrorist hotspots.
  4. Emphasis on racial and religious [] reduces radicalisation.

8 Clues: [] to regional terrorist hotspots.terrorist may target tourist hotspotsPublic cooperation via [] like SGSecure.Advanced surveillance and cybersecurity[]Potential for reduced vigilance over time.[] platforms spreading extremist ideologies.Robust laws and proactive Internal [] DepartmentEmphasis on racial and religious [] reduces radicalisation.

Future Jobs 2022-01-15

Future Jobs crossword puzzle
Across
  1. discontinue a job here and offer it in another country
  2. a specialist who’s an authority on something
  3. can continue for a long time
  4. a plan
  5. safety
  6. outdated and old-fashioned
Down
  1. someone who takes on gig work
  2. what we expect to happen in the future
  3. intelligence advanced computer software
  4. someone who starts a new company
  5. work temporary work on a specific project
  6. protecting systems, networks, and programs from digital attacks

12 Clues: a plansafetyoutdated and old-fashionedcan continue for a long timesomeone who takes on gig worksomeone who starts a new companywhat we expect to happen in the futureintelligence advanced computer softwarework temporary work on a specific projecta specialist who’s an authority on somethingdiscontinue a job here and offer it in another country...

Big 8 Ideas of Cyber 2024-01-11

Big 8 Ideas of Cyber crossword puzzle
Across
  1. worth a great deal
  2. doing the right thing online
  3. Always conected world
  4. synonym for electronic
  5. a staemnt of intent to damage
Down
  1. keeping computers safe and sound
  2. imaginng what could go wrong and figuring out how to stop it
  3. the application of conceptual knowledge
  4. It's like the key to a magical fortress and how to build it
  5. navigating dangers online
  6. the big impact of cybersecurity choices
  7. keeping secerets safe online

12 Clues: worth a great dealAlways conected worldsynonym for electronicnavigating dangers onlinedoing the right thing onlinekeeping secerets safe onlinea staemnt of intent to damagekeeping computers safe and soundthe application of conceptual knowledgethe big impact of cybersecurity choicesIt's like the key to a magical fortress and how to build it...

cybersicuritie eng briac 2024-03-13

cybersicuritie eng briac crossword puzzle
Across
  1. A barrier against network threats
  2. Harmful software
  3. is a network of private computers that have been infected with malicious software and are controlled as a group without the owners' knowledge.
  4. Fixing software vulnerabilities
  5. Protection against online threats
  6. Leaking sensitive information have 1 space (_)
  7. Unauthorized access
Down
  1. Double security confirmation for login have 1 space (_)
  2. Online assault
  3. Weakness in security
  4. Tricking people to reveal private information
  5. Scrambling data to keep it secret

12 Clues: Online assaultHarmful softwareUnauthorized accessWeakness in securityFixing software vulnerabilitiesA barrier against network threatsScrambling data to keep it secretProtection against online threatsTricking people to reveal private informationLeaking sensitive information have 1 space (_)Double security confirmation for login have 1 space (_)...

IO LA SO 2023-05-31

IO LA SO crossword puzzle
Across
  1. Truffa informatica via e-mail
  2. Programma di videoscrittura creato da Microsoft
  3. Il foglio di Excel è fatto di righe e ....
  4. Icona da cliccare per segnalare un sospetto phishing
  5. Non lasciare mai il tuo dispositivo aziendale....
  6. Programma di social networking aziendale
  7. Programma per fogli di calcolo
Down
  1. Sicurezza informatica (ingl.)
  2. Riunione organizzata attraverso la piattaforma Zoom
  3. Teams permette di lavorare e modificare ......files condivisi
  4. Strumento per realizzare presentazioni illustrate
  5. Programma di posta elettronica

12 Clues: Sicurezza informatica (ingl.)Truffa informatica via e-mailProgramma di posta elettronicaProgramma per fogli di calcoloProgramma di social networking aziendaleIl foglio di Excel è fatto di righe e ....Programma di videoscrittura creato da MicrosoftStrumento per realizzare presentazioni illustrateNon lasciare mai il tuo dispositivo aziendale.......

AI in Cybersecurity 2025-10-20

AI in Cybersecurity crossword puzzle
Across
  1. – Permission to enter a system.
  2. – Short for Artificial Intelligence.
  3. – A crime AI can help detect.
  4. – Harmful software detected by AI.
  5. – To protect data by converting it into code.
  6. – What we do to teach AI models.
Down
  1. – Automated programs that can attack or protect systems.
  2. – What AI learns from.
  3. – The goal of cybersecurity.
  4. – A warning sent when AI detects a threat.
  5. – A common target for cyberattacks.
  6. – What hackers use to fool people.

12 Clues: – What AI learns from.– The goal of cybersecurity.– A crime AI can help detect.– Permission to enter a system.– What we do to teach AI models.– Harmful software detected by AI.– What hackers use to fool people.– A common target for cyberattacks.– Short for Artificial Intelligence.– A warning sent when AI detects a threat....

Cybersecurity/Web Design 2019-11-05

Cybersecurity/Web Design crossword puzzle
Across
  1. to scramble information so that it can be sent safely over the Internet
  2. Hacking’ - Testing a computer systems to find security vulnerabilities
  3. Audience
  4. is the branch of Computer Science that deals with online threats, how to keep data safe and preventing cybercrime (criminal activity carried out using a computer/computer networks)
  5. preferred way to present/layout digital material
  6. attack intended to direct a website’s traffic to another fake site by hacking a DNS server or redirecting the computer electronically.
  7. to help protect a computer network from unauthorised access
  8. reason for which the website has been created e.g. to entertain
Down
  1. Testing
  2. a secret word to unlock a device – must include numbers/special characters
  3. by reproducing itself or infecting other programs by modifying them.
  4. to use and understand
  5. a user is sent a fake email that looks like it is from a bank/business hoping to gather personal information.
  6. simple way to get passwords/PIN numbers by criminals standing behind you and watching.

14 Clues: TestingAudienceto use and understandpreferred way to present/layout digital materialto help protect a computer network from unauthorised accessreason for which the website has been created e.g. to entertainby reproducing itself or infecting other programs by modifying them.Hacking’ - Testing a computer systems to find security vulnerabilities...

Cybersecurity Awareness Crossword 2025-08-27

Cybersecurity Awareness Crossword crossword puzzle
Across
  1. when unauthorized access to data or a system is made (hacked)
  2. an mfa type that is related to something unique to you; ie- fingerprint, facial recognition, etc.
  3. uses more than one type of authentication to verify a user identity
  4. proves someone's identity; Rayburn Use for access into ERCOT MIS
  5. global network (web) of computers that are connected and can share information with each other
Down
  1. to check that something is correct
  2. malicious software that locks your files until a demanded payment is made
  3. malicious software
  4. stored in your browser to track users across websites and remember preferences; "Third-Party ___ "
  5. habits, practices, and procedures that individuals and organizations use to maintain their digital health and security
  6. "___ Trust"; a model where no one is trusted by default
  7. a software update
  8. malicious email, generally attempts to get you to click a link or download a malicious file

13 Clues: a software updatemalicious softwareto check that something is correct"___ Trust"; a model where no one is trusted by defaultwhen unauthorized access to data or a system is made (hacked)proves someone's identity; Rayburn Use for access into ERCOT MISuses more than one type of authentication to verify a user identity...

Cybersecurity (year 09) 2022-12-12

Cybersecurity (year 09) crossword puzzle
Across
  1. people who are paid to legally hack into computer systems
  2. hackers who use tools downloaded from the internet that allow them to hack with little technical knowledge
  3. Manipulating people to get their personal information
  4. malware that collects info about the user and sends it back to criminals
Down
  1. type of malware that encrypts your data until you pay
  2. attack done by flooding a website with lots of requests
  3. attack where the criminal tries to maintain a conversation with the victim
  4. Law that looks after your data
  5. kind of access Computer Misuse Act protects from
  6. attacker watches their victim to get sensitive information
  7. an attack involving an email designed to look official
  8. malware that hides in legitimate software
  9. checks incoming and outgoing network traffic

13 Clues: Law that looks after your datamalware that hides in legitimate softwarechecks incoming and outgoing network traffickind of access Computer Misuse Act protects fromtype of malware that encrypts your data until you payManipulating people to get their personal informationan attack involving an email designed to look official...

day two - know your coworker 2022-03-27

day two - know your coworker crossword puzzle
Across
  1. shortest POV (__ minutes)
  2. POV?
  3. To which cybersecurity framework is Pentera mapped?
Down
  1. Morgan's end of night in Greece
  2. first of 2022
  3. Dor's favorite fruit
  4. How much RAM is needed for a Pentera RAN installation
  5. Maayan's second name
  6. One of Pentera's features
  7. Who said "Tenerife is great and dolphins are amazing but... Q1 isn't over yet!"

10 Clues: POV?first of 2022Dor's favorite fruitMaayan's second nameshortest POV (__ minutes)One of Pentera's featuresMorgan's end of night in GreeceTo which cybersecurity framework is Pentera mapped?How much RAM is needed for a Pentera RAN installationWho said "Tenerife is great and dolphins are amazing but... Q1 isn't over yet!"

Technology 2024-03-18

Technology crossword puzzle
Across
  1. Wireless technology for short-range communication.
  2. Security barrier for network traffic.
  3. Software that manages computer resources.
  4. Protection of computer systems from theft or damage.
Down
  1. Writing instructions for computers to execute.
  2. Measurement and analysis of unique physical characteristics.
  3. Software for accessing the internet.
  4. Global Positioning System for location tracking.
  5. This vast network connects computers worldwide.
  6. Artificial Intelligence Software

10 Clues: Artificial Intelligence SoftwareSoftware for accessing the internet.Security barrier for network traffic.Software that manages computer resources.Writing instructions for computers to execute.This vast network connects computers worldwide.Global Positioning System for location tracking.Wireless technology for short-range communication....

byte trail 3 2025-03-05

byte trail 3 crossword puzzle
Across
  1. Secures data by converting it to a coded form
  2. Software managing hardware and software resources
  3. Smallest unit of data in computing
  4. Storing data over the internet
  5. Device that connects multiple networks
Down
  1. Virtual representation of physical hardware
  2. High-level programming language
  3. Protecting data from unauthorized access
  4. A column in a table
  5. Set of vertices connected by edges

10 Clues: A column in a tableStoring data over the internetHigh-level programming languageSet of vertices connected by edgesSmallest unit of data in computingDevice that connects multiple networksProtecting data from unauthorized accessVirtual representation of physical hardwareSecures data by converting it to a coded form...

STEM Crossword 2025-08-19

STEM Crossword crossword puzzle
Across
  1. – Creating new ideas, tools, or methods.
  2. Exploration – Study and travel beyond Earth.
  3. – Using math or computers to simulate real-world systems.
  4. – The study of the natural world.
  5. – Protecting digital information.
Down
  1. Energy – Energy from sun, wind, or water.
  2. – The language of STEM.
  3. – Applying science to make tools or systems.
  4. – Designing and building solutions.
  5. – Science, Technology, Engineering, and Mathematics.

10 Clues: – The language of STEM.– The study of the natural world.– Protecting digital information.– Designing and building solutions.– Creating new ideas, tools, or methods.Energy – Energy from sun, wind, or water.– Applying science to make tools or systems.Exploration – Study and travel beyond Earth.– Science, Technology, Engineering, and Mathematics....

