cybersecurity Crossword Puzzles
CyberSecurity 1 2025-02-05
Across
- A type of attack where a hacker overloads a server with traffic to make it crash.
- A type of malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
- A method of encoding data to protect its confidentiality.
- A security method that requires two forms of identification, such as a password and a fingerprint.
- A commonly used firewall bypass technique that hides the source IP address.
Down
- The practice of defending systems and networks from digital attacks.
- A system that detects and prevents unauthorized access to computer networks.
- The act of impersonating a legitimate entity to steal sensitive information.
8 Clues: A method of encoding data to protect its confidentiality. • The practice of defending systems and networks from digital attacks. • A commonly used firewall bypass technique that hides the source IP address. • A system that detects and prevents unauthorized access to computer networks. • ...
Cybersecurity Crossword 2025-10-29
Across
- someone who attempts to gain access to your system without authorization
- the key to your accounts and information
- the kinds of links you want to avoid
- malicious programs that can infect your workstation
Down
- knowing what you are interacting with
- an attempt to get your information through emails and malicious means
- programs that run on your computer
- how you ensure your password cannot be guessed
8 Clues: programs that run on your computer • the kinds of links you want to avoid • knowing what you are interacting with • the key to your accounts and information • how you ensure your password cannot be guessed • malicious programs that can infect your workstation • an attempt to get your information through emails and malicious means • ...
internet 2023-10-30
7 Clues: steal private information • protection of our devices • protection against malware • infect smartphone and devices • communication between two devices • software responsible for undesirable tasks in device • donot download attachments from untrusted sources from here
Cybersecurity 2021 2021-10-18
Across
- use this where possible to protect valuable data and content
- phishing via SMS
- don't allow your devices to do this with unfamiliar networks
Down
- hover over all of these before clicking on them to make sure they are legitimate
- keep these updated to ensure they have the latest security
- Spotting these URLs is a bit of an art
- before you share
- do this over a link to ensure it is taking you to the site the email content says it will
8 Clues: phishing via SMS • before you share • Spotting these URLs is a bit of an art • keep these updated to ensure they have the latest security • use this where possible to protect valuable data and content • don't allow your devices to do this with unfamiliar networks • hover over all of these before clicking on them to make sure they are legitimate • ...
Cybersecurity 2021 2021-10-18
Across
- use this where possible to protect valuable data and content
- don't allow your devices to do this with unfamiliar networks
- do this over a link to ensure it is taking you to the site the email content says it will
- Spotting these URLs is a bit of an art
- before you share
Down
- phishing via SMS
- hover over all of these before clicking on them to make sure they are legitimate
- keep these updated to ensure they have the latest security
8 Clues: phishing via SMS • before you share • Spotting these URLs is a bit of an art • keep these updated to ensure they have the latest security • use this where possible to protect valuable data and content • don't allow your devices to do this with unfamiliar networks • hover over all of these before clicking on them to make sure they are legitimate • ...
Cybersecurity puzzle 2025-04-29
Across
- – A secret string used to authenticate a user’s identity.
- – The process of converting data into a secure code to prevent unauthorized access.
- – A form of social engineering that tricks people into revealing sensitive data.
- – General term for software designed to disrupt or damage a system.
Down
- – A network security device that monitors and filters incoming and outgoing traffic.
- – A set of rules used to transmit data securely over a network.
- – A program designed to detect and destroy malicious software.
- – Software that secretly gathers user information without consent.
8 Clues: – A secret string used to authenticate a user’s identity. • – A program designed to detect and destroy malicious software. • – A set of rules used to transmit data securely over a network. • – Software that secretly gathers user information without consent. • – General term for software designed to disrupt or damage a system. • ...
FY26 Q1 2025-10-15
Across
- Workstation compliance training goes live in this month
- Under privacy law, it means “forget about me”
- Leaves the forum when they don’t consent to one
- EU regulation keeping the financial sector in check
- Top-performing MU for SBS
- Helps out with meeting notes
Down
- If DORA’s vertical, NIS2 must be this
- Cybersecurity Awareness Month theme this year
- Complete by November: “Secure use of ___”
- January training: “Call ___”
- CCPA fine was issued in this country
11 Clues: Top-performing MU for SBS • January training: “Call ___” • Helps out with meeting notes • CCPA fine was issued in this country • If DORA’s vertical, NIS2 must be this • Complete by November: “Secure use of ___” • Cybersecurity Awareness Month theme this year • Under privacy law, it means “forget about me” • Leaves the forum when they don’t consent to one • ...
Cybersecurity 2 2022-09-08
Across
- This is popular network protocol analyzer, or an application that captures packets from a network connection
- 95% of all firewalls fail due to this
- ______ management is a continuous, proactive, and often automated process that keeps your computer systems, networks, and enterprise applications safe from cyberattacks and data breaches
- _____ scanning is a common technique hackers use to discover open doors or weak points in a network.
Down
- This type of testing simulates an attack against an organization in which ethical hackers use many of the same tools, techniques, and procedures as a real attacker would use.
- ______ detection is the process of identifying cyberattacks trying to enter a machine or network
- The process of converting information or data into a code, especially to prevent unauthorized access
- A cybersecurity _____ is a set of rules and guidelines that direct everyday IT activity in your organization
8 Clues: 95% of all firewalls fail due to this • ______ detection is the process of identifying cyberattacks trying to enter a machine or network • The process of converting information or data into a code, especially to prevent unauthorized access • _____ scanning is a common technique hackers use to discover open doors or weak points in a network. • ...
Cybersecurity Awareness 2024-09-22
Across
- / Tool is often used to help create and store complex passwords.
- / Most commonly targeted entity of cyber attacks in an organization.
- / A type of cyber attack that tricks users into giving up personal information.
- / Who should you report a suspicious email to?
- / The person or department you should approach with documented security concerns.
Down
- / This attack is when an unauthorized individual follows through the doorway behind an authorized employee.
- / What should you use as a way to have multiple forms of authentication on your accounts?
- / Tactic where the attacker looks over your shoulder or from a distance while attempting to gather information.
8 Clues: / Who should you report a suspicious email to? • / Tool is often used to help create and store complex passwords. • / Most commonly targeted entity of cyber attacks in an organization. • / A type of cyber attack that tricks users into giving up personal information. • / The person or department you should approach with documented security concerns. • ...
Cybersecurity Safegaurds 2023-01-18
Across
- the use of the internet or other digital technology to stalk or harass an individual, group, or organization
- the information that exists about a person as a result of their online activity
- the regular habits that computer users can take to improve their cybersecurity
- a small data packet that websites can store on your device in order to collect information
Down
- a weakness that leaves one’s data open to a cyberattack
- influencing people to change their behaviors in order to benefit society
- a type of crime in which someone uses your personal information without your permission
- any information that can be used to identify, contact, or locate an individual, like your name, birthday, address, social security number, and email address or password. You should never share identifiable information with someone you don’t know online
8 Clues: a weakness that leaves one’s data open to a cyberattack • influencing people to change their behaviors in order to benefit society • the regular habits that computer users can take to improve their cybersecurity • the information that exists about a person as a result of their online activity • ...
Introduction to Cybersecurity 2024-09-18
Across
- Protection of computer systems, networks, and data from digital attacks
- IoT devices increase our ____ to cyber attacks
- Assurance that systems and data are accessible by authorized users
- Ensuring information is protected from unauthorized or unintentional alterations
- Secure Systems with ____ and other security measures
- _______ contain a combination of numbers, letters, and symbols
- ______ store and send personal information
Down
- Protection of information from people who are not authorized to view it
- Security measure that should be guaranteed in every secured system
- ________ workers are needed to build more secure systems and respond to threats
- Cyber attacks threaten security,_______, and economic growth
- Another name for Internet of things
12 Clues: Another name for Internet of things • ______ store and send personal information • IoT devices increase our ____ to cyber attacks • Secure Systems with ____ and other security measures • Cyber attacks threaten security,_______, and economic growth • _______ contain a combination of numbers, letters, and symbols • ...
Impact of Cybersecurity 2025-03-03
Across
- ___ security aims to protect the organization’s technology assets
- ______ security encompasses the protection of tangible items such as buildings, equipment, and other physical assets.
- _____ Triad is a security measure that guarantees every system is system.
- _______ ensures that information is protected from unauthorized or unintentional alteration.
- There are ____ pillars of security that can safeguard an organization against potential threats.
- _____ is the protection of information from people who are not authorized to view it.
- ________ is the protection of computer systems, networks, and data from digital attacks.
- _________ of Things is a network of devices with the ability to connect and exchange data.
Down
- ___ security aims to reduce the risk of human error, negligence, or intentional acts of harm.
- __ security involves safeguarding confidential information from theft, unauthorized access, and ensuring data privacy, both in storage and transit.
- _____ involves developing an incident response plan
- is assurance that systems and data are accessible by authorized users when and where it is needed
12 Clues: _____ involves developing an incident response plan • ___ security aims to protect the organization’s technology assets • _____ Triad is a security measure that guarantees every system is system. • _____ is the protection of information from people who are not authorized to view it. • ...
Cybersecurity Crossword Puzzle 2024-10-30
Across
- Malicious software designed to harm or exploit devices
- A method of disguising data to protect it
- A program that scans for vulnerabilities in systems
- A type of attack where multiple systems are used to overwhelm a target
- The act of illegally accessing a computer system
- A device that helps protect networks by filtering traffic
- A common form of malware that locks files
Down
- A more secure method to login to an account using various factors such as something you know and something you have
- The process of verifying the identity of a user
- A malicious email designed to trick recipients
- A legal framework for data protection in the EU
- Software that detects and removes malware
12 Clues: A method of disguising data to protect it • Software that detects and removes malware • A common form of malware that locks files • A malicious email designed to trick recipients • The process of verifying the identity of a user • A legal framework for data protection in the EU • The act of illegally accessing a computer system • ...
Information Technology Crossword Puzzle 1 2021-04-21
Across
- Automated Rule Used in Excel
- Microsoft Meeting Tool
- VPN that allows users to work safely and effectively at locations outside of the traditional office
- Acronym for Virtual Machine
- Cybersecurity software used
Down
- Acronym for Customer Relationship Management
- Microsoft Email Used
- What is the first name of CommScope's new CIO?
- Replaced Software Center
- Planning methodology used to forecast, plan for and manage the demand for products and services
- Acronym for Virtual Private Network
11 Clues: Microsoft Email Used • Microsoft Meeting Tool • Replaced Software Center • Acronym for Virtual Machine • Cybersecurity software used • Automated Rule Used in Excel • Acronym for Virtual Private Network • Acronym for Customer Relationship Management • What is the first name of CommScope's new CIO? • ...
