cybersecurity Crossword Puzzles

ICS and Hydropower 2024-04-02

ICS and Hydropower crossword puzzle
Across
  1. Turbine type operating from fluid pressure.
  2. System distributing control for efficiency.
  3. Height of water used to generate pressure.
  4. Mechanism for moving or controlling a system.
  5. Protection against digital attacks.
  6. Interface for human interaction with machines.
  7. Device detecting changes in environment.
  8. Device for converting fluid flow into energy.
  9. A type of turbine used in low-head applications.
Down
  1. Movement of water through a system.
  2. Pipe channeling water to turbines.
  3. Converts mechanical energy to electrical.
  4. System for remote monitoring and control.
  5. A communication protocol for devices.
  6. Type of turbine driven by water jet.
  7. Programmable controller critical in automation.
  8. Storage space for water.
  9. A type of turbine used in medium to high-head applications.
  10. Security system for network defense.
  11. Device for remote utility control.

20 Clues: Storage space for water.Pipe channeling water to turbines.Device for remote utility control.Movement of water through a system.Protection against digital attacks.Type of turbine driven by water jet.Security system for network defense.A communication protocol for devices.Device detecting changes in environment....

TTS INFORMATIKA 2025-04-10

TTS INFORMATIKA crossword puzzle
Across
  1. Teknologi yang menunjukkan animasi yang berisi unsur budaya
  2. Memindahkan koneksi internet ke lokasi berbeda sehingga lebih aman saat berselancar
  3. Mesin pencari dikenal dengan istilah
  4. Pekerjaan yang menjaga keamanan siber
  5. Aplikasi pengolah data angka dari Microsoft
  6. Sintaks pencarian dari Google
  7. Profesional yang membuat sistem
  8. Hak kekayaan intelektual berupa lagu atau film
  9. Simbol atau tanda milik suatu merek
  10. Mesin pencari selain Google
  11. Tindakan menyebar konten ke masyarakat
  12. Hak untuk menggunakan konten tertentu
Down
  1. Informasi yang mengandung tidak ada kebenaran
  2. Yang bukan hukum digital (hukum siber – syber law)
  3. Seseorang yang menciptakan aplikasi
  4. Kata kunci untuk mencari informasi di internet
  5. Jenis profesi pembuat perangkat lunak
  6. Mendeteksi dan menghapus perangkat lunak berbaha
  7. Profesi bidang data dan informasi
  8. Bahasa pemrograman web
  9. Hak cipta dan merek termasuk dalam

21 Clues: Bahasa pemrograman webMesin pencari selain GoogleSintaks pencarian dari GoogleProfesional yang membuat sistemProfesi bidang data dan informasiHak cipta dan merek termasuk dalamSeseorang yang menciptakan aplikasiSimbol atau tanda milik suatu merekMesin pencari dikenal dengan istilahPekerjaan yang menjaga keamanan siber...

IT Terms 2025-05-15

IT Terms crossword puzzle
Across
  1. Internet-based delivery of IT resources.
  2. Software to manage customer interactions.
  3. Two-symbol system used by computers.
  4. Computer system within a larger system.
  5. Plan for continuing business during disruption.
  6. Simulates human intelligence in machines.
  7. Processes and executes instructions (abbr).
  8. Network of physical devices sharing data.
  9. Unique address for a device on a network.
  10. Device connected to a network.
  11. Visual interface with icons and menus.
  12. Tech and strategy for analyzing business data.
Down
  1. Stores data temporarily for quick access.
  2. Organized collection of electronic data.
  3. Protects systems from digital threats.
  4. Converts data into code for security.
  5. Group of connected computers sharing rules.
  6. Security device that filters traffic.
  7. Finding and fixing code issues.
  8. Set of rules for communication between software components.

20 Clues: Device connected to a network.Finding and fixing code issues.Two-symbol system used by computers.Converts data into code for security.Security device that filters traffic.Protects systems from digital threats.Visual interface with icons and menus.Computer system within a larger system.Internet-based delivery of IT resources....

CYBER AWARENESS 2024-11-02

CYBER AWARENESS crossword puzzle
Across
  1. A group of experts dedicated to responding to computer security incidents.
  2. The practice of protecting computer systems and networks from digital attacks.
  3. The process of converting data into an unreadable format to protect it from unauthorized access.
  4. Acronym for the process of collecting and analyzing publicly available information to gain insights.
  5. The unauthorized access to computer systems or networks.
  6. A notification from your security systems that someone is trying to break in (or, perhaps, has already done so).
  7. Any malicious act aimed at disrupting, damaging, or stealing information from computer systems or networks.
  8. A security system that monitors and controls network traffic.
  9. The process of converting readable data (plaintext) into unreadable code (ciphertext) to protect it from unauthorized access.
  10. Web The part of the internet that is not indexed by search engines but is accessible through specific URLs.
  11. Malicious software designed to harm computer systems or networks.
  12. A network of compromised computers controlled by an attacker.
Down
  1. Acronym for the process of gathering, analyzing, and interpreting data from social media platforms to gain insights.
  2. Malware that encrypts a victim's data and demands a ransom for its decryption.
  3. Deceiving individuals into revealing sensitive information through fraudulent emails or messages.
  4. The likelihood of a threat exploiting a vulnerability and causing harm.
  5. A weakness in a system or network that can be exploited by attackers.
  6. A piece of software or code that takes advantage of a vulnerability to gain unauthorized access.
  7. The first decentralized digital currency / cryptocurrency in which transactions can be performed without the need for a central bank.
  8. Web A part of the internet that is not indexed by search engines and requires special software to access.
  9. A group of information security experts who respond to malware attacks or other computer security incidents.
  10. Acronym for a software solution designed to streamline and automate various aspects of digital forensic investigations.
  11. Acronym for a centralized team that combines cybersecurity efforts to better detect, prevent, and respond to cyber threats.
  12. Illegal activities committed using computer networks or devices.

24 Clues: The unauthorized access to computer systems or networks.A security system that monitors and controls network traffic.A network of compromised computers controlled by an attacker.Illegal activities committed using computer networks or devices.Malicious software designed to harm computer systems or networks....

Cybersecurity Awareness Month Crossword 2018-09-28

Cybersecurity Awareness Month Crossword crossword puzzle
Across
  1. A form of malware that replicates across computer systems by infecting another piece of software
  2. Software that runs on the endpoint and prevents malware from accessing the system
  3. An appliance that sits between your network and the Internet and scans all data passes through
  4. An attempt by cybersecurity expert to hack into your network and identify any holes in your cybersecurity
  5. These bad actors may or may not be hackers. Their purpose is to acquire and use stolen information or attack users solely for gain.
  6. When an attacker sends emails that appear to be legitimate but have links to pharming sites or attachments that contain malware
  7. Encrypts either a portion or entire computer system and presents the user with a ransom note on how to pay and receive a decryption tool
  8. These spread across computer systems but self-replicates rather than infecting other software
  9. A network of hijacked computers a hacker uses for attacking other networks, sending spam or performing calculations such as cryptocurrency mining or cracking stolen passwords
Down
  1. Any software intended to damage, disable or take control of a computer system without the owner’s consent
  2. This practice encompasses techniques used by bad actors to trick a person into providing them key information needed for a scheme.
  3. A hacker that sees their activity as political activism
  4. Skilled computer users that seek to discover flaws in computer systems that allow them to access part of a system without proper authorization
  5. A series of software tools that enable an attacker to take control of an operating system at the root level
  6. A highly targeted phishing attack with information typically acquired through social engineering
  7. This is a series of numbers, letters, and characters that safeguard accounts. It should be easy to remember but hard to guess
  8. The process of encoding information so that only authorized individuals can access it

17 Clues: A hacker that sees their activity as political activismSoftware that runs on the endpoint and prevents malware from accessing the systemThe process of encoding information so that only authorized individuals can access itThese spread across computer systems but self-replicates rather than infecting other software...

Technology 2025-06-26

Technology crossword puzzle
Across
  1. video games in virtual reality.
  2. improved or made better.
  3. person who loves technology.
Down
  1. protection of computers and data.
  2. picture of a screen display.
  3. small useful device.

6 Clues: small useful device.improved or made better.picture of a screen display.person who loves technology.video games in virtual reality.protection of computers and data.

crossword #1 2023-03-15

crossword #1 crossword puzzle
Across
  1. Change: Long-term change in global climate patterns.
  2. Practical application of scientific knowledge.
  3. Acquisition of knowledge and skills.
  4. Physical and mental wellbeing.
  5. Protection of computer systems and data.
  6. Meeting present needs without compromising future generations.
Down
  1. Integration and interaction among people, companies, and governments worldwide.
  2. Setting up a business and taking financial risks for profit.
  3. Media: Online platforms for creating and sharing content.
  4. Intelligence: Machines that think and learn like humans.
  5. Inclusion of people from different backgrounds.

11 Clues: Physical and mental wellbeing.Acquisition of knowledge and skills.Protection of computer systems and data.Practical application of scientific knowledge.Inclusion of people from different backgrounds.Change: Long-term change in global climate patterns.Intelligence: Machines that think and learn like humans....

Kuis Audit TI 2024-03-04

Kuis Audit TI crossword puzzle
Across
  1. sistem manajemen audit yang digunakan Itjen
  2. Audit TIK atas pelaksanaan tusi yang memanfaatkan TIK
  3. pengendalian proses hanya melihat input dan output
  4. Salah satu area audit TIK
Down
  1. Memastikan keselarasan bisnis dan TIK
  2. pengendalian yang dilakukan oleh manusia tanpa bantuan mesin
  3. Audit TIK terintegrasi yang dilakukan secara bersamaan
  4. Audit TIK terintegrasi yang dilakukan secara berurutan
  5. Auditor harus ... yang artinya memiliki kemampuan untuk melakukan tugas audit
  6. singkatan dari pengendalian aplikasi
  7. Pengujian secara sistematis untuk memberikan keyakinan terbatas

11 Clues: Salah satu area audit TIKsingkatan dari pengendalian aplikasiMemastikan keselarasan bisnis dan TIKsistem manajemen audit yang digunakan Itjenpengendalian proses hanya melihat input dan outputAudit TIK atas pelaksanaan tusi yang memanfaatkan TIKAudit TIK terintegrasi yang dilakukan secara bersamaan...

Vanessa and Jinsik <3 2024-09-06

Vanessa and Jinsik <3 crossword puzzle
Across
  1. How many months have Vanessa and Jinsik been together?
  2. How many people are in the wedding party?
  3. Where do Vanessa and Jinsik live?
  4. How did Vanessa and Jinsik meet?
  5. How old is Vanessa?
  6. Where did Jinsik propose?
Down
  1. What does Jinsik do for work?
  2. Where are Vanessa and Jinsik going for their honeymoon?
  3. How old is Jinsik?
  4. What holiday did Vanessa and Jinsik first spend together?
  5. How many kids do Vanessa and Jinsik want?

11 Clues: How old is Jinsik?How old is Vanessa?Where did Jinsik propose?What does Jinsik do for work?How did Vanessa and Jinsik meet?Where do Vanessa and Jinsik live?How many people are in the wedding party?How many kids do Vanessa and Jinsik want?How many months have Vanessa and Jinsik been together?Where are Vanessa and Jinsik going for their honeymoon?...

Group 1 - CSE 167 2022-11-16

Group 1 - CSE 167 crossword puzzle
Across
  1. What's the weakest element in Cybersecurity
  2. The fake folder that acts as bait for hackers.
  3. The I in the CIA Triad
  4. The A in the CIA Triad
  5. All companies should have a ____ framework
Down
  1. The C in the CIA Triad
  2. An area that a hacker can use for their benefit
  3. Websites identify
  4. A type of key to use in Asymmetric encryption
  5. How to make a message secret.
  6. A copy of data that could be lost

11 Clues: Websites identifyThe C in the CIA TriadThe I in the CIA TriadThe A in the CIA TriadHow to make a message secret.A copy of data that could be lostAll companies should have a ____ frameworkWhat's the weakest element in CybersecurityA type of key to use in Asymmetric encryptionThe fake folder that acts as bait for hackers....