We Make IT Happen 2025-05-15

We Make IT Happen crossword puzzle
Across
  1. Programs that run on a computer
  2. A global system connecting computers
  3. Machine used for calculations and information
  4. A group of connected devices
  5. Organized collection of data
Down
  1. Physical parts of a computer
  2. Protection against online threats
  3. A person who writes computer code
  4. A step-by-step process used in computing
  5. Technology involving machines that do tasks

10 Clues: Physical parts of a computerA group of connected devicesOrganized collection of dataPrograms that run on a computerProtection against online threatsA person who writes computer codeA global system connecting computersA step-by-step process used in computingTechnology involving machines that do tasksMachine used for calculations and information

Internet Safety Crossword 2021-02-11

Internet Safety Crossword crossword puzzle
Across
  1. information information that can identify someone
  2. securing information on the internet
  3. can be trusted
  4. if something makes you feel sad or uncomfortable tell a _______ adult trusted
  5. software intended to do damage to computers
  6. someone who witnesses but doesn't participate
Down
  1. information about a person found online
  2. bullying using technology
  3. a person who stands up for someone else
  4. good manners online
  5. too much information

11 Clues: can be trustedgood manners onlinetoo much informationbullying using technologysecuring information on the internetinformation about a person found onlinea person who stands up for someone elsesoftware intended to do damage to computerssomeone who witnesses but doesn't participateinformation information that can identify someone...

Safety & Risk Awareness Month 2025-10-12

Safety & Risk Awareness Month crossword puzzle
Across
  1. Adhering to rules and regulations.
  2. A scam email pretending to be legitimate.
  3. Process of identifying potential hazards.
  4. Digitally altered video.
  5. Protecting systems from online threats.
  6. Understanding potential risks.
  7. Valuable digital information.
Down
  1. Word or phrase used to access systems
  2. Screenings to monitor health & well-being.
  3. Checklist Ensures a safe remote work environment.
  4. The state of being informed and alert.
  5. Possibility of loss or harm.
  6. A proactive measure to prevent incidents.
  7. Formal review to ensure standards are met.
  8. Keeping sensitive data safe from exposure.
  9. Measures taken to avoid danger or harm.

16 Clues: Digitally altered video.Possibility of loss or harm.Valuable digital information.Understanding potential risks.Adhering to rules and regulations.Word or phrase used to access systemsThe state of being informed and alert.Protecting systems from online threats.Measures taken to avoid danger or harm.A scam email pretending to be legitimate....

Cybersecurity Unit 2 Terminology 2022-09-13

Cybersecurity Unit 2 Terminology crossword puzzle
Across
  1. A machine that requests a webpage using a web browser.
  2. A Wireshark data capture file that contains packet information of network traffic.
  3. A network interface card is a physical component on a computer or device that provides connectivity to a network.
  4. In network security, it allows or denies packets based on source and destinations addresses, ports, or protocols.
  5. The arrangement of the various elements (computers,routers, switches, etc) of a network.
  6. A (distributed) denial of service attack that targets websites and web servers with the intention of bringing the services they provide to a halt.
  7. Transmission Control Protocol used to establish and maintain connections over a computer network.
  8. An agreed-upon method for communication.
  9. A code that defines every structure on an HTML page, such as text, images, and links. HTML tags begin with the less-than (<) character and end with greater-than (>) .
  10. An operating system similar in concept to the Windows OS but used more often to host routers and web servers.
  11. Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it.
  12. A part of a process or system that is seen by the user and typically provides functionality to the user.
  13. A small local area network of computers and devices.
  14. A piece of software or a sequence of commands that takes advantage of a vulnerability in a computer system to cause unexpected behavior to occur.
  15. A machine that responds to a request received.
  16. An identifying number for hosts and servers on the internet.
  17. The buying and selling of goods or services over the internet.
  18. it helps the reader of the program understand the code, especially when working on code with other people.
  19. A way for a computer to identify specific programs and manage their activity.
  20. When hackers can use their knowledge of a web server's directory structure to craft URL addresses and navigate to locations that are unreferenced and unlinked in a website.
  21. A file that contains an official record of activities that occur on a computer.
  22. A computer, typically one on a network.
  23. Preserving the accuracy of information and validating its source.
  24. A database in which data is organized into collections of similar data, called tables. It uses relationships to define how data in one table can relate to data in another table.
  25. A computer that delivers files forming web pages across a network to requesting clients.
  26. Problems, faults, and bugs in the program that are exploitable, allowing attackers access to the computer on which the program is running.
  27. A starting point for data analysis. It is the initial data set used in later comparisons.
  28. In a command, they are used to specify different variations, sometimes supplying additional input to the command or requesting different styles of output from the command.
Down
  1. Ensuring that information resources and services are accessible in a timely manner.
  2. Keeping sensitive information out of unwanted hands.
  3. Performing a computer attack to evaluate the security of a
  4. It can have two meanings in computer terminology:a) it can be a specific application or function such as email, chat, etc. b) it can refer to a specific part of an application, such as transmitting the data of a webpage
  5. Software that replicates and infects many computers, turning the computer into a "zombie". Zombie devices are remotely controlled by an attacker for malicious purposes.
  6. The way an organization structures and organizes the information that is required by their employees and/or customers.
  7. system The hardware and software used to help organize and analyze data.
  8. Analyze something without interfering or affecting it.
  9. Refers to the action of watching and analyzing network traffic at the packet level.
  10. A type of exploit in which the attacker inserts malicious client-side code into webpages to steal data, take control of a computer, run malicious code, or achieve a phishing scam.
  11. A computer, typically one on a network. It can also be referred to as a machine or a system.
  12. In terms of computer science, it means to increase a system's security and reduce its vulnerabilities.
  13. Reverse the encryption process, making the data human-readable again.
  14. system. The extra digits are represented by the letters a through f, so all digits in hex are 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f. You can also see hex numbers in all capitals A through F.
  15. A three-way communication method using SYN (synchronize), SYN-ACK (synchronize=acknowledge), and ACK (acknowledge) to establishing a connection between
  16. They are best known for developing standards in the computer and electronics industries.
  17. A human-based attack in which the malicious user intercepts communication between the victim's computer and the internet.
  18. Data that is stored in a router in table format. It contains addresses of known networks (other routers), ones that have already been discovered and used.
  19. The Organizationally Unique Identifier is the first half of the MAC address, designating the manufacturer of the network device.
  20. It is a very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden, allowing the user to focus on the details that are important for the task at hand.
  21. Transport Layer Security is a security protocol that uses encryption at a lower level of abstraction.
  22. Software and hardware that track all keyboard clicks, including back spaces, to discover usernames, passwords, credit card numbers, and other sensitive information.
  23. Software running with elevated privileges to control a computer or to gain access to restricted accounts and data.
  24. A network device that controls and filters data between networks, either wired or wireless. It is a specific type of "gateway", a device that acts as a gate between two networks.
  25. A media access control (MAC) addresses is unique numeric code that is assigned to networking hardware components (typically a network interface card or NIC) that is built into computers and mobile devices. The code is assigned by the manufacturer, includes their unique identification number, and never changes.
  26. Often referred to as hex, it is a base-16
  27. The acronym for "Uniform Resource Locator". The systematic way to find specific web addresses and web pages.
  28. A note in a program that describes what the code is doing. Adding them is very good programming practice,
  29. A part of a process or system that is not seen by the user. It provides a supporting function on behalf of the main process.
  30. Small units of data, transmitted on a network. Collected together, they compose some larger data, such as a document, a website, a movie, etc.

58 Clues: A computer, typically one on a network.An agreed-upon method for communication.Often referred to as hex, it is a base-16A machine that responds to a request received.Keeping sensitive information out of unwanted hands.A small local area network of computers and devices.A machine that requests a webpage using a web browser....

Cybersecurity Unit 2 Terminology 2022-09-15

Cybersecurity Unit 2 Terminology crossword puzzle
Across
  1. The way an organization structures and organizes the information that is required by their employees and/or customers.
  2. Performing a computer attack to evaluate the security of a system.
  3. A computer typically one on a network.
  4. An agreed-upon method for communication.
  5. A file that contains an official record of activities that occur on a computer.
  6. The acronym for "Uniform Resource Locator". The systematic way to find specific web addresses and web pages.
  7. A human-based attack in which the malicious user intercepts communication between the victim's computer and the internet.
  8. It is a very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden allowing the user to focus on the details that are important for the task at hand.
  9. A way for a computer to identify specific programs and manage their activity.
  10. Preserving the accuracy of information and validating its source.
  11. A network device that controls and filters data between networks either wired or wireless. It is a specific type of "gateway" a device that acts as a gate between two networks.
  12. A piece of software or a sequence of commands that takes advantage of a vulnerability in a computer system to cause unexpected behavior to occur.
  13. Transmission Control Protocol used to establish and maintain connections over a computer network.
  14. Refers to the action of watching and analyzing network traffic at the packet level.
  15. An identifying number for hosts and servers on the internet.
  16. Software running with elevated privileges to control a computer or to gain access to restricted accounts and data.
  17. It can have two meanings in computer terminology: a) it can be a specific application or function such as email chat etc. b) it can refer to a specific part of an application such as transmitting the data of a web page
  18. Keeping sensitive information out of unwanted hands.
  19. A type of exploit in which the attacker inserts malicious client-side code into webpages to steal data take control of a computer run malicious code or achieve a phishing scam.
  20. In a command flags are used to specify different variations sometimes supplying additional input to the command or requesting different styles of output from the command.
  21. Often referred to as hex it is a base-16 number system.
  22. Problems faults and bugs in the program that are exploitable allowing attackers access to the computer on which the program is running.
  23. A database in which data is organized into collections of similar data called tables. It uses relationships to define how data in one table can relate to data in another table.
  24. In network security it allows or denies packets based on source and destinations addresses ports or protocols.
  25. baseline A starting point for data analysis. It is the initial data set used in later comparisons.
  26. Ensuring that information resources and services are accessible in a timely manner.
  27. Analyze something without interfering or affecting it.
Down
  1. The arrangement of the various elements (computers routers switches etc) of a network.
  2. Small units of data transmitted on a network. Collected together they compose some larger data such as a document a website a movie etc.
  3. Software that locks your computer or makes it inoperable requiring you to pay someone to remove it.
  4. Software that replicates and infects many computers turning the computer into a "zombie". Zombie devices are remotely controlled by an attacker for malicious purposes.
  5. The hardware and software used to help organize and analyze data.
  6. A code that defines every structure on an HTML page such as text images and links.
  7. A (distributed) denial of service attack that targets websites and web servers with the intention of bringing the services they provide to a halt.
  8. Data that is stored in a router in table format. It contains addresses of known networks (other routers) ones that have already been discovered and used.
  9. When hackers can use their knowledge of a web server's directory structure to craft URL addresses and navigate to locations that are unreferenced and unlinked in a website.
  10. A Wireshark data capture file that contains packet information of network traffic.
  11. Transport Layer Security is a security protocol that uses encryption at a lower level of abstraction.
  12. In terms of computer science it means to increase a systems security and reduce its vulnerabilities.
  13. A machine that requests a webpage using a web browser.
  14. A machine that responds to a request received.
  15. A computer that delivers files forming web pages across a network to requesting clients.
  16. The buying and selling of goods or services over the internet.
  17. A note in a program that describes what the code is doing.
  18. A computer typically one on a network.
  19. Software and hardware that track all keyboard clicks including back spaces to discover usernames passwords credit card numbers and other sensitive information.
  20. A three-way communication method using SYN (synchronize) SYN-ACK (synchronize=acknowledge) and ACK (acknowledge) to establishing a connection between hosts.
  21. A small local area network of computers and devices.
  22. An operating system similar in concept to the Windows OS but used more often to host routers and web servers.

49 Clues: A computer typically one on a network.A computer typically one on a network.An agreed-upon method for communication.A machine that responds to a request received.Keeping sensitive information out of unwanted hands.A small local area network of computers and devices.A machine that requests a webpage using a web browser....

