cybersecurity Crossword Puzzles
Digital Communications 2025-05-08
Across
- Procedures used to protect data from unauthorised access
- A very obvious password
- Act of spies hacking or infiltrating internet systems
- Attackers impersonate legitimate entities, often through emails or fake websites
- The first form of the Internet
Down
- Set of 8 characters either 0's or 1's
- Small bundles of data
- Malicious software
- Common web search engine
9 Clues: Malicious software • Small bundles of data • A very obvious password • Common web search engine • The first form of the Internet • Set of 8 characters either 0's or 1's • Act of spies hacking or infiltrating internet systems • Procedures used to protect data from unauthorised access • Attackers impersonate legitimate entities, often through emails or fake websites
CYSIAM Crossword 2025-08-11
Across
- Encrypted communication channel (abbreviation)
- A secret word or phrase used to gain access
- A network of infected devices
- A program that replicates itself and spreads
- A scam where attackers trick users into giving up
- The practice of protecting systems and data
Down
- Code flaw that can be exploited
- Type of attack where services are overwhelmed(abbreviation
- Malicious software
9 Clues: Malicious software • A network of infected devices • Code flaw that can be exploited • A secret word or phrase used to gain access • The practice of protecting systems and data • A program that replicates itself and spreads • Encrypted communication channel (abbreviation) • A scam where attackers trick users into giving up • ...
You can fight back against cyberattacks - Facetime 2022-03-07
Across
- Short-lived fault in a system.
- Defect in a system's design
- A way to correct issues in devices.
- The service that was impacted by the issue
- The entity who makes something
Down
- A gap, break or a hole in something
- Be able to keep your personal info private
- Ways of protecting informatic systems
- To respond to a knock or ring
- Biggest tech company in the world
10 Clues: Defect in a system's design • To respond to a knock or ring • Short-lived fault in a system. • The entity who makes something • Biggest tech company in the world • A gap, break or a hole in something • A way to correct issues in devices. • Ways of protecting informatic systems • Be able to keep your personal info private • The service that was impacted by the issue
AI in business 2023-11-20
Across
- organizational entity or an individual engaged in commercial, industrial, or professional activities
- How many jobs will be created by AI
- biggest AI software
- simulation of human intelligence processes by computer inteligence
- Person that created ChatGpt
- AI-driven data insights for decision-making
Down
- AI technique predicting future outcomes
- AI application automating tasks
- refers to the application of scientific knowledge for practical purposes.
- AI application enhancing cybersecurity
10 Clues: biggest AI software • Person that created ChatGpt • AI application automating tasks • How many jobs will be created by AI • AI application enhancing cybersecurity • AI technique predicting future outcomes • AI-driven data insights for decision-making • simulation of human intelligence processes by computer inteligence • ...
sdaia crossword 2024-10-31
Across
- Safeguarding personal information
- Collections of data
- Protecting digital information and systems
- An AI and art collaboration challenge
Down
- A city that uses technology to improve quality of life
- Competition encouraging open data innovation
- A special coworker we will miss!
- A strategic framework for Saudi Arabia's economic diversification
- First Saudi summit for global data and AI experts
- SDAIA's mission includes harnessing this technology to drive progress
10 Clues: Collections of data • A special coworker we will miss! • Safeguarding personal information • An AI and art collaboration challenge • Protecting digital information and systems • Competition encouraging open data innovation • First Saudi summit for global data and AI experts • A city that uses technology to improve quality of life • ...
Vanessa & Jinsik <3 2024-10-24
Across
- What does Jinsik do for work?
- Where did Jinsik propose at?
- Where do Vanessa and Jinsik live?
- four How old is Vanessa?
- How many kids do Vanessa and Jinsik want?
Down
- How did Vanessa and Jinsik meet?
- What does Vanessa do for work?
- How old is Jinsik?
- How many people are in the wedding party?
- Where are Vanessa and Jinsik going for their honeymoon?
- What holiday were Vanessa and Jinsik celebrating when they met?
11 Clues: How old is Jinsik? • four How old is Vanessa? • Where did Jinsik propose at? • What does Jinsik do for work? • What does Vanessa do for work? • How did Vanessa and Jinsik meet? • Where do Vanessa and Jinsik live? • How many people are in the wedding party? • How many kids do Vanessa and Jinsik want? • Where are Vanessa and Jinsik going for their honeymoon? • ...