FY26 Q1 2025-10-14

FY26 Q1 crossword puzzle
Across
  1. January training: “Call ___”
  2. Leaves the forum when they don’t consent to one
  3. EU regulation keeping the financial sector in check
  4. CCPA fine was issued in this country
  5. Cybersecurity Awareness Month theme this year
  6. Complete by November: “Secure use of ___”
  7. Workstation compliance training goes live in this month
  8. If DORA’s vertical, NIS2 must be this
Down
  1. Under privacy law, it means “forget about me”
  2. Top-performing MU for SBS
  3. Fined 5.8 million AUD over data breach

11 Clues: Top-performing MU for SBSJanuary training: “Call ___”CCPA fine was issued in this countryIf DORA’s vertical, NIS2 must be thisFined 5.8 million AUD over data breachComplete by November: “Secure use of ___”Under privacy law, it means “forget about me”Cybersecurity Awareness Month theme this yearLeaves the forum when they don’t consent to one...

Information and Cyber Security 2021-03-29

Information and Cyber Security crossword puzzle
Across
  1. uses asymmetric key encryption
  2. person who performs a social engineering attack
  3. What will freezing your credit not affect?
  4. For online shopping it's best to use...?
Down
  1. most valuable to companies looking to sell you something
  2. Requires a carrier file to self-replicate
  3. What information do you need to set up a wireless access point?
  4. When is it ok to reuse a password?
  5. Cyber security month
  6. Weakest link in cybersecurity
  7. Continually bombarding a targeted network with fake requests

11 Clues: Cyber security monthWeakest link in cybersecurityuses asymmetric key encryptionWhen is it ok to reuse a password?For online shopping it's best to use...?Requires a carrier file to self-replicateWhat will freezing your credit not affect?person who performs a social engineering attackmost valuable to companies looking to sell you something...

crossword #1 2023-03-15

crossword #1 crossword puzzle
Across
  1. Change: Long-term change in global climate patterns.
  2. Practical application of scientific knowledge.
  3. Acquisition of knowledge and skills.
  4. Physical and mental wellbeing.
  5. Protection of computer systems and data.
  6. Meeting present needs without compromising future generations.
Down
  1. Integration and interaction among people, companies, and governments worldwide.
  2. Setting up a business and taking financial risks for profit.
  3. Media: Online platforms for creating and sharing content.
  4. Intelligence: Machines that think and learn like humans.
  5. Inclusion of people from different backgrounds.

11 Clues: Physical and mental wellbeing.Acquisition of knowledge and skills.Protection of computer systems and data.Practical application of scientific knowledge.Inclusion of people from different backgrounds.Change: Long-term change in global climate patterns.Intelligence: Machines that think and learn like humans....

Total Defence Crossword Puzzle 2025-02-15

Total Defence Crossword Puzzle crossword puzzle
Across
  1. The state of being safe from harm.
  2. The country that practices Total Defence.
  3. A serious situation that needs immediate action.
  4. People who serve in the army to protect the country.
  5. Living together peacefully despite differences.
  6. Protection against threats or danger.
Down
  1. Protecting computers and networks from attacks.
  2. Working together to achieve a common goal.
  3. Being prepared for any situation.
  4. The quality of being strong, physically or mentally.
  5. The ability to recover from challenges or difficulties.

11 Clues: Being prepared for any situation.The state of being safe from harm.Protection against threats or danger.The country that practices Total Defence.Working together to achieve a common goal.Protecting computers and networks from attacks.Living together peacefully despite differences.A serious situation that needs immediate action....

Technology 2024-01-26

Technology crossword puzzle
Across
  1. Smallest unity of information
  2. Small electronic devices that make your life easier.
  3. Electronic devices that you can wear as accessories.
  4. About conersing analog information to a digital ones.
  5. Intenet of things.
  6. To protect systems or data from cybernetics attacks.
  7. Programmable machine to automate processes
Down
  1. The smallest technology.
  2. It's used to talk to someone that is far from you.
  3. A process or set of rules that solve a specific problem.
  4. Msurament and analysis about unique physical of everyone.
  5. Aereal no tipulated devices
  6. Can make tridimensional images to crate optical illusions.
  7. Generally, the not physical about a computer.
  8. It's used to protect data encoding the information.

15 Clues: Intenet of things.The smallest technology.Aereal no tipulated devicesSmallest unity of informationProgrammable machine to automate processesGenerally, the not physical about a computer.It's used to talk to someone that is far from you.It's used to protect data encoding the information.Small electronic devices that make your life easier....

Electricity back 2023-05-30

Electricity back crossword puzzle
Across
  1. Measures the voltage in a circuit
  2. Measurement of electrical power
  3. Power lines connecting power supplies to homes in a large area
  4. A place to plug in a device
  5. Power used by a device
  6. Makes your hair stand up, gives a shock
  7. Online protection
Down
  1. Too much power at one time
  2. Transfers electricity from one circuit to another with more or less power
  3. Portable power supply, can power a remote
  4. Anything that makes power, like a generator or a battery
  5. Protects us from electric shocks
  6. Measures the current in a circuit
  7. Adjusts the power in a circuit
  8. Happens again and again

15 Clues: Online protectionPower used by a deviceHappens again and againToo much power at one timeA place to plug in a deviceAdjusts the power in a circuitMeasurement of electrical powerProtects us from electric shocksMeasures the voltage in a circuitMeasures the current in a circuitMakes your hair stand up, gives a shock...

soca 2023-03-13

soca crossword puzzle
Across
  1. Type Gryphons plan & organize ______-___-___ competitions
  2. ______ organized the SOC Open House.
  3. SEED hosts the ___-___-Series
  4. SOCC’s _____ department is in charge of planning events
  5. Programming competition only for freshmen
  6. SOCA is In charge of ________ relations
  7. Gryphons aims to promote ________ to students that are passionate about IT
  8. SOCC is in charge of maintaining and building ________ relations
Down
  1. SPAI is part of the AI Singapore Student ________
  2. SPAI attended and presented at the ____ Conference.
  3. SOCA’s ________ department is the first point of contact with outside organizations.
  4. SEED stands for Sharing, _______, Enriching, Development
  5. Gryphon’s Mascot
  6. SPAI created its own Project _____.
  7. SOCC organized Freshman Orientation ______

15 Clues: Gryphon’s MascotSEED hosts the ___-___-SeriesSPAI created its own Project _____.______ organized the SOC Open House.SOCA is In charge of ________ relationsProgramming competition only for freshmenSOCC organized Freshman Orientation ______SPAI is part of the AI Singapore Student ________SPAI attended and presented at the ____ Conference....

BACO Conference Team Builder 2024-11-20

BACO Conference Team Builder crossword puzzle
Across
  1. – The process of identifying and analyzing risks.
  2. – Violation of a law, duty, or agreement.
  3. – Abbreviation for Foreign Corrupt Practices Act.
  4. – Consequences for failing to follow regulations.
  5. – Recording and documenting compliance breaches.
  6. – Procedures to ensure proper operation of systems.
  7. – A professional responsible for managing compliance.
  8. – Protecting systems and data from cyber threats.
Down
  1. – Measures to prevent illicit financial activities.
  2. – A group responsible for overseeing ethical practices.
  3. – An in-house review of processes and systems.
  4. – The act of making information known.
  5. – Adherence to moral and ethical principles.
  6. – A set of rules outlining acceptable behaviors.
  7. – Relating to rules issued by governing bodies.

15 Clues: – The act of making information known.– Violation of a law, duty, or agreement.– Adherence to moral and ethical principles.– An in-house review of processes and systems.– Relating to rules issued by governing bodies.– Recording and documenting compliance breaches.– A set of rules outlining acceptable behaviors....

PAW 2024 Crossword Puzzle 2024-05-16

PAW 2024 Crossword Puzzle crossword puzzle
Across
  1. Always access and transmit patient data ________.
  2. When faxing, ensure that the fax _____-sheet is free of any PHI.
  3. If someone contacts you requesting information about a confidential patient, the response should be “I do not have any information available for that ______”.
  4. Snooping may be motivated by _________, concern about the health and well-being of others, interpersonal conflicts, or personal gain.
  5. Always verify the source of emails and links ______ clicking.
  6. All access to personal health information must be limited to what is _________ to perform your job duties.
  7. Loss of _____ by patients and families may be one of the consequences of a privacy breach.
  8. When verbally disclosing information, _____ the information shared to what is necessary for the purpose.
  9. The patient must be informed of the purpose of the _________, use, or disclosure of their PHI.
Down
  1. If you notice anything unusual about your system’s performance or receive __________ messages, report them immediately to our IT cybersecurity team.
  2. When mailing information, ensure that the person named on the ________ is authorized to receive every document included within.
  3. A patient may be confidential not only for privacy reasons but also potentially for ______ reasons.
  4. Check twice that all information is the correct information for the correct person _____ to releasing it.
  5. If a patient does not wish for it to be disclosed that they are in the facility, they can request to add a ____________ patient flag.
  6. All access to personal health information must be for a ____ -related need-to-know.
  7. Consent must be _________, whether it is written or verbal.
  8. ____________ is a crucial aspect that safeguards both our information and our patients’ trust.
  9. Contact the ______ ______ if you have been made aware of PHI being disclosed inappropriately.
  10. Defined by the Information and Privacy Commissioner of Ontario (IPC) as, the unauthorized access of PHI which may be motivated by several factors.
  11. If a patient has added a restriction to accessing their information, the authorization to override the consent directive must be documented in a ______ manner.

20 Clues: Always access and transmit patient data ________.Consent must be _________, whether it is written or verbal.Always verify the source of emails and links ______ clicking.When faxing, ensure that the fax _____-sheet is free of any PHI.All access to personal health information must be for a ____ -related need-to-know....

Cybersecurity Fundamental Chapter 6 2022-10-27

Cybersecurity Fundamental Chapter 6 crossword puzzle
Across
  1. protect data and information.
  2. writes data across multiple drives
  3. can actually improve availability.
  4. a system or component that is continuously operational for a given length of time.
  5. as part of an it asset management system, an organization specifies the acceptable it assets that meets its objectives.
  6. access to data and information reduces the possibility of a threat.
Down
  1. the most comprehensive protection.
  2. detects data errors
  3. assigns all resources of an organization into a group based on common characteristics.
  4. the weak links in the chain that can cause disruption of the organization's operations.
  5. analysis the process of analyzing the dangers posed by natural and human-caused events to the assets of an organization.
  6. changing the controls and procedures at different layers.
  7. involves reducing the severity of the loss or the likelihood of the loss from occurring.
  8. combines multiple physical hard disk drives into single logical units to provide data redundancy and improve performance.
  9. ensures system availability in the event of a component failure.
  10. systems and services are available 99.999% of the time.
  11. store duplicate data on second drive.

17 Clues: detects data errorsprotect data and information.the most comprehensive protection.writes data across multiple drivescan actually improve availability.store duplicate data on second drive.systems and services are available 99.999% of the time.changing the controls and procedures at different layers....

mari 2024-05-20

mari crossword puzzle
Across
  1. a decentralized digital currency
  2. the application of conceptual knowledge for
  3. a wide range of criminal activity that are
  4. providing the appearance of smth without reality
  5. practice and study of techniques for secure
  6. the process of writing computer software code
Down
  1. study and experimentation of algorithmic process
  2. a public distributed ledger of lists of records
  3. protection of computer systems and networks
  4. collection of accounts in which accounting
  5. a potential for vulnerabilities to turn into
  6. a digital currency designated to work as
  7. a device that can make and receive calls over
  8. the minimum amount of any physical entity involved
  9. the opposite of natural

15 Clues: the opposite of naturala decentralized digital currencya digital currency designated to work ascollection of accounts in which accountinga wide range of criminal activity that areprotection of computer systems and networksthe application of conceptual knowledge forpractice and study of techniques for secure...

