cybersecurity Crossword Puzzles

Digital Communications 2025-05-08

Digital Communications crossword puzzle
Across
  1. Procedures used to protect data from unauthorised access
  2. A very obvious password
  3. Act of spies hacking or infiltrating internet systems
  4. Attackers impersonate legitimate entities, often through emails or fake websites
  5. The first form of the Internet
Down
  1. Set of 8 characters either 0's or 1's
  2. Small bundles of data
  3. Malicious software
  4. Common web search engine

9 Clues: Malicious softwareSmall bundles of dataA very obvious passwordCommon web search engineThe first form of the InternetSet of 8 characters either 0's or 1'sAct of spies hacking or infiltrating internet systemsProcedures used to protect data from unauthorised accessAttackers impersonate legitimate entities, often through emails or fake websites

CYSIAM Crossword 2025-08-11

CYSIAM Crossword crossword puzzle
Across
  1. Encrypted communication channel (abbreviation)
  2. A secret word or phrase used to gain access
  3. A network of infected devices
  4. A program that replicates itself and spreads
  5. A scam where attackers trick users into giving up
  6. The practice of protecting systems and data
Down
  1. Code flaw that can be exploited
  2. Type of attack where services are overwhelmed(abbreviation
  3. Malicious software

9 Clues: Malicious softwareA network of infected devicesCode flaw that can be exploitedA secret word or phrase used to gain accessThe practice of protecting systems and dataA program that replicates itself and spreadsEncrypted communication channel (abbreviation)A scam where attackers trick users into giving up...

You can fight back against cyberattacks - Facetime 2022-03-07

You can fight back against cyberattacks - Facetime crossword puzzle
Across
  1. Short-lived fault in a system.
  2. Defect in a system's design
  3. A way to correct issues in devices.
  4. The service that was impacted by the issue
  5. The entity who makes something
Down
  1. A gap, break or a hole in something
  2. Be able to keep your personal info private
  3. Ways of protecting informatic systems
  4. To respond to a knock or ring
  5. Biggest tech company in the world

10 Clues: Defect in a system's designTo respond to a knock or ringShort-lived fault in a system.The entity who makes somethingBiggest tech company in the worldA gap, break or a hole in somethingA way to correct issues in devices.Ways of protecting informatic systemsBe able to keep your personal info privateThe service that was impacted by the issue

AI in business 2023-11-20

AI in business crossword puzzle
Across
  1. organizational entity or an individual engaged in commercial, industrial, or professional activities
  2. How many jobs will be created by AI
  3. biggest AI software
  4. simulation of human intelligence processes by computer inteligence
  5. Person that created ChatGpt
  6. AI-driven data insights for decision-making
Down
  1. AI technique predicting future outcomes
  2. AI application automating tasks
  3. refers to the application of scientific knowledge for practical purposes.
  4. AI application enhancing cybersecurity

10 Clues: biggest AI softwarePerson that created ChatGptAI application automating tasksHow many jobs will be created by AIAI application enhancing cybersecurityAI technique predicting future outcomesAI-driven data insights for decision-makingsimulation of human intelligence processes by computer inteligence...

sdaia crossword 2024-10-31

sdaia crossword crossword puzzle
Across
  1. Safeguarding personal information
  2. Collections of data
  3. Protecting digital information and systems
  4. An AI and art collaboration challenge
Down
  1. A city that uses technology to improve quality of life
  2. Competition encouraging open data innovation
  3. A special coworker we will miss!
  4. A strategic framework for Saudi Arabia's economic diversification
  5. First Saudi summit for global data and AI experts
  6. SDAIA's mission includes harnessing this technology to drive progress

10 Clues: Collections of dataA special coworker we will miss!Safeguarding personal informationAn AI and art collaboration challengeProtecting digital information and systemsCompetition encouraging open data innovationFirst Saudi summit for global data and AI expertsA city that uses technology to improve quality of life...

Vanessa & Jinsik <3 2024-10-24

Vanessa & Jinsik <3 crossword puzzle
Across
  1. What does Jinsik do for work?
  2. Where did Jinsik propose at?
  3. Where do Vanessa and Jinsik live?
  4. four How old is Vanessa?
  5. How many kids do Vanessa and Jinsik want?
Down
  1. How did Vanessa and Jinsik meet?
  2. What does Vanessa do for work?
  3. How old is Jinsik?
  4. How many people are in the wedding party?
  5. Where are Vanessa and Jinsik going for their honeymoon?
  6. What holiday were Vanessa and Jinsik celebrating when they met?

11 Clues: How old is Jinsik?four How old is Vanessa?Where did Jinsik propose at?What does Jinsik do for work?What does Vanessa do for work?How did Vanessa and Jinsik meet?Where do Vanessa and Jinsik live?How many people are in the wedding party?How many kids do Vanessa and Jinsik want?Where are Vanessa and Jinsik going for their honeymoon?...

Cybersecurity & Data Protection 2022-11-16

Cybersecurity & Data Protection crossword puzzle
Across
  1. One of the acronyms in the data breach response plan CARE framework.
  2. I am one possible cause of a data breach
  3. It is phising with text messages
  4. Stop and think before you download
  5. I identify, assess and address personal data protection risks specific to SCC.
  6. I run like scam ads
  7. I process personal data on behalf of SCC
Down
  1. These should not be left around the office
  2. Do this over email links to display URL
  3. A malicious software. You cannot access your files unless you pay a ransom
  4. I file incident reports to PDPC if necessary.
  5. Who you gonna call when a data breach is suspected or confirmed?

12 Clues: I run like scam adsIt is phising with text messagesStop and think before you downloadDo this over email links to display URLI am one possible cause of a data breachI process personal data on behalf of SCCThese should not be left around the officeI file incident reports to PDPC if necessary....

CyberSecurity Awareness 2021 2021-10-15

CyberSecurity Awareness 2021 crossword puzzle
Across
  1. the art of manipulating, influencing or deceiving you in order to gain control over your computer system.
  2. considered one or the best places to work
  3. subject matter of the most clicked on email from our 11/14/21 phish campaign
  4. October is Awareness Month for this
  5. disruptive, unsolicited messages (such as emails, text messages, or Internet postings) especially commercial messages, sent to a large number of recipients or posted in a large number of places.
  6. a method used by social engineers to gain access to a building or other protected area.
  7. 123456 and MyDOB01012010 are examples of what kind of Password?
Down
  1. the process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity.
  2. subject matter of the most clicked on email from our 11/07/21 phish campaign
  3. misspelled words and a sense of urgency for you to take a questionable action an email, are be considered to be recognizable what?
  4. type of phishing that is a small, focused, targeted attack via email on a particular person or organization with the goal to penetrate their defenses.
  5. MyCowRanAwayToTheMoon is an example of a

12 Clues: October is Awareness Month for thisMyCowRanAwayToTheMoon is an example of aconsidered one or the best places to work123456 and MyDOB01012010 are examples of what kind of Password?subject matter of the most clicked on email from our 11/07/21 phish campaignsubject matter of the most clicked on email from our 11/14/21 phish campaign...

Cybersecurity Awareness Crossword 2025-08-27

Cybersecurity Awareness Crossword crossword puzzle
Across
  1. general cybersecurity practices
  2. malicious software
  3. malicious software that locks your files until a demanded payment is made
  4. proves that someone is who they say they are
  5. malicious email, generally attempts to get you to click a link or download a malicious file
Down
  1. a software update
  2. an mfa type that is related to something unique to you; ie- fingerprint, facial recognition, etc.
  3. "___ Trust"; a model where no one is trusted by default
  4. uses more than one type of authentication to verify a user identity
  5. stored in your browser to track users across websites and remember preferences; "Third-Party ___ "
  6. when unauthorized access to data or a system is made (hacked)
  7. global network (web) of computers that are connected and can share information with each other

12 Clues: a software updatemalicious softwaregeneral cybersecurity practicesproves that someone is who they say they are"___ Trust"; a model where no one is trusted by defaultwhen unauthorized access to data or a system is made (hacked)uses more than one type of authentication to verify a user identity...

Crossword 1 2023-11-24

Crossword 1 crossword puzzle
Across
  1. What does the middle 'w' stand for in www.?
  2. A record of your details
  3. A complex code used to gain access
  4. A computer for your lap
  5. A small book to record your thoughts and secrets
  6. Protecting your computer systems and information from harm
  7. What allows you to write digital letters?
Down
  1. Lightweight portable speakers for your head
  2. Small mammal often chased by cats
  3. A device used for observing, checking, or keeping a continuous record of something
  4. A string of metal
  5. A collection of information

12 Clues: A string of metalA computer for your lapA record of your detailsA collection of informationSmall mammal often chased by catsA complex code used to gain accessWhat allows you to write digital letters?Lightweight portable speakers for your headWhat does the middle 'w' stand for in www.?A small book to record your thoughts and secrets...

Digital Strategy 2025-11-03

Digital Strategy crossword puzzle
Across
  1. predicting future demand for products
  2. software for managing business processes.
  3. Raw facts and figures used for analytics
  4. the process of sourcing and purchasing goods or services.
  5. monitoring the movement of goods.
  6. operating on an international scale
Down
  1. Network of suppliers, manufacturers and costumers
  2. Protecting systems and data from cyber threats
  3. Technology enabling remote access to computing resources
  4. a measurable value to evaluate performance.
  5. Automated tool that interacts with users via text or voice
  6. Step-by-step procedure for solving a problem

12 Clues: monitoring the movement of goods.operating on an international scalepredicting future demand for productsRaw facts and figures used for analyticssoftware for managing business processes.a measurable value to evaluate performance.Step-by-step procedure for solving a problemProtecting systems and data from cyber threats...

mari 2024-05-20

mari crossword puzzle
Across
  1. a decentralized digital currency
  2. the application of conceptual knowledge for
  3. a wide range of criminal activity that are
  4. providing the appearance of smth without reality
  5. practice and study of techniques for secure
  6. the process of writing computer software code
Down
  1. study and experimentation of algorithmic process
  2. a public distributed ledger of lists of records
  3. protection of computer systems and networks
  4. collection of accounts in which accounting
  5. a potential for vulnerabilities to turn into
  6. a digital currency designated to work as
  7. a device that can make and receive calls over
  8. the minimum amount of any physical entity involved
  9. the opposite of natural

15 Clues: the opposite of naturala decentralized digital currencya digital currency designated to work ascollection of accounts in which accountinga wide range of criminal activity that areprotection of computer systems and networksthe application of conceptual knowledge forpractice and study of techniques for secure...

Cyber Security 2016-05-24

Cyber Security crossword puzzle
Across
  1. What are we here for?
  2. virtual private network
  3. email that has no meaning
  4. strong authenticater for access
Down
  1. Steals data and holds it for ransom
  2. pesky thing that goofs up my computer
  3. What is my name?

7 Clues: What is my name?What are we here for?virtual private networkemail that has no meaningstrong authenticater for accessSteals data and holds it for ransompesky thing that goofs up my computer

Cybersecurity Awareness Month - Crossword 1 - Easy - Cybersecurity 2025-08-25

Cybersecurity Awareness Month - Crossword 1 - Easy - Cybersecurity crossword puzzle
Across
  1. The practice of protecting computers and networks from digital threats like hackers and viruses.
  2. Harmful software designed to damage or disrupt systems
  3. Unwanted or junk email messages
  4. Someone who breaks into computer systems, often illegally
  5. A secret string used to verify identity
  6. A scam where attackers trick you into giving up personal info via fake emails
Down
  1. Cyber Security Awareness Month is observed in ---?
  2. A type of malware disguised as a legitimate program
  3. A digital barrier that blocks unauthorized access to a network
  4. Software that detects and removes viruses and other malwares
  5. The name you use to log into a computer or website account.
  6. A copy of your data saved in case something goes wrong

12 Clues: Unwanted or junk email messagesA secret string used to verify identityCyber Security Awareness Month is observed in ---?A type of malware disguised as a legitimate programHarmful software designed to damage or disrupt systemsA copy of your data saved in case something goes wrongSomeone who breaks into computer systems, often illegally...

TNEG: Cybersecurity for Notaries - Notary Cybersecurity Essentials 2026-02-16

TNEG: Cybersecurity for Notaries - Notary Cybersecurity Essentials crossword puzzle
Across
  1. A secret string used to access your devices or accounts.
  2. Remote Online Notarization (abbreviation).
  3. A copy of important files stored for recovery.
  4. A fraudulent email attempt to steal sensitive information.
  5. Information that must be kept private and secure.
  6. Harmful software designed to damage or access systems.
  7. An added layer of login protection beyond a password.
Down
  1. A secure connection used when working remotely.
  2. Unauthorized access to sensitive data.
  3. The process of verifying identity before granting access.
  4. A software or hardware barrier that protects your network.
  5. A security method that scrambles data to protect it from unauthorized access.