Cybersecurity Crossword Puzzle - MP 2023-01-27

Cybersecurity Crossword Puzzle - MP crossword puzzle
Across
  1. transforms plaintext into ciphertext
  2. key used to decrypt
  3. trap for cyber criminals
  4. unsolicited emails
  5. tricked into clicking
  6. intrusive computer software
  7. key to encrypt and decrypt
  8. helps prevent hackers and viruses
  9. hidden horse surprise
  10. malware that collects personal data
  11. hides users location
Down
  1. unwanted pop up ads
  2. used to detect viruses network
  3. program that allows remote access
  4. person who harms your computer
  5. protects data by scrambling it
  6. error on software
  7. malware that reproduces itself
  8. ethical hacker
  9. form of internet communication
  10. peripherals connected as one entity.

21 Clues: ethical hackererror on softwareunsolicited emailsunwanted pop up adskey used to decrypthides users locationtricked into clickinghidden horse surprisetrap for cyber criminalskey to encrypt and decryptintrusive computer softwareused to detect viruses networkperson who harms your computerprotects data by scrambling itmalware that reproduces itself...

Cybersecurity Month - October 2023 2023-05-19

Cybersecurity Month - October 2023 crossword puzzle
Across
  1. TRSL's IT team stays on top of this so don't you fall for it either
  2. Not gonna fry up anything with this catch
  3. out to get you and your information
  4. always best to use your own instead of a public or free charging station
  5. If public, not the best connection for work-related tasks or any sensitive and/or personal info
  6. malicious software that can infiltrate a network(s)
  7. I can be dangerous so don't open me unless you know I'm safe
  8. If you don't know the source, do not ____ the data.
  9. hacker operating in cyberspace
  10. Being alert to avoid potential dangers or risks
  11. If you get a __ ___from someone you don't know, no response is best of all
  12. scammers can give you a ring too
Down
  1. Scammers use this trick to redirect your browser
  2. Your fingers do the talking but don't fall for this threat
  3. Leave it this section to handle your PC needs, please.
  4. when a "big fish" is targeted
  5. An ___ ___ calls at 3 am with a fraud alert from your bank. Hang up and call your bank directly, ASAP.
  6. FortiToken or Google
  7. Instead of just a single word, this is also great for a great password
  8. I should be unique and not reused
  9. If something seems too good to be true, you should feel this way.
  10. always do this when stepping away from your PC
  11. use this to type in the URL
  12. share carefully on these profiles
  13. method of communication in lieu of "snail mail"

25 Clues: FortiToken or Googleuse this to type in the URLwhen a "big fish" is targetedhacker operating in cyberspacescammers can give you a ring tooI should be unique and not reusedshare carefully on these profilesout to get you and your informationNot gonna fry up anything with this catchalways do this when stepping away from your PC...

CIS178 Cybersecurity Crossword Puzzle 2023-07-26

CIS178 Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. people bullying others online
  2. software that destroys information on your computer
  3. someone who attempts to get your information
  4. detection to shield against viruses
  5. software that hackers use to spy on you
  6. someone is tricked on clicking on an object
  7. software that hijacks your system and wants money
  8. malware that spreads to devices and slows down everything
  9. software to keep intruders out
  10. two or more computers connected together
  11. hackers change an IP address to seem real
Down
  1. multiple steps to access your account
  2. series of numbers that allow devices to connect to the internet
  3. owners permission to hack into their network
  4. connecting computers on a private network
  5. a scam that seems real
  6. hacker breaking into your computer data
  7. computers that are connected as one entity
  8. password to access your device
  9. a type of storage for your information

20 Clues: a scam that seems realpeople bullying others onlinepassword to access your devicesoftware to keep intruders outdetection to shield against virusesmultiple steps to access your accounta type of storage for your informationsoftware that hackers use to spy on youhacker breaking into your computer datatwo or more computers connected together...

MAHIM SIKDER-Cybersecurity Crossword 2023-09-07

MAHIM SIKDER-Cybersecurity Crossword crossword puzzle
Across
  1. a client/server protocol that automatically provides an IP host with its IP address, subnet mask and default gateway.
  2. a process that verifies a user's identity and ensures that they have authorization, before providing them with access to information.
  3. a copy of data that is used if original data is unavailable.
  4. a scheme that takes money or other valuables from an unsuspecting victim.
  5. a process in which data is converted to code, in order to prevent unauthorized access.
  6. a malware that denies users access to their files. The attacker demands money from the user, in order for them to get their information back.
  7. process of copying data from the internet to your computer.
  8. a communication method that electronic devices use to deliver and receive messages electronically.
  9. software that hackers use to steal data,damage or destroy computers/computer systems.
Down
  1. protection of networks,data and devices from criminal use.
  2. a software used to detect and destroy viruses.
  3. A number used to track someones financial information.(EVERYONE GETS THIS NUMBER AT BIRTH).
  4. this word is short for organization(s) that provides access to the Internet.
  5. string of characters used to access authorization.
  6. a set of instructions, data or programs used by computers to operate and execute specific tasks.
  7. known as the address of a web page.
  8. a system that changes domain name into IP-addresses.
  9. advertisement that promote product or services to the user. Sometimes this can lead to malicious websites.
  10. a device that connects two or more packet-switched networks. Uses ip-Addresses.
  11. authentication method that requires the user to provide more than one verification information.

20 Clues: known as the address of a web page.a software used to detect and destroy viruses.string of characters used to access authorization.a system that changes domain name into IP-addresses.protection of networks,data and devices from criminal use.process of copying data from the internet to your computer....

Cybersecurity Awareness Month Crossword 2023-09-27

Cybersecurity Awareness Month Crossword crossword puzzle
Across
  1. A process or measure used to verify a user's identity.
  2. A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices.
  3. Software that compromises the operation of a system by performing an unauthorized function or process.
  4. Converting Data into a form that cannot be easily understood by unauthorized people.
  5. A flaw or weakness in an information system that could be exploited.
  6. A string of characters used to authenticate an identity.
  7. Extra copies of computer files that can be used to restore files that are lost or damaged.
  8. A mechanism for creating a secure connection between a computing device and a computer network
  9. A type of malware that denies a user's access to a system or data until a sum of money is paid.
  10. A collection of computers compromised by malicious code and controlled across a network.
  11. Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from trusted sources.
Down
  1. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization
  2. The ability of individuals to understand and exercise control over how information about themselves may be used by others.
  3. Software designed to block malware from entering protected networks.
  4. Faking the sending address of a transmission to gain illegal entry into a secure system.
  5. Part of the Internet that isn't indexed by search engines.
  6. An unauthorized user who attempts to or gains access to an information system.
  7. an individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
  8. Computer programs that can block, detect, and remove viruses and other malware.
  9. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  10. A cybersecurity risk that originates from within an organization.
  11. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
  12. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  13. Unsolicited emails sent to many addresses.

24 Clues: Unsolicited emails sent to many addresses.A process or measure used to verify a user's identity.A string of characters used to authenticate an identity.Part of the Internet that isn't indexed by search engines.A cybersecurity risk that originates from within an organization.Software designed to block malware from entering protected networks....

Kisner Wedding 2025-04-01

Kisner Wedding crossword puzzle
Across
  1. Our dog's name
  2. Name of our church
  3. What we're doing for our honeymoon
  4. Furthers we've traveled together
  5. Our favorite video game
  6. Said "I love you" first
  7. Number of years together
  8. Nickname Ryan calls Elissa
  9. Elissa's job title
  10. Elissa's birth month
Down
  1. Name of the hike where they got lost
  2. Ryan's birth month
  3. Artist we listen to together most often
  4. Instrument Elissa played in school
  5. Where we made our wedding bands
  6. Where Ryan proposed
  7. Ryan's eye color
  8. Elissa's second middle name
  9. Favorite Carlisle ice cream spot
  10. Street we live on
  11. Ryan's bachelor's degree
  12. The bigger foodie
  13. Our favorite food to eat together
  14. Ryan's favorite sports team
  15. Our first dance song

25 Clues: Our dog's nameRyan's eye colorStreet we live onThe bigger foodieRyan's birth monthName of our churchElissa's job titleWhere Ryan proposedOur first dance songElissa's birth monthOur favorite video gameSaid "I love you" firstRyan's bachelor's degreeNumber of years togetherNickname Ryan calls ElissaElissa's second middle name...

TTS INFORMATIKA (Dara Cantika Dinsky X-G) 2025-04-10

TTS INFORMATIKA (Dara Cantika Dinsky X-G) crossword puzzle
Across
  1. itu merek dagang
  2. yang di Maksud hak cipta
  3. konten digital berunsur budaya?
  4. Konsekuensi konten negatif?
  5. Konsekuensi pelanggaran HAKI
  6. Tujuan validasi konten negatif?
  7. Tugas cybersecurity engineer?
  8. itu ranking?
  9. fungsi utama search engine?.
  10. penting unsur budaya dalam konten digital?
  11. untuk diseminasi konten budaya?
  12. itu konten negatif
  13. Tugas web developer?
  14. tugas programer
Down
  1. manfaat pendaftaran HAKI
  2. itu crawling?
  3. diseminasi konten budaya?
  4. Tugas database administrator?
  5. itu paten
  6. itu indexing
  7. Tugas data scientist?
  8. Tantangan validasi konten negatif?
  9. search engine?
  10. Metode validasi konten negatif?
  11. menghindari pelanggaran budaya?

25 Clues: itu patenitu indexingitu ranking?itu crawling?search engine?tugas programeritu merek dagangitu konten negatifTugas web developer?Tugas data scientist?manfaat pendaftaran HAKIyang di Maksud hak ciptadiseminasi konten budaya?Konsekuensi konten negatif?Konsekuensi pelanggaran HAKIfungsi utama search engine?.Tugas database administrator?...

Cybersecurity - LMC Style 2022-10-11

Cybersecurity - LMC Style crossword puzzle
Across
  1. Malicious software
  2. ___ Engineering. Hackers us this skill to trick people into revealing private information .
  3. Software that collects data about a user and transmits it over the internet without the user’s knowledge/permission.
  4. A technology used when working remote that secures information going to/from LMC’s servers.
  5. Software Usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them.
  6. A technology that allows us to access our files through the internet from anywhere in the world. Hint: it also brings rain.
  7. A group of computers, printers and devices that are interconnected.
Down
  1. A system that relies upon encryption techniques rather than banks to regulate the generation of units of currency and verify the transfer of funds.
  2. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. A process of encoding messages to keep them secret, so only “authorized” parties can read it.
  4. Who do you call for help?
  5. A sequence of words (spaces and punctuation too) used for authentication.
  6. Piece of code that replicates itself in order to spread the infection to other connected computers.

13 Clues: Malicious softwareWho do you call for help?A group of computers, printers and devices that are interconnected.A sequence of words (spaces and punctuation too) used for authentication.___ Engineering. Hackers us this skill to trick people into revealing private information ....

Cybersecurity (year 09) 2022-12-12

Cybersecurity (year 09) crossword puzzle
Across
  1. an attack involving an email designed to look official
  2. people who are paid to legally hack into computer systems
  3. malware that collects info about the user and sends it back to criminals
  4. Manipulating people to get their personal information
  5. attacker watches their victim to get sensitive information
  6. malware that hides in legitimate software
Down
  1. hackers who use tools downloaded from the internet that allow them to hack with little technical knowledge
  2. attack where the criminal tries to maintain a conversation with the victim
  3. kind of access Computer Misuse Act protects from
  4. Law that looks after your data
  5. type of malware that encrypts your data until you pay
  6. checks incoming and outgoing network traffic
  7. attack done by flooding a website with lots of requests

13 Clues: Law that looks after your datamalware that hides in legitimate softwarechecks incoming and outgoing network traffickind of access Computer Misuse Act protects fromtype of malware that encrypts your data until you payManipulating people to get their personal informationan attack involving an email designed to look official...