English assignment 2024-11-25

English assignment crossword puzzle
Across
  1. the essence of knowledge
  2. deployed for the purpose of dealing harm
  3. a branch of IT tasked with protection of virtual assets
  4. a core part of identity of something
  5. a simplified idea for ease of use
Down
  1. another word for confidential
  2. given permissions based on confirmed identity
  3. a way of viewing and dealing with an issue
  4. to construct a new product
  5. a broad group within a company; battles a common issue

10 Clues: the essence of knowledgeto construct a new productanother word for confidentiala simplified idea for ease of usea core part of identity of somethingdeployed for the purpose of dealing harma way of viewing and dealing with an issuegiven permissions based on confirmed identitya broad group within a company; battles a common issue...

FOP Crossword Puzzle 2023-03-28

FOP Crossword Puzzle crossword puzzle
Across
  1. SOCC is in charge of maintaining and building ________ relations.
  2. SPAI created its own Project _____.
  3. Gryphons plan & organize ______-___-___ competitions.
  4. SOCC organized Freshman Orientation ______.
  5. ______ organized the SOC Open House.
  6. Gryphons aims to promote ________ to students that are passionate about IT.
Down
  1. Programming competition only for freshmen.
  2. SOCC is in charge of events like ____ tournaments, Community Service Events and Sports Events
  3. SOCA is In charge of ________ relations.
  4. SEED hosts the ___-___-Series.
  5. SEED stands for Sharing, _______, Enriching, Development.
  6. DISM’s SIG.
  7. SPAI attended and presented at the ____ Conference.
  8. SPAI is part of the AI Singapore Student ________.
  9. SOCA’s ________ department is the first point of contact with outside organizations.

15 Clues: DISM’s SIG.SEED hosts the ___-___-Series.SPAI created its own Project _____.______ organized the SOC Open House.SOCA is In charge of ________ relations.Programming competition only for freshmen.SOCC organized Freshman Orientation ______.SPAI is part of the AI Singapore Student ________.SPAI attended and presented at the ____ Conference....

Viruses 2018-04-10

Viruses crossword puzzle
Across
  1. to preserve or keep safe from harm
  2. protection from hackers and viruses
  3. identify the presence of something concealed
  4. a malware that replicates itself in order to spread
  5. "in the ____" meaning it is still a threat to your computer
  6. software that is intended to damage or disable computers
  7. distributed denial of service
Down
  1. set of instructions for a computer
  2. tools, machinery, and other durable equipment
  3. electronic device for storing and processing data
  4. someone who uses computers to gain unauthorized access to data
  5. fake emails
  6. messages delivered by electronics
  7. a type of virus that disguises itself as something else
  8. corrupts your system and can be easily spread

15 Clues: fake emailsdistributed denial of servicemessages delivered by electronicsset of instructions for a computerto preserve or keep safe from harmprotection from hackers and virusesidentify the presence of something concealedtools, machinery, and other durable equipmentcorrupts your system and can be easily spread...

XoXo Your BIg 2024-10-12

XoXo Your BIg crossword puzzle
Across
  1. What do you call a fake noodle?
  2. Home to summer fun and seaside charm
  3. I named my car this
  4. My fav littles major
  5. America favorite fighting frenchman
  6. My favorite subject in school
Down
  1. What do you call a dinosaur with a extensive vocab
  2. My favorite little name
  3. My favorite day of the week
  4. What do you call a bear with no teeth?
  5. My favorite animal
  6. I call this salty place home
  7. My favorite color is
  8. I’m a dark elixir that many drink to kickstart their day
  9. I’m a sturdy substance often found underfoot, shaping landscapes and used for building

15 Clues: My favorite animalI named my car thisMy favorite color isMy fav littles majorMy favorite little nameMy favorite day of the weekI call this salty place homeMy favorite subject in schoolWhat do you call a fake noodle?America favorite fighting frenchmanHome to summer fun and seaside charmWhat do you call a bear with no teeth?...

Browsing safely 2025-05-26

Browsing safely crossword puzzle
Across
  1. Collection of technologies to prevent cybercrimes
  2. Prevents unauthorised access
  3. Process of befriending children on social media
  4. Committing crimes in your name after stealing your identity
  5. Conducting Terrorism online to cause fear and panic
  6. Illegal entry into computer systems
  7. A password valid for few minutes
  8. Designed to identify,prevent and remove viruses
  9. Hoaxing or misleading people online
Down
  1. Computer programs used to corrupt a computer system
  2. Criminal activity to harm a computer or internet connection
  3. Unethical hackers
  4. threat for people who use internet for online shopping,cash transactions and banking services
  5. Act of harming or harassing people online
  6. Tricking financial organisation to steal money online

15 Clues: Unethical hackersPrevents unauthorised accessA password valid for few minutesIllegal entry into computer systemsHoaxing or misleading people onlineAct of harming or harassing people onlineProcess of befriending children on social mediaDesigned to identify,prevent and remove virusesCollection of technologies to prevent cybercrimes...

Online Bankling 2025-11-27

Online Bankling crossword puzzle
Across
  1. Protects data during transfer
  2. Monthly account reports
  3. A type of money transfer
  4. A process used to verify a user’s identity before granting access.
Down
  1. Email-based scam
  2. Protection of computers, networks, and data from digital attacks.
  3. Illegal financial activity

7 Clues: Email-based scamMonthly account reportsA type of money transferIllegal financial activityProtects data during transferProtection of computers, networks, and data from digital attacks.A process used to verify a user’s identity before granting access.

PROFESI DAN PELUANG USAHA DI BIDANG TKJT 2023-11-17

PROFESI DAN PELUANG USAHA DI BIDANG TKJT crossword puzzle
Across
  1. Orang yang merancang dan mengembangkan perangkat lunak.
  2. Orang yang ahli dalam merancang rangkaian listrik.
  3. Bisnis yang fokus pada pengembangan aplikasi mobile.
  4. Bisnis yang menyediakan layanan keamanan jaringan.
  5. Orang yang spesialis dalam keamanan informasi.
Down
  1. Bisnis yang menyediakan solusi perangkat lunak ERP.
  2. Orang yang bekerja dengan perangkat keras komputer.
  3. Bisnis yang menyediakan solusi penyimpanan data.
  4. Bisnis yang menyediakan layanan cloud computing.
  5. Orang yang ahli dalam analisis data besar.

10 Clues: Orang yang ahli dalam analisis data besar.Orang yang spesialis dalam keamanan informasi.Bisnis yang menyediakan solusi penyimpanan data.Bisnis yang menyediakan layanan cloud computing.Orang yang ahli dalam merancang rangkaian listrik.Bisnis yang menyediakan layanan keamanan jaringan.Bisnis yang menyediakan solusi perangkat lunak ERP....

WeWork Noble House Community 2022-06-25

WeWork Noble House Community crossword puzzle
Across
  1. Solving the world's 1 gigaton refrigerant problem
  2. Pioneer of global content service and distribution
  3. Offering lead generation services from B2B telemarketing to inside sales
  4. Supporting diverse clean energy entrepreneurs to thrive
Down
  1. #DemiMasaDepan #MakingEducationAffordable
  2. Consumer intelligence platform specializing in mobile advertising
  3. SaaS platform that makes cybersecurity accessible to all
  4. Logistics service provider
  5. Language learning platform, mainly Chinese
  6. Consumer electronics company, well-known for its technologically advanced smartwatch

10 Clues: Logistics service provider#DemiMasaDepan #MakingEducationAffordableLanguage learning platform, mainly ChineseSolving the world's 1 gigaton refrigerant problemPioneer of global content service and distributionSupporting diverse clean energy entrepreneurs to thriveSaaS platform that makes cybersecurity accessible to all...

PROFESI DAN PELUANG USAHA 2023-11-17

PROFESI DAN PELUANG USAHA crossword puzzle
Across
  1. Orang yang spesialis dalam keamanan informasi.
  2. Orang yang merancang dan mengembangkan perangkat lunak.
  3. Bisnis yang menyediakan layanan cloud computing.
  4. Orang yang ahli dalam analisis data besar.
  5. Orang yang bekerja dengan perangkat keras komputer.
  6. Bisnis yang menyediakan solusi penyimpanan data.
  7. Bisnis yang fokus pada pengembangan aplikasi mobile.
Down
  1. Bisnis yang menyediakan solusi perangkat lunak ERP.
  2. Bisnis yang menyediakan layanan keamanan jaringan.
  3. Orang yang ahli dalam merancang rangkaian listrik.

10 Clues: Orang yang ahli dalam analisis data besar.Orang yang spesialis dalam keamanan informasi.Bisnis yang menyediakan layanan cloud computing.Bisnis yang menyediakan solusi penyimpanan data.Bisnis yang menyediakan layanan keamanan jaringan.Orang yang ahli dalam merancang rangkaian listrik.Bisnis yang menyediakan solusi perangkat lunak ERP....

Enterprise manual 2022-06-21

Enterprise manual crossword puzzle
Across
  1. CYBERSECURITY
  2. DATA PRIVACY
Down
  1. HIGH VALUE TECHNICAL INFORMATON
  2. COMPANY LEGAL MATTERS
  3. CATERPILLAR CONFIDENTIAL INFORMATION

5 Clues: DATA PRIVACYCYBERSECURITYCOMPANY LEGAL MATTERSHIGH VALUE TECHNICAL INFORMATONCATERPILLAR CONFIDENTIAL INFORMATION

Technology Terminology 2022-09-26

Technology Terminology crossword puzzle
Across
  1. Imaginary creatures that cause unexplained technology problems
  2. IT protection.
  3. Computer that manages access to centralized resource.
Down
  1. American multinational technology corporation based in Washington.
  2. Location of multiple centralized IT resources.
  3. Tool used to send and receive data across shared or public networks.
  4. Data "rains" from here.
  5. Interconnected people or technology.

8 Clues: IT protection.Data "rains" from here.Interconnected people or technology.Location of multiple centralized IT resources.Computer that manages access to centralized resource.Imaginary creatures that cause unexplained technology problemsAmerican multinational technology corporation based in Washington....

Enterprise manual 2022-06-21

Enterprise manual crossword puzzle
Across
  1. CATERPILLAR CONFIDENTIAL INFORMATION
  2. CYBERSECURITY
Down
  1. HIGH VALUE TECHNICAL INFORMATON
  2. DATA PRIVACY
  3. COMPANY LEGAL MATTERS

5 Clues: DATA PRIVACYCYBERSECURITYCOMPANY LEGAL MATTERSHIGH VALUE TECHNICAL INFORMATONCATERPILLAR CONFIDENTIAL INFORMATION

Smart System 2021-06-08

Smart System crossword puzzle
Across
  1. maintenance of systems
  2. #1 cons of the smart system
  3. application improving quality of life
Down
  1. application of tackling with climate change
  2. application that involves wireless sensors
  3. smart system incorporate functions of sensing, actuation and?
  4. example of smart system - monitoring

7 Clues: maintenance of systems#1 cons of the smart systemexample of smart system - monitoringapplication improving quality of lifeapplication that involves wireless sensorsapplication of tackling with climate changesmart system incorporate functions of sensing, actuation and?