12 Clues: Unauthorized access to sensitive data.Remote Online Notarization (abbreviation).A copy of important files stored for recovery.A secure connection used when working remotely.Information that must be kept private and secure.An added layer of login protection beyond a password.Harmful software designed to damage or access systems....

Crossword Puzzle 2023-11-14

Crossword Puzzle crossword puzzle
Across
  1. Malicious software designed to gain access to your devices
  2. The process of verifying the identity of a user or device before granting access to systems and data
  3. A crucial cybersecurity practice involving making copies of data to prevent loss in case of a ransomware attack
  4. In the context of supply chain attacks, this is a critical factor between partners that can be exploited by cybercriminals to infiltrate networks
  5. A tactic used in AI-assisted attacks where attackers mimic a trusted entity to deceive victims, often through sophisticated methods
  6. A cybersecurity threat that could be exploited to gain unauthorized access or cause harm by targeting less-secure elements in the supply network
Down
  1. A type of security measure that uses unique physical characteristics for user identification
  2. A fundamental principle in data privacy, requiring explicit permission before collecting, using, or sharing personal information
  3. A common tactic used in social engineering where the attacker creates a sense of immediate action to bypass rational decision-making
  4. A type of AI technology used in sophisticated cyberattacks, involving learning from data to improve over time
  5. An incident where personal or confidential information is accessed or disclosed without authorization, requiring immediate response and remediation
  6. A deceptive attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication

12 Clues: Malicious software designed to gain access to your devicesA type of security measure that uses unique physical characteristics for user identificationThe process of verifying the identity of a user or device before granting access to systems and data...

Intricacy 2022-11-22

Intricacy crossword puzzle
Across
  1. Mark
  2. Course which CMR NPS doesn't provide but CMR PU does
  3. Without this no computer would exist
  4. Nanobots assemble
  5. You do not fart in apple store because there are no _______
  6. Method of communication
  7. Present continuous tense of a device
  8. _______ explorer
  9. Of no use without a physical interface
  10. _______ assistant or Facebook Meta
Down
  1. Nanobots are from which category
  2. Reduces manforce
  3. Norbert Wiener: "the study of control and communication in the animal and the machine"
  4. Base of every project
  5. The computer isn't working, it's likely a system _______
  6. You do not want this on your device
  7. e-storage
  8. Firewall is a type of _______
  9. The creation of the Mars Rover falls mainly under which field?
  10. The bane of every iOS user

20 Clues: Marke-storageReduces manforce_______ explorerNanobots assembleBase of every projectMethod of communicationThe bane of every iOS userFirewall is a type of _______Nanobots are from which category_______ assistant or Facebook MetaYou do not want this on your deviceWithout this no computer would existPresent continuous tense of a device...

DAMPAK SOSIAL INFORMATIKA DAN JARINGAN KOMPUTER INTERNET 2025-11-14

DAMPAK SOSIAL INFORMATIKA DAN JARINGAN KOMPUTER INTERNET crossword puzzle
Across
  1. Media yang digunakan untuk berinteraksi secara online
  2. Teknologi yang memungkinkan penyimpanan data secara online
  3. Keamanan data di internet
  4. Jaringan komputer terbesar di dunia
  5. Informasi palsu yang disebarkan melalui media digital
  6. Penyebaran informasi yang sangat cepat melalui internet
  7. Dampak negatif internet berupa pengurangan interaksi langsun
  8. Kegiatan mengawasi aktivitas orang melalui dunia maya
  9. Program jahat yang dapat merusak sistem komputer
  10. Tindakan mencuri data melalui jaringan komputer
Down
  1. Kecanduan bermain game online
  2. Transaksi jual beli melalui internet
  3. Komunikasi jarak jauh menggunakan video
  4. Aktivitas membeli dan membayar melalui aplikasi
  5. Kegiatan belajar menggunakan jaringan internet
  6. Ruang penyimpanan yang digunakan untuk berbagi file
  7. Komentar kasar atau menyerang di dunia maya
  8. Dampak positif internet pada komunikasi
  9. Penyakit yang muncul akibat terlalu lama menatap layar
  10. Kemampuan bekerja dari jarak jauh melalui internet

20 Clues: Keamanan data di internetKecanduan bermain game onlineJaringan komputer terbesar di duniaTransaksi jual beli melalui internetKomunikasi jarak jauh menggunakan videoDampak positif internet pada komunikasiKomentar kasar atau menyerang di dunia mayaKegiatan belajar menggunakan jaringan internetAktivitas membeli dan membayar melalui aplikasi...

FITCVocab.jd 2013-05-15

FITCVocab.jd crossword puzzle
Across
  1. internet service provided
  2. it delivers internet to computers
  3. no wires
  4. protects your computer
  5. you find engines
  6. like this that do are not part of the computer ex. printer,mouse
  7. a display for computer/screen
  8. using good behaviors on computer
  9. lets you have wirless
  10. a output device that is there to click things on computer
  11. being safe on the internet
Down
  1. designed to find info ex. google
  2. something that plugs into a computer ex. printer, mouse
  3. who is contacting
  4. a mini computer that ca you can play on and look things up
  5. controls computer main contol
  6. the lights that make up the screen
  7. ramdom access memory
  8. central processing unit
  9. download put in computer

20 Clues: no wiresyou find engineswho is contactingramdom access memorylets you have wirlessprotects your computercentral processing unitdownload put in computerinternet service providedbeing safe on the internetcontrols computer main contola display for computer/screendesigned to find info ex. googleusing good behaviors on computer...

Harryclyde 2023-01-02

Harryclyde crossword puzzle
Across
  1. How many true friends
  2. Second high school
  3. British part of my name
  4. first time I almost died
  5. Where was I born
  6. College major
  7. first city we moved to in the US
  8. sport I played in high school
  9. a place I really want to visit
  10. how old was I when I migrated to the US
  11. allergies
  12. love language
  13. 17% of Cameroon
  14. I love your
Down
  1. First high school
  2. another time I almost died (told you this)
  3. 83% of cameroon
  4. Catch me exploring in
  5. type of movies I like
  6. Personality type.
  7. nick name for for the baby
  8. French part of my name
  9. we both like this movie
  10. The baby’s name
  11. favorite animal
  12. Region what region I was raised

26 Clues: allergiesI love yourCollege majorlove language83% of cameroonThe baby’s namefavorite animal17% of CameroonWhere was I bornFirst high schoolPersonality type.Second high schoolCatch me exploring inHow many true friendstype of movies I likeFrench part of my namewe both like this movieBritish part of my namefirst time I almost died...

lushi and john 2025-02-22

lushi and john crossword puzzle
Across
  1. Who is older between them
  2. First international trip destination
  3. Month of dating anniversary
  4. First date restaurant
  5. Favorite shared activity
  6. Total countries visited together
  7. John’s middle name
  8. Color of John’s eyes
  9. Place where John proposed
  10. John’s go-to drink
  11. Lushi’s favorite cuisine
  12. Total number of their dogs
  13. Name of their corgi
  14. Lushi’s favorite dessert
  15. Lushi’s favorite holiday
  16. John’s favorite music band
  17. John’s favorite food
  18. Month of their engagement
Down
  1. Lushi’s favorite snack to make
  2. Lushi’s favorite time of year
  3. City they live in
  4. John’s work industry
  5. Lushi’s favorite color
  6. John’s hometown
  7. Their dream honeymoon destination
  8. University John attended
  9. Lushi’s favorite board game
  10. City where they met
  11. John’s favorite video game

29 Clues: John’s hometownCity they live inJohn’s middle nameJohn’s go-to drinkName of their corgiCity where they metJohn’s work industryColor of John’s eyesJohn’s favorite foodFirst date restaurantLushi’s favorite colorFavorite shared activityLushi’s favorite cuisineUniversity John attendedLushi’s favorite dessertLushi’s favorite holiday...

Eva and Clayton 2024-11-23

Eva and Clayton crossword puzzle
Across
  1. Subject Eva studies in graduate school
  2. Sport played by the couple
  3. Eva's musical hobby
  4. Clayton’s favorite food
  5. Clayton's least favorite food
  6. Clayton’s favorite movie genre
  7. Eva's first job
  8. Subject of Clayton’s bachelor’s degree
  9. Clayton’s favorite holiday
  10. Number of years the couple has been together
  11. Clayton's football team
  12. Shape of Eva’s birthmark
Down
  1. Eva’s middle name
  2. The older half of the couple (bride/groom)
  3. Clayton’s favorite childhood video game
  4. English town where Eva lived while studying abroad
  5. City where the couple currently lives (abbr)
  6. Couple’s go to breakfast food
  7. Eva’s favorite TV show
  8. Eva’s favorite season
  9. The couple's future furry friend
  10. Eva's hockey team
  11. Clayton’s eye color
  12. Couple’s favorite vacation spot
  13. Mascot of the couple's alma mater (abbr)

25 Clues: Eva's first jobEva's hockey teamEva's musical hobbyClayton’s eye colorEva’s middle nameEva’s favorite TV showClayton’s favorite foodClayton's football teamEva’s favorite seasonClayton’s favorite holidayShape of Eva’s birthmarkClayton's least favorite foodCouple’s go to breakfast foodSport played by the couple...

STEM Quest: Discovering Careers and Concepts at Idaho National Laboratory 2025-07-18

STEM Quest: Discovering Careers and Concepts at Idaho National Laboratory crossword puzzle
Across
  1. Type of engineer that designs and builds machines
  2. A person who designs buildings, roads, and bridges
  3. Tiny basic building block of all matter
  4. Where is INL located?
  5. Process of splitting an atom to create nuclear power
  6. A person who writes computer programs
Down
  1. Person who analyzes experiments in science at INL
  2. Energy released in a reactor
  3. First atomic-powered town in 1951
  4. Science, Technology, Engineering, and Math
  5. (Advanced Test Reactor) A unique reactor at INL used for testing materials
  6. The L in INL
  7. Protecting computers and networks from attacks
  8. Scientists use these to test their ideas

14 Clues: The L in INLWhere is INL located?Energy released in a reactorFirst atomic-powered town in 1951A person who writes computer programsTiny basic building block of all matterScientists use these to test their ideasScience, Technology, Engineering, and MathProtecting computers and networks from attacksPerson who analyzes experiments in science at INL...

Computer Article Crossword 2015-06-10

Computer Article Crossword crossword puzzle
Across
  1. Very important and possibly dangerous
  2. The month which the hack happened
  3. Far away from anything else
  4. The Chairman of the Senate Armed Services Committee
  5. Keeping people safe on the Internet
  6. Breaking into a secure area
  7. To put together information
  8. To break into a secure area on the internet
Down
  1. Stealing someone's personal details
  2. All over the world
  3. The abbreviation for The Office of Personnel Management
  4. One billion people have access to Facebook on.......
  5. The Name of Mark Zuckerberg's company
  6. The name of the new App Zuckerberg is releasing
  7. The ........ Intelligence Committee which released information about the cyber attack
  8. The Country blamed for the hacking of American databases
  9. The President of America

17 Clues: All over the worldThe President of AmericaFar away from anything elseBreaking into a secure areaTo put together informationThe month which the hack happenedStealing someone's personal detailsKeeping people safe on the InternetVery important and possibly dangerousThe Name of Mark Zuckerberg's companyTo break into a secure area on the internet...

2025 Grad Crossword 2025-05-29

2025 Grad Crossword crossword puzzle
Across
  1. What does Ben plan to study at LCSC?
  2. Eliza will be going to school here
  3. Ben's favorite sport
  4. The last letter in PCHE stands for _______
  5. Isabella has a degree in information _______
  6. What does Denae plan to become?
  7. The song Ben is signing "________ of Jesus"
Down
  1. The second letter in PCHE stands for _______
  2. The first letter in PCHE stands for _______
  3. Who is the PCHE president?
  4. The name of the processional "____ and Circumstance"
  5. What is Isabella planning to study at LCSC?
  6. The third letter in PCHE stands for _______
  7. What is Eliza planning to study at NSA?
  8. What does Garrett plan to study after Bible School?
  9. Denae's hobby
  10. Program Garrett will attend in Texas

17 Clues: Denae's hobbyBen's favorite sportWho is the PCHE president?What does Denae plan to become?Eliza will be going to school hereWhat does Ben plan to study at LCSC?Program Garrett will attend in TexasWhat is Eliza planning to study at NSA?The last letter in PCHE stands for _______The first letter in PCHE stands for _______...