Orientation Day 2025-07-25
Across
- A popular programming language
- To break into a computer system illegally
- A temporary work experience to learn skills
- An upskilling and learning platform for practical career training
- A document that lists your skills and work history
Down
- Protecting computers from attacks
- A professional networking website
- Assurance Making sure things work well
- A secret word to protect your account
- A harmful program that can damage your computer
- Instructions given to a computer
11 Clues: A popular programming language • Instructions given to a computer • Protecting computers from attacks • A professional networking website • A secret word to protect your account • Assurance Making sure things work well • To break into a computer system illegally • A temporary work experience to learn skills • A harmful program that can damage your computer • ...
Newsletter 2024-06-17
Across
- What term describes an ethical hacker who uses their skills to improve cybersecurity
- what acts as a barrier between a trusted internal network and an untrusted external network.
- What small piece of data sent from a website and stored on the user's computer tracks information about their browsing activities?
- What term in cybersecurity is responsible for defending against simulated or real attacks.
- What type of cyber attack floods a network or system with a huge number of requests to disrupt normal traffic.
- What technology stores recently accessed data to speed up future acess
- What type of malware will self-replication and spread independently across networks.
- What term refers to a person who uses their programming skills to gain unauthorized access to computer systems?
- What term refers to the physical components of a computer system.
- What term refers to a group of interconnected computers or other devices that can communicate with each other.
- What term refers to testing a computer system, network, or web application to find security vulnerabilities?
- What term refers to a network of private computers infected with malicious software and controlled as a group without the owners' knowledge?
- what term refers to a collection of data or computer instructions that tell a computer how to work.
- What type of malicious software allows unauthorized access to a computer or network while concealing its presence?
- What group within an organization is responsible for simulating attacks against their own organization to test security measures.
- What term refers to a fixed-size output of a hash function that represents input data?
Down
- What term refers to a vulnerability in software that is unknown to a software vendor and has not yet been patched.
- What term refers to software which was designed to intentionally cause damage to the computer, server, client or computer network?
- What terms describes a hacker who exploits computer systems for personal gain or malicious purposes.
- What term refers to when someone is trying to disguise themselves as being a trusted known source.
- What term refers to the psychological manipulation of people into preforming actions or divulging confidential information.
- What type of software attaches itself to a legitimate program and spreads once the program is run.
- What term describes unauthorized use of someone else's computer to mine cryptocurrency?
- What term refers to a structured methodology or set of guidelines used to manage and improve an organization's cybersecurity posture.
- What type of malware encrypts a victim’s files and demands payment for the decryption key?
- What field of study involves techniques for secure communication in the presence of third parties?
- What protocol translates domain names into IP addresses?
- What term refers to a record of events that happen within an operating system, application or network device.
- What type of malicious software tricks the user by acting like a legitimate program to trick users into installing it.
29 Clues: What protocol translates domain names into IP addresses? • What term refers to the physical components of a computer system. • What technology stores recently accessed data to speed up future acess • What term describes an ethical hacker who uses their skills to improve cybersecurity • ...
DISA JFHQ-DODIN Holiday Gala 2022 2022-11-22
Across
- Social occasion with special entertainment performances
- Communications on the move
- Boots on the ground.
- Belief or confidence in a person or thing
- A duty assigned to an individual or unit; a task
Down
- Protection of IT systems and data
- Synchronizes C2 of the DODIN
- The IT Combat Support Agency
- One who gives someone else the power to behave in a certain way.
- Never trust; always verify
10 Clues: Boots on the ground. • Never trust; always verify • Communications on the move • Synchronizes C2 of the DODIN • The IT Combat Support Agency • Protection of IT systems and data • Belief or confidence in a person or thing • A duty assigned to an individual or unit; a task • Social occasion with special entertainment performances • ...
globalisasi 3 2024-09-18
Across
- Mesin pencari terbesar di dunia
- Belanja online melalui situs web
- Aplikasi berbagi foto dan video
- Seseorang yang mengeksploitasi sistem komputer
Down
- Menonton konten video secara langsung tanpa diunduh
- Perlindungan terhadap sistem komputer dari ancaman
- Acara audio yang dapat diunduh dan didengarkan
- Model bisnis yang menawarkan layanan dasar gratis
- Aplikasi berbagi video pendek yang populer
- Platform untuk menulis dan berbagi konten secara online
10 Clues: Mesin pencari terbesar di dunia • Aplikasi berbagi foto dan video • Belanja online melalui situs web • Aplikasi berbagi video pendek yang populer • Acara audio yang dapat diunduh dan didengarkan • Seseorang yang mengeksploitasi sistem komputer • Model bisnis yang menawarkan layanan dasar gratis • Perlindungan terhadap sistem komputer dari ancaman • ...
Protexxa's Cybersecurity Awareness Month 2024-09-19
Across
- A type of threat from within a company
- Cybersecurity Awareness Month
- The process of verifying identity
- Ceo Of our Company
- Our Internal Site
- Ensuring data has not been altered
- A security system that monitors network traffic
Down
- Covertly observing someone's screen to steal information
- The act of searching through trash for discarded personal information
- Refers to a vulnerability that is exploited on the same day it becomes known
- The middle child of Cloud Models
- The "G" in GRC
- A cloud computing platform from Microsoft
- Gaining unauthorized access to a secure area by closely following someone
- An amateur hacker
- The process of converting data into a secure format
- Icon for reporter button
- A type of malware that pretends to be legitimate
18 Clues: The "G" in GRC • An amateur hacker • Our Internal Site • Ceo Of our Company • Icon for reporter button • Cybersecurity Awareness Month • The middle child of Cloud Models • The process of verifying identity • Ensuring data has not been altered • A type of threat from within a company • A cloud computing platform from Microsoft • A security system that monitors network traffic • ...
Fundamentals of CYbersecurity 2023-01-22
Across
- secrecy of the information
- Involves a computer or computer network
- Warning for malicious activity
- control Role management and rule management
- Weakness in information system
Down
- assurance that the information received is exact and accurate
- enables you to manage and secure your mobile workforce with app security, container app security and secure mobile mail.
- Security measures for protecting a computer network from intruders, including both wired and wireless (Wi-Fi) connections.
- Attempt to gain unauthorized access
- Virtual component world
- security triads
- identify the user or system or the entity
12 Clues: security triads • Virtual component world • secrecy of the information • Warning for malicious activity • Weakness in information system • Attempt to gain unauthorized access • Involves a computer or computer network • identify the user or system or the entity • control Role management and rule management • assurance that the information received is exact and accurate • ...
CSC 200 Cybersecurity 2018-01-31
Across
- Deploying a security officer at the premises gate is an example of _____ control.
- _____ is a type of attacker who wants to make a statement and perform targeted cyber attacks
- Ensures transmission and storage of information in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the information.
- Prevents either sender or receiver from denying a transmitted message.
- Assures that the system works promptly and service is not denied to authorized users.
Down
- _______ is the act of accessing information during transmission.
- _________ unauthorized access and modification of an asset.
- _________ means an information becomes lost, unavailable, or unusable
- Preserving authorized restriction on information access and disclosure, including means for protection personal privacy and proprietary information
- A weakness which allows an attacker to reduce a system's information assurance.
- A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
- Phishing and attachments target the _________ threat vector
12 Clues: _________ unauthorized access and modification of an asset. • Phishing and attachments target the _________ threat vector • _______ is the act of accessing information during transmission. • _________ means an information becomes lost, unavailable, or unusable • Prevents either sender or receiver from denying a transmitted message. • ...
Cybersecurity Awareness Month 2024-08-16
Across
- Adhering to regulatory requirements and industry standards for data protection and privacy in cloud environments.
- Infectious software
- Type of attack that tricks users into revealing sensitive info
- Type of malware that allows an attacker to remotely control a system or network
- A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
- A type of software that is designed to damage or exploit a computer system
Down
- Attack where an attacker gains unauthorized access to a system or network
- Unwanted emails
- The process of verifying the identity of a user, device, or system
- A type of malware that demands payment in exchange for restoring access to data
- A network that encrypts internet connections and helps secure remote access to a network
- Creating a copy of data to prevent its loss in case of a disaster or data breach
12 Clues: Unwanted emails • Infectious software • Type of attack that tricks users into revealing sensitive info • The process of verifying the identity of a user, device, or system • Attack where an attacker gains unauthorized access to a system or network • A type of software that is designed to damage or exploit a computer system • ...
Crossword Labs cybersecurity 2024-03-27
Across
- the process or action of verifying the identity of a user or process.
- used to protect data from being stolen, changed, or compromised
- any security incident in which unauthorized parties gain access to sensitive or confidential information
- individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
- A thing to connect at an account
- software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
- type of malware that spreads between computers and damages data and software
- designed to detect and destroy computer viruses
- any program or file that is intentionally harmful to a computer, network or server
- network security device that monitors traffic to or from your network
- unwelcome attempts to steal, expose, alter, disable or destroy information through
- A technique for attempting to acquire sensitive data, with email
12 Clues: A thing to connect at an account • designed to detect and destroy computer viruses • used to protect data from being stolen, changed, or compromised • A technique for attempting to acquire sensitive data, with email • network security device that monitors traffic to or from your network • the process or action of verifying the identity of a user or process. • ...
WeWork Noble House Community 2022-06-25
Across
- Logistics service provider
- SaaS platform that makes cybersecurity accessible to all
- Consumer intelligence platform specializing in mobile advertising
- Solving the world's 1 gigaton refrigerant problem
- Consumer electronics company, well-known for its technologically advanced smartwatch
- #DemiMasaDepan #MakingEducationAffordable
Down
- Language learning platform, mainly Chinese
- Social justice philanthropy that supports initiatives to strengthen democracy
- Largest live training marketplace in Indonesia
- Supporting diverse clean energy entrepreneurs to thrive
- Offering lead generation services from B2B telemarketing to inside sales
- Pioneer of global content service and distribution
12 Clues: Logistics service provider • #DemiMasaDepan #MakingEducationAffordable • Language learning platform, mainly Chinese • Largest live training marketplace in Indonesia • Solving the world's 1 gigaton refrigerant problem • Pioneer of global content service and distribution • Supporting diverse clean energy entrepreneurs to thrive • ...
Work from home 2023-07-30
Across
- Team Colleagues working from different locations.