AI 2025-11-07

AI crossword puzzle
Across
  1. Kemampuan AI untuk membuat teks, gambar, atau musik disebut …
  2. Informasi yang bersifat pribadi dan rahasia disebut …
  3. Salah satu etika AI: tidak boleh … manusia
  4. Sistem keamanan yang mencegah akses tidak sah ke jaringan
  5. Teknologi yang meniru cara berpikir manusia
  6. AI yang bisa bermain game disebut … AI
  7. Cybersecurity melindungi dari serangan …
  8. Teknologi yang memungkinkan komputer memahami bahasa manusia
  9. AI yang bisa meniru gaya tulisan disebut … AI
  10. Sistem yang menyimpan dan mengelola data disebut …
  11. AI yang bisa membuat video dari teks disebut … AI
  12. AI yang digunakan untuk menganalisis data disebut … AI
  13. AI bisa belajar dari … yang diberikan
  14. Sistem yang memverifikasi identitas pengguna, seperti kata sandi
  15. Cybersecurity melindungi dari serangan …
  16. AI yang bisa menghasilkan musik disebut … AI
  17. AI yang bisa mengenali objek dalam gambar disebut … AI
  18. Teknologi yang digunakan untuk melacak aktivitas pengguna disebut …
  19. AI harus digunakan secara … dan bertanggung jawab
  20. AI yang bisa memahami emosi disebut … AI
  21. Salah satu contoh penggunaan AI di sekolah adalah … otomatis
Down
  1. AI yang digunakan untuk mengenali suara disebut ...
  2. Salah satu risiko AI adalah … pekerjaan manusia
  3. AI yang digunakan untuk membuat gambar dari teks disebut … AI
  4. Program jahat yang merusak sistem komputer
  5. Salah satu bentuk pelanggaran etika AI adalah … data tanpa izin
  6. AI yang bisa menerjemahkan bahasa disebut … AI
  7. Serangan yang menipu pengguna agar memberikan informasi disebut …
  8. Kata lain dari keamanan informasi digital
  9. AI yang bisa berbicara dan menjawab disebut … AI
  10. AI bisa digunakan untuk membantu … tugas manusia
  11. Sistem keamanan yang menggunakan sidik jari disebut …
  12. Sistem keamanan yang mencegah akses tidak sah ke jaringan
  13. Teknologi yang digunakan untuk mengenali wajah
  14. Salah satu risiko AI adalah penyebaran … palsu
  15. Kata sandi yang kuat harus sulit untuk …
  16. AI yang bisa membuat desain disebut … AI
  17. Sistem yang menyimpan data secara online disebut …
  18. Data pribadi harus dijaga agar tidak …
  19. AI yang digunakan untuk chatbot disebut … AI
  20. Serangan digital yang bertujuan mencuri data disebut …

41 Clues: AI bisa belajar dari … yang diberikanAI yang bisa bermain game disebut … AIData pribadi harus dijaga agar tidak …Cybersecurity melindungi dari serangan …Kata sandi yang kuat harus sulit untuk …AI yang bisa membuat desain disebut … AICybersecurity melindungi dari serangan …AI yang bisa memahami emosi disebut … AI...

Security Awareness Month 2025 2025-10-07

Security Awareness Month 2025 crossword puzzle
Across
  1. the credit card security audit we do
  2. Fastpass uses ____ to authenticate me to Okta.
  3. passwords should ____ be stored in plaintext
  4. the button to report a suspicious email
  5. the wiki code for the AI Knowledge Base
  6. our password manager tool
  7. phiches use ___ to pressure people to click or reply.
  8. Crowd____ is our AV software.
Down
  1. a pass____ is more memorable than a password
  2. the data classification for pii and credit card data
  3. ___@kayak.com where support tickets can be emailed
  4. ask-kayak-____ is the Slack channel for cybersecurity questions.
  5. our remote access tool
  6. ai tool to search all of kayak
  7. The Acceptable ____ Policy sets employee security rules

15 Clues: our remote access toolour password manager toolCrowd____ is our AV software.ai tool to search all of kayakthe credit card security audit we dothe button to report a suspicious emailthe wiki code for the AI Knowledge Basea pass____ is more memorable than a passwordpasswords should ____ be stored in plaintext...

Starhub 2025-04-06

Starhub crossword puzzle
Across
  1. Division offering network and cybersecurity solutions
  2. What class are we in?
  3. The forecasted revenue was derived from ____ reports
  4. Streaming platform competing with PAYTV
Down
  1. The last presenter of the group
  2. Key transformation strategy Starhub is undergoing:___ +
  3. Type of strategy Starhub uses to shift from Telco to Digital solutions player
  4. Our recommendation on Starhub's shares
  5. The bargaining power of buyers is ___

9 Clues: What class are we in?The last presenter of the groupThe bargaining power of buyers is ___Our recommendation on Starhub's sharesStreaming platform competing with PAYTVThe forecasted revenue was derived from ____ reportsDivision offering network and cybersecurity solutionsKey transformation strategy Starhub is undergoing:___ +...

R&D India Market Place 2022-11-09

R&D India Market Place crossword puzzle
Across
  1. own your_______
  2. ____ is at the core of our purpose, culture and business.
  3. Reducing the operational carbon emissions in our supply chain
  4. chairman and CEO
  5. one of our core values
  6. internal tool for mobility, projects and mentorships
Down
  1. IoT, mobility, sensing, cloud, analytics and cybersecurity to deliver Innovation at Every Level.
  2. We are Globally recognised for____
  3. one of our 6 long term commitments

9 Clues: own your_______chairman and CEOone of our core valuesWe are Globally recognised for____one of our 6 long term commitmentsinternal tool for mobility, projects and mentorships____ is at the core of our purpose, culture and business.Reducing the operational carbon emissions in our supply chain...

Cybersecurity 2020-08-21

Cybersecurity crossword puzzle
Across
  1. They are small files that some websites save on your computer. This little files store information about you, such as username, but they cannot spy on you.
  2. the junk email people receive. These messages, also known as unsolicited mail, are usually service advertisements.
  3. it is the practice of protecting systems, networks and programs from digital attacks.
Down
  1. an electronic device to store and process data, in the way that the user wishes.
  2. Los virus son programas informáticos que tienen como objetivo alterar el funcionamiento del computador, sin que el usuario lo desee. Estos tienen la intención de destruir o modificar los archivos o datos almacenados en tu computadora.

5 Clues: an electronic device to store and process data, in the way that the user wishes.it is the practice of protecting systems, networks and programs from digital attacks.the junk email people receive. These messages, also known as unsolicited mail, are usually service advertisements....

CYBERSECURITY 2021-09-28

CYBERSECURITY crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

crossword! 2024-02-03

crossword! crossword puzzle
Across
  1. Usually consists of 8 bits
  2. Invisible barrier for women advancing in the workplace
  3. left no crumbs
  4. Mentor applications are due on the _
  5. Film about under-recognized Black women at NASA who were a key part of its success
  6. Most commonly-used programming language
Down
  1. practice of protecting systems, networks, and programs from digital attacks
  2. Purdue's first women-centric hackathon ;)
  3. When women are generally paid less than men
  4. women in _

10 Clues: women in _left no crumbsUsually consists of 8 bitsMentor applications are due on the _Most commonly-used programming languagePurdue's first women-centric hackathon ;)When women are generally paid less than menInvisible barrier for women advancing in the workplacepractice of protecting systems, networks, and programs from digital attacks...

GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05

GGH - The odd word out here is a clue to the location of the next riddle. crossword puzzle
Across
  1. Unethical practice of gaining unauthorized access to computer systems.
  2. Act of impersonating a legitimate entity to deceive individuals or gain access.
  3. A type of computer memory.
  4. A small portable computer.
Down
  1. Securing computer systems against unauthorized access.
  2. A popular operating system.
  3. The brain of a computer.
  4. Term for gaining access to a secure network through.
  5. Malicious software used to gain unauthorised access to computer systems.
  6. Desired outcomes.

10 Clues: Desired outcomes.The brain of a computer.A type of computer memory.A small portable computer.A popular operating system.Term for gaining access to a secure network through.Securing computer systems against unauthorized access.Unethical practice of gaining unauthorized access to computer systems....

Technology & Innovation 2025-08-09

Technology & Innovation crossword puzzle
Across
  1. – The state of relying on something
  2. OFFICE – Working physically at a company's premises
  3. – Protection of computer systems from attacks
  4. – Introduction of new methods, ideas, or products
  5. – A mobile phone with advanced features
Down
  1. – Process of learning and acquiring knowledge
  2. – State of being free from public attention
  3. WORK – Working from home or another location outside the office
  4. – Short for Artificial Intelligence
  5. – Application of scientific knowledge for practical purposes

10 Clues: – The state of relying on something– Short for Artificial Intelligence– A mobile phone with advanced features– State of being free from public attention– Process of learning and acquiring knowledge– Protection of computer systems from attacks– Introduction of new methods, ideas, or productsOFFICE – Working physically at a company's premises...

Senior Management Knowledge 2024-12-25

Senior Management Knowledge crossword puzzle
Across
  1. Largest threat to Bank.
  2. Bank’s #1 Strength.
  3. Financial guide for the Bank.
  4. Beliefs about what will happen in the future.
  5. An unexpected event that could have a negative impact on the Bank.
  6. Fun for all associates.
  7. Coin or what people fear the most.
Down
  1. The ability of an asset to be quickly and easily converted to cash.
  2. The feeling or belief that one can rely on someone or something thing.
  3. The process of determining a borrower’s creditworthiness.
  4. Interest free checking accounts.
  5. A formal agreement to repay a debt.
  6. Number #1 challenge of FNB.
  7. Bank’s core system.
  8. Bank’s define market area.
  9. Official inspection or Necessity for all Banks.

16 Clues: Bank’s #1 Strength.Bank’s core system.Largest threat to Bank.Fun for all associates.Bank’s define market area.Number #1 challenge of FNB.Financial guide for the Bank.Interest free checking accounts.Coin or what people fear the most.A formal agreement to repay a debt.Beliefs about what will happen in the future....

Senior Management Knowledge 2024-12-25

Senior Management Knowledge crossword puzzle
Across
  1. Number #1 challenge of FNB.
  2. The feeling or belief that one can rely on someone or something thing.
  3. Largest threat to Bank.
  4. An unexpected event that could have a negative impact on the Bank.
  5. Financial guide for the Bank.
  6. A formal agreement to repay a debt.
  7. Official inspection or Necessity for all Banks.
Down
  1. Bank’s #1 Strength.
  2. Coin or what people fear the most.
  3. Bank’s define market area.
  4. The ability of an asset to be quickly and easily converted to cash.
  5. The process of determining a borrower’s creditworthiness.
  6. Interest free checking accounts.
  7. Beliefs about what will happen in the future.
  8. Bank’s core system.
  9. Fun for all associates.

16 Clues: Bank’s #1 Strength.Bank’s core system.Largest threat to Bank.Fun for all associates.Bank’s define market area.Number #1 challenge of FNB.Financial guide for the Bank.Interest free checking accounts.Coin or what people fear the most.A formal agreement to repay a debt.Beliefs about what will happen in the future....

Parole Cybercrociate 2021-04-23

Parole Cybercrociate crossword puzzle
Across
  1. Un particolare tipo di dato personale
  2. Nuovo social network fondato nel 2020
  3. Città che è una eccellenza mondiale nella Cybersecurity
  4. La casata rappresentata da un lupo nella serie "Trono di Spade"
  5. Il pizzo digitale
  6. Truffa che sfrutta la tecnologia VoiP
  7. Una delle tre dimensioni di sicurezza del dato
Down
  1. Probabilità per impatto
  2. E' una criptovaluta
  3. Il nome del processore ARM per Mac di Apple
  4. Rete di computer composta da dispositivi infettati da un malware “zombie”
  5. Numero di basi giuridiche previste dal GDPR per la liceità di un trattamento di dati personali

12 Clues: Il pizzo digitaleE' una criptovalutaProbabilità per impattoUn particolare tipo di dato personaleNuovo social network fondato nel 2020Truffa che sfrutta la tecnologia VoiPIl nome del processore ARM per Mac di AppleUna delle tre dimensioni di sicurezza del datoCittà che è una eccellenza mondiale nella Cybersecurity...