CyberSecurity Month Crossword 2024-10-10

CyberSecurity Month Crossword crossword puzzle
Across
  1. You should install this on your computer to detect and remove malicious software
  2. The process of proving your identity with a username and password
  3. Software that is designed to disrupt, damage, or gain unauthorized access to your computer
  4. ___________ backup - A way to protect important files by saving copies offsite or in the cloud
  5. A set of rules created to ensure security, such as not reusing passwords
Down
  1. Emails pretending to be from legitimate sources to steal personal info
  2. This type of "attack" involves tricking people into giving away personal information
  3. "Public ________ should not be used for sensitive tasks like banking."
  4. A software designed to protect against malicious software
  5. A security measure that sends a code to your phone to verify your login
  6. “_______ encryption” - Technology that scrambles data so it can only be read by authorized users
  7. What you should never share with others, even if they seem trustworthy
  8. A strong, unique _______ should be used for each account
  9. An attack where hackers encrypt your data and demand money to unlock it
  10. "_____ your devices regularly" - Important action to prevent unauthorized access

15 Clues: A strong, unique _______ should be used for each accountA software designed to protect against malicious softwareThe process of proving your identity with a username and passwordEmails pretending to be from legitimate sources to steal personal info"Public ________ should not be used for sensitive tasks like banking."...

CS Month Week 2 2023-09-14

CS Month Week 2 crossword puzzle
Across
  1. _______ Control: The practice of restricting access to resources based on user roles and permissions to prevent unauthorized access.
  2. Cybersecurity _______:A structured approach that defines guidelines and best practices for securing information systems.
  3. _______ Response: A planned approach to managing and mitigating the impact of a cybersecurity incident.
  4. _______ of Service: An attack that overwhelms a system, network, or website with excessive traffic, rendering it inaccessible.
  5. The process of verifying the identity of a user, system, or device to grant access to resources.
Down
  1. ______ Breach: Unauthorized access, acquisition, or disclosure of sensitive data, often involving large amounts of personal or confidential information.
  2. _______Testing: Ethical hacking conducted to identify vulnerabilities and assess the security of a system or network
  3. Malware that encrypts a victim’s data and demands payment (ransom) for its decryption.

8 Clues: Malware that encrypts a victim’s data and demands payment (ransom) for its decryption.The process of verifying the identity of a user, system, or device to grant access to resources._______ Response: A planned approach to managing and mitigating the impact of a cybersecurity incident....

Telecom Olympics 2021 2021-05-04

Telecom Olympics 2021 crossword puzzle
Across
  1. Network security system used to stop unauthorized access
  2. Someone who seeks to exploit weaknesses in a network
  3. Making copies of data
  4. Tech Support Company
  5. Communications over a distance
  6. Don't open ____ from people you don't know
  7. Use ____ passwords
Down
  1. What is a CDR?
  2. A piece of code that is capable of destroying data
  3. The capacity of a telecom line to carry signals
  4. The activity of defrauding by posting as a legitimate business
  5. NIST involves strategies for ____
  6. Board President

13 Clues: What is a CDR?Board PresidentUse ____ passwordsTech Support CompanyMaking copies of dataCommunications over a distanceNIST involves strategies for ____Don't open ____ from people you don't knowThe capacity of a telecom line to carry signalsA piece of code that is capable of destroying dataSomeone who seeks to exploit weaknesses in a network...

Office of Performance Management and Internal Controls 2021-03-05

Office of Performance Management and Internal Controls crossword puzzle
Across
  1. Intentional deceptive action
  2. Periodic comparison of source documents
  3. Office directed by Lt. Col. Terry
  4. Last name of OPMIC Information Security Officer
  5. Training due April 15th by all employees
Down
  1. Synonym for bloom, blossom and singing birds
  2. Control working in less than optimal condition
  3. Reduces the risk of error and inefficiency
  4. Acronym for Information Security Officer
  5. Complete acronym for internal control standards
  6. Last name of Internal Audit Manager
  7. The end toward which effort is directed
  8. Evaluation document with code of ethics

13 Clues: Intentional deceptive actionOffice directed by Lt. Col. TerryLast name of Internal Audit ManagerPeriodic comparison of source documentsThe end toward which effort is directedEvaluation document with code of ethicsAcronym for Information Security OfficerTraining due April 15th by all employeesReduces the risk of error and inefficiency...

August Crossword Puzzle 2024-08-18

August Crossword Puzzle crossword puzzle
Across
  1. Hero of a movie-turned-musical playing at the Kennedy Center
  2. Spielberg blockbuster approaching its 50th anniversary
  3. environmental certification for buildings
  4. site of the 2024 Olympics
  5. ___ Sullivan, 14-year-old signed with the Major Soccer League
  6. new Academic Dean
  7. ____ Richard, transgender tennis player
Down
  1. recently infamous cybersecurity company
  2. students may go to France, for instance (acronym)
  3. Chamber Chorus trip location
  4. controversial location for Olympic open-course swimming
  5. Charlie xcx album associated with the Harris campaign
  6. new Democratic presidential candidate

13 Clues: new Academic Deansite of the 2024 OlympicsChamber Chorus trip locationnew Democratic presidential candidaterecently infamous cybersecurity company____ Richard, transgender tennis playerenvironmental certification for buildingsstudents may go to France, for instance (acronym)Charlie xcx album associated with the Harris campaign...

Elicia's Birthday Crossword 2023-05-04

Elicia's Birthday Crossword crossword puzzle
Across
  1. the college Elicia is going to
  2. how many siblings does Elicia have
  3. career path Elicia wants to enter
  4. the month Elicia was born
  5. a birthday dessert
  6. an instrument Elicia plays
  7. author of Elicia's favourite books
Down
  1. how old is elicia turning
  2. the colour of Elicia's room
  3. the day of the week Elicia on which was born
  4. how does elicia take her coffee
  5. the genre of music Elicia listens to most

12 Clues: a birthday desserthow old is elicia turningthe month Elicia was bornan instrument Elicia playsthe colour of Elicia's roomthe college Elicia is going tohow does elicia take her coffeecareer path Elicia wants to enterhow many siblings does Elicia haveauthor of Elicia's favourite booksthe genre of music Elicia listens to most...

Banking and SCM 2025-05-16

Banking and SCM crossword puzzle
Across
  1. Loan charge or bank account earnings
  2. the person or business that provides goods
  3. Charges for services or tuition payments
  4. end user of a product
  5. the business that sells goods in small quantity
  6. integrating technology into financial services
  7. the total amount of goods in stock
Down
  1. Corporate Purchasing
  2. online Protection against hackers
  3. Managing and planning the flow of goods
  4. put money in business
  5. Handy, suitable and easy to use

12 Clues: Corporate Purchasingend user of a productput money in businessHandy, suitable and easy to useonline Protection against hackersthe total amount of goods in stockLoan charge or bank account earningsManaging and planning the flow of goodsCharges for services or tuition paymentsthe person or business that provides goods...

Malachi 2024-12-02

Malachi crossword puzzle
Across
  1. My max squat
  2. What I value
  3. what i´d like to major and study for the rest of my life
  4. What I´m interested in
Down
  1. what i value in a friend
  2. A qoute I live by
  3. My backup plan
  4. What i do on my free time
  5. The sport I play

9 Clues: My max squatWhat I valueMy backup planThe sport I playA qoute I live byWhat I´m interested inwhat i value in a friendWhat i do on my free timewhat i´d like to major and study for the rest of my life

Computer science 2025-11-06

Computer science crossword puzzle
Across
  1. machine that can learn and think
  2. programs that make computer useful
  3. the language programmers use
  4. informations and analysed
  5. protecting data from online threats
  6. the process of creating and improving software
Down
  1. a machine that process data and performs tasks
  2. step-by-step problem solving
  3. the tools and systems built using science

9 Clues: informations and analysedthe language programmers usestep-by-step problem solvingmachine that can learn and thinkprograms that make computer usefulprotecting data from online threatsthe tools and systems built using sciencea machine that process data and performs tasksthe process of creating and improving software

Testdf puzzlesd 2022-08-15

Testdf puzzlesd crossword puzzle
Across
  1. A string of words used to gain access to system or service which is easier to remember than a random combination of symbols and letters
  2. Use this feature in Outlook to report all suspicious email at work
  3. The act of having the content or recipient address(es) of a previously legitimate delivered email (with an attachment or link) replaced with a malicious version
  4. Cyberattacks can be targeted at anyone in the organisation. Who is responsible for Cybersecurity in your organisation?
  5. The Cybersecurity Awareness month occurs in <month>
Down
  1. A technique to manipulate a person to gain unauthorised access to a system or network and steal sensitive data or disperse malware
  2. Use this to make your passphrase harder to crack
  3. Authentication method identifying individuals based on their physical features
  4. You received an email with a suspicious link, attachment or with misspelling. What could this email be attempting to do?
  5. A malicious software that can infect your computer resulting in data theft and intrusion of your organisation

10 Clues: Use this to make your passphrase harder to crackThe Cybersecurity Awareness month occurs in <month>Use this feature in Outlook to report all suspicious email at workAuthentication method identifying individuals based on their physical features...

IT Vocabulary 2022-05-04

IT Vocabulary crossword puzzle
Across
  1. a type of social engineering attack often used to steal user data including login credentials and credit card numbers
  2. device that uses integrated circuit assemblies to store data persistently, typically using flash memory
  3. responsible for an organization’s overarching cybersecurity, which can include prevention, incident response (IR), compliance, and risk management.
  4. use a computer to gain unauthorized access to data in a system
  5. a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker
Down
  1. one kind of technology that stores the operating system, applications, and data files
  2. also referred to as junk email
  3. a set of computers sharing resources located together.
  4. attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic utilizing multiple compromised systems
  5. a group of information security experts responsible for the protection against, detection of and response to an organization's cybersecurity incidents.

10 Clues: also referred to as junk emaila set of computers sharing resources located together.use a computer to gain unauthorized access to data in a systemone kind of technology that stores the operating system, applications, and data filesdevice that uses integrated circuit assemblies to store data persistently, typically using flash memory...

Super Secret Security Crossword Puzzle 2024-05-31

Super Secret Security Crossword Puzzle crossword puzzle
Across
  1. itelligence exhibited by machines, particularly computer systems.
  2. one or more locations from which network monitoring and control, or network management, is exercised over a computer, telecommunication or satellite network.
  3. a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
  4. "gift" or "present" in Arabic.
  5. a team of experts that proactively monitor and respond to cybersecurity incidents.
  6. a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
Down
  1. the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change.
  2. an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
  3. a physical or logical sub-network that separates an internal local area network (LAN) from other untrusted networks, usually the Internet.
  4. a technique through which a cybercriminal disguises themselves as a known or trusted source.

10 Clues: "gift" or "present" in Arabic.itelligence exhibited by machines, particularly computer systems.a team of experts that proactively monitor and respond to cybersecurity incidents.a technique through which a cybercriminal disguises themselves as a known or trusted source....

Project Three Part Two 2021-10-15

Project Three Part Two crossword puzzle
Across
  1. Cyber ___ refers to fundamental cybersecurity best practices that an organization's security practitioners and users can undertake.
  2. a kind of bullying or harassment that takes place via the internet.
  3. The skill of writing and solving codes, or the study of codes.
  4. a structure or scheme consisting of a set of algorithms that converts plaintext to the ciphertext to encode or decode messages securely.
  5. cryptography is the study of ___ communications mechanisms that restrict access to a message's contents to just the sender and intended receiver.
  6. a digital certificate is a ___ or electronic password that uses cryptography and the public key infrastructure to authenticate the validity of a device, server, or user.digital Certificate
Down
  1. Cyberstalking is the use of the ____ or other electronic means to stalk or harass an individual, group, or organization.
  2. the technique of defending vital systems and sensitive data against cyber-attacks.
  3. any hostile operation aimed at computer information systems, computer networks, infrastructures, or personal computers.
  4. A person in an existing photograph or video is replaced with someone else's likeness in synthetic media.