The Voice: October 2nd, 2023 2023-10-02

The Voice: October 2nd, 2023 crossword puzzle
Across
  1. One of the new members highlighted!
  2. What curriculum is Alberta Education redrafting?
  3. DS Tax
  4. Someone who can help with templates and shortcuts!
Down
  1. Be a ________ of the 2026 Special Olympics Summer Games!
  2. What awareness month is October?
  3. 2023 ______ Breakfast coming up.
  4. Minister on Agriculture under Advocacy in Action.

8 Clues: DS TaxWhat awareness month is October?2023 ______ Breakfast coming up.One of the new members highlighted!What curriculum is Alberta Education redrafting?Minister on Agriculture under Advocacy in Action.Someone who can help with templates and shortcuts!Be a ________ of the 2026 Special Olympics Summer Games!

cybersecurity 2023-03-03

cybersecurity crossword puzzle
Across
  1. The practice of protecting computer systems from theft, damage, and unauthorized access. (11)
  2. A software program designed to prevent unauthorized access to a computer system. (8)
Down
  1. A type of attack that attempts to overwhelm a system with traffic. (4)
  2. A type of cyber attack that attempts to obtain sensitive information by tricking users. (6)
  3. A type of encryption that uses two keys to encrypt and decrypt data. (3)

5 Clues: A type of attack that attempts to overwhelm a system with traffic. (4)A type of encryption that uses two keys to encrypt and decrypt data. (3)A software program designed to prevent unauthorized access to a computer system. (8)A type of cyber attack that attempts to obtain sensitive information by tricking users. (6)...

Cybersecurity 2023-05-11

Cybersecurity crossword puzzle
Across
  1. A process that proves the identity of the user
  2. The art of writing or solving codes
  3. A cyberattack carried out by creating a fake website, or compromising/ corrupting a real one, in order to gather information or data on visitors
Down
  1. The process of encoding or scrambling data to prevent unauthorized people from opening or accessing it
  2. A cyberattack carried out by sending emails to large numbers of people asking for sensitive information

5 Clues: The art of writing or solving codesA process that proves the identity of the userThe process of encoding or scrambling data to prevent unauthorized people from opening or accessing itA cyberattack carried out by sending emails to large numbers of people asking for sensitive information...

Cybersecurity 2024-04-23

Cybersecurity crossword puzzle
Across
  1. Persoon die ongeoorloofd toegang probeert te krijgen tot een netwerk of computer
  2. Software die bestanden infecteert en zich zelf kan vermenigvuldigen
  3. Poging tot het achterhalen van persoonlijke gegevens
Down
  1. Verzamelnaam voor malafide software
  2. Ongevraagde mail

5 Clues: Ongevraagde mailVerzamelnaam voor malafide softwarePoging tot het achterhalen van persoonlijke gegevensSoftware die bestanden infecteert en zich zelf kan vermenigvuldigenPersoon die ongeoorloofd toegang probeert te krijgen tot een netwerk of computer

Cybersecurity 2019-11-30

Cybersecurity crossword puzzle
Across
  1. : A malware that spies on your online activities and captures information from your computer, e.g. your web browsing habits, email messages, login credentials, banking and credit card details. It does all this without your knowledge.
  2. : “VPN” is short for “virtual p______ network”
  3. : P_______ is when cybercriminals use fake emails to bait their victims to click on a link or download a file containing infectious malware.
Down
  1. : Short for “malicious software”
  2. : “IT” is short for “Information Technology”, “OT” is short for “O______ Technology”.

5 Clues: : Short for “malicious software”: “VPN” is short for “virtual p______ network”: “IT” is short for “Information Technology”, “OT” is short for “O______ Technology”.: P_______ is when cybercriminals use fake emails to bait their victims to click on a link or download a file containing infectious malware....

CyberSecurity 2020-08-21

CyberSecurity crossword puzzle
Across
  1. Persona que por diversos motivos se dedica a manipular sistemas informáticos ajenos
  2. es un programa informático que tiene el propósito de detectar y eliminar virus y otros programas perjudiciales antes o después de que ingresen al sistema.
Down
  1. es un software que recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador.
  2. Programa informático que controla el acceso de una computadora a la red y de elementos de la red a la computadora, por motivos de seguridad.
  3. Programa que se elabora de manera accidental o intencionada y se introduce en los ordenadores, causando daños en la información contenida en el disco duro.

5 Clues: Persona que por diversos motivos se dedica a manipular sistemas informáticos ajenosPrograma informático que controla el acceso de una computadora a la red y de elementos de la red a la computadora, por motivos de seguridad....

Cybersecurity 2020-08-21

Cybersecurity crossword puzzle
Across
  1. Correo electrónico no solicitado que se envía a un gran número de destinatarios con fines publicitarios o comerciales.
  2. Programa informático que controla el acceso de una computadoraa la red y de elementos de la red a la computadora, por motivos de seguridad, evitan que usuarios de Internet no autorizados accedan a redes privadas conectadas a la red.
  3. Programa que se elabora de manera accidental o intencionada y se introduce en los ordenadores, causando daños en la información contenida en el disco duro. Estos, por lo general, infectan otros archivos del sistema con la intención de modificarlos para destruir archivos o datos almacenados en tu computador.
Down
  1. Es una estafa que tiene como objetivo obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias.
  2. Persona que se dedica a detectar fallos de seguridad en sistemas informáticos ajenos.

5 Clues: Persona que se dedica a detectar fallos de seguridad en sistemas informáticos ajenos.Correo electrónico no solicitado que se envía a un gran número de destinatarios con fines publicitarios o comerciales....

CyberSecurity 2021-09-24

CyberSecurity crossword puzzle
Across
  1. Should be strong and not shred with anyone
  2. The protection of information from unauthorized access
Down
  1. something of either tangible or intangible value that is worth protecting
  2. Ensures the timely and Reliable access to and use if information systems
  3. the combination of the probability of an event and its consequence

5 Clues: Should be strong and not shred with anyoneThe protection of information from unauthorized accessthe combination of the probability of an event and its consequenceEnsures the timely and Reliable access to and use if information systemssomething of either tangible or intangible value that is worth protecting

ISSN Day 2 2024-09-09

ISSN Day 2 crossword puzzle
Across
  1. Entry-level certification for IT technicians (2 words)
  2. Career path for someone with CCNA (2 words)
  3. Network certification from Cisco (acronym)
  4. Type of device covered in A+ certification, besides computers
Down
  1. Career path for someone with A+ (2 words)
  2. Network topic covered in CCNA
  3. Security topic covered in Security+ certification
  4. Cybersecurity certification from CompTIA
  5. Operating system topic covered in A+ certification

9 Clues: Network topic covered in CCNACybersecurity certification from CompTIACareer path for someone with A+ (2 words)Network certification from Cisco (acronym)Career path for someone with CCNA (2 words)Security topic covered in Security+ certificationOperating system topic covered in A+ certificationEntry-level certification for IT technicians (2 words)...

cybersecurity 2025-04-27

cybersecurity crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Cybersecurity 2025-02-23

Cybersecurity crossword puzzle
Across
  1. uses an unsecured public network as if it were a secure private network and encrypts data between remote the device and the network
  2. when you click or execute it, it infects your systems
  3. security incident that occurs when classified data is shown in an unclassified system or system with lower-level classification
Down
  1. process that scrambles readable text so it can only be read by the person who has the secret key
  2. generally install themselves on a computer and collect user data without the user's awareness

5 Clues: when you click or execute it, it infects your systemsgenerally install themselves on a computer and collect user data without the user's awarenessprocess that scrambles readable text so it can only be read by the person who has the secret key...

Network Components 2022-10-27

Network Components crossword puzzle
Across
  1. a device used at the customer premises to terminate a dial-up Integrated Services Digital Network line and connect it to a computer or a local area network
  2. a transmitter and a receiver of signals, such as analog or digital
  3. a cybersecurity tool that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of cybersecurity rules
  4. a transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signals
  5. is a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
Down
  1. networking devices that connect networks
  2. a network node used in telecommunications that connects two networks with different transmission protocols together
  3. a hardware component responsible for relaying data from a computer network to the destination endpoint

8 Clues: networking devices that connect networksa transmitter and a receiver of signals, such as analog or digitala transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signalsa hardware component responsible for relaying data from a computer network to the destination endpoint...

Cybersecurity Fundamental Chapter 6 2022-10-27

Cybersecurity Fundamental Chapter 6 crossword puzzle
Across
  1. protect data and information.
  2. writes data across multiple drives
  3. can actually improve availability.
  4. a system or component that is continuously operational for a given length of time.
  5. as part of an it asset management system, an organization specifies the acceptable it assets that meets its objectives.
  6. access to data and information reduces the possibility of a threat.
Down
  1. the most comprehensive protection.
  2. detects data errors
  3. assigns all resources of an organization into a group based on common characteristics.
  4. the weak links in the chain that can cause disruption of the organization's operations.
  5. analysis the process of analyzing the dangers posed by natural and human-caused events to the assets of an organization.
  6. changing the controls and procedures at different layers.
  7. involves reducing the severity of the loss or the likelihood of the loss from occurring.
  8. combines multiple physical hard disk drives into single logical units to provide data redundancy and improve performance.
  9. ensures system availability in the event of a component failure.
  10. systems and services are available 99.999% of the time.
  11. store duplicate data on second drive.

17 Clues: detects data errorsprotect data and information.the most comprehensive protection.writes data across multiple drivescan actually improve availability.store duplicate data on second drive.systems and services are available 99.999% of the time.changing the controls and procedures at different layers....

LCA ACTIVITY 2 2024-07-18

LCA ACTIVITY 2 crossword puzzle
Across
  1. Metric improved by good BI practices
  2. Type of organization that benefits from BI
  3. The primary focus of intelligence efforts
  4. Creating summaries of analyzed data
  5. Valuable understanding gained from data analysis
  6. Process of turning data into insights
  7. Type of analytics answering "What happened?"
  8. Applications used in business intelligence
  9. Repositories for storing unstructured data
  10. Software and hardware supporting BI efforts
  11. Metaphor for complex business structures
Down
  1. Pattern identified through data analysis
  2. Essential plan before construction begins
  3. Visual tool for displaying business data
  4. The blueprint for an organization's BI efforts
  5. Important feature of data management systems
  6. How data is collected, stored, and accessed
  7. Databases designed for storing and analyzing data
  8. Devices used to collect data in manufacturing
  9. Critical aspect of protecting data

20 Clues: Critical aspect of protecting dataCreating summaries of analyzed dataMetric improved by good BI practicesProcess of turning data into insightsPattern identified through data analysisVisual tool for displaying business dataMetaphor for complex business structuresEssential plan before construction beginsThe primary focus of intelligence efforts...

Web Wonders Crossword Challenge 2023-10-09

Web Wonders Crossword Challenge crossword puzzle
Across
  1. - Data protection through coding
  2. - Wireless internet connection
  3. - Online buying and selling
  4. - Tool for finding information on the internet
  5. - Measures to protect online data and privacy
  6. - Electronic mail for online communication
  7. - Content that spreads rapidly online
  8. - Storage and computing services on the internet
  9. - Web address identifying a website
  10. - Symbol used to categorize and search for topics
Down
  1. - Platforms for sharing content and connecting
  2. - Software for accessing the web
  3. - Audio or video series available for streaming
  4. - Online location with webpages
  5. - Security system to block unauthorized access
  6. - Saving files from the internet to a device
  7. - Real-time media content delivery
  8. - Clickable link that directs to another webpage
  9. - Sending files from a device to the internet
  10. - Online journal or diary

20 Clues: - Online journal or diary- Online buying and selling- Wireless internet connection- Online location with webpages- Data protection through coding- Software for accessing the web- Real-time media content delivery- Web address identifying a website- Content that spreads rapidly online- Electronic mail for online communication...

ICS and Hydropower 2024-04-02

ICS and Hydropower crossword puzzle
Across
  1. Turbine type operating from fluid pressure.
  2. System distributing control for efficiency.
  3. Height of water used to generate pressure.
  4. Mechanism for moving or controlling a system.
  5. Protection against digital attacks.
  6. Interface for human interaction with machines.
  7. Device detecting changes in environment.
  8. Device for converting fluid flow into energy.
  9. A type of turbine used in low-head applications.
Down
  1. Movement of water through a system.
  2. Pipe channeling water to turbines.
  3. Converts mechanical energy to electrical.
  4. System for remote monitoring and control.
  5. A communication protocol for devices.
  6. Type of turbine driven by water jet.
  7. Programmable controller critical in automation.
  8. Storage space for water.
  9. A type of turbine used in medium to high-head applications.
  10. Security system for network defense.
  11. Device for remote utility control.