Cybersecurity & Data Protection 2022-11-16
Across
- One of the acronyms in the data breach response plan CARE framework.
- I am one possible cause of a data breach
- It is phising with text messages
- Stop and think before you download
- I identify, assess and address personal data protection risks specific to SCC.
- I run like scam ads
- I process personal data on behalf of SCC
Down
- These should not be left around the office
- Do this over email links to display URL
- A malicious software. You cannot access your files unless you pay a ransom
- I file incident reports to PDPC if necessary.
- Who you gonna call when a data breach is suspected or confirmed?
12 Clues: I run like scam ads • It is phising with text messages • Stop and think before you download • Do this over email links to display URL • I am one possible cause of a data breach • I process personal data on behalf of SCC • These should not be left around the office • I file incident reports to PDPC if necessary. • ...
CyberSecurity Awareness 2021 2021-10-15
Across
- the art of manipulating, influencing or deceiving you in order to gain control over your computer system.
- considered one or the best places to work
- subject matter of the most clicked on email from our 11/14/21 phish campaign
- October is Awareness Month for this
- disruptive, unsolicited messages (such as emails, text messages, or Internet postings) especially commercial messages, sent to a large number of recipients or posted in a large number of places.
- a method used by social engineers to gain access to a building or other protected area.
- 123456 and MyDOB01012010 are examples of what kind of Password?
Down
- the process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity.
- subject matter of the most clicked on email from our 11/07/21 phish campaign
- misspelled words and a sense of urgency for you to take a questionable action an email, are be considered to be recognizable what?
- type of phishing that is a small, focused, targeted attack via email on a particular person or organization with the goal to penetrate their defenses.
- MyCowRanAwayToTheMoon is an example of a
12 Clues: October is Awareness Month for this • MyCowRanAwayToTheMoon is an example of a • considered one or the best places to work • 123456 and MyDOB01012010 are examples of what kind of Password? • subject matter of the most clicked on email from our 11/07/21 phish campaign • subject matter of the most clicked on email from our 11/14/21 phish campaign • ...
Cybersecurity Awareness Crossword 2025-08-27
Across
- general cybersecurity practices
- malicious software
- malicious software that locks your files until a demanded payment is made
- proves that someone is who they say they are
- malicious email, generally attempts to get you to click a link or download a malicious file
Down
- a software update
- an mfa type that is related to something unique to you; ie- fingerprint, facial recognition, etc.
- "___ Trust"; a model where no one is trusted by default
- uses more than one type of authentication to verify a user identity
- stored in your browser to track users across websites and remember preferences; "Third-Party ___ "
- when unauthorized access to data or a system is made (hacked)
- global network (web) of computers that are connected and can share information with each other
12 Clues: a software update • malicious software • general cybersecurity practices • proves that someone is who they say they are • "___ Trust"; a model where no one is trusted by default • when unauthorized access to data or a system is made (hacked) • uses more than one type of authentication to verify a user identity • ...
Crossword 1 2023-11-24
Across
- What does the middle 'w' stand for in www.?
- A record of your details
- A complex code used to gain access
- A computer for your lap
- A small book to record your thoughts and secrets
- Protecting your computer systems and information from harm
- What allows you to write digital letters?
Down
- Lightweight portable speakers for your head
- Small mammal often chased by cats
- A device used for observing, checking, or keeping a continuous record of something
- A string of metal
- A collection of information
12 Clues: A string of metal • A computer for your lap • A record of your details • A collection of information • Small mammal often chased by cats • A complex code used to gain access • What allows you to write digital letters? • Lightweight portable speakers for your head • What does the middle 'w' stand for in www.? • A small book to record your thoughts and secrets • ...
Digital Strategy 2025-11-03
Across
- predicting future demand for products
- software for managing business processes.
- Raw facts and figures used for analytics
- the process of sourcing and purchasing goods or services.
- monitoring the movement of goods.
- operating on an international scale
Down
- Network of suppliers, manufacturers and costumers
- Protecting systems and data from cyber threats
- Technology enabling remote access to computing resources
- a measurable value to evaluate performance.