10 Clues: The skill of writing and solving codes, or the study of codes.a kind of bullying or harassment that takes place via the internet.the technique of defending vital systems and sensitive data against cyber-attacks.A person in an existing photograph or video is replaced with someone else's likeness in synthetic media....

LETERASI KINANSIAL 2025-11-13

LETERASI KINANSIAL crossword puzzle
Across
  1. technologi finansial
  2. interaksi digital untuk menjaga data pribadi
  3. uang yang disisihkan untuk masa depan
  4. perdagangan yang memanfaatkan teknologi informasi dan komunikasi di abad ke-21
  5. mengelola uang dan mengambil keputusan keuangan yang bijak
  6. penanaman keuntungan di masa depan
  7. lembaga yanga mengelola pasar modal
  8. alat tukar yang sah
  9. lembaga keuangan bukan bank
Down
  1. dokumen sebagai bukti simpanan di bank
  2. internasi sosial
  3. kemudahan mendapat berita dimana saja kapan saja
  4. sikap yang perlu di hindari dalam mengelola uang
  5. daftar pengeluaran dan pemasukan dan pemasukan keuangan
  6. tantangan dalam transaksi digital
  7. pembayaran non-tunai menggunakan app di ponsel
  8. tempat jual beli daring
  9. berinteraksi menggunakan tenologi digital
  10. pembayaran memindai kode untuk transaksi
  11. lembaga keuangan yang menerima simpanan

20 Clues: internasi sosialalat tukar yang sahtechnologi finansialtempat jual beli daringlembaga keuangan bukan banktantangan dalam transaksi digitalpenanaman keuntungan di masa depanlembaga yanga mengelola pasar modaluang yang disisihkan untuk masa depandokumen sebagai bukti simpanan di banklembaga keuangan yang menerima simpanan...

Harris 20th Anniversary 2022-10-14

Harris 20th Anniversary crossword puzzle
Across
  1. What sport/activity does Chris play
  2. Where did Melissa grow up?
  3. Where did they live when they got married?
  4. What is the Harris family dogs name?
  5. What volcano did the Harris family climb in Hawaii?
  6. Who is Melissa's favorite singer?
  7. Where did they Chris & Melissa get married?
Down
  1. What is Chris' profession?
  2. What are Chris & Melissa's kids middle
  3. Who is Chris' favorite rapper?
  4. What cruise line did they sail on when they
  5. married?

12 Clues: married?What is Chris' profession?Where did Melissa grow up?Who is Chris' favorite rapper?Who is Melissa's favorite singer?What sport/activity does Chris playWhat is the Harris family dogs name?What are Chris & Melissa's kids middleWhere did they live when they got married?What cruise line did they sail on when they...

CRACCon2024 2023-12-25

CRACCon2024 crossword puzzle
Across
  1. Pay to get your data
  2. The popular buzzword
  3. Get paid for hunting bugs
Down
  1. What do you want to learn?
  2. poses as a legitimate sender
  3. Stolen data
  4. You like to play

7 Clues: Stolen dataYou like to playPay to get your dataThe popular buzzwordGet paid for hunting bugsWhat do you want to learn?poses as a legitimate sender

technology 2025-05-14

technology crossword puzzle
Across
  1. Fifth-generation mobile network technology
  2. Distributed ledger technology for cryptocurrencies
  3. Electric car company founded by Elon Musk
  4. Internet-based computing service model
  5. Network of interconnected smart devices
Down
  1. World’s largest search engine
  2. Technology protecting networks from attacks
  3. Computer system mimicking human intelligence

8 Clues: World’s largest search engineInternet-based computing service modelNetwork of interconnected smart devicesElectric car company founded by Elon MuskFifth-generation mobile network technologyTechnology protecting networks from attacksComputer system mimicking human intelligenceDistributed ledger technology for cryptocurrencies

Cyber Security Awareness 2023-03-04

Cyber Security Awareness crossword puzzle
Across
  1. Using encryption and other security technologies to protect online activities and prevent unauthorized access to sensitive information.
  2. A common form of social engineering that involves sending fraudulent emails or messages in order to steal information or spread malware.
  3. The practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction.
  4. A mindset and set of behaviors that prioritize cybersecurity and make it a fundamental part of organizational culture.
  5. Policies and procedures for safeguarding sensitive data and ensuring its confidentiality, integrity, and availability.
  6. The process of identifying, assessing, and mitigating cyber risks in order to protect against cyber attacks.
Down
  1. Tools and techniques for detecting and removing malicious software, including viruses, worms, and Trojans.
  2. A targeted form of phishing that involves customized messages designed to deceive a specific individual or group.
  3. Strategies for creating strong, unique passwords and protecting them from unauthorized access.
  4. Techniques used by cybercriminals to manipulate individuals into revealing sensitive information or taking harmful actions.
  5. Best practices for keeping digital devices and online accounts clean and secure.
  6. Best practices for staying safe while browsing the internet, including avoiding risky websites and downloading files from trusted sources.

12 Clues: Best practices for keeping digital devices and online accounts clean and secure.Strategies for creating strong, unique passwords and protecting them from unauthorized access.Tools and techniques for detecting and removing malicious software, including viruses, worms, and Trojans....

example 2023-07-06

example crossword puzzle
Across
  1. A “tunnel” for private network browsing:
  2. The collection, use, sharing, storage, destruction, or processing of PI that is provided by an individual in connection with obtaining a product, service, or employment, including an individual’s choice on how their PI is used.
  3. Be client obsessed, champion our people, lead with integrity, own it, and win as one are examples of TIAA’s:
  4. What malware propagates without a host program?
  5. A _____ review is done quarterly to review privileged access.
  6. What is the most common attack vector for malware?
  7. TIAA’s ______ promotes a culture of inclusion, diversity and equity by connecting associates across diverse perspectives, wide-ranging talents and unique experiences.
  8. A targeted form of phishing that is customized for specific individuals within a specific organization.
  9. What does GCSAM stand for?
  10. Suspicious sender address, invalid branding, appealing to emotions, sense of urgency, invalid URL’s, request for sensitive data, spelling errors, requests to click links, and signatures are all __________ of phishing attempts.
Down
  1. Who founded TIAA?
  2. Malware that limits users access until a ransom is paid.
  3. A phishing technique that utilizes two emails: one benign and one containing the malicious element. The first email facilitates a sense of familiarity when the second, malicious, email arrives.
  4. Who is the security awareness program’s mascot?
  5. What is TIAA’s social impact hashtag?
  6. Be the change by delivering lifetime income for all with investments that build a better world is TIAA’s:
  7. When somebody sends an e-mail with a link to a bogus website it is called:
  8. In 2021 TIAA cybersecurity expanded to become TIAA _____ cybersecurity.
  9. The probability of exposure or loss of assets is considered?

19 Clues: Who founded TIAA?What does GCSAM stand for?What is TIAA’s social impact hashtag?A “tunnel” for private network browsing:Who is the security awareness program’s mascot?What malware propagates without a host program?What is the most common attack vector for malware?Malware that limits users access until a ransom is paid....

KM Week 10 2021-10-11

KM Week 10 crossword puzzle
Across
  1. Smart Nation through Digital _________
  2. An intellectual property
  3. ________ citizen through e-participation
  4. Increase in digital usage has brought about the need to protect data, infrastructure and networks from growing cyber threats.
  5. in the eco-system of Digital Economy.
  6. A KMS
  7. A communication tool
Down
  1. The Government, _____ and Society are closely
  2. an advantage to move towards digital economy
  3. One of the KM processes
  4. structural resource
  5. An impact/ area of concern for digital society
  6. We need an update of this to move to a digital future
  7. Infrastructural resources
  8. He conceived the concept of KM

15 Clues: A KMSstructural resourceA communication toolOne of the KM processesAn intellectual propertyInfrastructural resourcesHe conceived the concept of KMin the eco-system of Digital Economy.Smart Nation through Digital _________________ citizen through e-participationan advantage to move towards digital economyThe Government, _____ and Society are closely...

GEN-Z TRENDS 2025-03-27

GEN-Z TRENDS crossword puzzle
Across
  1. A field combining AI and Engineering
  2. GenZ slang for stylish outfits
  3. A famous anime known for its huge number of episodes
  4. The tech behind chatGPT
  5. A viral Gen Z meme
  6. A growing field focused on protecting data and network
Down
  1. Next level gaming and training
  2. Usually done in netflix on long series's
  3. Act of cutting off communication without warning
  4. Slang for Delusional
  5. Action packed franchise ni Keanu Reeves
  6. On top of Gen Z's screen time
  7. a fusion of biology and technology
  8. A cruicial skill for GenZ learners
  9. DCU Counterpart of Iron Man

15 Clues: A viral Gen Z memeSlang for DelusionalThe tech behind chatGPTDCU Counterpart of Iron ManOn top of Gen Z's screen timeNext level gaming and trainingGenZ slang for stylish outfitsa fusion of biology and technologyA cruicial skill for GenZ learnersA field combining AI and EngineeringAction packed franchise ni Keanu Reeves...

Solve Our Story 2025-09-28

Solve Our Story crossword puzzle
Across
  1. How did Amy and David meet?
  2. Amy’s favorite band?
  3. What branch of the military was David in?
  4. Where did Amy go for her bachelorette party?
  5. What TV show is produced by the bride?
  6. Bride’s hometown?
  7. What does Amy’s family call her?
Down
  1. Where they said “I love you” for the first time?
  2. Where did Amy go to college?
  3. Groom’s hometown?
  4. The hotel bar where Amy and David had their first date?
  5. What does David have his masters in?
  6. What does David’s family call him?
  7. What is David’s favorite sport?
  8. Where did David go for his bachelor party?

15 Clues: Groom’s hometown?Bride’s hometown?Amy’s favorite band?How did Amy and David meet?Where did Amy go to college?What is David’s favorite sport?What does Amy’s family call her?What does David’s family call him?What does David have his masters in?What TV show is produced by the bride?What branch of the military was David in?...

Cybersecurity Crossword Puzzle 2024-02-01

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Passwords should not contain your
  2. Sikorsky Facility Security Officer (FSO)
  3. Strategy to protect sensitive information (operational security)
  4. Assured File Transfers (AFTs) should only be performed by a trained
  5. If you see something
  6. A company's most valuable asset
Down
  1. Report all security incidents to
  2. Sikorsky Classified Cybersecurity Manager
  3. Access is granted based on clearance level and

9 Clues: If you see somethingA company's most valuable assetReport all security incidents toPasswords should not contain yourSikorsky Facility Security Officer (FSO)Sikorsky Classified Cybersecurity ManagerAccess is granted based on clearance level andStrategy to protect sensitive information (operational security)...

Crossword 2025-08-10

Crossword crossword puzzle
Across
  1. New generation of wireless network technology
  2. New business, often tech-focused and innovative
  3. Protection against online threats
  4. Company known for graphics cards and AI chips
  5. Internet-based computing and storage
  6. Step-by-step problem-solving procedure in computing
  7. A digital virtual world concept
Down
  1. Popular AI language model by OpenAI
  2. Distributed ledger technology supporting Bitcoin
  3. Unmanned flying device used for delivery or photos
  4. Electric car company known for tech innovation
  5. A type of computing using quantum mechanics
  6. Intelligence demonstrated by machines.
  7. Digital or virtual money

14 Clues: Digital or virtual moneyA digital virtual world conceptProtection against online threatsPopular AI language model by OpenAIInternet-based computing and storageIntelligence demonstrated by machines.A type of computing using quantum mechanicsNew generation of wireless network technologyCompany known for graphics cards and AI chips...