20 Clues: Storage space for water.Pipe channeling water to turbines.Device for remote utility control.Movement of water through a system.Protection against digital attacks.Type of turbine driven by water jet.Security system for network defense.A communication protocol for devices.Device detecting changes in environment....

TTS INFORMATIKA 2025-04-10

TTS INFORMATIKA crossword puzzle
Across
  1. Teknologi yang menunjukkan animasi yang berisi unsur budaya
  2. Memindahkan koneksi internet ke lokasi berbeda sehingga lebih aman saat berselancar
  3. Mesin pencari dikenal dengan istilah
  4. Pekerjaan yang menjaga keamanan siber
  5. Aplikasi pengolah data angka dari Microsoft
  6. Sintaks pencarian dari Google
  7. Profesional yang membuat sistem
  8. Hak kekayaan intelektual berupa lagu atau film
  9. Simbol atau tanda milik suatu merek
  10. Mesin pencari selain Google
  11. Tindakan menyebar konten ke masyarakat
  12. Hak untuk menggunakan konten tertentu
Down
  1. Informasi yang mengandung tidak ada kebenaran
  2. Yang bukan hukum digital (hukum siber – syber law)
  3. Seseorang yang menciptakan aplikasi
  4. Kata kunci untuk mencari informasi di internet
  5. Jenis profesi pembuat perangkat lunak
  6. Mendeteksi dan menghapus perangkat lunak berbaha
  7. Profesi bidang data dan informasi
  8. Bahasa pemrograman web
  9. Hak cipta dan merek termasuk dalam

21 Clues: Bahasa pemrograman webMesin pencari selain GoogleSintaks pencarian dari GoogleProfesional yang membuat sistemProfesi bidang data dan informasiHak cipta dan merek termasuk dalamSeseorang yang menciptakan aplikasiSimbol atau tanda milik suatu merekMesin pencari dikenal dengan istilahPekerjaan yang menjaga keamanan siber...

IT Terms 2025-05-15

IT Terms crossword puzzle
Across
  1. Internet-based delivery of IT resources.
  2. Software to manage customer interactions.
  3. Two-symbol system used by computers.
  4. Computer system within a larger system.
  5. Plan for continuing business during disruption.
  6. Simulates human intelligence in machines.
  7. Processes and executes instructions (abbr).
  8. Network of physical devices sharing data.
  9. Unique address for a device on a network.
  10. Device connected to a network.
  11. Visual interface with icons and menus.
  12. Tech and strategy for analyzing business data.
Down
  1. Stores data temporarily for quick access.
  2. Organized collection of electronic data.
  3. Protects systems from digital threats.
  4. Converts data into code for security.
  5. Group of connected computers sharing rules.
  6. Security device that filters traffic.
  7. Finding and fixing code issues.
  8. Set of rules for communication between software components.

20 Clues: Device connected to a network.Finding and fixing code issues.Two-symbol system used by computers.Converts data into code for security.Security device that filters traffic.Protects systems from digital threats.Visual interface with icons and menus.Computer system within a larger system.Internet-based delivery of IT resources....

Digital Literacy 2025-10-29

Digital Literacy crossword puzzle
Across
  1. The software that runs a computer
  2. Computer thinking
  3. External devices(mouse,printer,headset)
  4. fake emails or texts to share data
  5. Random Access Memory, a type of processing computer memory
  6. Behaving responsibly and ethically online
  7. Result
  8. A software application used to access and navigate the internet
  9. Locks files until ransom is paid
Down
  1. Software designed to harm devices or steal info
  2. The practice of protecting computer systems and networks from theft, damage, or unauthorized access
  3. Programs that tell hardware what to do
  4. Working with others in a digital environment
  5. The trail of data a person leaves behind
  6. Data entered
  7. Physical parts of the computer
  8. unauthorized access to private data
  9. Unsolicited bulk electronic messages

18 Clues: ResultData enteredComputer thinkingPhysical parts of the computerLocks files until ransom is paidThe software that runs a computerfake emails or texts to share dataunauthorized access to private dataUnsolicited bulk electronic messagesPrograms that tell hardware what to doExternal devices(mouse,printer,headset)...

crossword #1 2023-03-15

crossword #1 crossword puzzle
Across
  1. Change: Long-term change in global climate patterns.
  2. Practical application of scientific knowledge.
  3. Acquisition of knowledge and skills.
  4. Physical and mental wellbeing.
  5. Protection of computer systems and data.
  6. Meeting present needs without compromising future generations.
Down
  1. Integration and interaction among people, companies, and governments worldwide.
  2. Setting up a business and taking financial risks for profit.
  3. Media: Online platforms for creating and sharing content.
  4. Intelligence: Machines that think and learn like humans.
  5. Inclusion of people from different backgrounds.

11 Clues: Physical and mental wellbeing.Acquisition of knowledge and skills.Protection of computer systems and data.Practical application of scientific knowledge.Inclusion of people from different backgrounds.Change: Long-term change in global climate patterns.Intelligence: Machines that think and learn like humans....

Kuis Audit TI 2024-03-04

Kuis Audit TI crossword puzzle
Across
  1. sistem manajemen audit yang digunakan Itjen
  2. Audit TIK atas pelaksanaan tusi yang memanfaatkan TIK
  3. pengendalian proses hanya melihat input dan output
  4. Salah satu area audit TIK
Down
  1. Memastikan keselarasan bisnis dan TIK
  2. pengendalian yang dilakukan oleh manusia tanpa bantuan mesin
  3. Audit TIK terintegrasi yang dilakukan secara bersamaan
  4. Audit TIK terintegrasi yang dilakukan secara berurutan
  5. Auditor harus ... yang artinya memiliki kemampuan untuk melakukan tugas audit
  6. singkatan dari pengendalian aplikasi
  7. Pengujian secara sistematis untuk memberikan keyakinan terbatas

11 Clues: Salah satu area audit TIKsingkatan dari pengendalian aplikasiMemastikan keselarasan bisnis dan TIKsistem manajemen audit yang digunakan Itjenpengendalian proses hanya melihat input dan outputAudit TIK atas pelaksanaan tusi yang memanfaatkan TIKAudit TIK terintegrasi yang dilakukan secara bersamaan...

Vanessa and Jinsik <3 2024-09-06

Vanessa and Jinsik <3 crossword puzzle
Across
  1. How many months have Vanessa and Jinsik been together?
  2. How many people are in the wedding party?
  3. Where do Vanessa and Jinsik live?
  4. How did Vanessa and Jinsik meet?
  5. How old is Vanessa?
  6. Where did Jinsik propose?
Down
  1. What does Jinsik do for work?
  2. Where are Vanessa and Jinsik going for their honeymoon?
  3. How old is Jinsik?
  4. What holiday did Vanessa and Jinsik first spend together?
  5. How many kids do Vanessa and Jinsik want?

11 Clues: How old is Jinsik?How old is Vanessa?Where did Jinsik propose?What does Jinsik do for work?How did Vanessa and Jinsik meet?Where do Vanessa and Jinsik live?How many people are in the wedding party?How many kids do Vanessa and Jinsik want?How many months have Vanessa and Jinsik been together?Where are Vanessa and Jinsik going for their honeymoon?...

Group 1 - CSE 167 2022-11-16

Group 1 - CSE 167 crossword puzzle
Across
  1. What's the weakest element in Cybersecurity
  2. The fake folder that acts as bait for hackers.
  3. The I in the CIA Triad
  4. The A in the CIA Triad
  5. All companies should have a ____ framework
Down
  1. The C in the CIA Triad
  2. An area that a hacker can use for their benefit
  3. Websites identify
  4. A type of key to use in Asymmetric encryption
  5. How to make a message secret.
  6. A copy of data that could be lost

11 Clues: Websites identifyThe C in the CIA TriadThe I in the CIA TriadThe A in the CIA TriadHow to make a message secret.A copy of data that could be lostAll companies should have a ____ frameworkWhat's the weakest element in CybersecurityA type of key to use in Asymmetric encryptionThe fake folder that acts as bait for hackers....

FY26 Q1 2025-10-14

FY26 Q1 crossword puzzle
Across
  1. January training: “Call ___”
  2. Leaves the forum when they don’t consent to one
  3. EU regulation keeping the financial sector in check
  4. CCPA fine was issued in this country
  5. Cybersecurity Awareness Month theme this year
  6. Complete by November: “Secure use of ___”
  7. Workstation compliance training goes live in this month
  8. If DORA’s vertical, NIS2 must be this
Down
  1. Under privacy law, it means “forget about me”
  2. Top-performing MU for SBS
  3. Fined 5.8 million AUD over data breach

11 Clues: Top-performing MU for SBSJanuary training: “Call ___”CCPA fine was issued in this countryIf DORA’s vertical, NIS2 must be thisFined 5.8 million AUD over data breachComplete by November: “Secure use of ___”Under privacy law, it means “forget about me”Cybersecurity Awareness Month theme this yearLeaves the forum when they don’t consent to one...

Technology 2025-06-26

Technology crossword puzzle
Across
  1. video games in virtual reality.
  2. improved or made better.
  3. person who loves technology.
Down
  1. protection of computers and data.
  2. picture of a screen display.
  3. small useful device.

6 Clues: small useful device.improved or made better.picture of a screen display.person who loves technology.video games in virtual reality.protection of computers and data.

Mechdyne's 30th Anniversary Puzzle 2026-01-05

Mechdyne's 30th Anniversary Puzzle crossword puzzle
Across
  1. A quick discussion at the beginning of a meeting to prevent accidents
  2. One of our core values us Profit and _____
  3. Acronym for Audio Visual
  4. At Mechdyne we strive to "stay ____ the line"
  5. phrase we use to secure and dedicate an assignment to a teammate
Down
  1. Apart of the 4 P's
  2. Mechdyne's headquarters state
  3. One of Mechdyne's sister companies
  4. The college the Mechdyne founders attended
  5. Our people are...
  6. Popular video conferencing platform used for remote meetings\
  7. System that protects against cyber threats
  8. Month dedicated to cybersecurity awareness
  9. The universal “fix” for most tech problems

14 Clues: Our people are...Apart of the 4 P'sAcronym for Audio VisualMechdyne's headquarters stateOne of Mechdyne's sister companiesThe college the Mechdyne founders attendedSystem that protects against cyber threatsMonth dedicated to cybersecurity awarenessThe universal “fix” for most tech problemsOne of our core values us Profit and _____...

PAW 2024 Crossword Puzzle 2024-05-16

PAW 2024 Crossword Puzzle crossword puzzle
Across
  1. Always access and transmit patient data ________.
  2. When faxing, ensure that the fax _____-sheet is free of any PHI.
  3. If someone contacts you requesting information about a confidential patient, the response should be “I do not have any information available for that ______”.
  4. Snooping may be motivated by _________, concern about the health and well-being of others, interpersonal conflicts, or personal gain.
  5. Always verify the source of emails and links ______ clicking.
  6. All access to personal health information must be limited to what is _________ to perform your job duties.
  7. Loss of _____ by patients and families may be one of the consequences of a privacy breach.
  8. When verbally disclosing information, _____ the information shared to what is necessary for the purpose.
  9. The patient must be informed of the purpose of the _________, use, or disclosure of their PHI.
Down
  1. If you notice anything unusual about your system’s performance or receive __________ messages, report them immediately to our IT cybersecurity team.
  2. When mailing information, ensure that the person named on the ________ is authorized to receive every document included within.
  3. A patient may be confidential not only for privacy reasons but also potentially for ______ reasons.
  4. Check twice that all information is the correct information for the correct person _____ to releasing it.
  5. If a patient does not wish for it to be disclosed that they are in the facility, they can request to add a ____________ patient flag.
  6. All access to personal health information must be for a ____ -related need-to-know.
  7. Consent must be _________, whether it is written or verbal.
  8. ____________ is a crucial aspect that safeguards both our information and our patients’ trust.
  9. Contact the ______ ______ if you have been made aware of PHI being disclosed inappropriately.
  10. Defined by the Information and Privacy Commissioner of Ontario (IPC) as, the unauthorized access of PHI which may be motivated by several factors.
  11. If a patient has added a restriction to accessing their information, the authorization to override the consent directive must be documented in a ______ manner.