- Designing a comfortable and efficient workspace.
- Training Professional development conducted via the internet.
- Essential tool for remote work
- Happy Hour Socializing with colleagues online after work.
- Meetings Replacing in-person gatherings.
- Protecting data and systems while working remotely.
Down
- Popular video conferencing platform.
- (Virtual Private Network)A secure network connection for remote access.
- Access The ability to connect to work resources from anywhere.
- Online seminar or presentation.
- One of the benefits of working from home.
- Balance Striving to maintain harmony between work and personal life.
- Office A dedicated workspace within one's home.
14 Clues: Essential tool for remote work • Online seminar or presentation. • Popular video conferencing platform. • Meetings Replacing in-person gatherings. • One of the benefits of working from home. • Office A dedicated workspace within one's home. • Designing a comfortable and efficient workspace. • Team Colleagues working from different locations. • ...
The Wenzels 2025-09-02
Across
- World's #1 Dad
- Palmer's middle name
- Engagement country
- Palmer's birth month
- Something borrowed
- Jordyn's hometown
- Jordyn's favorite flower
- Jordyn's bachelor degree
- Jordyn's jersey number at UTSA
- The chapel
- Palmer's favorite color
- Something old
- The reception
- Palmer's first impression costume
Down
- Palmer's hometown
- Gem of an apartment building
- When the couple first met (holiday)
- Jordyn's first impression costume
- The size of each half of the wedding party
- Palmer's bachelor degree
- Jordyn's eye color
- Jordyn's favorite color
- The couple's first apartment (city)
- Jordyn's birth month
- The couple's favorite drink
- What Jordyn picked out for the wedding
- What Palmer picked out for the wedding
- Something blue
- Palmer's jersey number at UTSA
- Something new
- Jordyn's middle name
31 Clues: The chapel • Something old • The reception • Something new • World's #1 Dad • Something blue • Palmer's hometown • Jordyn's hometown • Engagement country • Jordyn's eye color • Something borrowed • Palmer's middle name • Palmer's birth month • Jordyn's birth month • Jordyn's middle name • Jordyn's favorite color • Palmer's favorite color • Palmer's bachelor degree • Jordyn's favorite flower • ...
LifeHack 2022 Crossword 2022-07-09
Across
- Actions that come from the heart
- Protecting personal stuff from hackers
- The surrounding place we live in
- One of the pillars
- Working for the good of others (for free!)
- (____ in wonderland)and (___ the builder)
Down
- Organizations that help groups of people
- How do we grow crops in winter?
- The Au of LifeHack
- OOO, It's good in the sky but not in our lungs
10 Clues: One of the pillars • The Au of LifeHack • How do we grow crops in winter? • Actions that come from the heart • The surrounding place we live in • Protecting personal stuff from hackers • Organizations that help groups of people • (____ in wonderland)and (___ the builder) • Working for the good of others (for free!) • OOO, It's good in the sky but not in our lungs
Risk Management Process, Common Approaches & Techniques 2023-08-09
Across
- data driven risk technique
- common risk approach
- graphical representation of the 2nd step of the risk management process
- SGJ's risk response against disasters
- channel for communicating fraud internally
- effective risk management requires sound relationships with ________
Down
- a risk identified/assessed as "high" across the Group
- the last step in the risk management process
- risks with greater________ may be given greater priority
- category of risk response
10 Clues: common risk approach • category of risk response • data driven risk technique • SGJ's risk response against disasters • channel for communicating fraud internally • the last step in the risk management process • a risk identified/assessed as "high" across the Group • risks with greater________ may be given greater priority • ...
Hast du den Durchblick in der Welt der IT und Innovation? 2023-11-15
Across
- Systeme, die Aufgaben ausführen, die normalerweise menschliche Intelligenz erfordern.
- Integration von digitalen Informationen in die reale Welt.
- Bereitstellung von Computing-Diensten über das Internet.
- Simulierte Umgebung durch Computer generiert.
- Dezentrales und sicheres Verzeichnis für Transaktionen.
- Verarbeitung und Analyse großer Datenmengen.
- Nächste Generation von Mobilfunknetzen.
Down
- Vernetzung von Geräten und Objekten im Internet.
- Schutz vor Cyberangriffen und Datenverlust.
- Verwendung von Quantenbits für leistungsstarke Berechnungen.
10 Clues: Nächste Generation von Mobilfunknetzen. • Schutz vor Cyberangriffen und Datenverlust. • Verarbeitung und Analyse großer Datenmengen. • Simulierte Umgebung durch Computer generiert. • Vernetzung von Geräten und Objekten im Internet. • Dezentrales und sicheres Verzeichnis für Transaktionen. • Bereitstellung von Computing-Diensten über das Internet. • ...
WeWork Noble House Community 2022-06-25
Across
- Consumer intelligence platform specializing in mobile advertising
- Consumer electronics company, well-known for its technologically advanced smartwatch
- Largest live training marketplace in Indonesia
- Solving the world's 1 gigaton refrigerant problem
- #DemiMasaDepan #MakingEducationAffordable
- Supporting diverse clean energy entrepreneurs to thrive
Down
- Language learning platform, mainly Chinese
- Pioneer of global content service and distribution
- Social justice philanthropy that supports initiatives to strengthen democracy
- SaaS platform that makes cybersecurity accessible to all
- Offering lead generation services from B2B telemarketing to inside sales
- Logistics service provider
12 Clues: Logistics service provider • #DemiMasaDepan #MakingEducationAffordable • Language learning platform, mainly Chinese • Largest live training marketplace in Indonesia • Solving the world's 1 gigaton refrigerant problem • Pioneer of global content service and distribution • Supporting diverse clean energy entrepreneurs to thrive • ...
Technological progress 2025-03-11
Across
- protecting digital systems from cyber threats
- maintaining progress without depleting resources
- achieving maximum productivity with minimal waste
- Reality overlaying digital content onto the real world
- manipulating matter on an atomic or molecular scale
- the fifth generation of mobile network technology
Down
- Intelligence machines that mimic human intelligence
- a significant new idea, method, or product
- Computing computing based on quantum-mechanical principles
- a major and sudden advancement or discovery
- using machines to perform tasks without human assistance
- using living organisms for technological advancements
12 Clues: a significant new idea, method, or product • a major and sudden advancement or discovery • protecting digital systems from cyber threats • maintaining progress without depleting resources • achieving maximum productivity with minimal waste • the fifth generation of mobile network technology • Intelligence machines that mimic human intelligence • ...
IIC BTECH 2025-05-18
Across
- Closed electrical path for current flow.
- Small computer on a single integrated chip.
- Process of combining multiple data inputs into one output.
- Mechanism to regulate and manage other devices.
- India's homegrown open-source processor chip.
- Site of India's nuclear tests in Rajasthan desert.
Down
- Defense measures against digital attacks.
- Stepwise instructions for solving problems in computing.
- organization which research on Defence .
- Worldwide network connecting computers globally.
- Machine programmed to perform automatic tasks.
- Device that detects physical changes in the environment.
12 Clues: Closed electrical path for current flow. • organization which research on Defence . • Defense measures against digital attacks. • Small computer on a single integrated chip. • India's homegrown open-source processor chip. • Machine programmed to perform automatic tasks. • Mechanism to regulate and manage other devices. • Worldwide network connecting computers globally. • ...
Intro Cybersecurity Puzzle 1 2021-09-08
Across
- Hacker with a political agenda
- The 'A' in the CIA Triade
- Psychological control discouraging an attack
- Acronym for information that is freely available
- Vulnerability + Threat
- A control such as a gateway or fence
Down
- Organization that publishes cybersecurity frameworks
- The 'C' in the CIA Triade
- Using a voice channel to conduct phishing
- The 'I' in the CIA Triade
- an attack type that can be polymorphic and is usually memory resident
- Acronym for a group with lot of resources to attack
- Alternative access to a system for malware
- A regulation only found in Canada
14 Clues: Vulnerability + Threat • The 'C' in the CIA Triade • The 'I' in the CIA Triade • The 'A' in the CIA Triade • Hacker with a political agenda • A regulation only found in Canada • A control such as a gateway or fence • Using a voice channel to conduct phishing • Alternative access to a system for malware • Psychological control discouraging an attack • ...
Crossword Labs cybersecurity 2024-03-27
Across
- the process or action of verifying the identity of a user or process.
- used to protect data from being stolen, changed, or compromised
- any security incident in which unauthorized parties gain access to sensitive or confidential information
- individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
- A thing to connect at an account
- software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
- type of malware that spreads between computers and damages data and software
- designed to detect and destroy computer viruses
- any program or file that is intentionally harmful to a computer, network or server
- network security device that monitors traffic to or from your network
- unwelcome attempts to steal, expose, alter, disable or destroy information through
- A technique for attempting to acquire sensitive data, with email
12 Clues: A thing to connect at an account • designed to detect and destroy computer viruses • used to protect data from being stolen, changed, or compromised • A technique for attempting to acquire sensitive data, with email • network security device that monitors traffic to or from your network • the process or action of verifying the identity of a user or process. • ...
Fundamentals of CYbersecurity 2023-01-22
Across
- secrecy of the information
- Involves a computer or computer network
- Warning for malicious activity
- control Role management and rule management
- Weakness in information system
Down
- assurance that the information received is exact and accurate
- enables you to manage and secure your mobile workforce with app security, container app security and secure mobile mail.
- Security measures for protecting a computer network from intruders, including both wired and wireless (Wi-Fi) connections.
- Attempt to gain unauthorized access
- Virtual component world
- security triads
- identify the user or system or the entity
12 Clues: security triads • Virtual component world • secrecy of the information • Warning for malicious activity • Weakness in information system • Attempt to gain unauthorized access • Involves a computer or computer network • identify the user or system or the entity • control Role management and rule management • assurance that the information received is exact and accurate • ...
Cybersecurity Awareness Month 2023-09-21
Across
- ____ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the use
- Secure your home wi-fi network with ____ password to prevent unauthorized access
- Do not open email attachment or click on ____ from an unknown or unsolicited sources
- Regularly ____ your important data to prevent data loss in case of cyberattack
- Always ____ any suspicious activity or security incident to security team immediately
- Be cautious about oversharing ___ information online as it could be used for social engineering attacks
- Email scam or attempt to trick you into giving your password or personal information
Down
- ____ is something you should always change and never share with anyone else.