Topic 3 AI & Competition Law 2024-11-15

Topic 3 AI & Competition Law crossword puzzle
Across
  1. Rules governing AI development and implementation
  2. When AI systems independently coordinate to avoid competition
  3. Large technology firms influencing markets
  4. Control by a major player in a market
  5. Internet-based computing and storage services
  6. Technology that mimics human thinking and learning
  7. Moral principles governing behavior
  8. Unfair preference in decision-making
Down
  1. Safeguarding personal information
  2. Charging different prices based on user data
  3. Organization for global trade rules
  4. Ensures fairness and innovation in markets
  5. Clarity in AI decision-making processes
  6. Protecting systems and networks from attacks

14 Clues: Safeguarding personal informationOrganization for global trade rulesMoral principles governing behaviorUnfair preference in decision-makingControl by a major player in a marketClarity in AI decision-making processesLarge technology firms influencing marketsEnsures fairness and innovation in marketsCharging different prices based on user data...

Cybersecurity Unit 10 Crossword 2025-03-20

Cybersecurity Unit 10 Crossword crossword puzzle
Across
  1. impacts availability and requires redundancy
  2. updates and changes in one component may impact others
  3. timely removal of access to minimize risks
  4. older or outdated software
  5. realizing that you are not encrypting data, using weak passwords and outdated technology
  6. step-by-step instructions for security measures
  7. focusing on ensuring you are following regulatory requirements such as HIPPA
  8. influences user behaviors
  9. define requirements for security controls and configurations
Down
  1. guides access provisioning for new employees
  2. predefinied responses for security incidents
  3. includes checking things such as your incident response plan to make sure it is sufficient enough
  4. common during updates or performance issues
  5. establish organizational stances on security aspects
  6. specify what items are allowed
  7. Developing an action plan, implementing new security controls and tracking progress
  8. specify what items are denied
  9. Never trust, always verify
  10. this type of restart requires restarting a particular component

19 Clues: influences user behaviorsolder or outdated softwareNever trust, always verifyspecify what items are deniedspecify what items are allowedtimely removal of access to minimize riskscommon during updates or performance issuesguides access provisioning for new employeesimpacts availability and requires redundancy...

Information Technology 2023-05-10

Information Technology crossword puzzle
Across
  1. Desarrollo
  2. Comunicaciones
  3. Computación en la nube
  4. Apoyo técnico
  5. Innovar
  6. Programador
  7. Analista de malware
  8. Perspectiva
  9. Habilidades
  10. Fuerza laboral
  11. Ciencia de datos
  12. Compañías empresariales
  13. Operaciones comerciales
  14. Desarrollador web
  15. Ilimitado
  16. Implementación
  17. Productividad
  18. Ingeniero de software
  19. Recreación
  20. Microsoft
Down
  1. Soporte de escritorio
  2. Plataformas
  3. Software
  4. Sostenibilidad
  5. Habilidades
  6. Aplicaciones
  7. Hoja de cálculo
  8. Conocimientos técnicos
  9. Automatización
  10. Servicio de ayuda
  11. Programas
  12. Base de datos
  13. Gerencia
  14. Desarrollador de software
  15. Acceso a la información
  16. Inteligencia artificial
  17. Liderazgo
  18. Tecnología de la información (TI)
  19. Complejidad
  20. Ciberseguridad
  21. Educación
  22. soporte
  23. Mantenimiento
  24. Análisis
  25. Avance
  26. Hardware
  27. Gerente IT
  28. Conocimiento
  29. Robótica

49 Clues: AvanceInnovarsoporteSoftwareGerenciaAnálisisHardwareRobóticaProgramasLiderazgoEducaciónIlimitadoMicrosoftDesarrolloRecreaciónPlataformasHabilidadesProgramadorPerspectivaComplejidadHabilidadesGerente ITAplicacionesConocimientoApoyo técnicoBase de datosMantenimientoProductividadSostenibilidadComunicacionesAutomatizaciónFuerza laboralCiberseguridad...

RU ITEC411 Chapter 5 Crime and Security 2025-03-16

RU ITEC411 Chapter 5 Crime and Security crossword puzzle
Across
  1. something that will spread one its own
  2. information gathering software
  3. a network of computers being controlled
  4. returning what has been lost to its owner
  5. something that needs a host to spread
  6. being locked out of a computer or system until someone is paid
  7. digital world
  8. something disguised as something else
  9. sending out messages impersonating someone or something
  10. deception for someone's gain
Down
  1. bad software
  2. obstructing or ruining something
  3. to be kept secret
  4. stealing someone's information for impersonation
  5. instruction sets
  6. spying on someone or something
  7. a soft spot in a piece of software
  8. manipulatively finding information out about someone or something
  9. team to manage cybersecurity incidents
  10. using a spoofed website to steal information

20 Clues: bad softwaredigital worldinstruction setsto be kept secretdeception for someone's gaininformation gathering softwarespying on someone or somethingobstructing or ruining somethinga soft spot in a piece of softwaresomething that needs a host to spreadsomething disguised as something elsesomething that will spread one its own...

Lushi & John's Wedding 2025-02-22

Lushi & John's Wedding crossword puzzle
Across
  1. Lushi’s favorite dessert
  2. Favorite shared activity
  3. Lushi’s favorite cuisine
  4. John’s go-to drink
  5. City they live in
  6. Lushi’s favorite holiday
  7. Who is older between them
  8. John’s hometown
  9. Total number of their dogs
  10. John’s favorite food
  11. Name of their corgi
  12. Color of John’s eyes
  13. Place where John proposed
Down
  1. University John attended
  2. First date restaurant
  3. Total countries visited together
  4. John’s favorite video game
  5. francisco City where they met
  6. First international trip destination
  7. John’s work industry
  8. John’s favorite music band
  9. Lushi’s favorite color
  10. Month of their engagement
  11. Month of dating anniversary
  12. Their dream honeymoon destination
  13. John’s middle name
  14. Lushi’s favorite time of year
  15. Lushi’s favorite board game

28 Clues: John’s hometownCity they live inJohn’s go-to drinkJohn’s middle nameName of their corgiJohn’s work industryJohn’s favorite foodColor of John’s eyesFirst date restaurantLushi’s favorite colorUniversity John attendedLushi’s favorite dessertFavorite shared activityLushi’s favorite cuisineLushi’s favorite holidayMonth of their engagement...

Sorav 2025-05-13

Sorav crossword puzzle
Across
  1. a key when you put in the computer
  2. a internet connection
  3. when you see in screen
  4. A malicious program designed to harm or disrupt computer system
  5. actually like a mouse but better
  6. when you type the input
  7. use for click or type letter
  8. a like a browser
  9. Protection of computer systems and data from unauthorised access and attacks
  10. like a menu in the website
  11. open another homepage
Down
  1. Programs and operating systems that run on computers and devices.
  2. a device portable
  3. like a smart home
  4. The physical components of a computer or electronic device
  5. charge your device
  6. type the code
  7. when you unlock your device
  8. big object for the computer
  9. a part of computer

20 Clues: type the codea like a browsera device portablelike a smart homecharge your devicea part of computera internet connectionopen another homepagewhen you see in screenwhen you type the inputlike a menu in the websitewhen you unlock your devicebig object for the computeruse for click or type letteractually like a mouse but better...

Infor 2025-01-26

Infor crossword puzzle
Across
  1. Maumere yang mampu mendeskripsi
  2. Membuka lampiran surel
  3. orang yang mendeskripsikan peretasan
  4. Menandakan bahwa hacking merupakan pengertian
  5. Nama lain dari kesalahan
  6. Tidak perlu menumpuk keprogaman lain
  7. pembuatan buku the cookers
  8. Akroni bobot network
  9. Adalah kejahatan di dunia
  10. salah satu kejahatan sosial yang berpengaruh pada kesehatan mental
Down
  1. Makna yang disampaikan oleh serangkaian representasi yang merupakan hasil pemrosesan data disebut
  2. Perangkat lunak yang menempel
  3. Gunakan activit atau activity internasional
  4. data berasal dari kata dalam bahasa latin datum yang artinya
  5. Virus yang menyebar di dunia
  6. keamanan informasi internet adalah
  7. Pada tahun 1988 sebuah program komputer yang dikenal sebagai
  8. badan siber dan sandi negara
  9. Merupakan Malware yang tampak kagoda
  10. Teknologi keamanan yang lebih baik dengan pembentukan

20 Clues: Akroni bobot networkMembuka lampiran surelNama lain dari kesalahanAdalah kejahatan di duniapembuatan buku the cookersVirus yang menyebar di duniabadan siber dan sandi negaraPerangkat lunak yang menempelMaumere yang mampu mendeskripsikeamanan informasi internet adalahorang yang mendeskripsikan peretasanMerupakan Malware yang tampak kagoda...

Let's explore the kept.pro Eco System 2024-12-13

Let's explore the kept.pro Eco System crossword puzzle
Across
  1. Robyne's call sign
  2. Required for work from home success
  3. Tab to find Client Services specific information?
  4. Name of software platform to help categorize expenses
  5. One of the flywheel components
  6. System used by all clients
  7. Pod name
  8. Client payroll platform
  9. What we are
  10. A kept.pro core value
  11. Accurate, timely and complete financials are part of this
Down
  1. One-stop shop for kept.pro information
  2. Item we are all responsible for
  3. One of the internal programs we use
  4. Part of kept.GROW
  5. Tab where you can find info on Google Workspace
  6. Name of our outside IT support company
  7. Tab to find out about kept.pro team members
  8. Tab to see Google Classroom classes
  9. Essential for working together

20 Clues: Pod nameWhat we arePart of kept.GROWRobyne's call signA kept.pro core valueClient payroll platformSystem used by all clientsOne of the flywheel componentsEssential for working togetherItem we are all responsible forOne of the internal programs we useRequired for work from home successTab to see Google Classroom classes...

SISTEM KOMPUTER 2025-09-08

SISTEM KOMPUTER crossword puzzle
Across
  1. : Singkatan dari Central Processing Unit.
  2. : Bahasa pemrograman yang populer untuk web.
  3. : Singkatan dari Hypertext Markup Language.
  4. : Media penyimpanan berbentuk cakram optik.
  5. : Perangkat yang digunakan untuk memasukkan data ke komputer.
  6. : Protokol pengiriman surat elektronik.
  7. : Perangkat lunak untuk mengolah kata.
  8. : Singkatan dari Uniform Resource Locator.
  9. : Sistem operasi buatan Microsoft.
  10. : Istilah untuk keamanan informasi di dunia digital.
  11. : Jaringan global yang menghubungkan komputer di seluruh dunia.
Down
  1. : Bahasa pemrograman yang identik dengan logo cangkir kopi.
  2. : Bagian komputer yang menyimpan data secara permanen.
  3. : Perangkat keras untuk mencetak dokumen.
  4. : Singkatan dari Random Access Memory.
  5. : Sistem operasi berbasis open source.
  6. : Aplikasi untuk membuat presentasi.
  7. : Singkatan dari Graphics Interchange Format.
  8. : Penyimpanan berbasis awan dari Google.
  9. : Perangkat keras untuk menampilkan hasil proses.

20 Clues: : Sistem operasi buatan Microsoft.: Aplikasi untuk membuat presentasi.: Sistem operasi berbasis open source.: Perangkat lunak untuk mengolah kata.: Perangkat keras untuk mencetak dokumen.: Protokol pengiriman surat elektronik.: Bahasa pemrograman yang populer untuk web.: Singkatan dari Random Access Memory....

Sondre's Christmas Crossword 2023-12-26

Sondre's Christmas Crossword crossword puzzle
Across
  1. Sarah's favorite "The office" character
  2. Name of the species of the big boi fish Sarah caught
  3. Month of Sondre's birthday
  4. One of Sarah's favorite vegetables
  5. Indie band from Norwich, UK
  6. Country with the most snow
  7. Soon to be patented bike
  8. Homeless cat
  9. Country that Canada has been at war with for almost 40 years
  10. Sarah's totally real and true favorite tv-show ;)
Down
  1. Sondre's field of study
  2. National park in the west of Canada that Sarah has visited
  3. Sarah's favorite League of Legends champion
  4. Sarah's favorite tea
  5. Good girl
  6. Good boy
  7. Subject of the class that had a field trip in Sarah's dream

17 Clues: Good boyGood girlHomeless catSarah's favorite teaSondre's field of studySoon to be patented bikeMonth of Sondre's birthdayCountry with the most snowIndie band from Norwich, UKOne of Sarah's favorite vegetablesSarah's favorite "The office" characterSarah's favorite League of Legends championSarah's totally real and true favorite tv-show ;)...