20 Clues: Always access and transmit patient data ________.Consent must be _________, whether it is written or verbal.Always verify the source of emails and links ______ clicking.When faxing, ensure that the fax _____-sheet is free of any PHI.All access to personal health information must be for a ____ -related need-to-know....

Information and Cyber Security 2021-03-29

Information and Cyber Security crossword puzzle
Across
  1. uses asymmetric key encryption
  2. person who performs a social engineering attack
  3. What will freezing your credit not affect?
  4. For online shopping it's best to use...?
Down
  1. most valuable to companies looking to sell you something
  2. Requires a carrier file to self-replicate
  3. What information do you need to set up a wireless access point?
  4. When is it ok to reuse a password?
  5. Cyber security month
  6. Weakest link in cybersecurity
  7. Continually bombarding a targeted network with fake requests

11 Clues: Cyber security monthWeakest link in cybersecurityuses asymmetric key encryptionWhen is it ok to reuse a password?For online shopping it's best to use...?Requires a carrier file to self-replicateWhat will freezing your credit not affect?person who performs a social engineering attackmost valuable to companies looking to sell you something...

crossword #1 2023-03-15

crossword #1 crossword puzzle
Across
  1. Change: Long-term change in global climate patterns.
  2. Practical application of scientific knowledge.
  3. Acquisition of knowledge and skills.
  4. Physical and mental wellbeing.
  5. Protection of computer systems and data.
  6. Meeting present needs without compromising future generations.
Down
  1. Integration and interaction among people, companies, and governments worldwide.
  2. Setting up a business and taking financial risks for profit.
  3. Media: Online platforms for creating and sharing content.
  4. Intelligence: Machines that think and learn like humans.
  5. Inclusion of people from different backgrounds.

11 Clues: Physical and mental wellbeing.Acquisition of knowledge and skills.Protection of computer systems and data.Practical application of scientific knowledge.Inclusion of people from different backgrounds.Change: Long-term change in global climate patterns.Intelligence: Machines that think and learn like humans....

Total Defence Crossword Puzzle 2025-02-15

Total Defence Crossword Puzzle crossword puzzle
Across
  1. The state of being safe from harm.
  2. The country that practices Total Defence.
  3. A serious situation that needs immediate action.
  4. People who serve in the army to protect the country.
  5. Living together peacefully despite differences.
  6. Protection against threats or danger.
Down
  1. Protecting computers and networks from attacks.
  2. Working together to achieve a common goal.
  3. Being prepared for any situation.
  4. The quality of being strong, physically or mentally.
  5. The ability to recover from challenges or difficulties.

11 Clues: Being prepared for any situation.The state of being safe from harm.Protection against threats or danger.The country that practices Total Defence.Working together to achieve a common goal.Protecting computers and networks from attacks.Living together peacefully despite differences.A serious situation that needs immediate action....

Cybersecurity Awareness Month Crossword 2018-09-28

Cybersecurity Awareness Month Crossword crossword puzzle
Across
  1. A form of malware that replicates across computer systems by infecting another piece of software
  2. Software that runs on the endpoint and prevents malware from accessing the system
  3. An appliance that sits between your network and the Internet and scans all data passes through
  4. An attempt by cybersecurity expert to hack into your network and identify any holes in your cybersecurity
  5. These bad actors may or may not be hackers. Their purpose is to acquire and use stolen information or attack users solely for gain.
  6. When an attacker sends emails that appear to be legitimate but have links to pharming sites or attachments that contain malware
  7. Encrypts either a portion or entire computer system and presents the user with a ransom note on how to pay and receive a decryption tool
  8. These spread across computer systems but self-replicates rather than infecting other software
  9. A network of hijacked computers a hacker uses for attacking other networks, sending spam or performing calculations such as cryptocurrency mining or cracking stolen passwords
Down
  1. Any software intended to damage, disable or take control of a computer system without the owner’s consent
  2. This practice encompasses techniques used by bad actors to trick a person into providing them key information needed for a scheme.
  3. A hacker that sees their activity as political activism
  4. Skilled computer users that seek to discover flaws in computer systems that allow them to access part of a system without proper authorization
  5. A series of software tools that enable an attacker to take control of an operating system at the root level
  6. A highly targeted phishing attack with information typically acquired through social engineering
  7. This is a series of numbers, letters, and characters that safeguard accounts. It should be easy to remember but hard to guess
  8. The process of encoding information so that only authorized individuals can access it

17 Clues: A hacker that sees their activity as political activismSoftware that runs on the endpoint and prevents malware from accessing the systemThe process of encoding information so that only authorized individuals can access itThese spread across computer systems but self-replicates rather than infecting other software...

Crossword Puzzle on Cybersecurity 2026-01-20

Crossword Puzzle on Cybersecurity crossword puzzle
Across
  1. Umbrella term for malicious software.
  2. Code or technique used to take advantage of a vulnerability.
  3. Fraudulent attempt to obtain sensitive information through deception.
  4. Malicious program that records keystrokes.
  5. Unknown vulnerability with no available patch.
  6. Security technique that executes programs in an isolated environment.
  7. Process of verifying a user's identity.
  8. One-way process used to securely store passwords.
  9. A weakness that can be exploited by an attacker.
  10. Harmful component delivered by malware.
Down
  1. Security device that filters network traffic based on rules.
  2. Technique used to protect data by converting it into unreadable form.
  3. Malware designed to hide itself and maintain privileged access.
  4. Malware that encrypts files and demands payment.
  5. Group of compromised systems controlled remotely.
  6. Defines what an authenticated user is allowed to do.
  7. Unauthorized attempt to access a system.

17 Clues: Umbrella term for malicious software.Process of verifying a user's identity.Harmful component delivered by malware.Unauthorized attempt to access a system.Malicious program that records keystrokes.Unknown vulnerability with no available patch.Malware that encrypts files and demands payment.A weakness that can be exploited by an attacker....

CYBER AWARENESS 2024-11-02

CYBER AWARENESS crossword puzzle
Across
  1. A group of experts dedicated to responding to computer security incidents.
  2. The practice of protecting computer systems and networks from digital attacks.
  3. The process of converting data into an unreadable format to protect it from unauthorized access.
  4. Acronym for the process of collecting and analyzing publicly available information to gain insights.
  5. The unauthorized access to computer systems or networks.
  6. A notification from your security systems that someone is trying to break in (or, perhaps, has already done so).
  7. Any malicious act aimed at disrupting, damaging, or stealing information from computer systems or networks.
  8. A security system that monitors and controls network traffic.
  9. The process of converting readable data (plaintext) into unreadable code (ciphertext) to protect it from unauthorized access.
  10. Web The part of the internet that is not indexed by search engines but is accessible through specific URLs.
  11. Malicious software designed to harm computer systems or networks.
  12. A network of compromised computers controlled by an attacker.
Down
  1. Acronym for the process of gathering, analyzing, and interpreting data from social media platforms to gain insights.
  2. Malware that encrypts a victim's data and demands a ransom for its decryption.
  3. Deceiving individuals into revealing sensitive information through fraudulent emails or messages.
  4. The likelihood of a threat exploiting a vulnerability and causing harm.
  5. A weakness in a system or network that can be exploited by attackers.
  6. A piece of software or code that takes advantage of a vulnerability to gain unauthorized access.
  7. The first decentralized digital currency / cryptocurrency in which transactions can be performed without the need for a central bank.
  8. Web A part of the internet that is not indexed by search engines and requires special software to access.
  9. A group of information security experts who respond to malware attacks or other computer security incidents.
  10. Acronym for a software solution designed to streamline and automate various aspects of digital forensic investigations.
  11. Acronym for a centralized team that combines cybersecurity efforts to better detect, prevent, and respond to cyber threats.
  12. Illegal activities committed using computer networks or devices.

24 Clues: The unauthorized access to computer systems or networks.A security system that monitors and controls network traffic.A network of compromised computers controlled by an attacker.Illegal activities committed using computer networks or devices.Malicious software designed to harm computer systems or networks....

crossword #1 2023-03-15

crossword #1 crossword puzzle
Across
  1. Change: Long-term change in global climate patterns.
  2. Practical application of scientific knowledge.
  3. Acquisition of knowledge and skills.
  4. Physical and mental wellbeing.
  5. Protection of computer systems and data.
  6. Meeting present needs without compromising future generations.
Down
  1. Integration and interaction among people, companies, and governments worldwide.
  2. Setting up a business and taking financial risks for profit.
  3. Media: Online platforms for creating and sharing content.
  4. Intelligence: Machines that think and learn like humans.
  5. Inclusion of people from different backgrounds.

11 Clues: Physical and mental wellbeing.Acquisition of knowledge and skills.Protection of computer systems and data.Practical application of scientific knowledge.Inclusion of people from different backgrounds.Change: Long-term change in global climate patterns.Intelligence: Machines that think and learn like humans....

TEKNOLOGI INFORMASI DAN KOMUNIKASI 2025-09-23

TEKNOLOGI INFORMASI DAN KOMUNIKASI crossword puzzle
Across
  1. sejajar dengan lantai gunakan penyangga kaki
  2. harus ada sandaran punggung dan tangan atur ketinggian
  3. keamanan informasi di internet
  4. sebuah layanan blog milik geogle
  5. catatan harian atau jurnal pribadi di internet yang dapat diakses oleh siapa saja.
  6. individu yang melakukan aktivitas peretasan sistem komputer
Down
  1. konten lebih banyak mengandung teks
  2. pusat operasi keamanan siber nasional di indones
  3. konten dengan format angka, data numerik
  4. membuat blog dalam format video
  5. makna yang disampaiakan oleh serangkaian representasi hasil pemprosesan data

11 Clues: keamanan informasi di internetmembuat blog dalam format videosebuah layanan blog milik geoglekonten lebih banyak mengandung tekskonten dengan format angka, data numeriksejajar dengan lantai gunakan penyangga kakipusat operasi keamanan siber nasional di indonesharus ada sandaran punggung dan tangan atur ketinggian...

mari 2024-05-20

mari crossword puzzle
Across
  1. a decentralized digital currency
  2. the application of conceptual knowledge for
  3. a wide range of criminal activity that are
  4. providing the appearance of smth without reality
  5. practice and study of techniques for secure
  6. the process of writing computer software code
Down
  1. study and experimentation of algorithmic process
  2. a public distributed ledger of lists of records
  3. protection of computer systems and networks
  4. collection of accounts in which accounting
  5. a potential for vulnerabilities to turn into
  6. a digital currency designated to work as
  7. a device that can make and receive calls over
  8. the minimum amount of any physical entity involved
  9. the opposite of natural

15 Clues: the opposite of naturala decentralized digital currencya digital currency designated to work ascollection of accounts in which accountinga wide range of criminal activity that areprotection of computer systems and networksthe application of conceptual knowledge forpractice and study of techniques for secure...

Financial Technology 2026-02-16

Financial Technology crossword puzzle
Across
  1. Financial services provided through apps
  2. trading Automated trading using computerrograms based on pre-set rules.
  3. Technology FinTech stand for
  4. WALLET App used to make payments with a smartphone
  5. Bitcoin is an example of:
  6. risks Major challenge faced by FinTech companies?
  7. Process of verifying customer identity
  8. Raising funds through digital coins
Down
  1. banking apps one example of FinTech innovation in banks.
  2. Bank of India organization regulates digital paymentsyment systems in India?
  3. one example of a peer-to-peer payment app starting with G
  4. Payments Interface UPI stand for
  5. Security method using fingerprints or face recognition
  6. Short code sent to verify online transactions
  7. banking
  8. Regulatory technology used to ensure compliance

16 Clues: bankingBitcoin is an example of:Technology FinTech stand forRaising funds through digital coinsPayments Interface UPI stand forProcess of verifying customer identityFinancial services provided through appsShort code sent to verify online transactionsRegulatory technology used to ensure compliance...

test 2026-02-18

test crossword puzzle
Across
  1. Tətbiqləri konteynerlərdə işlətməyə imkan verən platforma
  2. Veb səhifələrə interaktivlik qatan proqramlaşdırma dili
  3. Proqramların bir-biri ilə əlaqə qurmasını təmin edən interfeys
  4. Veb səhifələrin dizayn və görünüşünü tərtib edən stil dili
  5. Microsoft tərəfindən hazırlanmış əməliyyat sistemi
  6. Veb səhifənin strukturunu quran işarələmə dili
  7. Açıq mənbəli əməliyyat sistemi
  8. Bulud əsaslı backend xidmətləri təqdim edən platforma
Down
  1. Server tərəfində JavaScript işlətməyə imkan verən mühit
  2. İstifadəçi interfeysi yaratmaq üçün JavaScript kitabxanası
  3. Məlumatların və sistemlərin təhlükəsizliyini təmin edən sahə
  4. Obyekt yönümlü və platformadan asılı olmayan proqramlaşdırma dili
  5. Sadə sintaksisli və çox məqsədli proqramlaşdırma dili
  6. Kodların saxlanıldığı və versiya nəzarəti platforması
  7. Verilənlər bazası ilə işləmək üçün sorğu dili

15 Clues: Açıq mənbəli əməliyyat sistemiVerilənlər bazası ilə işləmək üçün sorğu diliVeb səhifənin strukturunu quran işarələmə diliMicrosoft tərəfindən hazırlanmış əməliyyat sistemiSadə sintaksisli və çox məqsədli proqramlaşdırma diliKodların saxlanıldığı və versiya nəzarəti platformasıBulud əsaslı backend xidmətləri təqdim edən platforma...