- Never uninstall ____ software that is designed to destroy computer viruses
- Do not leave your ____ unattended
- Regularly review and adjust your ___ settings on social media and online accounts
- Always use ____ websites/Appstore's when downloading apps to reduce risk of malware
12 Clues: Do not leave your ____ unattended • Never uninstall ____ software that is designed to destroy computer viruses • ____ is something you should always change and never share with anyone else. • Regularly ____ your important data to prevent data loss in case of cyberattack • Secure your home wi-fi network with ____ password to prevent unauthorized access • ...
Cybersecurity Lesson 5 2022-08-28
Across
- gaining unauthorised access to or control of a computer system
- hackers who don’t hack with malicious intent but illegally hack for ethical purposes.
- locks up or encrypts your files so you can no longer access them without paying a ransom.
- hackers who attack others with malicious intent to cause damage and harm.
- involves the attacker watching the victim while they provide sensitive information.
- replicate themselves and spread through the network.
- An attack in which the victim receives an email or text message disguised to look as if it has come from a reputable source.
Down
- Raw facts and figures, with little to no meaning behind them.
- Created when that data has been processed and becomes meaningful.
- malicious form of self-replicating software that attach to software.
- Hackers who hack for the greater good.
- An attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
12 Clues: Hackers who hack for the greater good. • replicate themselves and spread through the network. • Raw facts and figures, with little to no meaning behind them. • gaining unauthorised access to or control of a computer system • Created when that data has been processed and becomes meaningful. • malicious form of self-replicating software that attach to software. • ...
Cybersecurity Crossword #1 2019-04-29
Across
- software designed to interfere with a computer's normal functioning
- computer software that is provided usually for free but contains advertisements
- a scam by which an email user is duped into revealing personal information
- a prescribed or proscribed course of action or behavior which is to be followed
- a program that is designed to harm a computer by deleting data
- of, relating to, or using data in the form of numerical digits
- a computer that is under the control of a malicious hacker without the knowledge of the computer owner
Down
- computer software that secretly records information about the way you use the computer
- measures taken to protect a computer or computer system against unauthorized access or attack
- email that is not wanted
- an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer
- to change (something) by including the most recent information
12 Clues: email that is not wanted • a program that is designed to harm a computer by deleting data • to change (something) by including the most recent information • of, relating to, or using data in the form of numerical digits • software designed to interfere with a computer's normal functioning • ...
Crossword Labs cybersecurity 2024-03-27
Across
- the process or action of verifying the identity of a user or process.
- used to protect data from being stolen, changed, or compromised
- any security incident in which unauthorized parties gain access to sensitive or confidential information
- individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
- A thing to connect at an account
- software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
- type of malware that spreads between computers and damages data and software
- designed to detect and destroy computer viruses
- any program or file that is intentionally harmful to a computer, network or server
- network security device that monitors traffic to or from your network
- unwelcome attempts to steal, expose, alter, disable or destroy information through
- A technique for attempting to acquire sensitive data, with email
12 Clues: A thing to connect at an account • designed to detect and destroy computer viruses • used to protect data from being stolen, changed, or compromised • A technique for attempting to acquire sensitive data, with email • network security device that monitors traffic to or from your network • the process or action of verifying the identity of a user or process. • ...
Crossword Labs cybersecurity 2024-03-27
Across
- the process or action of verifying the identity of a user or process.
- used to protect data from being stolen, changed, or compromised
- any security incident in which unauthorized parties gain access to sensitive or confidential information
- individual with technical computer skills but often refers to individuals who use their skills to breach cybersecurity defenses.
- A thing to connect at an account
- software and operating system (OS) updates that address security vulnerabilities within a program or product
Down
- type of malware that spreads between computers and damages data and software
- designed to detect and destroy computer viruses
- any program or file that is intentionally harmful to a computer, network or server
- network security device that monitors traffic to or from your network
- unwelcome attempts to steal, expose, alter, disable or destroy information through
- A technique for attempting to acquire sensitive data, with email
12 Clues: A thing to connect at an account • designed to detect and destroy computer viruses • used to protect data from being stolen, changed, or compromised • A technique for attempting to acquire sensitive data, with email • network security device that monitors traffic to or from your network • the process or action of verifying the identity of a user or process. • ...
Cybersecurity Awareness Month 2024-09-27
Across
- Manages policies and practices aimed at preventing unauthorized access, data breaches, and misuse of personal data.
- A string of unique characters used to login to a computer.
- A sentence-like string of words used for authentication that is easy to remember but difficult to crack.
- The practice of protecting systems, networks, and programs from digital attacks.
- Attempting to acquire sensitive data, such as personal information or passwords, through a fraudulent solicitation in email.
- A method to verify identity and protect computers from unauthorized use.
Down
- Malware designed to deny a user or organization access to files on their computer.
- Phishing method using text messages
- A method used to defraud people over the phone.
- To keep safe from harm.
- A skilled programmer who secretly invades computers without authorization.
- A type of artificial intelligence used to create convincing fake images, videos and audio recordings.
12 Clues: To keep safe from harm. • Phishing method using text messages • A method used to defraud people over the phone. • A string of unique characters used to login to a computer. • A method to verify identity and protect computers from unauthorized use. • A skilled programmer who secretly invades computers without authorization. • ...
SBA Crossword 2022-06-24
Across
- Ida, Harvey, Katrina
- Atmospheric/weather conditions
- System that provides loan information (4 letter abbrev)
- What you complete to be considered for a loan
- Presidential, SBA and Secretary of Agriculture (types of ________)
- Another word for crisis, SBA manages ____
- 2020 Pandemic (minus 19)
- Business assets used to secure a loan
- Businesses apply for EIDL loans and seek funds for normal operations known as
Down
- The ODA Mission is to be "in one word"
- Must meet minimum credit ____ to qualify for loan
- Death and ____ (IRS)
- Spreading payments over multiple periods
- A signed commitment
- SBA Employee recognition program (3 words)
- Economic ______ Disaster Loan
- Reconsideration/reacceptance
- Handles complaints or reports of fraud
- Never share this, cybersecurity, keep safe
19 Clues: A signed commitment • Ida, Harvey, Katrina • Death and ____ (IRS) • 2020 Pandemic (minus 19) • Reconsideration/reacceptance • Economic ______ Disaster Loan • Atmospheric/weather conditions • Business assets used to secure a loan • The ODA Mission is to be "in one word" • Handles complaints or reports of fraud • Spreading payments over multiple periods • ...
Digital Communications 2025-05-08
Across
- Procedures used to protect data from unauthorised access
- A very obvious password
- Act of spies hacking or infiltrating internet systems
- Attackers impersonate legitimate entities, often through emails or fake websites
- The first form of the Internet
Down
- Set of 8 characters either 0's or 1's
- Small bundles of data
- Malicious software
- Common web search engine
9 Clues: Malicious software • Small bundles of data • A very obvious password • Common web search engine • The first form of the Internet • Set of 8 characters either 0's or 1's • Act of spies hacking or infiltrating internet systems • Procedures used to protect data from unauthorised access • Attackers impersonate legitimate entities, often through emails or fake websites
CYSIAM Crossword 2025-08-11
Across
- Encrypted communication channel (abbreviation)
- A secret word or phrase used to gain access
- A network of infected devices
- A program that replicates itself and spreads
- A scam where attackers trick users into giving up
- The practice of protecting systems and data
Down
- Code flaw that can be exploited
- Type of attack where services are overwhelmed(abbreviation
- Malicious software
9 Clues: Malicious software • A network of infected devices • Code flaw that can be exploited • A secret word or phrase used to gain access • The practice of protecting systems and data • A program that replicates itself and spreads • Encrypted communication channel (abbreviation) • A scam where attackers trick users into giving up • ...
Algorithms 2024-09-12
Across
- a common port smaller than USB
- safety the practice of protecting yourself online
- the action you take with your mouse
- a programming concept that allows you to repeat a set of instructions
- the smallest unit of data a computer can process (1/0)
- another word for software
- a list of steps needed to complete a task
Down
- The most common type of port
- the practice of protecting computer systems
- The language that tells a computer what to do
- a single simple instruction
- a person who writes code
- A programming error
13 Clues: A programming error • a person who writes code • another word for software • a single simple instruction • The most common type of port • a common port smaller than USB • the action you take with your mouse • a list of steps needed to complete a task • the practice of protecting computer systems • The language that tells a computer what to do • ...
Air Force Career: Cyber Surety 2021-11-17
Across
- From programming to _____, these experts keep our systems and our information safe.
- Responsible for cybersecurity of national ____ systems.
- Minimum Education: High School ______
- ASVAB requirement
Down
- Completion of 8.5 weeks of Basic _____Training
- Enforce national, DoD, and Air Force security policies and _________
- Status: Enlisted Airmen with credits earned towards _______ Systems Technology
- Ensure all systems comply with ____ security standards.
- Training: 50 ____
9 Clues: Training: 50 ____ • ASVAB requirement • Minimum Education: High School ______ • Completion of 8.5 weeks of Basic _____Training • Ensure all systems comply with ____ security standards. • Responsible for cybersecurity of national ____ systems. • Enforce national, DoD, and Air Force security policies and _________ • ...
SheTech x Entrata Crossword Puzzle 2024-03-12
Across
- Designer Makes apps pretty and user-friendly
- EngineerCrafts digital solutions from code
- Marketing Specialist Markets products in the digital realm
- Analyst Guardian against digital threats
Down
- Manager Directs tech projects to success
- Scientist Turns data into actionable insights
- Analyst Unlocks insights hidden in numbers
- Support Specialist Tech troubleshooter extraordinaire
- Engineer Connects the digital dots securely
- Assurance Engineer Detects bugs before users do
10 Clues: Manager Directs tech projects to success • Analyst Guardian against digital threats • EngineerCrafts digital solutions from code • Analyst Unlocks insights hidden in numbers • Engineer Connects the digital dots securely • Designer Makes apps pretty and user-friendly • Scientist Turns data into actionable insights • Assurance Engineer Detects bugs before users do • ...
word search 2025-05-22
Across
- Developer A programmer with knowledge
- for designing,implementing, and managing
- Developer A person who creates computer programs.
- Manager A professional who oversees the planning,
Down
- App Developer A programmer who creates applications.
- Developer A programmer focused on the design
- Specialist A professional who protects computer
- A professional responsible
- Developer A programmer who designs and creates video
9 Clues: A professional responsible • Developer A programmer with knowledge • for designing,implementing, and managing • Developer A programmer focused on the design • Specialist A professional who protects computer • Developer A person who creates computer programs. • Manager A professional who oversees the planning, • App Developer A programmer who creates applications. • ...