Exploring our Ecosystem 2025-01-15

Exploring our Ecosystem crossword puzzle
Across
  1. essential for working together
  2. one of the internal programs we use
  3. system used by all clients
  4. name of software platform to help categorize expenses
  5. what we are
  6. one-stop shop for kept.pro information
  7. required for work-from-home success
  8. accruate, timely and complete financials are a part of this
  9. tab to find out about kept.pro team members
  10. a kept.pro core value
Down
  1. tab to see Google Classroom courses
  2. name of a pod
  3. name of our outside IT support
  4. one of the flywheel components
  5. client payroll platform
  6. tab to find Client Services specific information
  7. tab where you can find info on Google Workspace
  8. item we are all responsible for
  9. James' call sign
  10. part of kept.GROW

20 Clues: what we arename of a podJames' call signpart of kept.GROWa kept.pro core valueclient payroll platformsystem used by all clientsname of our outside IT supportessential for working togetherone of the flywheel componentsitem we are all responsible fortab to see Google Classroom coursesone of the internal programs we use...

The Print Puzzler 2025-03-26

The Print Puzzler crossword puzzle
Across
  1. GOAL OF MOST CAMPAIGNS
  2. A NEW COMPANY
  3. SIC 27
  4. NOBODY GETS LEFT OUT
  5. MORALLY RIGHT AND WRONG
  6. WHERE PINE LIVES
  7. RENOWNED BUSINESS PUBLICATION
  8. MALICIOUS HACKER
  9. TRY FOR THE FIRST TIME
  10. WELL KNOWN WISCONSIN PRINTER
  11. IMPACTS SOCIAL MEDIA
  12. COMMONLY FOUND ON WALLS OR DESKS
  13. THE P IN PMS
  14. BILLBOARDS, TAXIS AND POSTERS
  15. MAY ONE DAY REPLACE SICS
Down
  1. A NEW COMPANY
  2. INTEGRATING SALES AND MARKETING
  3. ITS ALWAYS RAISED
  4. PAPER CUTTER
  5. EMAIL WITH COLOR
  6. HELD EVERY 4 YEARS IN DUSSELDORF, GERMANY
  7. COMPANY SIZE
  8. CRM AND AUTOMATION SW
  9. USED TO PERSONALIZE YOUR EXPERIENCE
  10. WHATS IN IT FOR ME
  11. BOSTON VENUE
  12. ETHICAL CYBERSECURITY
  13. ENHANCE YOUR DATA
  14. BEST WAY TO MEET PEOPLE

29 Clues: SIC 27PAPER CUTTERCOMPANY SIZEBOSTON VENUETHE P IN PMSA NEW COMPANYA NEW COMPANYEMAIL WITH COLORWHERE PINE LIVESMALICIOUS HACKERITS ALWAYS RAISEDENHANCE YOUR DATAWHATS IN IT FOR MENOBODY GETS LEFT OUTIMPACTS SOCIAL MEDIACRM AND AUTOMATION SWETHICAL CYBERSECURITYGOAL OF MOST CAMPAIGNSTRY FOR THE FIRST TIMEMORALLY RIGHT AND WRONG...

Natalie and Robbie 2024-07-01

Natalie and Robbie crossword puzzle
Across
  1. The couple's favorite singer.
  2. The food Robbie hates but Natalie insists on making.
  3. Robbie's first roommate.
  4. The month Robbie proposed.
  5. Robbie's least favorite household chore.
  6. The grade Natalie teaches.
  7. The city they got engaged in.
  8. What is the name of Natalie and Robbie's cat?
  9. Who made the first move?
Down
  1. Who said I love you first?
  2. The elementary school Natalie and Robbie first met (Forest __)
  3. Natalie's least favorite household chore.
  4. Natalie and Robbie's eye color.
  5. What field does Robbie work in?
  6. Number of dresses Natalie tried on.
  7. Number of years Natalie and Robbie dated.
  8. What college did they attend?
  9. Total number of bridesmaids and groomsmen.
  10. The shape of the engagment ring.
  11. Natalie and Robbie's favorite condiment.

20 Clues: Robbie's first roommate.Who made the first move?Who said I love you first?The month Robbie proposed.The grade Natalie teaches.The couple's favorite singer.The city they got engaged in.What college did they attend?Natalie and Robbie's eye color.What field does Robbie work in?The shape of the engagment ring.Number of dresses Natalie tried on....

Computing Vocabulary 2019-12-04

Computing Vocabulary crossword puzzle
Across
  1. Small device to store data on the go
  2. The amount of space available
  3. Most of the time you do it illegally
  4. Smaller than a rat
  5. Part of a computer that reads information
  6. Synonym of information
  7. We also call it the Web
  8. System of computer equipment & programs
  9. Computers that are connected together
Down
  1. Desktop machine
  2. Combination of letters and numbers
  3. Protection system making use of the internet
  4. Someone who uses a product, machine or service
  5. Software designed to damage
  6. A set of mathematical instructions or rules
  7. Identifying data ; Biscuit
  8. Computer program
  9. Central computer from which other computers get information
  10. Accessing information without permission
  11. All the equipment necessary to run a computer

20 Clues: Desktop machineComputer programSmaller than a ratSynonym of informationWe also call it the WebIdentifying data ; BiscuitSoftware designed to damageThe amount of space availableCombination of letters and numbersSmall device to store data on the goMost of the time you do it illegallyComputers that are connected together...

Sip and Solve 2024-04-05

Sip and Solve crossword puzzle
Across
  1. What month did they begin dating?
  2. Where is their honeymoon location?
  3. What is Adonis' middle name?
  4. What is Eimear's eye colour?
  5. How they first meet?
  6. Where do they live?
  7. What is Eimear's job?
  8. How many years have they been together?
  9. What is the name of their dog?
  10. Where was Eimear born?
Down
  1. What is Adonis' job?
  2. What car do they drive?
  3. Where was their first date?
  4. What instrument does Eimear learn?
  5. Where did they get engaged?
  6. What is Eimear's birth month?
  7. What is Eimear's middle name?
  8. What is Adonis' favourite hobby?
  9. What is Adonis' eye colour?
  10. What is Adonis' birth month?
  11. Where was Adonis born?
  12. Where was their first holiday?

22 Clues: Where do they live?What is Adonis' job?How they first meet?What is Eimear's job?Where was Adonis born?Where was Eimear born?What car do they drive?Where was their first date?Where did they get engaged?What is Adonis' eye colour?What is Adonis' middle name?What is Eimear's eye colour?What is Adonis' birth month?What is Eimear's birth month?...

Pineapple #2 2023-05-05

Pineapple #2 crossword puzzle
Across
  1. slithering coding language
  2. Pokemon Cards for REAL men
  3. fictional school with one of the worst student safety track records
  4. Heath Ledger or an otaku with an ungodly amount of rizz
  5. rock band that just "Can't Stop"
  6. Ghibli mastermind Miyazaki
  7. Your favorite cybersecurity student
  8. One who is "virtually insane"
  9. a site that is full of idiots and dank memes
  10. Psych lead James Roday
  11. Star Trek captain with a terrible "Rocketman" cover
Down
  1. that old meme you had as your background for a while
  2. Cocaine sadly not included anymore
  3. "Ride of The Valkyries" Composer
  4. They're finally making GTA VI
  5. "I think therefore I'm"
  6. Feline from Fukuhara
  7. based smash main
  8. Soulsborne mastermind Miyazaki
  9. Kentaro Miura's masterpiece

20 Clues: based smash mainFeline from FukuharaPsych lead James Roday"I think therefore I'm"slithering coding languagePokemon Cards for REAL menGhibli mastermind MiyazakiKentaro Miura's masterpieceThey're finally making GTA VIOne who is "virtually insane"Soulsborne mastermind Miyazaki"Ride of The Valkyries" Composerrock band that just "Can't Stop"...

TTS INFORMATIKA 2025-04-10

TTS INFORMATIKA crossword puzzle
Across
  1. tugas programer
  2. Platform untuk diseminasi konten budaya?
  3. Contoh search engine?
  4. Metode validasi konten negatif?
  5. itu konten negatif
  6. menghindari pelanggaran budaya?
  7. penting unsur budaya dalam konten digital?
  8. yang di maksud indexing
  9. Tugas data scientist?
  10. pendaftaran HAKI
  11. itu hak cipta
  12. Konsekuensi konten negatif?
Down
  1. Tujuan validasi konten negatif?
  2. itu ranking?
  3. diseminasi konten budaya?
  4. yang di maksud paten
  5. Tugas cybersecurity engineer?
  6. konten digital berunsur budaya?
  7. Tugas web developer?
  8. Tugas database administrator?
  9. fungsi utama search engine?.
  10. itu crawling?
  11. itu merek dagang
  12. Tantangan validasi konten negatif?
  13. Konsekuensi pelanggaran HAKI

25 Clues: itu ranking?itu crawling?itu hak ciptatugas programeritu merek dagangpendaftaran HAKIitu konten negatifyang di maksud patenTugas web developer?Contoh search engine?Tugas data scientist?yang di maksud indexingdiseminasi konten budaya?Konsekuensi konten negatif?fungsi utama search engine?.Konsekuensi pelanggaran HAKITugas cybersecurity engineer?...

How well do you know POOL/PACT? 2025-02-19

How well do you know POOL/PACT? crossword puzzle
Across
  1. Executive Director
  2. HR Oversight Committee Chair
  3. POOL/PACT's Learning Management System
  4. Month of this year's HR Leadership Conference
  5. Email notice of significant change in law or practice
  6. POOL/PACT's EAP
  7. Organization-wide assessment program
  8. How often this newsletter comes out
  9. PACT Chair
  10. Cybersecurity expert
  11. Type of grant available to members to attend conferences
  12. Summary of HR services for the fiscal year
  13. POOL Chair
Down
  1. Claims management company
  2. Flagship certificate program for managers
  3. Location of this year's HR Leadership Conference
  4. What POOL/PACT HR is currently tracking
  5. Main HR contact
  6. This year's Thursday night event at the annual board meeting
  7. Funding provided to attain HR certification
  8. Month of POOL/PACT's annual board meeting

21 Clues: PACT ChairPOOL ChairPOOL/PACT's EAPMain HR contactExecutive DirectorCybersecurity expertClaims management companyHR Oversight Committee ChairHow often this newsletter comes outOrganization-wide assessment programPOOL/PACT's Learning Management SystemWhat POOL/PACT HR is currently trackingFlagship certificate program for managers...

Puzzle on Digitalisation (Ansgar O & Olivia U) 2025-10-07

Puzzle on Digitalisation (Ansgar O & Olivia U) crossword puzzle
Across
  1. Raw facts or information
  2. Watching or listening online in real time
  3. Protecting systems and data from attacks
  4. Pocket computer with apps and calls
  5. A new idea or improvement
  6. Machine ability to mimic human thinking
  7. Interactive digital classroom display
  8. Global network of computers
  9. Entering username and password to access
  10. Software used to surf the web
Down
  1. Company behind Windows and Office
  2. Turning paper or analog into digital form
  3. Copy of data for safety
  4. Scannable digital code for quick access
  5. Engineering of automated machines
  6. Writing instructions (code) for computers
  7. Doing several tasks at once
  8. Connected devices exchanging information
  9. Remote servers accessed online
  10. Programmes that run on computers
  11. Send files from device to the internet

21 Clues: Copy of data for safetyRaw facts or informationA new idea or improvementDoing several tasks at onceGlobal network of computersSoftware used to surf the webRemote servers accessed onlineProgrammes that run on computersCompany behind Windows and OfficeEngineering of automated machinesPocket computer with apps and calls...