Professor Sloan's Fun Facts 2025-04-23

Professor Sloan's Fun Facts crossword puzzle
Across
  1. What is the acronym for the New CS Building?
  2. What month was he born?
  3. What school did he earn his PhD from?
  4. What school did he go to for undergrad?
  5. What is one of his hobbies?
  6. What book did he write w/Richard Warner in 2021?
Down
  1. What is his job title?
  2. What event is he the Official Pronouncer for?
  3. How many years has he been at UIC?
  4. What is his favorite apparel to wear?
  5. What is his newest book about?
  6. Where was he born?

12 Clues: Where was he born?What is his job title?What month was he born?What is one of his hobbies?What is his newest book about?How many years has he been at UIC?What is his favorite apparel to wear?What school did he earn his PhD from?What school did he go to for undergrad?What is the acronym for the New CS Building?...

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Entries due NLT 11/2
  2. Home of the 14th Flying Training Wing of Air Education and Training Command
  3. By David C. Graham
  4. Entries due NLT 10/23
  5. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Do your Part.#BeCyberSmart
  2. Quality Management Principles
  3. Test Monthly

8 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartQuality Management PrinciplesHome of the 14th Flying Training Wing of Air Education and Training CommandTo be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees

Hacktivism Vocabulary Crossword 2 2023-05-09

Hacktivism Vocabulary Crossword 2 crossword puzzle
Across
  1. protecting an organization and its employees against cyber threats
  2. a person or thing likely to cause damage or danger
  3. a hacker with bad intentions
Down
  1. an attempt by hackers to damage or destroy a computer network or system
  2. a legal hacker hired by a company or government
  3. reveal
  4. take something that is not yours
  5. to search

8 Clues: revealto searcha hacker with bad intentionstake something that is not yoursa legal hacker hired by a company or governmenta person or thing likely to cause damage or dangerprotecting an organization and its employees against cyber threatsan attempt by hackers to damage or destroy a computer network or system

Computer Science 2025-09-11

Computer Science crossword puzzle
Across
  1. a graph that plots data using bars
  2. your credibility to use the internet
  3. bullying using the internet
  4. someone you should inform during a bullying situation
  5. online credentials to an account on the internet
  6. the Brains of the computer
  7. Your own information on the internet
  8. a person who witnesses bullying
Down
  1. a component that connects your major components of the computer
  2. usng someone else's work without giving credit to the author
  3. the physical components of a computer
  4. your history on the internet
  5. harmful to your computer/ the internet
  6. one of the most common software applications
  7. a place where people can connect with others
  8. The process of protecting yourself on the internet

16 Clues: the Brains of the computerbullying using the internetyour history on the interneta person who witnesses bullyinga graph that plots data using barsyour credibility to use the internetYour own information on the internetthe physical components of a computerharmful to your computer/ the internetone of the most common software applications...

IELTS Science & Tech Vocabulary 2025-09-03

IELTS Science & Tech Vocabulary crossword puzzle
Across
  1. A sudden and important discovery or development
  2. The investigation of outer space through tech
  3. A new method, idea, or product
  4. Highly advanced and innovative
  5. Based on or guided by data
  6. The most advanced or sophisticated version available
  7. The imitation of intelligent human behavior
  8. The period characterized by the internet
  9. The gap between those with and without technology
Down
  1. Technology dealing with robots
  2. Involving advanced technological development
  3. High levels of technological development
  4. The use of machines to perform tasks without human involvement
  5. A digital space used for interaction or services
  6. The practice of protecting systems and networks from attacks
  7. Easy to understand or use

16 Clues: Easy to understand or useBased on or guided by dataTechnology dealing with robotsA new method, idea, or productHighly advanced and innovativeHigh levels of technological developmentThe period characterized by the internetThe imitation of intelligent human behaviorInvolving advanced technological development...

tema 2 perkembangan ekonomi digital 2025-10-27

tema 2 perkembangan ekonomi digital crossword puzzle
Across
  1. digital menciptakan pekerjaan baru berbasis → TEKNOLOGI
  2. besar yang digunakan untuk analisis bisnis disebut → BIGDATA
  3. baru berbasis teknologi disebut → STARTUP
  4. keuangan secara online disebut → EBANKING
  5. depan ekonomi digital bergantung pada literasi → DIGITAL
  6. dan GrabFood merupakan layanan → DIGITALDELIVERY
  7. merupakan singkatan dari → FINANCIALTECHNOLOGY
  8. pemerintah untuk mendukung ekonomi digital UMKM disebut → DIGITALISASIUMKM
  9. utama dalam ekonomi digital adalah keamanan data dan → PRIVASI
  10. melalui marketplace online termasuk kegiatan → EKOMERCE
  11. transaksi online dikenal dengan istilah → CYBERSECURITY
  12. ekonomi digital adalah kebocoran → DATA
Down
  1. buatan dikenal juga dengan istilah → ARTIFICIALINTELLIGENCE
  2. aplikasi fintech di Indonesia adalah → OVO
  3. ekonomi yang memanfaatkan teknologi digital dan internet → EKONOMIDIGITAL
  4. melalui media sosial disebut → DIGITALMARKETING
  5. Shopee, dan Lazada adalah contoh platform → MARKETPLACE
  6. utama ekonomi digital adalah mempercepat → TRANSAKSI
  7. tanpa uang tunai menggunakan kartu atau aplikasi disebut → EMONEY
  8. usaha kecil dapat menjangkau pasar luas melalui → INTERNET

20 Clues: ekonomi digital adalah kebocoran → DATAbaru berbasis teknologi disebut → STARTUPkeuangan secara online disebut → EBANKINGaplikasi fintech di Indonesia adalah → OVOmerupakan singkatan dari → FINANCIALTECHNOLOGYmelalui media sosial disebut → DIGITALMARKETINGdan GrabFood merupakan layanan → DIGITALDELIVERY...

TEMA 2 TTS perkembangan ekonomi digital M.mumthazul fikri 9A 2025-10-22

TEMA 2 TTS perkembangan ekonomi digital M.mumthazul fikri 9A crossword puzzle
Across
  1. , Kegiatan ekonomi melalui media internet.
  2. ,Singkatan dari teknologi kecerdasan buatan dalam bahasa Inggris.
  3. kredit , Alat pembayaran berbentuk kartu dari bank.
  4. , Aplikasi belanja online yang berwarna oranye.
  5. banking , Layanan bank yang sepenuhnya berbasis internet.
  6. Salah satu dompet digital terkenal di Indonesia.
  7. Sistem pembayaran tanpa uang tunai.
  8. , Sistem keamanan siber untuk perlindungan data.
  9. , Proses jual beli yang terjadi secara online.
  10. , Salah satu e-wallet milik Gojek.
Down
  1. Bentuk pasar digital tempat jual beli online.
  2. , Teknologi virtual yang berkembang bersama ekonomi digital.
  3. , Perusahaan teknologi keuangan disebut ...
  4. Bentuk uang yang hanya bisa digunakan secara elektronik.
  5. , Mata uang kripto pertama di dunia.
  6. , Mata uang digital resmi dari bank sentral disebut.
  7. , Metode pembayaran dengan memindai kode.
  8. , Transaksi keuangan melalui jaringan komputer disebut ...
  9. Teknologi dasar dari mata uang kripto.
  10. Mata uang digital yang populer dan terdesentralisasi.

20 Clues: , Salah satu e-wallet milik Gojek.Sistem pembayaran tanpa uang tunai., Mata uang kripto pertama di dunia.Teknologi dasar dari mata uang kripto., Metode pembayaran dengan memindai kode., Kegiatan ekonomi melalui media internet., Perusahaan teknologi keuangan disebut ...Bentuk pasar digital tempat jual beli online....

Technology and Society 2024-09-02

Technology and Society crossword puzzle
Across
  1. A virtual representation of a person
  2. A digital platform for sharing and connecting
  3. A type of software that protects against malware
  4. A device used for communication and information
  5. The practice of protecting systems, networks
  6. The global network connecting millions of computers
Down
  1. The use of technology to perform tasks without human intervention
  2. A digital currency
  3. The buying and selling of goods and services over the internet.
  4. Online theft of personal information

10 Clues: A digital currencyA virtual representation of a personOnline theft of personal informationThe practice of protecting systems, networksA digital platform for sharing and connectingA device used for communication and informationA type of software that protects against malwareThe global network connecting millions of computers...

Technology 2025-06-16

Technology crossword puzzle
Across
  1. an important discovery or development
  2. the use of machines to perform tasks without human intervention
  3. easy to use or understand
  4. a small electronic device with a specific function
  5. the trail of data left by users on the internet
  6. introducing new ideas or methods
Down
  1. knowledgeable about modern technology
  2. extremely modern and advanced
  3. measures taken to protect systems from cyber threats
  4. the simulation of human intelligence in machines

10 Clues: easy to use or understandextremely modern and advancedintroducing new ideas or methodsknowledgeable about modern technologyan important discovery or developmentthe trail of data left by users on the internetthe simulation of human intelligence in machinesa small electronic device with a specific function...

Teka Teki Silang 2025-06-26

Teka Teki Silang crossword puzzle
Across
  1. Profesi yang bertugas mendesain dan mengembangkan perangkat lunak
  2. Membuat dan menulis program komputer
  3. Orang yang mengelola jaringan komputer dalam suatu organisasi
  4. Orang yang mengoprasikan komputer dalam kehidupan sehari-hari
  5. Profesi yang membantu pengguna saat mengalami masalah teknis
Down
  1. Profesi yang bertugas merancang dan membangun halaman web
  2. Orang yang bertugas menjaga keamanan sistem dari serangan siber
  3. Profesi yang menganalisis kebutuhan sistem sebelum dibuat
  4. Komponen sistem komputer selain hardware dan software
  5. Orang yang menggunakan komputer

10 Clues: Orang yang menggunakan komputerMembuat dan menulis program komputerKomponen sistem komputer selain hardware dan softwareProfesi yang bertugas merancang dan membangun halaman webProfesi yang menganalisis kebutuhan sistem sebelum dibuatProfesi yang membantu pengguna saat mengalami masalah teknis...

security 2021-08-18

security crossword puzzle
Across
  1. I am testin gthis out
  2. a color I like
  3. director cybersecurity
Down
  1. a way to protect data
  2. a way to look at the sun
  3. a way to protect users

6 Clues: a color I likea way to protect dataI am testin gthis outa way to protect usersdirector cybersecuritya way to look at the sun

disguise 2024-09-22

disguise crossword puzzle
Across
  1. Has a trunk
  2. Likes to chase mice
Down
  1. Man's best friend
  2. Large marsupial
  3. Flying mammal

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cybersecurity Fundamentals - Chapter 3 2022-10-18

Cybersecurity Fundamentals - Chapter 3 crossword puzzle
Across
  1. to make malicious website appear higher in search engine result.
  2. software that enables a criminal to obtain information about user's computer activities.
  3. an attack that targes high profile targets within an organization.
  4. impersonation of a legitimate website
  5. the program or code introduced by a criminal who has compromised a system
  6. malicious program that uses a trigger to awaken the malicious code
  7. malicious code that replicates by independently exploiting vulnerabilities.
  8. malware that carries out malicious operation under the guise of a desired operation.
  9. a malicious executable code attached to another executable file.
  10. known as junk mail
Down
  1. highly targeted phishing attack, that send customized emails to a specific person or individual.
  2. holds a computer system, or the data it contains, captive until the target makes a payment.
  3. alters a computer's browser settings to redirect user to website paid for the cyber criminals' customers.
  4. a form of fraud where a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source.
  5. persuades the user to take specific action based on fear
  6. displays annoying pop-ups to generate revenue for its authors.
  7. using voice communication technology and records message that appears legitimate.