Islington Crosswords. 2024-12-15
Across
- has solved different national and int'l cyber cases
- where classes are named after alumni
- cozy smaller lecture place
Down
- A record of the books you have borrowed
- A long-running cinema hall located in Kathmandu, named after a goddess
- Pops when heated
- Classes named after cities in Nepal
- biggest lecture place
- holds an old memory of the college
9 Clues: Pops when heated • biggest lecture place • cozy smaller lecture place • holds an old memory of the college • Classes named after cities in Nepal • where classes are named after alumni • A record of the books you have borrowed • has solved different national and int'l cyber cases • A long-running cinema hall located in Kathmandu, named after a goddess
Thales prodcuts version 2 2024-05-30
Across
- Thales product for spaceborne observation
- Thales product for military الدفاع الجوي (difaa al-jawwi - air defense) systems
- Thales product for avionics
- Thales product for Airspace mobility solutions
Down
- Thales product for cybersecurity solutions
- Thales product for underwater defense solutions
- Thales product for civil aviation landing systems
- Thales product for digital identity and security
- Thales product for air traffic management
9 Clues: Thales product for avionics • Thales product for spaceborne observation • Thales product for air traffic management • Thales product for cybersecurity solutions • Thales product for Airspace mobility solutions • Thales product for underwater defense solutions • Thales product for digital identity and security • Thales product for civil aviation landing systems • ...
Vanessa & Jinsik <3 2024-10-24
Across
- Where do Vanessa and Jinsik live?
- What does Jinsik do for work?
- How old is Jinsik?
- What holiday were Vanessa and Jinsik celebrating when they met?
Down
- How did Vanessa and Jinsik meet?
- How many kids do Vanessa and Jinsik want?
- Where did Jinsik propose at?
- How many people are in the wedding party?
- Where are Vanessa and Jinsik going for their honeymoon?
- What does Vanessa do for work?
- How old is Vanessa?
11 Clues: How old is Jinsik? • How old is Vanessa? • Where did Jinsik propose at? • What does Jinsik do for work? • What does Vanessa do for work? • How did Vanessa and Jinsik meet? • Where do Vanessa and Jinsik live? • How many kids do Vanessa and Jinsik want? • How many people are in the wedding party? • Where are Vanessa and Jinsik going for their honeymoon? • ...
CYSIAM Crossword 2025-08-05
Across
- Malicious software
- A network of infected devices
- Type of attack where services are overwhelmed (abbreviation)
- Hides data from unauthorised users
- Unauthorised access to systems or networks
- Encrypted communication channel (abbreviation)
Down
- Code flaw that can be exploited
- A secret word or phrase used to gain access
- The practice of protecting systems and data
- A program that replicates itself and spreads
- A scam where attackers trick users into giving up information
11 Clues: Malicious software • A network of infected devices • Code flaw that can be exploited • Hides data from unauthorised users • Unauthorised access to systems or networks • A secret word or phrase used to gain access • The practice of protecting systems and data • A program that replicates itself and spreads • Encrypted communication channel (abbreviation) • ...
Cyber 2024-08-08
8 Clues: The__________ Cube • The third letter of CIA • The first letter of CIA • The second letter of CIA • The main idea of Gen cyber • A type of hacker nicknamed pen tester • The type of hacker that hacks for revenge • Something that thinks like a human but isn't
Technology Terminology 2022-09-26
Across
- Imaginary creatures that cause unexplained technology problems
- IT protection.
- Computer that manages access to centralized resource.
Down
- American multinational technology corporation based in Washington.
- Location of multiple centralized IT resources.
- Tool used to send and receive data across shared or public networks.
- Data "rains" from here.
- Interconnected people or technology.
8 Clues: IT protection. • Data "rains" from here. • Interconnected people or technology. • Location of multiple centralized IT resources. • Computer that manages access to centralized resource. • Imaginary creatures that cause unexplained technology problems • American multinational technology corporation based in Washington. • ...
You can fight back against cyberattacks - Facetime 2022-03-07
Across
- Short-lived fault in a system.
- Defect in a system's design
- A way to correct issues in devices.
- The service that was impacted by the issue
- The entity who makes something
Down
- A gap, break or a hole in something
- Be able to keep your personal info private
- Ways of protecting informatic systems
- To respond to a knock or ring
- Biggest tech company in the world
10 Clues: Defect in a system's design • To respond to a knock or ring • Short-lived fault in a system. • The entity who makes something • Biggest tech company in the world • A gap, break or a hole in something • A way to correct issues in devices. • Ways of protecting informatic systems • Be able to keep your personal info private • The service that was impacted by the issue
AI in business 2023-11-20
Across
- organizational entity or an individual engaged in commercial, industrial, or professional activities
- How many jobs will be created by AI
- biggest AI software
- simulation of human intelligence processes by computer inteligence
- Person that created ChatGpt
- AI-driven data insights for decision-making
Down
- AI technique predicting future outcomes
- AI application automating tasks
- refers to the application of scientific knowledge for practical purposes.
- AI application enhancing cybersecurity
10 Clues: biggest AI software • Person that created ChatGpt • AI application automating tasks • How many jobs will be created by AI • AI application enhancing cybersecurity • AI technique predicting future outcomes • AI-driven data insights for decision-making • simulation of human intelligence processes by computer inteligence • ...
sdaia crossword 2024-10-31
Across
- Safeguarding personal information
- Collections of data
- Protecting digital information and systems
- An AI and art collaboration challenge
Down
- A city that uses technology to improve quality of life
- Competition encouraging open data innovation
- A special coworker we will miss!
- A strategic framework for Saudi Arabia's economic diversification
- First Saudi summit for global data and AI experts
- SDAIA's mission includes harnessing this technology to drive progress
10 Clues: Collections of data • A special coworker we will miss! • Safeguarding personal information • An AI and art collaboration challenge • Protecting digital information and systems • Competition encouraging open data innovation • First Saudi summit for global data and AI experts • A city that uses technology to improve quality of life • ...
Vanessa & Jinsik <3 2024-10-24
Across
- What does Jinsik do for work?
- Where did Jinsik propose at?
- Where do Vanessa and Jinsik live?
- four How old is Vanessa?
- How many kids do Vanessa and Jinsik want?
Down
- How did Vanessa and Jinsik meet?
- What does Vanessa do for work?
- How old is Jinsik?
- How many people are in the wedding party?
- Where are Vanessa and Jinsik going for their honeymoon?
- What holiday were Vanessa and Jinsik celebrating when they met?
11 Clues: How old is Jinsik? • four How old is Vanessa? • Where did Jinsik propose at? • What does Jinsik do for work? • What does Vanessa do for work? • How did Vanessa and Jinsik meet? • Where do Vanessa and Jinsik live? • How many people are in the wedding party? • How many kids do Vanessa and Jinsik want? • Where are Vanessa and Jinsik going for their honeymoon? • ...
Crossword 1 2023-11-24
Across
- What does the middle 'w' stand for in www.?
- A record of your details
- A complex code used to gain access
- A computer for your lap
- A small book to record your thoughts and secrets
- Protecting your computer systems and information from harm
- What allows you to write digital letters?
Down
- Lightweight portable speakers for your head
- Small mammal often chased by cats
- A device used for observing, checking, or keeping a continuous record of something
- A string of metal
- A collection of information
12 Clues: A string of metal • A computer for your lap • A record of your details • A collection of information • Small mammal often chased by cats • A complex code used to gain access • What allows you to write digital letters? • Lightweight portable speakers for your head • What does the middle 'w' stand for in www.? • A small book to record your thoughts and secrets • ...
Digital Strategy 2025-11-03
Across
- predicting future demand for products
- software for managing business processes.
- Raw facts and figures used for analytics
- the process of sourcing and purchasing goods or services.
- monitoring the movement of goods.
- operating on an international scale
Down
- Network of suppliers, manufacturers and costumers
- Protecting systems and data from cyber threats
- Technology enabling remote access to computing resources
- a measurable value to evaluate performance.
- Automated tool that interacts with users via text or voice
- Step-by-step procedure for solving a problem
12 Clues: monitoring the movement of goods. • operating on an international scale • predicting future demand for products • Raw facts and figures used for analytics • software for managing business processes. • a measurable value to evaluate performance. • Step-by-step procedure for solving a problem • Protecting systems and data from cyber threats • ...
Cybersecurity Vocabulary 2023-02-27
Across
- verifiying that the user is who they say they are
- spying on a user to get their login information
- sending targeted emails pretending to be a known person to gain information or give malware
Down
- Protection of computer systems and networks from attack
- requires the user to provide two or more verification factors to gain access
- a hacking method that uses trial and error to crack passwords
- sending emails that pretend to be real in order to gain information or give malware
- helps you identify vulnerabilities and create countermeasures against attacks
8 Clues: spying on a user to get their login information • verifiying that the user is who they say they are • Protection of computer systems and networks from attack • a hacking method that uses trial and error to crack passwords • requires the user to provide two or more verification factors to gain access • ...
Cybersecurity puzzle 2023-10-04
Across
- Cybersecurity month
- resist immediate action when receiving an email or text
- ready to gobble up all your important files
- refers to best practices for maintaining online security
Down
- dangerous pieces of phishing email; compromised links, malicious attachments
- well-honed social engineering-spotting skills to avoid his tricks
- charm of social engineering
- malware that replicated itself to infect more devices
8 Clues: Cybersecurity month • charm of social engineering • ready to gobble up all your important files • malware that replicated itself to infect more devices • resist immediate action when receiving an email or text • refers to best practices for maintaining online security • well-honed social engineering-spotting skills to avoid his tricks • ...
Cybersecurity Crosswords 2023-11-14
Across
- Information security is not just a___issue.
- Use hard-to-guess ______ and keep them secret–even from your friends.
- You should not just check, you should also confirm.
- If you open a suspicious email by ______, don't click on the links or download the files that came with it.
Down
- Delete spam email. Don't ______ it.
- The strongest password's is: Grrrrrrrr8!!!, Go^sa!, John012109, Am3r1ca!,
- Be careful when ______ files or shopping online. Use trusted sites only.
- Don't open an ______ from someone you don't know. It may contain a virus.
8 Clues: Delete spam email. Don't ______ it. • Information security is not just a___issue. • You should not just check, you should also confirm. • Use hard-to-guess ______ and keep them secret–even from your friends. • Be careful when ______ files or shopping online. Use trusted sites only. • The strongest password's is: Grrrrrrrr8!!!, Go^sa!, John012109, Am3r1ca!, • ...