FOP Crossword Puzzle 2023-03-28

FOP Crossword Puzzle crossword puzzle
Across
  1. SOCC is in charge of maintaining and building ________ relations.
  2. SPAI created its own Project _____.
  3. Gryphons plan & organize ______-___-___ competitions.
  4. SOCC organized Freshman Orientation ______.
  5. ______ organized the SOC Open House.
  6. Gryphons aims to promote ________ to students that are passionate about IT.
Down
  1. Programming competition only for freshmen.
  2. SOCC is in charge of events like ____ tournaments, Community Service Events and Sports Events
  3. SOCA is In charge of ________ relations.
  4. SEED hosts the ___-___-Series.
  5. SEED stands for Sharing, _______, Enriching, Development.
  6. DISM’s SIG.
  7. SPAI attended and presented at the ____ Conference.
  8. SPAI is part of the AI Singapore Student ________.
  9. SOCA’s ________ department is the first point of contact with outside organizations.

15 Clues: DISM’s SIG.SEED hosts the ___-___-Series.SPAI created its own Project _____.______ organized the SOC Open House.SOCA is In charge of ________ relations.Programming competition only for freshmen.SOCC organized Freshman Orientation ______.SPAI is part of the AI Singapore Student ________.SPAI attended and presented at the ____ Conference....

Viruses 2018-04-10

Viruses crossword puzzle
Across
  1. to preserve or keep safe from harm
  2. protection from hackers and viruses
  3. identify the presence of something concealed
  4. a malware that replicates itself in order to spread
  5. "in the ____" meaning it is still a threat to your computer
  6. software that is intended to damage or disable computers
  7. distributed denial of service
Down
  1. set of instructions for a computer
  2. tools, machinery, and other durable equipment
  3. electronic device for storing and processing data
  4. someone who uses computers to gain unauthorized access to data
  5. fake emails
  6. messages delivered by electronics
  7. a type of virus that disguises itself as something else
  8. corrupts your system and can be easily spread

15 Clues: fake emailsdistributed denial of servicemessages delivered by electronicsset of instructions for a computerto preserve or keep safe from harmprotection from hackers and virusesidentify the presence of something concealedtools, machinery, and other durable equipmentcorrupts your system and can be easily spread...

XoXo Your BIg 2024-10-12

XoXo Your BIg crossword puzzle
Across
  1. What do you call a fake noodle?
  2. Home to summer fun and seaside charm
  3. I named my car this
  4. My fav littles major
  5. America favorite fighting frenchman
  6. My favorite subject in school
Down
  1. What do you call a dinosaur with a extensive vocab
  2. My favorite little name
  3. My favorite day of the week
  4. What do you call a bear with no teeth?
  5. My favorite animal
  6. I call this salty place home
  7. My favorite color is
  8. I’m a dark elixir that many drink to kickstart their day
  9. I’m a sturdy substance often found underfoot, shaping landscapes and used for building

15 Clues: My favorite animalI named my car thisMy favorite color isMy fav littles majorMy favorite little nameMy favorite day of the weekI call this salty place homeMy favorite subject in schoolWhat do you call a fake noodle?America favorite fighting frenchmanHome to summer fun and seaside charmWhat do you call a bear with no teeth?...

Browsing safely 2025-05-26

Browsing safely crossword puzzle
Across
  1. Collection of technologies to prevent cybercrimes
  2. Prevents unauthorised access
  3. Process of befriending children on social media
  4. Committing crimes in your name after stealing your identity
  5. Conducting Terrorism online to cause fear and panic
  6. Illegal entry into computer systems
  7. A password valid for few minutes
  8. Designed to identify,prevent and remove viruses
  9. Hoaxing or misleading people online
Down
  1. Computer programs used to corrupt a computer system
  2. Criminal activity to harm a computer or internet connection
  3. Unethical hackers
  4. threat for people who use internet for online shopping,cash transactions and banking services
  5. Act of harming or harassing people online
  6. Tricking financial organisation to steal money online

15 Clues: Unethical hackersPrevents unauthorised accessA password valid for few minutesIllegal entry into computer systemsHoaxing or misleading people onlineAct of harming or harassing people onlineProcess of befriending children on social mediaDesigned to identify,prevent and remove virusesCollection of technologies to prevent cybercrimes...

Technology 2024-01-26

Technology crossword puzzle
Across
  1. Smallest unity of information
  2. Small electronic devices that make your life easier.
  3. Electronic devices that you can wear as accessories.
  4. About conersing analog information to a digital ones.
  5. Intenet of things.
  6. To protect systems or data from cybernetics attacks.
  7. Programmable machine to automate processes
Down
  1. The smallest technology.
  2. It's used to talk to someone that is far from you.
  3. A process or set of rules that solve a specific problem.
  4. Msurament and analysis about unique physical of everyone.
  5. Aereal no tipulated devices
  6. Can make tridimensional images to crate optical illusions.
  7. Generally, the not physical about a computer.
  8. It's used to protect data encoding the information.

15 Clues: Intenet of things.The smallest technology.Aereal no tipulated devicesSmallest unity of informationProgrammable machine to automate processesGenerally, the not physical about a computer.It's used to talk to someone that is far from you.It's used to protect data encoding the information.Small electronic devices that make your life easier....

Electricity back 2023-05-30

Electricity back crossword puzzle
Across
  1. Measures the voltage in a circuit
  2. Measurement of electrical power
  3. Power lines connecting power supplies to homes in a large area
  4. A place to plug in a device
  5. Power used by a device
  6. Makes your hair stand up, gives a shock
  7. Online protection
Down
  1. Too much power at one time
  2. Transfers electricity from one circuit to another with more or less power
  3. Portable power supply, can power a remote
  4. Anything that makes power, like a generator or a battery
  5. Protects us from electric shocks
  6. Measures the current in a circuit
  7. Adjusts the power in a circuit
  8. Happens again and again

15 Clues: Online protectionPower used by a deviceHappens again and againToo much power at one timeA place to plug in a deviceAdjusts the power in a circuitMeasurement of electrical powerProtects us from electric shocksMeasures the voltage in a circuitMeasures the current in a circuitMakes your hair stand up, gives a shock...

soca 2023-03-13

soca crossword puzzle
Across
  1. Type Gryphons plan & organize ______-___-___ competitions
  2. ______ organized the SOC Open House.
  3. SEED hosts the ___-___-Series
  4. SOCC’s _____ department is in charge of planning events
  5. Programming competition only for freshmen
  6. SOCA is In charge of ________ relations
  7. Gryphons aims to promote ________ to students that are passionate about IT
  8. SOCC is in charge of maintaining and building ________ relations
Down
  1. SPAI is part of the AI Singapore Student ________
  2. SPAI attended and presented at the ____ Conference.
  3. SOCA’s ________ department is the first point of contact with outside organizations.
  4. SEED stands for Sharing, _______, Enriching, Development
  5. Gryphon’s Mascot
  6. SPAI created its own Project _____.
  7. SOCC organized Freshman Orientation ______

15 Clues: Gryphon’s MascotSEED hosts the ___-___-SeriesSPAI created its own Project _____.______ organized the SOC Open House.SOCA is In charge of ________ relationsProgramming competition only for freshmenSOCC organized Freshman Orientation ______SPAI is part of the AI Singapore Student ________SPAI attended and presented at the ____ Conference....

BACO Conference Team Builder 2024-11-20

BACO Conference Team Builder crossword puzzle
Across
  1. – The process of identifying and analyzing risks.
  2. – Violation of a law, duty, or agreement.
  3. – Abbreviation for Foreign Corrupt Practices Act.
  4. – Consequences for failing to follow regulations.
  5. – Recording and documenting compliance breaches.
  6. – Procedures to ensure proper operation of systems.
  7. – A professional responsible for managing compliance.
  8. – Protecting systems and data from cyber threats.
Down
  1. – Measures to prevent illicit financial activities.
  2. – A group responsible for overseeing ethical practices.
  3. – An in-house review of processes and systems.
  4. – The act of making information known.
  5. – Adherence to moral and ethical principles.
  6. – A set of rules outlining acceptable behaviors.
  7. – Relating to rules issued by governing bodies.

15 Clues: – The act of making information known.– Violation of a law, duty, or agreement.– Adherence to moral and ethical principles.– An in-house review of processes and systems.– Relating to rules issued by governing bodies.– Recording and documenting compliance breaches.– A set of rules outlining acceptable behaviors....

PROFESI DAN PELUANG USAHA DI BIDANG TKJT 2023-11-17

PROFESI DAN PELUANG USAHA DI BIDANG TKJT crossword puzzle
Across
  1. Orang yang merancang dan mengembangkan perangkat lunak.
  2. Orang yang ahli dalam merancang rangkaian listrik.
  3. Bisnis yang fokus pada pengembangan aplikasi mobile.
  4. Bisnis yang menyediakan layanan keamanan jaringan.
  5. Orang yang spesialis dalam keamanan informasi.
Down
  1. Bisnis yang menyediakan solusi perangkat lunak ERP.
  2. Orang yang bekerja dengan perangkat keras komputer.
  3. Bisnis yang menyediakan solusi penyimpanan data.
  4. Bisnis yang menyediakan layanan cloud computing.
  5. Orang yang ahli dalam analisis data besar.

10 Clues: Orang yang ahli dalam analisis data besar.Orang yang spesialis dalam keamanan informasi.Bisnis yang menyediakan solusi penyimpanan data.Bisnis yang menyediakan layanan cloud computing.Orang yang ahli dalam merancang rangkaian listrik.Bisnis yang menyediakan layanan keamanan jaringan.Bisnis yang menyediakan solusi perangkat lunak ERP....

WeWork Noble House Community 2022-06-25

WeWork Noble House Community crossword puzzle
Across
  1. Solving the world's 1 gigaton refrigerant problem
  2. Pioneer of global content service and distribution
  3. Offering lead generation services from B2B telemarketing to inside sales
  4. Supporting diverse clean energy entrepreneurs to thrive
Down
  1. #DemiMasaDepan #MakingEducationAffordable
  2. Consumer intelligence platform specializing in mobile advertising
  3. SaaS platform that makes cybersecurity accessible to all
  4. Logistics service provider
  5. Language learning platform, mainly Chinese
  6. Consumer electronics company, well-known for its technologically advanced smartwatch

10 Clues: Logistics service provider#DemiMasaDepan #MakingEducationAffordableLanguage learning platform, mainly ChineseSolving the world's 1 gigaton refrigerant problemPioneer of global content service and distributionSupporting diverse clean energy entrepreneurs to thriveSaaS platform that makes cybersecurity accessible to all...

Online Bankling 2025-11-27

Online Bankling crossword puzzle
Across
  1. Protects data during transfer
  2. Monthly account reports
  3. A type of money transfer
  4. A process used to verify a user’s identity before granting access.
Down
  1. Email-based scam
  2. Protection of computers, networks, and data from digital attacks.
  3. Illegal financial activity

7 Clues: Email-based scamMonthly account reportsA type of money transferIllegal financial activityProtects data during transferProtection of computers, networks, and data from digital attacks.A process used to verify a user’s identity before granting access.

PROFESI DAN PELUANG USAHA 2023-11-17

PROFESI DAN PELUANG USAHA crossword puzzle
Across
  1. Orang yang spesialis dalam keamanan informasi.
  2. Orang yang merancang dan mengembangkan perangkat lunak.
  3. Bisnis yang menyediakan layanan cloud computing.
  4. Orang yang ahli dalam analisis data besar.
  5. Orang yang bekerja dengan perangkat keras komputer.
  6. Bisnis yang menyediakan solusi penyimpanan data.
  7. Bisnis yang fokus pada pengembangan aplikasi mobile.
Down
  1. Bisnis yang menyediakan solusi perangkat lunak ERP.
  2. Bisnis yang menyediakan layanan keamanan jaringan.
  3. Orang yang ahli dalam merancang rangkaian listrik.