17 Clues: known as junk mailimpersonation of a legitimate websitepersuades the user to take specific action based on feardisplays annoying pop-ups to generate revenue for its authors.to make malicious website appear higher in search engine result.a malicious executable code attached to another executable file....

Privacy Summit 2025 2025-01-06

Privacy Summit 2025 crossword puzzle
Across
  1. Federal law governing information security management
  2. Hide one's IP address
  3. Unique code or number assigned to an individual
  4. Government watching
  5. Personal info stored online
  6. Cybersecurity sequence
  7. Measures to prevent hacking
  8. Threat of hacking or online attack or Reason to use strong passwords
  9. Code for secure messaging
  10. Alert to potential threat
  11. Not for public view
  12. Secure online account
Down
  1. Requirement of FOIA
  2. Secret information
  3. Method of identification using fingerprints or High-tech way to unlock your phone
  4. Protected from hacking
  5. Nameless online user
  6. Conceal online activity
  7. Personal info to be guarded
  8. Unauthorized access
  9. Right to keep info secret
  10. Shield from identity theft
  11. Reduce the severity of a cyber-attack/data breach or Lessen the blow of a data breach
  12. Document or file containing personal data

24 Clues: Secret informationRequirement of FOIAGovernment watchingUnauthorized accessNot for public viewNameless online userHide one's IP addressSecure online accountProtected from hackingCybersecurity sequenceConceal online activityRight to keep info secretCode for secure messagingAlert to potential threatShield from identity theft...

attempt 3 2025-07-10

attempt 3 crossword puzzle
Across
  1. The flavor of their wedding cake
  2. The instrument the groom played in high school
  3. Their first dance song
  4. The city they met in
  5. The name of their dog
  6. How many years the couple has been together
  7. The first movie they watched as a couple
  8. The bride's maiden name
  9. First concert they saw together
  10. number of pets the couple has
  11. The stone in the engagement ring
Down
  1. The country they visited last summer
  2. The street Sarah and Liam call home
  3. What did the groom study in college
  4. Name of Sarah's Maid of Honor
  5. The month they first met
  6. Sarah's middle name
  7. The month the couple got engaged
  8. Where did the proposal happen
  9. The color of the bridesmaid dresses
  10. Name of the Best Man
  11. Sarah's star sign

22 Clues: Sarah's star signSarah's middle nameThe city they met inName of the Best ManThe name of their dogTheir first dance songThe bride's maiden nameThe month they first metName of Sarah's Maid of HonorWhere did the proposal happennumber of pets the couple hasFirst concert they saw togetherThe flavor of their wedding cakeThe month the couple got engaged...

Cittadinanza digitale 2021-11-15

Cittadinanza digitale crossword puzzle
Across
  1. bullismo in rete
  2. la sicurezza informatica
  3. insieme di regole per il buon comportamento su internet
Down
  1. il pirata del sistema informatico
  2. colui che infetta i file
  3. parola segreta legata a un account
  4. rete di computer che possono comunicare tra loro

7 Clues: bullismo in retecolui che infetta i filela sicurezza informaticail pirata del sistema informaticoparola segreta legata a un accountrete di computer che possono comunicare tra loroinsieme di regole per il buon comportamento su internet

Smart System 2021-06-08

Smart System crossword puzzle
Across
  1. maintenance of systems
  2. smart system incorporate functions of sensing, actuation and?
  3. application that involves wireless sensors
  4. example of smart system - monitoring
Down
  1. application of tackling with climate change
  2. #1 cons of the smart system
  3. application improving quality of life

7 Clues: maintenance of systems#1 cons of the smart systemexample of smart system - monitoringapplication improving quality of lifeapplication that involves wireless sensorsapplication of tackling with climate changesmart system incorporate functions of sensing, actuation and?

CTE Pathway Lake Highlands HS 2022-11-16

CTE Pathway Lake Highlands HS crossword puzzle
Across
  1. Computer Science Magnet Pathway (Level 3)
  2. Manufacturing Technology Magnet Pathway (Level 1)
  3. Digital Communications -AV Production Pathway (Level 2)
Down
  1. Legal Studies Magnet Pathway (Level 1)
  2. Cybersecurity Magnet Pathway (Level 4)
  3. Robotics Pathway (Level 4)
  4. Culinary Arts Magnet Pathway (Level 3)

7 Clues: Robotics Pathway (Level 4)Legal Studies Magnet Pathway (Level 1)Cybersecurity Magnet Pathway (Level 4)Culinary Arts Magnet Pathway (Level 3)Computer Science Magnet Pathway (Level 3)Manufacturing Technology Magnet Pathway (Level 1)Digital Communications -AV Production Pathway (Level 2)

High School Pathways 2024-04-26

High School Pathways crossword puzzle
Across
  1. Take courses to become a teacher
  2. Take courses about wildlife, plants and animals
  3. Finish 2 years of your Bachelor's Degree
  4. Take courses on building, carpentry work
Down
  1. Take courses in computer technology
  2. Course towards medical fields
  3. Earn a welding certificate

7 Clues: Earn a welding certificateCourse towards medical fieldsTake courses to become a teacherTake courses in computer technologyFinish 2 years of your Bachelor's DegreeTake courses on building, carpentry workTake courses about wildlife, plants and animals

Cybersecurity Crossword Puzzle 2023-04-17

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Engineering, Is a technique that a hacker uses to steal data by a person for different purposes by psychological manipulation combined with social scenes.
  2. access, When someone gains access to a server, website, or other sensitive data using someone else's account details.
  3. It is a software or hardware which is used to filter network traffic based on rules.
  4. It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding the security system.
  5. Is a software that operates on different OS which is used to prevent malicious software.
  6. security, the protection of computer systems and information from harm, theft, and unauthorized use.
Down
  1. Is a person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.
  2. Is an action or event that might compromise the security.
  3. It is a malicious software that installs on your computer without your consent for a bad purpose.
  4. security, refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
  5. Is an assault on the system security that is delivered by a person or a machine to a system.

11 Clues: Is an action or event that might compromise the security.It is a software or hardware which is used to filter network traffic based on rules.Is a software that operates on different OS which is used to prevent malicious software.Is an assault on the system security that is delivered by a person or a machine to a system....

Unit 4 Cybersecurity 2022-03-02

Unit 4 Cybersecurity crossword puzzle
Across
  1. a check for a secure BIOS operation
  2. when an information system receives protection from a pre-existing security controls
  3. software built into a piece of hardware
  4. securing devices by reducing the exposure
Down
  1. a more thorough hotfix
  2. quick fix for a software problem
  3. firewall command to block or allow certain user
  4. a device that acts as a file server
  5. proprietary journaling file system
  6. a guide for efficiency of a network
  7. network of high speed storage used by servers

11 Clues: a more thorough hotfixquick fix for a software problemproprietary journaling file systema check for a secure BIOS operationa device that acts as a file servera guide for efficiency of a networksoftware built into a piece of hardwaresecuring devices by reducing the exposurenetwork of high speed storage used by servers...

CYBERSECURITY AWARENESS - C40 2024-10-22

CYBERSECURITY AWARENESS - C40 crossword puzzle
Across
  1. The process of analyzing systems for vulnerabilities (8 LETTERS)
  2. A program that replicates itself to spread malware (4 LETTERS)
  3. A security method where each user has specific privileges (6 LETTERS)
  4. Cybercriminals often use this method to monitor network activity (8 LETTERS)
  5. Using multiple types of information to verify identity (14 LETTERS)
  6. Security strategy that requires users to change this regularly (8 LETTERS)
Down
  1. Common method used to protect sensitive data (10 LETTERS)
  2. Fake emails claiming to be from trusted sources (8 LETTERS)
  3. A phrase longer than a password for added security (9 LETTERS)
  4. Network of infected computers controlled remotely (6 LETTERS)
  5. Program designed to prevent unauthorized access (8 LETTERS)

11 Clues: Common method used to protect sensitive data (10 LETTERS)Fake emails claiming to be from trusted sources (8 LETTERS)Program designed to prevent unauthorized access (8 LETTERS)Network of infected computers controlled remotely (6 LETTERS)A phrase longer than a password for added security (9 LETTERS)...

Luka's Cybersecurity Quizz 2024-03-20

Luka's Cybersecurity Quizz crossword puzzle
Across
  1. Something that protect a network
  2. Symetrical encryption
  3. Keep a message unmodified
  4. Someone who doing hacking for there ethic
  5. Garanty that a message come from one person
  6. Something that encrypt or deencrypt a message
Down
  1. The possibility to access data
  2. Something that will damage your pc or things on it
  3. Privacy of a message
  4. A type of attack on a network
  5. Asymetrical encryption

11 Clues: Privacy of a messageSymetrical encryptionAsymetrical encryptionKeep a message unmodifiedA type of attack on a networkThe possibility to access dataSomething that protect a networkSomeone who doing hacking for there ethicGaranty that a message come from one personSomething that encrypt or deencrypt a message...

National Cybersecurity Month 2022-09-16

National Cybersecurity Month crossword puzzle
Across
  1. SOFTWARE DESIGNED TO INTERFERE WITH A COMPUTER'S NORMAL FUNCTIONING
  2. A SCAM BY WHICH AN EMAIL USER IS DUPED INTO REVEALING PERSONAL OR CONFIDENTIAL INFORMATION WHICH THE SCAMMER CAN USE ILLICITLY
  3. AN INTEGRATED COLLECTION OF SECURITY MEASURES DESIGNED TO PREVENT UNAUTHORIZED ELECTRONIC ACCESS TO A NETWORKED COMPUTER
  4. A COMPUTER THAT IS UNDER COTNROL OF A MALICIOUS HACKER WITHOUT THE KNOWLEDGE OF THE COMPUTER OWNER
  5. A PROGRAM THAT IS DESIGNED TO HARM A COMPUTER BY DELETING DATA, RUINING FILES, & THAT CAN BE SPREAD SECRETLY FROM ONE COMPUTER TO ANOTHER
Down
  1. COMPUTER SOFTWARE THAT SECRETLY RECORDS INFORMATION ABOUT THE WAY YOU USE YOUR COMPUTER
  2. THE ACT OF OBTAINING OR ATTEMPTING TO OBTAIN OTHERWISE SECURE DATA BY CONNING AN INDIVIDUAL INTO REVEALING SECURE INFORMATION
  3. MEASURES TAKEN TO PROTECT A COMPUTER OR COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS OR ATTACK
  4. A SECRET SERIES OF NUMBERS OR LETTERS THAT ALLOWS YOU TO USE A COMPUTER SYSTEM
  5. USUALLY A SMALL SELF-CONTAINED & SELF REPLICATING COMPUTER PROGRAM THAT INVADES COMPUTERS ON A NETWORK AND USUALLY PERFORMS A DESTRUCTIVE ACTION
  6. EMAIL THAT IS NOT WANTED, EMAIL THAT IS SENT TO LARGE NUMBERS OF PEOPLE AND CONSISTS OF MOSTLY ADVERTISING

11 Clues: SOFTWARE DESIGNED TO INTERFERE WITH A COMPUTER'S NORMAL FUNCTIONINGA SECRET SERIES OF NUMBERS OR LETTERS THAT ALLOWS YOU TO USE A COMPUTER SYSTEMCOMPUTER SOFTWARE THAT SECRETLY RECORDS INFORMATION ABOUT THE WAY YOU USE YOUR COMPUTERMEASURES TAKEN TO PROTECT A COMPUTER OR COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS OR ATTACK...