M-cybersecurity 2024-03-27
Across
- attack which consists of testing all the words in a list as a keyword
- word used to gain access to certain information
- a public-key cryptosystem, one of the oldest widely used for secure data transmission
- attack which consists of testing all possible password or key solutuions
Down
- a feature or defect of a computer system that allows surreptitious unauthorized access to data.
- type of computer attack that blocks access to a victim's device or files and demands payment of a ransom in exchange for restoring access
- uses encryption to protect your Internet connection from unauthorized access
- a symmetric encryption algorithm using 56-bit keys
8 Clues: word used to gain access to certain information • a symmetric encryption algorithm using 56-bit keys • attack which consists of testing all the words in a list as a keyword • attack which consists of testing all possible password or key solutuions • uses encryption to protect your Internet connection from unauthorized access • ...
Cybersecurity Crossword 2024-03-20
Across
- Measures adopted to protect systems and data from cyber threats.
- A network-connected computer or device.
- A deceptive technique used to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication.
- The process of converting information or data into a code, especially to prevent unauthorized access.
Down
- A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A powerful tool used for penetration testing, security research, and IDS signature development.
- The process or action of verifying the identity of a user or process.
- A country in Europe known for its precision engineering and historical contributions to science and technology.
8 Clues: A network-connected computer or device. • Measures adopted to protect systems and data from cyber threats. • The process or action of verifying the identity of a user or process. • A powerful tool used for penetration testing, security research, and IDS signature development. • ...
Cyber Security 2016-05-24
7 Clues: What is my name? • What are we here for? • virtual private network • email that has no meaning • strong authenticater for access • Steals data and holds it for ransom • pesky thing that goofs up my computer
mari 2024-05-20
Across
- a decentralized digital currency
- the application of conceptual knowledge for
- a wide range of criminal activity that are
- providing the appearance of smth without reality
- practice and study of techniques for secure
- the process of writing computer software code
Down
- study and experimentation of algorithmic process
- a public distributed ledger of lists of records
- protection of computer systems and networks
- collection of accounts in which accounting
- a potential for vulnerabilities to turn into
- a digital currency designated to work as
- a device that can make and receive calls over
- the minimum amount of any physical entity involved
- the opposite of natural
15 Clues: the opposite of natural • a decentralized digital currency • a digital currency designated to work as • collection of accounts in which accounting • a wide range of criminal activity that are • protection of computer systems and networks • the application of conceptual knowledge for • practice and study of techniques for secure • ...
Cybersecurity Midterm Review Crossword 2024-12-17
Across
- This type of phishing is directed only towards one person
- This encryption type uses two keys: public and private
- a type of malware that automatically displays unwanted advertisements
- intentionally spreading false facts
- accidentially spreading false facts
- a piece of code that remains idle until certain conditions are met
- this type of encryption uses the same key for encrypting and decrypting data
- this type of malware spreads by attaching itself to files and programs
- the practice and study of writing codes
- abbreviation for allowing people to bring their own devices to work
- permanently deleting data so that it can't be recovered by standard methods
Down
- A trusted third party that holds a copy of your private key in case you lose it
- a type of trojan that allows a cybercriminal to remotely control a computer
- stands for malicious software
- This part of the CIA Triad ensures that information remains secret
- this part of the CIA triad ensures that systems are always available for use
- a type of malware that records keystrokes
- attempting to gain sensitive information through electronic communication
18 Clues: stands for malicious software • intentionally spreading false facts • accidentially spreading false facts • the practice and study of writing codes • a type of malware that records keystrokes • This encryption type uses two keys: public and private • This type of phishing is directed only towards one person • ...
2025 Cybersecurity Awareness Month 2025-09-08
Across
- Fake system set up to lure hackers.
- Unauthorized access to data or systems
- Fake emails or messages to steal information
- Malware that locks files and demands payment.
- Code used to take advantage of a vulnerability.
- Hacker intercepts communication between two parties.
- Securing data by converting it into unreadable code.
- Encrypts internet traffic for secure browsing
Down
- Authentication Verifying identity using two methods.
- EU law protecting personal data privacy.
- Security barrier between trusted and untrusted networks.
- Process of verifying a user’s identity.
- Username and password for authentication.
- Malicious code that spreads through files or programs
- Software that protects against malicious programs.
- Malware disguised as legitimate software.
- Isolated environment for testing suspicious files
- Security rules for handling credit card data.
18 Clues: Fake system set up to lure hackers. • Unauthorized access to data or systems • Process of verifying a user’s identity. • EU law protecting personal data privacy. • Username and password for authentication. • Malware disguised as legitimate software. • Fake emails or messages to steal information • Malware that locks files and demands payment. • ...
FITCVocab.jd 2013-05-15
Across
- internet service provided
- it delivers internet to computers
- no wires
- protects your computer
- you find engines
- like this that do are not part of the computer ex. printer,mouse
- a display for computer/screen
- using good behaviors on computer
- lets you have wirless
- a output device that is there to click things on computer
- being safe on the internet
Down
- designed to find info ex. google
- something that plugs into a computer ex. printer, mouse
- who is contacting
- a mini computer that ca you can play on and look things up
- controls computer main contol
- the lights that make up the screen
- ramdom access memory
- central processing unit
- download put in computer
20 Clues: no wires • you find engines • who is contacting • ramdom access memory • lets you have wirless • protects your computer • central processing unit • download put in computer • internet service provided • being safe on the internet • controls computer main contol • a display for computer/screen • designed to find info ex. google • using good behaviors on computer • ...
Harryclyde 2023-01-02
Across
- How many true friends
- Second high school
- British part of my name
- first time I almost died
- Where was I born
- College major
- first city we moved to in the US
- sport I played in high school
- a place I really want to visit
- how old was I when I migrated to the US
- allergies
- love language
- 17% of Cameroon
- I love your
Down
- First high school
- another time I almost died (told you this)
- 83% of cameroon
- Catch me exploring in
- type of movies I like
- Personality type.
- nick name for for the baby
- French part of my name
- we both like this movie
- The baby’s name
- favorite animal
- Region what region I was raised
26 Clues: allergies • I love your • College major • love language • 83% of cameroon • The baby’s name • favorite animal • 17% of Cameroon • Where was I born • First high school • Personality type. • Second high school • Catch me exploring in • How many true friends • type of movies I like • French part of my name • we both like this movie • British part of my name • first time I almost died • ...
lushi and john 2025-02-22
Across
- Who is older between them
- First international trip destination
- Month of dating anniversary
- First date restaurant
- Favorite shared activity
- Total countries visited together
- John’s middle name
- Color of John’s eyes
- Place where John proposed
- John’s go-to drink
- Lushi’s favorite cuisine
- Total number of their dogs
- Name of their corgi
- Lushi’s favorite dessert
- Lushi’s favorite holiday
- John’s favorite music band
- John’s favorite food
- Month of their engagement
Down
- Lushi’s favorite snack to make
- Lushi’s favorite time of year
- City they live in
- John’s work industry
- Lushi’s favorite color
- John’s hometown
- Their dream honeymoon destination
- University John attended
- Lushi’s favorite board game
- City where they met
- John’s favorite video game
29 Clues: John’s hometown • City they live in • John’s middle name • John’s go-to drink • Name of their corgi • City where they met • John’s work industry • Color of John’s eyes • John’s favorite food • First date restaurant • Lushi’s favorite color • Favorite shared activity • Lushi’s favorite cuisine • University John attended • Lushi’s favorite dessert • Lushi’s favorite holiday • ...
Eva and Clayton 2024-11-23
Across
- Subject Eva studies in graduate school
- Sport played by the couple
- Eva's musical hobby
- Clayton’s favorite food
- Clayton's least favorite food
- Clayton’s favorite movie genre
- Eva's first job
- Subject of Clayton’s bachelor’s degree
- Clayton’s favorite holiday
- Number of years the couple has been together
- Clayton's football team
- Shape of Eva’s birthmark
Down
- Eva’s middle name
- The older half of the couple (bride/groom)
- Clayton’s favorite childhood video game
- English town where Eva lived while studying abroad
- City where the couple currently lives (abbr)
- Couple’s go to breakfast food
- Eva’s favorite TV show
- Eva’s favorite season
- The couple's future furry friend
- Eva's hockey team
- Clayton’s eye color
- Couple’s favorite vacation spot
- Mascot of the couple's alma mater (abbr)
25 Clues: Eva's first job • Eva's hockey team • Eva's musical hobby • Clayton’s eye color • Eva’s middle name • Eva’s favorite TV show • Clayton’s favorite food • Clayton's football team • Eva’s favorite season • Clayton’s favorite holiday • Shape of Eva’s birthmark • Clayton's least favorite food • Couple’s go to breakfast food • Sport played by the couple • ...
Crossword Puzzle 2023-11-14
Across
- Malicious software designed to gain access to your devices
- The process of verifying the identity of a user or device before granting access to systems and data
- A crucial cybersecurity practice involving making copies of data to prevent loss in case of a ransomware attack
- In the context of supply chain attacks, this is a critical factor between partners that can be exploited by cybercriminals to infiltrate networks
- A tactic used in AI-assisted attacks where attackers mimic a trusted entity to deceive victims, often through sophisticated methods
- A cybersecurity threat that could be exploited to gain unauthorized access or cause harm by targeting less-secure elements in the supply network
Down
- A type of security measure that uses unique physical characteristics for user identification
- A fundamental principle in data privacy, requiring explicit permission before collecting, using, or sharing personal information
- A common tactic used in social engineering where the attacker creates a sense of immediate action to bypass rational decision-making
- A type of AI technology used in sophisticated cyberattacks, involving learning from data to improve over time
- An incident where personal or confidential information is accessed or disclosed without authorization, requiring immediate response and remediation
- A deceptive attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication
12 Clues: Malicious software designed to gain access to your devices • A type of security measure that uses unique physical characteristics for user identification • The process of verifying the identity of a user or device before granting access to systems and data • ...
Intricacy 2022-11-22
Across
- Mark
- Course which CMR NPS doesn't provide but CMR PU does
- Without this no computer would exist
- Nanobots assemble
- You do not fart in apple store because there are no _______
- Method of communication
- Present continuous tense of a device
- _______ explorer
- Of no use without a physical interface
- _______ assistant or Facebook Meta
Down
- Nanobots are from which category
- Reduces manforce
- Norbert Wiener: "the study of control and communication in the animal and the machine"
- Base of every project
- The computer isn't working, it's likely a system _______
- You do not want this on your device
- e-storage
- Firewall is a type of _______
- The creation of the Mars Rover falls mainly under which field?