- Automated tool that interacts with users via text or voice
- Step-by-step procedure for solving a problem
12 Clues: monitoring the movement of goods. • operating on an international scale • predicting future demand for products • Raw facts and figures used for analytics • software for managing business processes. • a measurable value to evaluate performance. • Step-by-step procedure for solving a problem • Protecting systems and data from cyber threats • ...
mari 2024-05-20
Across
- a decentralized digital currency
- the application of conceptual knowledge for
- a wide range of criminal activity that are
- providing the appearance of smth without reality
- practice and study of techniques for secure
- the process of writing computer software code
Down
- study and experimentation of algorithmic process
- a public distributed ledger of lists of records
- protection of computer systems and networks
- collection of accounts in which accounting
- a potential for vulnerabilities to turn into
- a digital currency designated to work as
- a device that can make and receive calls over
- the minimum amount of any physical entity involved
- the opposite of natural
15 Clues: the opposite of natural • a decentralized digital currency • a digital currency designated to work as • collection of accounts in which accounting • a wide range of criminal activity that are • protection of computer systems and networks • the application of conceptual knowledge for • practice and study of techniques for secure • ...
Cyber Security 2016-05-24
7 Clues: What is my name? • What are we here for? • virtual private network • email that has no meaning • strong authenticater for access • Steals data and holds it for ransom • pesky thing that goofs up my computer
Cybersecurity Awareness Month - Crossword 1 - Easy - Cybersecurity 2025-08-25
Across
- The practice of protecting computers and networks from digital threats like hackers and viruses.
- Harmful software designed to damage or disrupt systems
- Unwanted or junk email messages
- Someone who breaks into computer systems, often illegally
- A secret string used to verify identity
- A scam where attackers trick you into giving up personal info via fake emails
Down
- Cyber Security Awareness Month is observed in ---?
- A type of malware disguised as a legitimate program
- A digital barrier that blocks unauthorized access to a network
- Software that detects and removes viruses and other malwares
- The name you use to log into a computer or website account.
- A copy of your data saved in case something goes wrong
12 Clues: Unwanted or junk email messages • A secret string used to verify identity • Cyber Security Awareness Month is observed in ---? • A type of malware disguised as a legitimate program • Harmful software designed to damage or disrupt systems • A copy of your data saved in case something goes wrong • Someone who breaks into computer systems, often illegally • ...
TNEG: Cybersecurity for Notaries - Notary Cybersecurity Essentials 2026-02-16
Across
- A secret string used to access your devices or accounts.
- Remote Online Notarization (abbreviation).
- A copy of important files stored for recovery.
- A fraudulent email attempt to steal sensitive information.
- Information that must be kept private and secure.
- Harmful software designed to damage or access systems.
- An added layer of login protection beyond a password.
Down
- A secure connection used when working remotely.
- Unauthorized access to sensitive data.
- The process of verifying identity before granting access.
- A software or hardware barrier that protects your network.
- A security method that scrambles data to protect it from unauthorized access.
12 Clues: Unauthorized access to sensitive data. • Remote Online Notarization (abbreviation). • A copy of important files stored for recovery. • A secure connection used when working remotely. • Information that must be kept private and secure. • An added layer of login protection beyond a password. • Harmful software designed to damage or access systems. • ...
Crossword Puzzle 2023-11-14
Across
- Malicious software designed to gain access to your devices
- The process of verifying the identity of a user or device before granting access to systems and data
- A crucial cybersecurity practice involving making copies of data to prevent loss in case of a ransomware attack
- In the context of supply chain attacks, this is a critical factor between partners that can be exploited by cybercriminals to infiltrate networks
- A tactic used in AI-assisted attacks where attackers mimic a trusted entity to deceive victims, often through sophisticated methods
- A cybersecurity threat that could be exploited to gain unauthorized access or cause harm by targeting less-secure elements in the supply network
Down
- A type of security measure that uses unique physical characteristics for user identification
- A fundamental principle in data privacy, requiring explicit permission before collecting, using, or sharing personal information
- A common tactic used in social engineering where the attacker creates a sense of immediate action to bypass rational decision-making
- A type of AI technology used in sophisticated cyberattacks, involving learning from data to improve over time
- An incident where personal or confidential information is accessed or disclosed without authorization, requiring immediate response and remediation
- A deceptive attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication
12 Clues: Malicious software designed to gain access to your devices • A type of security measure that uses unique physical characteristics for user identification • The process of verifying the identity of a user or device before granting access to systems and data • ...