Unit 11-Cyber Security 2023-09-15

Unit 11-Cyber Security crossword puzzle
Across
  1. digital illegal activity
  2. network security barrier
  3. scam in which attackers trick people into disclosing confidential information
Down
  1. harmful software
  2. isolated testing environment
  3. unique physical characteristics for authentication
  4. protection of digital resources

7 Clues: harmful softwaredigital illegal activitynetwork security barrierisolated testing environmentprotection of digital resourcesunique physical characteristics for authenticationscam in which attackers trick people into disclosing confidential information

Chapter 15 Globalism: Information, Communication, and The Digital Revolution 2024-12-10

Chapter 15 Globalism: Information, Communication, and The Digital Revolution crossword puzzle
Across
  1. Devices used for computing and connecting online.
  2. Method for delivering messages electronically.
  3. Process of converting data into a secure code.
  4. Storing data on remote servers accessed via the Internet.
  5. Portable electronic device for accessing information.
  6. Software that performs malicious activities.
  7. Online platform for social interaction.
Down
  1. Digital means of connecting people worldwide.
  2. Measure to protect networks and systems.
  3. Global system for mobile communication.
  4. Widespread sharing of digital media.

11 Clues: Widespread sharing of digital media.Global system for mobile communication.Online platform for social interaction.Measure to protect networks and systems.Software that performs malicious activities.Digital means of connecting people worldwide.Method for delivering messages electronically.Process of converting data into a secure code....

Operation DigiVyuh 2025-01-27

Operation DigiVyuh crossword puzzle
Across
  1. - Converting data into a code to protect it
  2. - Entity that issues digital certificates
  3. - Stealing someone's personal information
  4. - Sending unwanted bulk messages
Down
  1. - Protecting systems from digital attacks
  2. - A secure way to sign electronic documents
  3. - Fraudulent attempt to steal sensitive information
  4. - Unauthorized access to computer systems
  5. - Police unit for investigating cyber crimes
  6. - Part of the IT Act dealing with computer offenses
  7. - Indian law for cyber crimes (abbreviation)

11 Clues: - Sending unwanted bulk messages- Protecting systems from digital attacks- Entity that issues digital certificates- Unauthorized access to computer systems- Stealing someone's personal information- A secure way to sign electronic documents- Converting data into a code to protect it- Police unit for investigating cyber crimes...

Guess The word 2022-06-27

Guess The word crossword puzzle
Across
  1. The act of obeying an order, rule, or request
  2. Possibility of loss or injury
  3. Group of people for decision making
  4. An event that is either unpleasant or unusual
  5. An official inspection
  6. A set of guidelines
Down
  1. Report certain types of wrongdoing
  2. Protection of internet-connected system
  3. of conduct A set of rules
  4. of interest Clash between personal and professional duties

10 Clues: A set of guidelinesAn official inspectionof conduct A set of rulesPossibility of loss or injuryReport certain types of wrongdoingGroup of people for decision makingProtection of internet-connected systemThe act of obeying an order, rule, or requestAn event that is either unpleasant or unusual...

crossword 01 2025-04-21

crossword 01 crossword puzzle
Across
  1. By laws
  2. The art of sticking to something like a rule
  3. The act of studying something closely
  4. To improve or make more precise
Down
  1. Favoring one thing over other
  2. The process of reducing danger
  3. Use of technology to reduce human intervention in a process
  4. Following regulation
  5. The quality of doing something well without wasting time
  6. Protection of digital information from cyberattacks

10 Clues: By lawsFollowing regulationFavoring one thing over otherThe process of reducing dangerTo improve or make more preciseThe act of studying something closelyThe art of sticking to something like a ruleProtection of digital information from cyberattacksThe quality of doing something well without wasting time...

Biometrics 2025-04-03

Biometrics crossword puzzle
Across
  1. basic rights
  2. safety measures taken for protection
  3. to take full advantage of and benefit from
  4. something so easy that you cant mess it up
Down
  1. software programs that protect you while online
  2. following a trend just because everyone else is
  3. weaknesses in a security system
  4. to illegally enter into someone's computer
  5. to avoid or get around
  6. a gap in security

10 Clues: basic rightsa gap in securityto avoid or get aroundweaknesses in a security systemsafety measures taken for protectionto illegally enter into someone's computerto take full advantage of and benefit fromsomething so easy that you cant mess it upsoftware programs that protect you while onlinefollowing a trend just because everyone else is

Spectrum Degree Programs 2023-10-18

Spectrum Degree Programs crossword puzzle
Across
  1. Ideas to interest customers
  2. Understanding formulas to gather data
Down
  1. Protecting computers
  2. Employee relations
  3. Budgeting and money
  4. Tracking expenses and payments

6 Clues: Employee relationsBudgeting and moneyProtecting computersIdeas to interest customersTracking expenses and paymentsUnderstanding formulas to gather data

Harris 20th Anniversary 2022-10-14

Harris 20th Anniversary crossword puzzle
Across
  1. What sport/activity does Chris play
  2. Where did Melissa grow up?
  3. Where did they live when they got married?
  4. What is the Harris family dogs name?
  5. What volcano did the Harris family climb in Hawaii?
  6. Who is Melissa's favorite singer?
  7. Where did they Chris & Melissa get married?
Down
  1. What is Chris' profession?
  2. What are Chris & Melissa's kids middle
  3. Who is Chris' favorite rapper?
  4. What cruise line did they sail on when they
  5. married?

12 Clues: married?What is Chris' profession?Where did Melissa grow up?Who is Chris' favorite rapper?Who is Melissa's favorite singer?What sport/activity does Chris playWhat is the Harris family dogs name?What are Chris & Melissa's kids middleWhere did they live when they got married?What cruise line did they sail on when they...

If Ever You're Bored 2022-09-07

If Ever You're Bored crossword puzzle
Across
  1. my favorite food you cook
  2. my college major
  3. my favorite song from Renaissance
  4. the first food place we've ever been together to
  5. your first car's name
  6. our son's name
Down
  1. place we celebrated when we thought we were going to get accepted into our first "dream" apt.
  2. my car's name
  3. my mother's name
  4. type of car i want in the future
  5. what we are going to be in the future
  6. you and Miracle

12 Clues: my car's nameour son's nameyou and Miraclemy college majormy mother's nameyour first car's namemy favorite food you cooktype of car i want in the futuremy favorite song from Renaissancewhat we are going to be in the futurethe first food place we've ever been together to...

Unit 1-3 vocab 2024-03-14

Unit 1-3 vocab crossword puzzle
Across
  1. Watering crops
  2. Farm animals like cows and chickens
  3. Picking crops when they're ready
  4. Person who plays sports
  5. security Making sure everyone has enough to eat
  6. rotation Changing what you plant to help the soil
  7. Computer steps to solve problems
  8. identity How you show yourself on the internet
  9. Keeping nature safe for the future
  10. Food for plants
  11. Underground water source
Down
  1. literacy Knowing how to use the internet well
  2. Trick emails trying to get private info
  3. Keeping computers safe
  4. Buying and selling online
  5. Watching videos on the internet without downloading
  6. detox Taking a break from screens and devices
  7. Long time with no rain
  8. gaming Playing games on the internet with others
  9. storage Keeping files on the internet, not your computer

20 Clues: Watering cropsFood for plantsKeeping computers safeLong time with no rainPerson who plays sportsUnderground water sourceBuying and selling onlinePicking crops when they're readyComputer steps to solve problemsKeeping nature safe for the futureFarm animals like cows and chickensTrick emails trying to get private info...

Module 1 Introductory Course Telehealth 2017-03-02

Module 1 Introductory Course Telehealth crossword puzzle
Across
  1. acronym for information and communication technology
  2. word used interchangeably with telecare
  3. used to monitor vital signs remotely
  4. nurses engaged in remote service delivery
  5. computer-based medical records
  6. the ability of computers to exchange information
  7. measures taken to protect computer/computer systems
  8. the use of smartphones to provide healthcare
Down
  1. virtual, medical, health, and educational services
  2. in real time
  3. emerging umbrella term; intersection of technology and healthcare
  4. live visual connection between two or more people
  5. the "e" in this term stands for many things
  6. term referring to teleconsultations
  7. electronic component used to provide input and detect changes

15 Clues: in real timecomputer-based medical recordsterm referring to teleconsultationsused to monitor vital signs remotelyword used interchangeably with telecarenurses engaged in remote service deliverythe "e" in this term stands for many thingsthe use of smartphones to provide healthcarethe ability of computers to exchange information...

Useful Vocab 2023-11-22

Useful Vocab crossword puzzle
Across
  1. Cooking style
  2. Newness
  3. The process of providing or obtaining the food necessary for health and growth
  4. Small electronic devices with a specific function
  5. The activity of visiting interesting places, especially as a tourist
  6. The ability to use, understand, and evaluate information across digital platforms
  7. Physical activity
  8. A place where people live or stay, such as a hotel or guesthouse
Down
  1. Conditions or practices conducive to maintaining health and preventing disease
  2. Techniques and therapies aimed at controlling stress levels for better mental health
  3. Place to stay
  4. Literacy Competence in using digital information
  5. Security
  6. Health
  7. The place to which someone or something is going or being sent
  8. Schedule
  9. A planned route or journey

17 Clues: HealthNewnessSecuritySchedulePlace to stayCooking stylePhysical activityA planned route or journeyLiteracy Competence in using digital informationSmall electronic devices with a specific functionThe place to which someone or something is going or being sentA place where people live or stay, such as a hotel or guesthouse...

Security Audit Quiz SET C 2025-11-18

Security Audit Quiz SET C crossword puzzle
Across
  1. NIST CSF function focused on safeguarding assets.
  2. Level of harm from a compromise.
  3. Testing to confirm proper implementation.
  4. The defined boundary of an audit.
  5. Critical element of CIA triad.
  6. The probability of a threat exploiting a vulnerability.
  7. Final step of an audit process.
Down
  1. Unauthorized attempt to access a system.
  2. Ability to track actions back to individuals or systems.
  3. Adhering to required standards or regulations.
  4. A potential cause of an unwanted incident.
  5. A weakness that can be exploited.
  6. U.S. body responsible for cybersecurity standards.
  7. Checking compliance to documented requirements.
  8. measures implemented to reduce risk.

15 Clues: Critical element of CIA triad.Final step of an audit process.Level of harm from a compromise.A weakness that can be exploited.The defined boundary of an audit.measures implemented to reduce risk.Unauthorized attempt to access a system.Testing to confirm proper implementation.A potential cause of an unwanted incident....

THE FRIENDS 2023-04-20

THE FRIENDS crossword puzzle
Across
  1. ashley's most used phrase
  2. what maria gets on her face when she's outside
  3. a class we all share
  4. kaylee's biggest feature
  5. the man the myth the situationship
  6. the groupchat that we all have together
  7. the teacher that is better than woolley
  8. chaine's dead name
  9. ariany could never live with out this
  10. kaylee and ashley are poor...
Down
  1. ashley's stem major
  2. ariany, kaylee, ashley all have in common
  3. our last year here:(
  4. ariany is lacking her...
  5. what maria is (foreign)
  6. ariany gives you this when you speak
  7. emily thinks she looks like this when her hair is up (in spanish)
  8. chaine is pretty in...

18 Clues: chaine's dead nameashley's stem majorour last year here:(a class we all sharechaine is pretty in...what maria is (foreign)ariany is lacking her...kaylee's biggest featureashley's most used phrasekaylee and ashley are poor...the man the myth the situationshipariany gives you this when you speakariany could never live with out this...