- The bane of every iOS user
20 Clues: Mark • e-storage • Reduces manforce • _______ explorer • Nanobots assemble • Base of every project • Method of communication • The bane of every iOS user • Firewall is a type of _______ • Nanobots are from which category • _______ assistant or Facebook Meta • You do not want this on your device • Without this no computer would exist • Present continuous tense of a device • ...
DAMPAK SOSIAL INFORMATIKA DAN JARINGAN KOMPUTER INTERNET 2025-11-14
Across
- Media yang digunakan untuk berinteraksi secara online
- Teknologi yang memungkinkan penyimpanan data secara online
- Keamanan data di internet
- Jaringan komputer terbesar di dunia
- Informasi palsu yang disebarkan melalui media digital
- Penyebaran informasi yang sangat cepat melalui internet
- Dampak negatif internet berupa pengurangan interaksi langsun
- Kegiatan mengawasi aktivitas orang melalui dunia maya
- Program jahat yang dapat merusak sistem komputer
- Tindakan mencuri data melalui jaringan komputer
Down
- Kecanduan bermain game online
- Transaksi jual beli melalui internet
- Komunikasi jarak jauh menggunakan video
- Aktivitas membeli dan membayar melalui aplikasi
- Kegiatan belajar menggunakan jaringan internet
- Ruang penyimpanan yang digunakan untuk berbagi file
- Komentar kasar atau menyerang di dunia maya
- Dampak positif internet pada komunikasi
- Penyakit yang muncul akibat terlalu lama menatap layar
- Kemampuan bekerja dari jarak jauh melalui internet
20 Clues: Keamanan data di internet • Kecanduan bermain game online • Jaringan komputer terbesar di dunia • Transaksi jual beli melalui internet • Komunikasi jarak jauh menggunakan video • Dampak positif internet pada komunikasi • Komentar kasar atau menyerang di dunia maya • Kegiatan belajar menggunakan jaringan internet • Aktivitas membeli dan membayar melalui aplikasi • ...
STEM Quest: Discovering Careers and Concepts at Idaho National Laboratory 2025-07-18
Across
- Type of engineer that designs and builds machines
- A person who designs buildings, roads, and bridges
- Tiny basic building block of all matter
- Where is INL located?
- Process of splitting an atom to create nuclear power
- A person who writes computer programs
Down
- Person who analyzes experiments in science at INL
- Energy released in a reactor
- First atomic-powered town in 1951
- Science, Technology, Engineering, and Math
- (Advanced Test Reactor) A unique reactor at INL used for testing materials
- The L in INL
- Protecting computers and networks from attacks
- Scientists use these to test their ideas
14 Clues: The L in INL • Where is INL located? • Energy released in a reactor • First atomic-powered town in 1951 • A person who writes computer programs • Tiny basic building block of all matter • Scientists use these to test their ideas • Science, Technology, Engineering, and Math • Protecting computers and networks from attacks • Person who analyzes experiments in science at INL • ...
Cybersecurity & Data Protection 2022-11-16
Across
- One of the acronyms in the data breach response plan CARE framework.
- I am one possible cause of a data breach
- It is phising with text messages
- Stop and think before you download
- I identify, assess and address personal data protection risks specific to SCC.
- I run like scam ads
- I process personal data on behalf of SCC
Down
- These should not be left around the office
- Do this over email links to display URL
- A malicious software. You cannot access your files unless you pay a ransom
- I file incident reports to PDPC if necessary.
- Who you gonna call when a data breach is suspected or confirmed?
12 Clues: I run like scam ads • It is phising with text messages • Stop and think before you download • Do this over email links to display URL • I am one possible cause of a data breach • I process personal data on behalf of SCC • These should not be left around the office • I file incident reports to PDPC if necessary. • ...
CyberSecurity Awareness 2021 2021-10-15
Across
- the art of manipulating, influencing or deceiving you in order to gain control over your computer system.
- considered one or the best places to work
- subject matter of the most clicked on email from our 11/14/21 phish campaign
- October is Awareness Month for this
- disruptive, unsolicited messages (such as emails, text messages, or Internet postings) especially commercial messages, sent to a large number of recipients or posted in a large number of places.
- a method used by social engineers to gain access to a building or other protected area.
- 123456 and MyDOB01012010 are examples of what kind of Password?
Down
- the process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity.
- subject matter of the most clicked on email from our 11/07/21 phish campaign
- misspelled words and a sense of urgency for you to take a questionable action an email, are be considered to be recognizable what?
- type of phishing that is a small, focused, targeted attack via email on a particular person or organization with the goal to penetrate their defenses.
- MyCowRanAwayToTheMoon is an example of a
12 Clues: October is Awareness Month for this • MyCowRanAwayToTheMoon is an example of a • considered one or the best places to work • 123456 and MyDOB01012010 are examples of what kind of Password? • subject matter of the most clicked on email from our 11/07/21 phish campaign • subject matter of the most clicked on email from our 11/14/21 phish campaign • ...
Cybersecurity Awareness Crossword 2025-08-27
Across
- general cybersecurity practices
- malicious software
- malicious software that locks your files until a demanded payment is made
- proves that someone is who they say they are
- malicious email, generally attempts to get you to click a link or download a malicious file
Down
- a software update
- an mfa type that is related to something unique to you; ie- fingerprint, facial recognition, etc.
- "___ Trust"; a model where no one is trusted by default
- uses more than one type of authentication to verify a user identity
- stored in your browser to track users across websites and remember preferences; "Third-Party ___ "
- when unauthorized access to data or a system is made (hacked)
- global network (web) of computers that are connected and can share information with each other
12 Clues: a software update • malicious software • general cybersecurity practices • proves that someone is who they say they are • "___ Trust"; a model where no one is trusted by default • when unauthorized access to data or a system is made (hacked) • uses more than one type of authentication to verify a user identity • ...
Cybersecurity Awareness Month - Crossword 1 - Easy - Cybersecurity 2025-08-25
Across
- The practice of protecting computers and networks from digital threats like hackers and viruses.
- Harmful software designed to damage or disrupt systems
- Unwanted or junk email messages
- Someone who breaks into computer systems, often illegally
- A secret string used to verify identity
- A scam where attackers trick you into giving up personal info via fake emails
Down
- Cyber Security Awareness Month is observed in ---?
- A type of malware disguised as a legitimate program
- A digital barrier that blocks unauthorized access to a network
- Software that detects and removes viruses and other malwares
- The name you use to log into a computer or website account.
- A copy of your data saved in case something goes wrong
12 Clues: Unwanted or junk email messages • A secret string used to verify identity • Cyber Security Awareness Month is observed in ---? • A type of malware disguised as a legitimate program • Harmful software designed to damage or disrupt systems • A copy of your data saved in case something goes wrong • Someone who breaks into computer systems, often illegally • ...
Computer Article Crossword 2015-06-10
Across
- Very important and possibly dangerous
- The month which the hack happened
- Far away from anything else
- The Chairman of the Senate Armed Services Committee
- Keeping people safe on the Internet
- Breaking into a secure area
- To put together information
- To break into a secure area on the internet
Down
- Stealing someone's personal details
- All over the world
- The abbreviation for The Office of Personnel Management
- One billion people have access to Facebook on.......
- The Name of Mark Zuckerberg's company
- The name of the new App Zuckerberg is releasing
- The ........ Intelligence Committee which released information about the cyber attack
- The Country blamed for the hacking of American databases
- The President of America
17 Clues: All over the world • The President of America • Far away from anything else • Breaking into a secure area • To put together information • The month which the hack happened • Stealing someone's personal details • Keeping people safe on the Internet • Very important and possibly dangerous • The Name of Mark Zuckerberg's company • To break into a secure area on the internet • ...
2025 Grad Crossword 2025-05-29
Across
- What does Ben plan to study at LCSC?
- Eliza will be going to school here
- Ben's favorite sport
- The last letter in PCHE stands for _______
- Isabella has a degree in information _______
- What does Denae plan to become?
- The song Ben is signing "________ of Jesus"
Down
- The second letter in PCHE stands for _______
- The first letter in PCHE stands for _______
- Who is the PCHE president?
- The name of the processional "____ and Circumstance"
- What is Isabella planning to study at LCSC?
- The third letter in PCHE stands for _______
- What is Eliza planning to study at NSA?
- What does Garrett plan to study after Bible School?
- Denae's hobby
- Program Garrett will attend in Texas
17 Clues: Denae's hobby • Ben's favorite sport • Who is the PCHE president? • What does Denae plan to become? • Eliza will be going to school here • What does Ben plan to study at LCSC? • Program Garrett will attend in Texas • What is Eliza planning to study at NSA? • The last letter in PCHE stands for _______ • The first letter in PCHE stands for _______ • ...
The Voice: October 2nd, 2023 2023-10-02
Across
- One of the new members highlighted!
- What curriculum is Alberta Education redrafting?
- DS Tax
- Someone who can help with templates and shortcuts!
Down
- Be a ________ of the 2026 Special Olympics Summer Games!
- What awareness month is October?
- 2023 ______ Breakfast coming up.
- Minister on Agriculture under Advocacy in Action.
8 Clues: DS Tax • What awareness month is October? • 2023 ______ Breakfast coming up. • One of the new members highlighted! • What curriculum is Alberta Education redrafting? • Minister on Agriculture under Advocacy in Action. • Someone who can help with templates and shortcuts! • Be a ________ of the 2026 Special Olympics Summer Games!
cybersecurity 2023-03-03
Across
- The practice of protecting computer systems from theft, damage, and unauthorized access. (11)
- A software program designed to prevent unauthorized access to a computer system. (8)
Down
- A type of attack that attempts to overwhelm a system with traffic. (4)
- A type of cyber attack that attempts to obtain sensitive information by tricking users. (6)
- A type of encryption that uses two keys to encrypt and decrypt data. (3)
5 Clues: A type of attack that attempts to overwhelm a system with traffic. (4) • A type of encryption that uses two keys to encrypt and decrypt data. (3) • A software program designed to prevent unauthorized access to a computer system. (8) • A type of cyber attack that attempts to obtain sensitive information by tricking users. (6) • ...