Cybersecurity for Seniors 2025-10-10

Cybersecurity for Seniors crossword puzzle
Across
  1. Be____when sharing credit card information
  2. Do not _____ passwords with anyone
  3. Signifies the protection of important information
  4. Do not ___ the same password
  5. ____ applications you don't use anymore
  6. Means keeping information unchanged and trustworthy
Down
  1. Turn off ____ on all applications
  2. ____ software when available
  3. _____ calls/texts/links from strangers
  4. Availability means making sure computers, websites and ___ are ready to be used
  5. When making an account set good ____

11 Clues: ____ software when availableDo not ___ the same passwordTurn off ____ on all applicationsDo not _____ passwords with anyoneWhen making an account set good _________ calls/texts/links from strangers____ applications you don't use anymoreBe____when sharing credit card informationSignifies the protection of important information...

Vocabulary 2024-10-17

Vocabulary crossword puzzle
Across
  1. For higher cybersecurity, you need a better ... (Passwort).
  2. Most of the times, there is no ... (Zeuge/Zeugin) to cybercrime.
  3. schützen/beschützen
  4. Most crimes involve hacking into the individual's computer to ... (stehlen) credit card information.
  5. Sometimes there is no ... (Beweis) of the cyberattack.
  6. beliebig
  7. The company got ... (gehackt).
  8. Hackers use the internet as their ... (Waffe).
  9. They use information to ... (erpressen) people.
Down
  1. The ... (Opfer) often doesn't recognize hackers as criminals.
  2. Hackers' ... (Verbrechen) are often invisible.
  3. The ... (Verdächtige/r) was probably from the UK.
  4. This ... (illegale) activity is costing the global economy a lot of money.
  5. Schadsoftware
  6. Sicherheit
  7. It sometimes can be really difficult to catch a ... (Kriminelle/r).

16 Clues: beliebigSicherheitSchadsoftwareschützen/beschützenThe company got ... (gehackt).Hackers' ... (Verbrechen) are often invisible.Hackers use the internet as their ... (Waffe).They use information to ... (erpressen) people.The ... (Verdächtige/r) was probably from the UK.Sometimes there is no ... (Beweis) of the cyberattack....

Compliance Newsletter, Vol 1. April 2021 2021-03-26

Compliance Newsletter, Vol 1.  April 2021 crossword puzzle
Across
  1. Covid conference room
  2. Ticker symbol for Apex Clearing Holdings
  3. Outside Brokerage Accounts are required to be disclosed via ________ Compliance Technologies
  4. Sum of money paid by a company to its shareholders
  5. Written ________ Procedures
  6. Protects against the criminal or unauthorized use of electronic data
  7. A Series 4 Exam covers this specific area
  8. Securities ________ Protection Corporation
  9. The acknowledgement of understanding and abidance to policies, procedures or training
  10. ________ Oxley Act of 2002
Down
  1. Being in accordance with established guidelines or regulations
  2. Special Purpose ________ Company
  3. People who have material nonpublic information about a company
  4. The Firm's new Deputy CCO
  5. State where Apex Clearing is based
  6. Know Your ________
  7. Vendor for Firm Element Training
  8. Driving for Uber is an example of an Outside ________ Activity
  9. Handles the licensing and regulation of broker-dealers

19 Clues: Know Your ________Covid conference roomThe Firm's new Deputy CCO________ Oxley Act of 2002Written ________ ProceduresSpecial Purpose ________ CompanyVendor for Firm Element TrainingState where Apex Clearing is basedTicker symbol for Apex Clearing HoldingsA Series 4 Exam covers this specific areaSecurities ________ Protection Corporation...

CSIT - Cybersecurity Vocab 2024-12-02

CSIT - Cybersecurity Vocab crossword puzzle
Across
  1. A person or entity responsible for an event that has been identified as a security incident or as a risk
  2. Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted
  3. Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage
  4. The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data
  5. Data that can be used to identify or contact an individual
  6. A physical or virtual item that contains authentication and/or authorization data, commonly used in multifactor authentication
Down
  1. A number used in conjunction with authentication devices
  2. Scans that allow access to a physical space or program by verifying unique body features
  3. unauthorized use is detected or attempted
  4. Security control that can enforce a virtual boundary based on real-world geography
  5. A basic principle of security stating that a person should be allocated the minimum necessary rights, privileges, or information to perform its role

11 Clues: unauthorized use is detected or attemptedA number used in conjunction with authentication devicesData that can be used to identify or contact an individualSecurity control that can enforce a virtual boundary based on real-world geographyScans that allow access to a physical space or program by verifying unique body features...

Akash Test crossword 2025-03-21

Akash Test crossword crossword puzzle
Across
  1. Protects your data and accounts from unauthorized access
  2. Avoiding practices that harm the environment in tech usage
  3. Giving credit to original creators when using their work
  4. Verifying facts before sharing online information
  5. Avoiding the use of pirated software
  6. Ensuring websites are trustworthy before sharing personal data
  7. A harmful program that can damage your computer
Down
  1. Abiding by rules and regulations online
  2. Keeping your information secret online
  3. To act thoughtfully when posting or commenting online
  4. Using strong passwords and two-factor authentication

11 Clues: Avoiding the use of pirated softwareKeeping your information secret onlineAbiding by rules and regulations onlineA harmful program that can damage your computerVerifying facts before sharing online informationUsing strong passwords and two-factor authenticationTo act thoughtfully when posting or commenting online...

Let's Play OPS 2025-12-01

Let's Play OPS crossword puzzle
Across
  1. Unauthorized access gained by cracking credentials
  2. Attack where shipment or order details are altered secretly
  3. Encrypted communication protocol used between supply chain systems
  4. Event where warehouse operations halt due to corrupted systems
  5. Malicious entry inserted through software updates
  6. Weakest digital point that can collapse a multi-partner network
  7. Fraud where attackers pose as legitimate suppliers
Down
  1. Practice of verifying every transaction or shared data
  2. Undetected extraction of sensitive commercial data
  3. Technique that overwhelms logistics systems with fake traffic
  4. Process of assessing supplier cybersecurity capability

11 Clues: Malicious entry inserted through software updatesUnauthorized access gained by cracking credentialsUndetected extraction of sensitive commercial dataFraud where attackers pose as legitimate suppliersPractice of verifying every transaction or shared dataProcess of assessing supplier cybersecurity capability...

Northwood and NUIAS 2024-10-02

Northwood and NUIAS crossword puzzle
Across
  1. Built Tough
  2. Who runs the Auto Show?
  3. What is the name of the Automotive Roundtable at 9 am on October 5th?
  4. The protection of computers and computer systems
  5. What number is this year's Auto Show?
  6. Ford's newest active driving assistance system
  7. The collection of multi-million dollar hypercars
Down
  1. America's _____ University
  2. What is both a degree at Northwood and a section of the Auto Show
  3. Liberty and ____ for all
  4. What does the "I" in NUIAS stand for
  5. What does the "M" in CAMS stand for?

12 Clues: Built ToughWho runs the Auto Show?Liberty and ____ for allAmerica's _____ UniversityWhat does the "I" in NUIAS stand forWhat does the "M" in CAMS stand for?What number is this year's Auto Show?Ford's newest active driving assistance systemThe protection of computers and computer systemsThe collection of multi-million dollar hypercars...

IT Networking & Cybersecurity 2025-03-27

IT Networking & Cybersecurity crossword puzzle
Across
  1. Connects multiple local networks
  2. Personal small device network
  3. Defines data transmission rules
  4. Central hub connects devices
  5. Single central network cable
Down
  1. Mix of multiple topologies
  2. Devices form a closed loop
  3. Nodes interconnect with redundancy
  4. Splits, checks, and reassembles data
  5. Large, wide-area network
  6. Small local network area

11 Clues: Large, wide-area networkSmall local network areaMix of multiple topologiesDevices form a closed loopCentral hub connects devicesSingle central network cablePersonal small device networkDefines data transmission rulesConnects multiple local networksNodes interconnect with redundancySplits, checks, and reassembles data

Test Yourself! 2025-06-24

Test Yourself! crossword puzzle
Across
  1. Unauthorized access to systems or data
  2. Malicious software designed to harm or exploit systems
  3. A fake website or link used to trick people
  4. messages distributed by electronic means
  5. Secret sequence of characters used for safety purposes
  6. Program that appears useful but is harmful
  7. File extension often used for dangerous attachments
Down
  1. A flaw or gap in software security
  2. Practice of protecting systems, networks, and programs
  3. Type of scam that tricks users via fake emails
  4. Type of attack where users are locked out unless they pay
  5. Common malware that replicates through a network

12 Clues: A flaw or gap in software securityUnauthorized access to systems or datamessages distributed by electronic meansProgram that appears useful but is harmfulA fake website or link used to trick peopleType of scam that tricks users via fake emailsCommon malware that replicates through a networkFile extension often used for dangerous attachments...

Build with AI Bamenda 2025 2025-05-03

Build with AI Bamenda 2025 crossword puzzle
Across
  1. Platform for data science competitions and hosting datasets
  2. Unit of a neural network
  3. Hardware accelerator for speeding up AI computations
  4. Text-to-image model developed by Google DeepMind
  5. Model error due to excessive complexity
  6. Protection of digital systems and data
  7. Platform for collaborative coding and machine learning
  8. Google's AI research organization
  9. AI chatbot developed by Google DeepMind
Down
  1. Collection of data for training AI models
  2. Decentralized and secure data storage
  3. Open-source ML framework used on Google Cloud
  4. Notebook Interactive coding environment
  5. Proportion of correct predictions made by a model
  6. Method for solving a problem
  7. Google infrastructure for scalable AI computing
  8. AI Platform for building and deploying ML models on Google Cloud

17 Clues: Unit of a neural networkMethod for solving a problemGoogle's AI research organizationDecentralized and secure data storageProtection of digital systems and dataNotebook Interactive coding environmentModel error due to excessive complexityAI chatbot developed by Google DeepMindCollection of data for training AI models...

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
  2. Entries due NLT 10/23
  3. Do your Part.#BeCyberSmart
  4. Quality Management Principles
Down
  1. Entries due NLT 11/2
  2. Test Monthly
  3. Home of the 14th Flying Training Wing of Air Education and Training Command
  4. By David C. Graham

8 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartQuality Management PrinciplesHome of the 14th Flying Training Wing of Air Education and Training CommandTo be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees

Cybersecurity Crossword Puzzle 2025-04-29

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. part of the CIA triad that ensures no unauthorized access to sensitive data
  2. a deceptive technique where someone pretends to be from another source or entity to gain trust, access, or information
  3. A type of malware that propagates across a network without the help of a user
  4. denial of _________
  5. a wireless hijacking attack involving a rogue access point
  6. part of the CIA triad that ensures access to data is readily available
Down
  1. a type of social engineering where attackers send fraudulent messages in an attempt to trick the user into giving them information
  2. a type of malware that blocks user access to a machine or data until they pay a large fee to the attacker
  3. man in the ________
  4. part of the CIA triad that ensures accuracy and trustworthiness of data
  5. malware that disguises itself as a harmless program

11 Clues: man in the ________denial of _________malware that disguises itself as a harmless programa wireless hijacking attack involving a rogue access pointpart of the CIA triad that ensures access to data is readily availablepart of the CIA triad that ensures accuracy and trustworthiness of data...

DigitalGuard: Protecting Your Online Footprint 2023-09-18

DigitalGuard: Protecting Your Online Footprint crossword puzzle
Across
  1. You need this to unlock your online world securely
  2. Doing the right thing in the digital world
  3. Defending against online threats
  4. Platforms like Facebook and Twitter for online networking
  5. Online harassment that hurts.
Down
  1. Protecting your personal space in the digital realm
  2. The process of converting data into a secret code
  3. Fraudulent attempts to obtain sensitive information
  4. Your online trail of likes, posts, and searches
  5. -An extra layer of security for online accounts

10 Clues: Online harassment that hurts.Defending against online threatsDoing the right thing in the digital worldYour online trail of likes, posts, and searches-An extra layer of security for online accountsThe process of converting data into a secret codeYou need this to unlock your online world securelyProtecting your personal space in the digital realm...