10 Clues: Orang yang ahli dalam analisis data besar.Orang yang spesialis dalam keamanan informasi.Bisnis yang menyediakan layanan cloud computing.Bisnis yang menyediakan solusi penyimpanan data.Bisnis yang menyediakan layanan keamanan jaringan.Orang yang ahli dalam merancang rangkaian listrik.Bisnis yang menyediakan solusi perangkat lunak ERP....

English assignment 2024-11-25

English assignment crossword puzzle
Across
  1. the essence of knowledge
  2. deployed for the purpose of dealing harm
  3. a branch of IT tasked with protection of virtual assets
  4. a core part of identity of something
  5. a simplified idea for ease of use
Down
  1. another word for confidential
  2. given permissions based on confirmed identity
  3. a way of viewing and dealing with an issue
  4. to construct a new product
  5. a broad group within a company; battles a common issue

10 Clues: the essence of knowledgeto construct a new productanother word for confidentiala simplified idea for ease of usea core part of identity of somethingdeployed for the purpose of dealing harma way of viewing and dealing with an issuegiven permissions based on confirmed identitya broad group within a company; battles a common issue...

Cybersecurity 2020-08-21

Cybersecurity crossword puzzle
Across
  1. They are small files that some websites save on your computer. This little files store information about you, such as username, but they cannot spy on you.
  2. the junk email people receive. These messages, also known as unsolicited mail, are usually service advertisements.
  3. it is the practice of protecting systems, networks and programs from digital attacks.
Down
  1. an electronic device to store and process data, in the way that the user wishes.
  2. Los virus son programas informáticos que tienen como objetivo alterar el funcionamiento del computador, sin que el usuario lo desee. Estos tienen la intención de destruir o modificar los archivos o datos almacenados en tu computadora.

5 Clues: an electronic device to store and process data, in the way that the user wishes.it is the practice of protecting systems, networks and programs from digital attacks.the junk email people receive. These messages, also known as unsolicited mail, are usually service advertisements....

CYBERSECURITY 2021-09-28

CYBERSECURITY crossword puzzle
Across
  1. Large marsupial
  2. Likes to chase mice
Down
  1. Has a trunk
  2. Flying mammal
  3. Man's best friend

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

Technology Terminology 2022-09-26

Technology Terminology crossword puzzle
Across
  1. Imaginary creatures that cause unexplained technology problems
  2. IT protection.
  3. Computer that manages access to centralized resource.
Down
  1. American multinational technology corporation based in Washington.
  2. Location of multiple centralized IT resources.
  3. Tool used to send and receive data across shared or public networks.
  4. Data "rains" from here.
  5. Interconnected people or technology.

8 Clues: IT protection.Data "rains" from here.Interconnected people or technology.Location of multiple centralized IT resources.Computer that manages access to centralized resource.Imaginary creatures that cause unexplained technology problemsAmerican multinational technology corporation based in Washington....

Smart System 2021-06-08

Smart System crossword puzzle
Across
  1. maintenance of systems
  2. #1 cons of the smart system
  3. application improving quality of life
Down
  1. application of tackling with climate change
  2. application that involves wireless sensors
  3. smart system incorporate functions of sensing, actuation and?
  4. example of smart system - monitoring

7 Clues: maintenance of systems#1 cons of the smart systemexample of smart system - monitoringapplication improving quality of lifeapplication that involves wireless sensorsapplication of tackling with climate changesmart system incorporate functions of sensing, actuation and?

Enterprise manual 2022-06-21

Enterprise manual crossword puzzle
Across
  1. CATERPILLAR CONFIDENTIAL INFORMATION
  2. CYBERSECURITY
Down
  1. HIGH VALUE TECHNICAL INFORMATON
  2. DATA PRIVACY
  3. COMPANY LEGAL MATTERS

5 Clues: DATA PRIVACYCYBERSECURITYCOMPANY LEGAL MATTERSHIGH VALUE TECHNICAL INFORMATONCATERPILLAR CONFIDENTIAL INFORMATION

AI 2025-11-07

AI crossword puzzle
Across
  1. Kemampuan AI untuk membuat teks, gambar, atau musik disebut …
  2. Informasi yang bersifat pribadi dan rahasia disebut …
  3. Salah satu etika AI: tidak boleh … manusia
  4. Sistem keamanan yang mencegah akses tidak sah ke jaringan
  5. Teknologi yang meniru cara berpikir manusia
  6. AI yang bisa bermain game disebut … AI
  7. Cybersecurity melindungi dari serangan …
  8. Teknologi yang memungkinkan komputer memahami bahasa manusia
  9. AI yang bisa meniru gaya tulisan disebut … AI
  10. Sistem yang menyimpan dan mengelola data disebut …
  11. AI yang bisa membuat video dari teks disebut … AI
  12. AI yang digunakan untuk menganalisis data disebut … AI
  13. AI bisa belajar dari … yang diberikan
  14. Sistem yang memverifikasi identitas pengguna, seperti kata sandi
  15. Cybersecurity melindungi dari serangan …
  16. AI yang bisa menghasilkan musik disebut … AI
  17. AI yang bisa mengenali objek dalam gambar disebut … AI
  18. Teknologi yang digunakan untuk melacak aktivitas pengguna disebut …
  19. AI harus digunakan secara … dan bertanggung jawab
  20. AI yang bisa memahami emosi disebut … AI
  21. Salah satu contoh penggunaan AI di sekolah adalah … otomatis
Down
  1. AI yang digunakan untuk mengenali suara disebut ...
  2. Salah satu risiko AI adalah … pekerjaan manusia
  3. AI yang digunakan untuk membuat gambar dari teks disebut … AI
  4. Program jahat yang merusak sistem komputer
  5. Salah satu bentuk pelanggaran etika AI adalah … data tanpa izin
  6. AI yang bisa menerjemahkan bahasa disebut … AI
  7. Serangan yang menipu pengguna agar memberikan informasi disebut …
  8. Kata lain dari keamanan informasi digital
  9. AI yang bisa berbicara dan menjawab disebut … AI
  10. AI bisa digunakan untuk membantu … tugas manusia
  11. Sistem keamanan yang menggunakan sidik jari disebut …
  12. Sistem keamanan yang mencegah akses tidak sah ke jaringan
  13. Teknologi yang digunakan untuk mengenali wajah
  14. Salah satu risiko AI adalah penyebaran … palsu
  15. Kata sandi yang kuat harus sulit untuk …
  16. AI yang bisa membuat desain disebut … AI
  17. Sistem yang menyimpan data secara online disebut …
  18. Data pribadi harus dijaga agar tidak …
  19. AI yang digunakan untuk chatbot disebut … AI
  20. Serangan digital yang bertujuan mencuri data disebut …

41 Clues: AI bisa belajar dari … yang diberikanAI yang bisa bermain game disebut … AIData pribadi harus dijaga agar tidak …Cybersecurity melindungi dari serangan …Kata sandi yang kuat harus sulit untuk …AI yang bisa membuat desain disebut … AICybersecurity melindungi dari serangan …AI yang bisa memahami emosi disebut … AI...

Enterprise manual 2022-06-21

Enterprise manual crossword puzzle
Across
  1. CYBERSECURITY
  2. DATA PRIVACY
Down
  1. HIGH VALUE TECHNICAL INFORMATON
  2. COMPANY LEGAL MATTERS
  3. CATERPILLAR CONFIDENTIAL INFORMATION

5 Clues: DATA PRIVACYCYBERSECURITYCOMPANY LEGAL MATTERSHIGH VALUE TECHNICAL INFORMATONCATERPILLAR CONFIDENTIAL INFORMATION

Security Awareness Month 2025 2025-10-07

Security Awareness Month 2025 crossword puzzle
Across
  1. the credit card security audit we do
  2. Fastpass uses ____ to authenticate me to Okta.
  3. passwords should ____ be stored in plaintext
  4. the button to report a suspicious email
  5. the wiki code for the AI Knowledge Base
  6. our password manager tool
  7. phiches use ___ to pressure people to click or reply.
  8. Crowd____ is our AV software.
Down
  1. a pass____ is more memorable than a password
  2. the data classification for pii and credit card data
  3. ___@kayak.com where support tickets can be emailed
  4. ask-kayak-____ is the Slack channel for cybersecurity questions.
  5. our remote access tool
  6. ai tool to search all of kayak
  7. The Acceptable ____ Policy sets employee security rules

15 Clues: our remote access toolour password manager toolCrowd____ is our AV software.ai tool to search all of kayakthe credit card security audit we dothe button to report a suspicious emailthe wiki code for the AI Knowledge Basea pass____ is more memorable than a passwordpasswords should ____ be stored in plaintext...

Starhub 2025-04-06

Starhub crossword puzzle
Across
  1. Division offering network and cybersecurity solutions
  2. What class are we in?
  3. The forecasted revenue was derived from ____ reports
  4. Streaming platform competing with PAYTV
Down
  1. The last presenter of the group
  2. Key transformation strategy Starhub is undergoing:___ +
  3. Type of strategy Starhub uses to shift from Telco to Digital solutions player
  4. Our recommendation on Starhub's shares
  5. The bargaining power of buyers is ___

9 Clues: What class are we in?The last presenter of the groupThe bargaining power of buyers is ___Our recommendation on Starhub's sharesStreaming platform competing with PAYTVThe forecasted revenue was derived from ____ reportsDivision offering network and cybersecurity solutionsKey transformation strategy Starhub is undergoing:___ +...

Cybersecurity Fundamentals - Chapter 3 2022-10-18

Cybersecurity Fundamentals - Chapter 3 crossword puzzle
Across
  1. to make malicious website appear higher in search engine result.
  2. software that enables a criminal to obtain information about user's computer activities.
  3. an attack that targes high profile targets within an organization.
  4. impersonation of a legitimate website
  5. the program or code introduced by a criminal who has compromised a system
  6. malicious program that uses a trigger to awaken the malicious code
  7. malicious code that replicates by independently exploiting vulnerabilities.
  8. malware that carries out malicious operation under the guise of a desired operation.
  9. a malicious executable code attached to another executable file.
  10. known as junk mail
Down
  1. highly targeted phishing attack, that send customized emails to a specific person or individual.
  2. holds a computer system, or the data it contains, captive until the target makes a payment.
  3. alters a computer's browser settings to redirect user to website paid for the cyber criminals' customers.
  4. a form of fraud where a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source.
  5. persuades the user to take specific action based on fear
  6. displays annoying pop-ups to generate revenue for its authors.
  7. using voice communication technology and records message that appears legitimate.

17 Clues: known as junk mailimpersonation of a legitimate websitepersuades the user to take specific action based on feardisplays annoying pop-ups to generate revenue for its authors.to make malicious website appear higher in search engine result.a malicious executable code attached to another executable file....

R&D India Market Place 2022-11-09

R&D India Market Place crossword puzzle
Across
  1. own your_______
  2. ____ is at the core of our purpose, culture and business.
  3. Reducing the operational carbon emissions in our supply chain
  4. chairman and CEO
  5. one of our core values
  6. internal tool for mobility, projects and mentorships
Down
  1. IoT, mobility, sensing, cloud, analytics and cybersecurity to deliver Innovation at Every Level.
  2. We are Globally recognised for____
  3. one of our 6 long term commitments

9 Clues: own your_______chairman and CEOone of our core valuesWe are Globally recognised for____one of our 6 long term commitmentsinternal tool for mobility, projects and mentorships____ is at the core of our purpose, culture and business.Reducing the operational carbon emissions in our supply chain...

crossword! 2024-02-03

crossword! crossword puzzle
Across
  1. Usually consists of 8 bits
  2. Invisible barrier for women advancing in the workplace
  3. left no crumbs
  4. Mentor applications are due on the _
  5. Film about under-recognized Black women at NASA who were a key part of its success
  6. Most commonly-used programming language
Down
  1. practice of protecting systems, networks, and programs from digital attacks
  2. Purdue's first women-centric hackathon ;)
  3. When women are generally paid less than men
  4. women in _

10 Clues: women in _left no crumbsUsually consists of 8 bitsMentor applications are due on the _Most commonly-used programming languagePurdue's first women-centric hackathon ;)When women are generally paid less than menInvisible barrier for women advancing in the workplacepractice of protecting systems, networks, and programs from digital attacks...

GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05

GGH - The odd word out here is a clue to the location of the next riddle. crossword puzzle
Across
  1. Unethical practice of gaining unauthorized access to computer systems.
  2. Act of impersonating a legitimate entity to deceive individuals or gain access.
  3. A type of computer memory.
  4. A small portable computer.
Down
  1. Securing computer systems against unauthorized access.
  2. A popular operating system.
  3. The brain of a computer.
  4. Term for gaining access to a secure network through.
  5. Malicious software used to gain unauthorised access to computer systems.
  6. Desired outcomes.

10 Clues: Desired outcomes.The brain of a computer.A type of computer memory.A small portable computer.A popular operating system.Term for gaining access to a secure network through.Securing computer systems against unauthorized access.Unethical practice of gaining unauthorized access to computer systems....

Technology & Innovation 2025-08-09

Technology & Innovation crossword puzzle
Across
  1. – The state of relying on something
  2. OFFICE – Working physically at a company's premises
  3. – Protection of computer systems from attacks
  4. – Introduction of new methods, ideas, or products
  5. – A mobile phone with advanced features
Down
  1. – Process of learning and acquiring knowledge
  2. – State of being free from public attention
  3. WORK – Working from home or another location outside the office
  4. – Short for Artificial Intelligence
  5. – Application of scientific knowledge for practical purposes

10 Clues: – The state of relying on something– Short for Artificial Intelligence– A mobile phone with advanced features– State of being free from public attention– Process of learning and acquiring knowledge– Protection of computer systems from attacks– Introduction of new methods, ideas, or productsOFFICE – Working physically at a company's premises...

Parole Cybercrociate 2021-04-23

Parole Cybercrociate crossword puzzle
Across
  1. Un particolare tipo di dato personale
  2. Nuovo social network fondato nel 2020
  3. Città che è una eccellenza mondiale nella Cybersecurity
  4. La casata rappresentata da un lupo nella serie "Trono di Spade"
  5. Il pizzo digitale
  6. Truffa che sfrutta la tecnologia VoiP
  7. Una delle tre dimensioni di sicurezza del dato
Down
  1. Probabilità per impatto
  2. E' una criptovaluta
  3. Il nome del processore ARM per Mac di Apple
  4. Rete di computer composta da dispositivi infettati da un malware “zombie”
  5. Numero di basi giuridiche previste dal GDPR per la liceità di un trattamento di dati personali

12 Clues: Il pizzo digitaleE' una criptovalutaProbabilità per impattoUn particolare tipo di dato personaleNuovo social network fondato nel 2020Truffa che sfrutta la tecnologia VoiPIl nome del processore ARM per Mac di AppleUna delle tre dimensioni di sicurezza del datoCittà che è una eccellenza mondiale nella Cybersecurity...

Professor Sloan's Fun Facts 2025-04-23

Professor Sloan's Fun Facts crossword puzzle
Across
  1. What is the acronym for the New CS Building?
  2. What month was he born?
  3. What school did he earn his PhD from?
  4. What school did he go to for undergrad?
  5. What is one of his hobbies?
  6. What book did he write w/Richard Warner in 2021?
Down
  1. What is his job title?
  2. What event is he the Official Pronouncer for?
  3. How many years has he been at UIC?
  4. What is his favorite apparel to wear?
  5. What is his newest book about?
  6. Where was he born?

12 Clues: Where was he born?What is his job title?What month was he born?What is one of his hobbies?What is his newest book about?How many years has he been at UIC?What is his favorite apparel to wear?What school did he earn his PhD from?What school did he go to for undergrad?What is the acronym for the New CS Building?...

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Entries due NLT 11/2
  2. Home of the 14th Flying Training Wing of Air Education and Training Command
  3. By David C. Graham
  4. Entries due NLT 10/23
  5. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Do your Part.#BeCyberSmart
  2. Quality Management Principles
  3. Test Monthly

8 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartQuality Management PrinciplesHome of the 14th Flying Training Wing of Air Education and Training CommandTo be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees

Hacktivism Vocabulary Crossword 2 2023-05-09

Hacktivism Vocabulary Crossword 2 crossword puzzle
Across
  1. protecting an organization and its employees against cyber threats
  2. a person or thing likely to cause damage or danger
  3. a hacker with bad intentions
Down
  1. an attempt by hackers to damage or destroy a computer network or system
  2. a legal hacker hired by a company or government
  3. reveal
  4. take something that is not yours
  5. to search

8 Clues: revealto searcha hacker with bad intentionstake something that is not yoursa legal hacker hired by a company or governmenta person or thing likely to cause damage or dangerprotecting an organization and its employees against cyber threatsan attempt by hackers to damage or destroy a computer network or system

Computer Science 2025-09-11

Computer Science crossword puzzle
Across
  1. a graph that plots data using bars
  2. your credibility to use the internet
  3. bullying using the internet
  4. someone you should inform during a bullying situation
  5. online credentials to an account on the internet
  6. the Brains of the computer
  7. Your own information on the internet
  8. a person who witnesses bullying
Down
  1. a component that connects your major components of the computer
  2. usng someone else's work without giving credit to the author
  3. the physical components of a computer
  4. your history on the internet
  5. harmful to your computer/ the internet
  6. one of the most common software applications
  7. a place where people can connect with others
  8. The process of protecting yourself on the internet

16 Clues: the Brains of the computerbullying using the internetyour history on the interneta person who witnesses bullyinga graph that plots data using barsyour credibility to use the internetYour own information on the internetthe physical components of a computerharmful to your computer/ the internetone of the most common software applications...

IELTS Science & Tech Vocabulary 2025-09-03

IELTS Science & Tech Vocabulary crossword puzzle
Across
  1. A sudden and important discovery or development
  2. The investigation of outer space through tech
  3. A new method, idea, or product
  4. Highly advanced and innovative
  5. Based on or guided by data
  6. The most advanced or sophisticated version available
  7. The imitation of intelligent human behavior
  8. The period characterized by the internet
  9. The gap between those with and without technology
Down
  1. Technology dealing with robots
  2. Involving advanced technological development
  3. High levels of technological development
  4. The use of machines to perform tasks without human involvement
  5. A digital space used for interaction or services
  6. The practice of protecting systems and networks from attacks
  7. Easy to understand or use

16 Clues: Easy to understand or useBased on or guided by dataTechnology dealing with robotsA new method, idea, or productHighly advanced and innovativeHigh levels of technological developmentThe period characterized by the internetThe imitation of intelligent human behaviorInvolving advanced technological development...

tema 2 perkembangan ekonomi digital 2025-10-27

tema 2 perkembangan ekonomi digital crossword puzzle
Across
  1. digital menciptakan pekerjaan baru berbasis → TEKNOLOGI
  2. besar yang digunakan untuk analisis bisnis disebut → BIGDATA
  3. baru berbasis teknologi disebut → STARTUP
  4. keuangan secara online disebut → EBANKING
  5. depan ekonomi digital bergantung pada literasi → DIGITAL
  6. dan GrabFood merupakan layanan → DIGITALDELIVERY
  7. merupakan singkatan dari → FINANCIALTECHNOLOGY
  8. pemerintah untuk mendukung ekonomi digital UMKM disebut → DIGITALISASIUMKM
  9. utama dalam ekonomi digital adalah keamanan data dan → PRIVASI
  10. melalui marketplace online termasuk kegiatan → EKOMERCE
  11. transaksi online dikenal dengan istilah → CYBERSECURITY
  12. ekonomi digital adalah kebocoran → DATA
Down
  1. buatan dikenal juga dengan istilah → ARTIFICIALINTELLIGENCE
  2. aplikasi fintech di Indonesia adalah → OVO
  3. ekonomi yang memanfaatkan teknologi digital dan internet → EKONOMIDIGITAL
  4. melalui media sosial disebut → DIGITALMARKETING
  5. Shopee, dan Lazada adalah contoh platform → MARKETPLACE
  6. utama ekonomi digital adalah mempercepat → TRANSAKSI
  7. tanpa uang tunai menggunakan kartu atau aplikasi disebut → EMONEY
  8. usaha kecil dapat menjangkau pasar luas melalui → INTERNET

20 Clues: ekonomi digital adalah kebocoran → DATAbaru berbasis teknologi disebut → STARTUPkeuangan secara online disebut → EBANKINGaplikasi fintech di Indonesia adalah → OVOmerupakan singkatan dari → FINANCIALTECHNOLOGYmelalui media sosial disebut → DIGITALMARKETINGdan GrabFood merupakan layanan → DIGITALDELIVERY...

TEMA 2 TTS perkembangan ekonomi digital M.mumthazul fikri 9A 2025-10-22

TEMA 2 TTS perkembangan ekonomi digital M.mumthazul fikri 9A crossword puzzle
Across
  1. , Kegiatan ekonomi melalui media internet.
  2. ,Singkatan dari teknologi kecerdasan buatan dalam bahasa Inggris.
  3. kredit , Alat pembayaran berbentuk kartu dari bank.
  4. , Aplikasi belanja online yang berwarna oranye.
  5. banking , Layanan bank yang sepenuhnya berbasis internet.
  6. Salah satu dompet digital terkenal di Indonesia.
  7. Sistem pembayaran tanpa uang tunai.
  8. , Sistem keamanan siber untuk perlindungan data.
  9. , Proses jual beli yang terjadi secara online.
  10. , Salah satu e-wallet milik Gojek.
Down
  1. Bentuk pasar digital tempat jual beli online.
  2. , Teknologi virtual yang berkembang bersama ekonomi digital.
  3. , Perusahaan teknologi keuangan disebut ...
  4. Bentuk uang yang hanya bisa digunakan secara elektronik.
  5. , Mata uang kripto pertama di dunia.
  6. , Mata uang digital resmi dari bank sentral disebut.
  7. , Metode pembayaran dengan memindai kode.
  8. , Transaksi keuangan melalui jaringan komputer disebut ...
  9. Teknologi dasar dari mata uang kripto.
  10. Mata uang digital yang populer dan terdesentralisasi.

20 Clues: , Salah satu e-wallet milik Gojek.Sistem pembayaran tanpa uang tunai., Mata uang kripto pertama di dunia.Teknologi dasar dari mata uang kripto., Metode pembayaran dengan memindai kode., Kegiatan ekonomi melalui media internet., Perusahaan teknologi keuangan disebut ...Bentuk pasar digital tempat jual beli online....

Senior Management Knowledge 2024-12-25

Senior Management Knowledge crossword puzzle
Across
  1. Largest threat to Bank.
  2. Bank’s #1 Strength.
  3. Financial guide for the Bank.
  4. Beliefs about what will happen in the future.
  5. An unexpected event that could have a negative impact on the Bank.
  6. Fun for all associates.
  7. Coin or what people fear the most.
Down
  1. The ability of an asset to be quickly and easily converted to cash.
  2. The feeling or belief that one can rely on someone or something thing.
  3. The process of determining a borrower’s creditworthiness.
  4. Interest free checking accounts.
  5. A formal agreement to repay a debt.
  6. Number #1 challenge of FNB.
  7. Bank’s core system.
  8. Bank’s define market area.
  9. Official inspection or Necessity for all Banks.

16 Clues: Bank’s #1 Strength.Bank’s core system.Largest threat to Bank.Fun for all associates.Bank’s define market area.Number #1 challenge of FNB.Financial guide for the Bank.Interest free checking accounts.Coin or what people fear the most.A formal agreement to repay a debt.Beliefs about what will happen in the future....

Senior Management Knowledge 2024-12-25

Senior Management Knowledge crossword puzzle
Across
  1. Number #1 challenge of FNB.
  2. The feeling or belief that one can rely on someone or something thing.
  3. Largest threat to Bank.
  4. An unexpected event that could have a negative impact on the Bank.
  5. Financial guide for the Bank.
  6. A formal agreement to repay a debt.
  7. Official inspection or Necessity for all Banks.
Down
  1. Bank’s #1 Strength.
  2. Coin or what people fear the most.
  3. Bank’s define market area.
  4. The ability of an asset to be quickly and easily converted to cash.
  5. The process of determining a borrower’s creditworthiness.
  6. Interest free checking accounts.
  7. Beliefs about what will happen in the future.
  8. Bank’s core system.
  9. Fun for all associates.

16 Clues: Bank’s #1 Strength.Bank’s core system.Largest threat to Bank.Fun for all associates.Bank’s define market area.Number #1 challenge of FNB.Financial guide for the Bank.Interest free checking accounts.Coin or what people fear the most.A formal agreement to repay a debt.Beliefs about what will happen in the future....