Cybersecurity 2023-05-11
Across
- A process that proves the identity of the user
- The art of writing or solving codes
- A cyberattack carried out by creating a fake website, or compromising/ corrupting a real one, in order to gather information or data on visitors
Down
- The process of encoding or scrambling data to prevent unauthorized people from opening or accessing it
- A cyberattack carried out by sending emails to large numbers of people asking for sensitive information
5 Clues: The art of writing or solving codes • A process that proves the identity of the user • The process of encoding or scrambling data to prevent unauthorized people from opening or accessing it • A cyberattack carried out by sending emails to large numbers of people asking for sensitive information • ...
Cybersecurity 2024-04-23
5 Clues: Ongevraagde mail • Verzamelnaam voor malafide software • Poging tot het achterhalen van persoonlijke gegevens • Software die bestanden infecteert en zich zelf kan vermenigvuldigen • Persoon die ongeoorloofd toegang probeert te krijgen tot een netwerk of computer
ISSN Day 2 2024-09-09
Across
- Entry-level certification for IT technicians (2 words)
- Career path for someone with CCNA (2 words)
- Network certification from Cisco (acronym)
- Type of device covered in A+ certification, besides computers
Down
- Career path for someone with A+ (2 words)
- Network topic covered in CCNA
- Security topic covered in Security+ certification
- Cybersecurity certification from CompTIA
- Operating system topic covered in A+ certification
9 Clues: Network topic covered in CCNA • Cybersecurity certification from CompTIA • Career path for someone with A+ (2 words) • Network certification from Cisco (acronym) • Career path for someone with CCNA (2 words) • Security topic covered in Security+ certification • Operating system topic covered in A+ certification • Entry-level certification for IT technicians (2 words) • ...
Digital Literacy 2025-10-29
Across
- The software that runs a computer
- Computer thinking
- External devices(mouse,printer,headset)
- fake emails or texts to share data
- Random Access Memory, a type of processing computer memory
- Behaving responsibly and ethically online
- Result
- A software application used to access and navigate the internet
- Locks files until ransom is paid
Down
- Software designed to harm devices or steal info
- The practice of protecting computer systems and networks from theft, damage, or unauthorized access
- Programs that tell hardware what to do
- Working with others in a digital environment
- The trail of data a person leaves behind
- Data entered
- Physical parts of the computer
- unauthorized access to private data
- Unsolicited bulk electronic messages
18 Clues: Result • Data entered • Computer thinking • Physical parts of the computer • Locks files until ransom is paid • The software that runs a computer • fake emails or texts to share data • unauthorized access to private data • Unsolicited bulk electronic messages • Programs that tell hardware what to do • External devices(mouse,printer,headset) • ...
cybersecurity 2025-04-27
Cybersecurity 2025-02-23
Across
- uses an unsecured public network as if it were a secure private network and encrypts data between remote the device and the network
- when you click or execute it, it infects your systems
- security incident that occurs when classified data is shown in an unclassified system or system with lower-level classification
Down
- process that scrambles readable text so it can only be read by the person who has the secret key
- generally install themselves on a computer and collect user data without the user's awareness
5 Clues: when you click or execute it, it infects your systems • generally install themselves on a computer and collect user data without the user's awareness • process that scrambles readable text so it can only be read by the person who has the secret key • ...
Cybersecurity 2019-11-30
Across
- : A malware that spies on your online activities and captures information from your computer, e.g. your web browsing habits, email messages, login credentials, banking and credit card details. It does all this without your knowledge.
- : “VPN” is short for “virtual p______ network”
- : P_______ is when cybercriminals use fake emails to bait their victims to click on a link or download a file containing infectious malware.
Down
- : Short for “malicious software”
- : “IT” is short for “Information Technology”, “OT” is short for “O______ Technology”.
5 Clues: : Short for “malicious software” • : “VPN” is short for “virtual p______ network” • : “IT” is short for “Information Technology”, “OT” is short for “O______ Technology”. • : P_______ is when cybercriminals use fake emails to bait their victims to click on a link or download a file containing infectious malware. • ...
CyberSecurity 2020-08-21
Across
- Persona que por diversos motivos se dedica a manipular sistemas informáticos ajenos
- es un programa informático que tiene el propósito de detectar y eliminar virus y otros programas perjudiciales antes o después de que ingresen al sistema.
Down
- es un software que recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador.
- Programa informático que controla el acceso de una computadora a la red y de elementos de la red a la computadora, por motivos de seguridad.
- Programa que se elabora de manera accidental o intencionada y se introduce en los ordenadores, causando daños en la información contenida en el disco duro.
5 Clues: Persona que por diversos motivos se dedica a manipular sistemas informáticos ajenos • Programa informático que controla el acceso de una computadora a la red y de elementos de la red a la computadora, por motivos de seguridad. • ...
Cybersecurity 2020-08-21
Across
- Correo electrónico no solicitado que se envía a un gran número de destinatarios con fines publicitarios o comerciales.
- Programa informático que controla el acceso de una computadoraa la red y de elementos de la red a la computadora, por motivos de seguridad, evitan que usuarios de Internet no autorizados accedan a redes privadas conectadas a la red.
- Programa que se elabora de manera accidental o intencionada y se introduce en los ordenadores, causando daños en la información contenida en el disco duro. Estos, por lo general, infectan otros archivos del sistema con la intención de modificarlos para destruir archivos o datos almacenados en tu computador.
Down
- Es una estafa que tiene como objetivo obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias.
- Persona que se dedica a detectar fallos de seguridad en sistemas informáticos ajenos.
5 Clues: Persona que se dedica a detectar fallos de seguridad en sistemas informáticos ajenos. • Correo electrónico no solicitado que se envía a un gran número de destinatarios con fines publicitarios o comerciales. • ...
CyberSecurity 2021-09-24
Across
- Should be strong and not shred with anyone
- The protection of information from unauthorized access
Down
- something of either tangible or intangible value that is worth protecting
- Ensures the timely and Reliable access to and use if information systems
- the combination of the probability of an event and its consequence
5 Clues: Should be strong and not shred with anyone • The protection of information from unauthorized access • the combination of the probability of an event and its consequence • Ensures the timely and Reliable access to and use if information systems • something of either tangible or intangible value that is worth protecting
Network Components 2022-10-27
Across
- a device used at the customer premises to terminate a dial-up Integrated Services Digital Network line and connect it to a computer or a local area network
- a transmitter and a receiver of signals, such as analog or digital
- a cybersecurity tool that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of cybersecurity rules
- a transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signals
- is a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
Down
- networking devices that connect networks
- a network node used in telecommunications that connects two networks with different transmission protocols together
- a hardware component responsible for relaying data from a computer network to the destination endpoint
8 Clues: networking devices that connect networks • a transmitter and a receiver of signals, such as analog or digital • a transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signals • a hardware component responsible for relaying data from a computer network to the destination endpoint • ...
crossword #1 2023-03-15
Across
- Change: Long-term change in global climate patterns.
- Practical application of scientific knowledge.
- Acquisition of knowledge and skills.
- Physical and mental wellbeing.
- Protection of computer systems and data.
- Meeting present needs without compromising future generations.
Down
- Integration and interaction among people, companies, and governments worldwide.
- Setting up a business and taking financial risks for profit.
- Media: Online platforms for creating and sharing content.
- Intelligence: Machines that think and learn like humans.
- Inclusion of people from different backgrounds.
11 Clues: Physical and mental wellbeing. • Acquisition of knowledge and skills. • Protection of computer systems and data. • Practical application of scientific knowledge. • Inclusion of people from different backgrounds. • Change: Long-term change in global climate patterns. • Intelligence: Machines that think and learn like humans. • ...
TEKNOLOGI INFORMASI DAN KOMUNIKASI 2025-09-23
Across
- sejajar dengan lantai gunakan penyangga kaki
- harus ada sandaran punggung dan tangan atur ketinggian
- keamanan informasi di internet
- sebuah layanan blog milik geogle
- catatan harian atau jurnal pribadi di internet yang dapat diakses oleh siapa saja.
- individu yang melakukan aktivitas peretasan sistem komputer
Down
- konten lebih banyak mengandung teks
- pusat operasi keamanan siber nasional di indones
- konten dengan format angka, data numerik
- membuat blog dalam format video
- makna yang disampaiakan oleh serangkaian representasi hasil pemprosesan data
11 Clues: keamanan informasi di internet • membuat blog dalam format video • sebuah layanan blog milik geogle • konten lebih banyak mengandung teks • konten dengan format angka, data numerik • sejajar dengan lantai gunakan penyangga kaki • pusat operasi keamanan siber nasional di indones • harus ada sandaran punggung dan tangan atur ketinggian • ...
LCA ACTIVITY 2 2024-07-18
Across
- Metric improved by good BI practices
- Type of organization that benefits from BI
- The primary focus of intelligence efforts
- Creating summaries of analyzed data
- Valuable understanding gained from data analysis
- Process of turning data into insights
- Type of analytics answering "What happened?"
- Applications used in business intelligence
- Repositories for storing unstructured data
- Software and hardware supporting BI efforts
- Metaphor for complex business structures
Down
- Pattern identified through data analysis
- Essential plan before construction begins
- Visual tool for displaying business data
- The blueprint for an organization's BI efforts
- Important feature of data management systems
- How data is collected, stored, and accessed
- Databases designed for storing and analyzing data
- Devices used to collect data in manufacturing
- Critical aspect of protecting data
20 Clues: Critical aspect of protecting data • Creating summaries of analyzed data • Metric improved by good BI practices • Process of turning data into insights • Pattern identified through data analysis • Visual tool for displaying business data • Metaphor for complex business structures • Essential plan before construction begins • The primary focus of intelligence efforts • ...
Web Wonders Crossword Challenge 2023-10-09
Across
- - Data protection through coding
- - Wireless internet connection
- - Online buying and selling
- - Tool for finding information on the internet
- - Measures to protect online data and privacy
- - Electronic mail for online communication
- - Content that spreads rapidly online
- - Storage and computing services on the internet
- - Web address identifying a website
- - Symbol used to categorize and search for topics
Down
- - Platforms for sharing content and connecting
- - Software for accessing the web
- - Audio or video series available for streaming
- - Online location with webpages
- - Security system to block unauthorized access
- - Saving files from the internet to a device
- - Real-time media content delivery
- - Clickable link that directs to another webpage
- - Sending files from a device to the internet
- - Online journal or diary
20 Clues: - Online journal or diary • - Online buying and selling • - Wireless internet connection • - Online location with webpages • - Data protection through coding • - Software for accessing the web • - Real-time media content delivery • - Web address identifying a website • - Content that spreads rapidly online • - Electronic mail for online communication • ...