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Licensed amateur radio operator
  2. Entries due NLT 11/2
  3. Test Monthly
  4. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 10/23
  2. By David C. Graham
  3. _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  4. Chad's Favorite sports team?
  5. Do your Part.#BeCyberSmart
  6. Home of the 14th Flying Training Wing of Air Education and Training Command

10 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training Command_____Satisfaction should also be measured and monitored to insure all needs and expectations are met....

CyberFun 2024-03-18

CyberFun crossword puzzle
Across
  1. Keeping personal information safe from unauthorized access
  2. A protective barrier for your computer or network
  3. Unwanted and unsolicited emails
  4. An attempt to damage or disrupt computer systems
  5. A system of interconnected computers
  6. Measures taken to protect computer systems from theft or damage
Down
  1. A harmful software that can damage your computer
  2. A secret code to access your accounts online
  3. I want to _____ my GF/BF account
  4. Illegal activities conducted using the internet

10 Clues: Unwanted and unsolicited emailsI want to _____ my GF/BF accountA system of interconnected computersA secret code to access your accounts onlineIllegal activities conducted using the internetA harmful software that can damage your computerAn attempt to damage or disrupt computer systemsA protective barrier for your computer or network...

Career Cluster Quiz 2025-05-30

Career Cluster Quiz crossword puzzle
Across
  1. includes jobs like professors and teachers
  2. includes jobs where people help design and create buildings
  3. includes jobs like factory workers and machine operators
  4. includes jobs like CEOS and managers
  5. includes jobs like hotel managers and tour guides
Down
  1. includes jobs like farmers and food scientists
  2. includes jobs like doctors and nurses
  3. includes jobs in advertising and social media
  4. includes jobs in cybersecurity and software engineering
  5. includes jobs in science, technology, engineering, and mathematics

10 Clues: includes jobs like CEOS and managersincludes jobs like doctors and nursesincludes jobs like professors and teachersincludes jobs in advertising and social mediaincludes jobs like farmers and food scientistsincludes jobs like hotel managers and tour guidesincludes jobs in cybersecurity and software engineering...

BYTETRAIL 16 2025-02-25

BYTETRAIL 16 crossword puzzle
Across
  1. Protocol for transferring files over the internet
  2. Protecting systems from unauthorized access
  3. Secures data by converting it into a coded form
  4. Small data stored on a user’s computer by a website
  5. Logical division of a drive
Down
  1. A type of scam email designed to steal user data
  2. Wireless technology for local area networking
  3. Temporary storage for faster access
  4. A device or point in a network
  5. Software that manages hardware and software resources

10 Clues: Logical division of a driveA device or point in a networkTemporary storage for faster accessProtecting systems from unauthorized accessWireless technology for local area networkingSecures data by converting it into a coded formA type of scam email designed to steal user dataProtocol for transferring files over the internet...

BYTETRAIL 16 2025-02-25

BYTETRAIL 16 crossword puzzle
Across
  1. Protocol for transferring files over the internet
  2. Protecting systems from unauthorized access
  3. Secures data by converting it into a coded form
  4. Small data stored on a user’s computer by a website
  5. Logical division of a drive
Down
  1. A type of scam email designed to steal user data
  2. Wireless technology for local area networking
  3. Temporary storage for faster access
  4. A device or point in a network
  5. Software that manages hardware and software resources

10 Clues: Logical division of a driveA device or point in a networkTemporary storage for faster accessProtecting systems from unauthorized accessWireless technology for local area networkingSecures data by converting it into a coded formA type of scam email designed to steal user dataProtocol for transferring files over the internet...

Application of Boosting And Ensemble Learning 2025-10-31

Application of Boosting And Ensemble Learning crossword puzzle
Across
  1. Detects anomalies or intrusions in networks
  2. Used in suggesting products or movies on platforms
  3. General purpose of using ensemble models
  4. Applied in detecting diseases in the medical field
  5. Helps in predicting stock prices or sales trends
  6. Used for improving decision-making processes
Down
  1. Applied in dividing images into meaningful regions
  2. Used in image and speech recognition tasks
  3. Used in identifying spam or fraudulent activities
  4. Common application in sorting data into categories

10 Clues: General purpose of using ensemble modelsUsed in image and speech recognition tasksDetects anomalies or intrusions in networksUsed for improving decision-making processesHelps in predicting stock prices or sales trendsUsed in identifying spam or fraudulent activitiesApplied in dividing images into meaningful regions...

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Chad's Favorite sports team?
  2. _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  3. Test Monthly
  4. Do your Part.#BeCyberSmart
  5. Entries due NLT 10/23
  6. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 11/2
  2. By David C. Graham
  3. Home of the 14th Flying Training Wing of Air Education and Training Command
  4. Licensed amateur radio operator

10 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training Command_____Satisfaction should also be measured and monitored to insure all needs and expectations are met....

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Chad's Favorite sports team?
  2. _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  3. Test Monthly
  4. Do your Part.#BeCyberSmart
  5. Entries due NLT 10/23
  6. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 11/2
  2. By David C. Graham
  3. Home of the 14th Flying Training Wing of Air Education and Training Command
  4. Licensed amateur radio operator

10 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training Command_____Satisfaction should also be measured and monitored to insure all needs and expectations are met....

Legal terminology 2019-11-19

Legal terminology crossword puzzle
Across
  1. Electronic currency.
  2. Check the safety on the internet.
  3. People with good computer knowledge and skills.
  4. A variety of data that is rapidly increasing.
  5. Computer systems, programs and data are free from threats.
  6. reality This project is the technology between reality and the virtual world.
Down
  1. Use of electronic devices to destroy, change, or steal information.
  2. Bullying and Malignant, Insulting.
  3. User avatar in a virtual world or game.
  4. Scam through the internet

10 Clues: Electronic currency.Scam through the internetCheck the safety on the internet.Bullying and Malignant, Insulting.User avatar in a virtual world or game.A variety of data that is rapidly increasing.People with good computer knowledge and skills.Computer systems, programs and data are free from threats....

Montreat College 2023-05-24

Montreat College crossword puzzle
Across
  1. What is it's school colors?
  2. What sport am I going to this college for?
  3. What is our Mascot?
  4. What is the mascots name?
  5. What is the name of Montreats honors college?
Down
  1. Which famous preacher was married in the chapel on campus?
  2. This major has been gaining a lot of popularity at Montreat.
  3. Where is Montreat Located?
  4. What popular American sport is not offered here?
  5. What is the name of Montreats popular lake?

10 Clues: What is our Mascot?What is the mascots name?Where is Montreat Located?What is it's school colors?What sport am I going to this college for?What is the name of Montreats popular lake?What is the name of Montreats honors college?What popular American sport is not offered here?Which famous preacher was married in the chapel on campus?...

General Knowledge 2025-04-16

General Knowledge crossword puzzle
Across
  1. Doctors for animals
  2. A word that can be read the same in both directions
  3. Which type of company is CrowdStrike?
  4. Missile man of India
Down
  1. Char Minar is located in which city?
  2. By which process does the excess water in plants get released?
  3. Current Home Minister of India
  4. Which country was the primary target of Trump's tariff war?
  5. Ornithology is the scientific study of?
  6. What is the term lunar related to?

10 Clues: Doctors for animalsMissile man of IndiaCurrent Home Minister of IndiaWhat is the term lunar related to?Char Minar is located in which city?Which type of company is CrowdStrike?Ornithology is the scientific study of?A word that can be read the same in both directionsWhich country was the primary target of Trump's tariff war?...

C4i4's Connect Crossword 2025-07-02

C4i4's Connect Crossword crossword puzzle
Across
  1. Future-focused maintenance strategy to reduce downtime
  2. Country widely credited for pioneering Industry 4.0.
  3. Actionable digital layer applied on physical systems.
  4. Data-driven insight method used in business intelligence.
  5. Smart factory enabler that reduces human intervention
Down
  1. Backbone technology for protecting digital infrastructure
  2. Converting analog processes to digital formats.
  3. Real-time sensor-based technology for tracking machinery performance.
  4. Seamless transfer of information across systems.
  5. Centralized location where digital info is kept safely.

10 Clues: Converting analog processes to digital formats.Seamless transfer of information across systems.Country widely credited for pioneering Industry 4.0.Actionable digital layer applied on physical systems.Smart factory enabler that reduces human interventionFuture-focused maintenance strategy to reduce downtime...

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Licensed amateur radio operator
  2. Entries due NLT 11/2
  3. Test Monthly
  4. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 10/23
  2. By David C. Graham
  3. Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  4. Chad's Favorite sports team?
  5. Do your Part.#BeCyberSmart
  6. Home of the 14th Flying Training Wing of Air Education and Training Command

10 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training CommandSatisfaction should also be measured and monitored to insure all needs and expectations are met....

cyber security 2022-05-05

cyber security crossword puzzle
Across
  1. a type of malware that modifies information on a computer
  2. virtual private network
  3. distributed denial of service
  4. someone who enters a technological divice illegaly
  5. attacker uses malici=ous codes to take the victims information
  6. a type of software allowing an attacker to take over a computer
Down
  1. set of programs that allow a computer to perform the task
  2. a technique allowing the hacker to imporsonate
  3. protection of technological devices
  4. malicious softwares

10 Clues: malicious softwaresvirtual private networkdistributed denial of serviceprotection of technological devicesa technique allowing the hacker to imporsonatesomeone who enters a technological divice illegalya type of malware that modifies information on a computerset of programs that allow a computer to perform the task...

Technology 2023-07-06

Technology crossword puzzle
Across
  1. Identification used by a person with access to a computer
  2. Another word for the top-notch support that we provide our users.
  3. A smaller computer that runs on ChromeOS
  4. A systematic approach to solving a problem
  5. What kids use to spell bad words
  6. A person that is learning
Down
  1. Sound
  2. Enables storing data and files on the internet
  3. The practice of protecting systems and networks from digital attacks
  4. Intelligence demonstrated by computers

10 Clues: SoundA person that is learningWhat kids use to spell bad wordsIntelligence demonstrated by computersA smaller computer that runs on ChromeOSA systematic approach to solving a problemEnables storing data and files on the internetIdentification used by a person with access to a computerAnother word for the top-notch support that we provide our users....

byte trails 3 2025-03-05

byte trails 3 crossword puzzle
Across
  1. Protocol for transferring files over the internet
  2. Protecting systems from unauthorized access
  3. Secures data by converting it into a coded form
  4. Small data stored on a user’s computer by a website
  5. Logical division of a drive
Down
  1. A type of scam email designed to steal user data
  2. Wireless technology for local area networking
  3. Temporary storage for faster access
  4. A device or point in a network
  5. Software that manages hardware and software resources

10 Clues: Logical division of a driveA device or point in a networkTemporary storage for faster accessProtecting systems from unauthorized accessWireless technology for local area networkingSecures data by converting it into a coded formA type of scam email designed to steal user dataProtocol for transferring files over the internet...

Computer Science 2025-05-15

Computer Science crossword puzzle
Across
  1. A place to store files and data
  2. The part of the computer you can touch
  3. A language used to write computer programs
  4. A list of instructions for a computer to follow
  5. A mistake in a program
Down
  1. Protecting information from unauthorized access
  2. Repeating a set of actions
  3. A symbol or name that stores data in a program
  4. An action or information given to a computer
  5. The result produced by a computer

10 Clues: A mistake in a programRepeating a set of actionsA place to store files and dataThe result produced by a computerThe part of the computer you can touchA language used to write computer programsAn action or information given to a computerA symbol or name that stores data in a programProtecting information from unauthorized access...