Intricacy 2022-11-22
Across
- Mark
- Course which CMR NPS doesn't provide but CMR PU does
- Without this no computer would exist
- Nanobots assemble
- You do not fart in apple store because there are no _______
- Method of communication
- Present continuous tense of a device
- _______ explorer
- Of no use without a physical interface
- _______ assistant or Facebook Meta
Down
- Nanobots are from which category
- Reduces manforce
- Norbert Wiener: "the study of control and communication in the animal and the machine"
- Base of every project
- The computer isn't working, it's likely a system _______
- You do not want this on your device
- e-storage
- Firewall is a type of _______
- The creation of the Mars Rover falls mainly under which field?
- The bane of every iOS user
20 Clues: Mark • e-storage • Reduces manforce • _______ explorer • Nanobots assemble • Base of every project • Method of communication • The bane of every iOS user • Firewall is a type of _______ • Nanobots are from which category • _______ assistant or Facebook Meta • You do not want this on your device • Without this no computer would exist • Present continuous tense of a device • ...
DAMPAK SOSIAL INFORMATIKA DAN JARINGAN KOMPUTER INTERNET 2025-11-14
Across
- Media yang digunakan untuk berinteraksi secara online
- Teknologi yang memungkinkan penyimpanan data secara online
- Keamanan data di internet
- Jaringan komputer terbesar di dunia
- Informasi palsu yang disebarkan melalui media digital
- Penyebaran informasi yang sangat cepat melalui internet
- Dampak negatif internet berupa pengurangan interaksi langsun
- Kegiatan mengawasi aktivitas orang melalui dunia maya
- Program jahat yang dapat merusak sistem komputer
- Tindakan mencuri data melalui jaringan komputer
Down
- Kecanduan bermain game online
- Transaksi jual beli melalui internet
- Komunikasi jarak jauh menggunakan video
- Aktivitas membeli dan membayar melalui aplikasi
- Kegiatan belajar menggunakan jaringan internet
- Ruang penyimpanan yang digunakan untuk berbagi file
- Komentar kasar atau menyerang di dunia maya
- Dampak positif internet pada komunikasi
- Penyakit yang muncul akibat terlalu lama menatap layar
- Kemampuan bekerja dari jarak jauh melalui internet
20 Clues: Keamanan data di internet • Kecanduan bermain game online • Jaringan komputer terbesar di dunia • Transaksi jual beli melalui internet • Komunikasi jarak jauh menggunakan video • Dampak positif internet pada komunikasi • Komentar kasar atau menyerang di dunia maya • Kegiatan belajar menggunakan jaringan internet • Aktivitas membeli dan membayar melalui aplikasi • ...
FITCVocab.jd 2013-05-15
Across
- internet service provided
- it delivers internet to computers
- no wires
- protects your computer
- you find engines
- like this that do are not part of the computer ex. printer,mouse
- a display for computer/screen
- using good behaviors on computer
- lets you have wirless
- a output device that is there to click things on computer
- being safe on the internet
Down
- designed to find info ex. google
- something that plugs into a computer ex. printer, mouse
- who is contacting
- a mini computer that ca you can play on and look things up
- controls computer main contol
- the lights that make up the screen
- ramdom access memory
- central processing unit
- download put in computer
20 Clues: no wires • you find engines • who is contacting • ramdom access memory • lets you have wirless • protects your computer • central processing unit • download put in computer • internet service provided • being safe on the internet • controls computer main contol • a display for computer/screen • designed to find info ex. google • using good behaviors on computer • ...
Harryclyde 2023-01-02
Across
- How many true friends
- Second high school
- British part of my name
- first time I almost died
- Where was I born
- College major
- first city we moved to in the US
- sport I played in high school
- a place I really want to visit
- how old was I when I migrated to the US
- allergies
- love language
- 17% of Cameroon
- I love your
Down
- First high school
- another time I almost died (told you this)
- 83% of cameroon
- Catch me exploring in
- type of movies I like
- Personality type.
- nick name for for the baby
- French part of my name
- we both like this movie
- The baby’s name
- favorite animal
- Region what region I was raised
26 Clues: allergies • I love your • College major • love language • 83% of cameroon • The baby’s name • favorite animal • 17% of Cameroon • Where was I born • First high school • Personality type. • Second high school • Catch me exploring in • How many true friends • type of movies I like • French part of my name • we both like this movie • British part of my name • first time I almost died • ...
lushi and john 2025-02-22
Across
- Who is older between them
- First international trip destination
- Month of dating anniversary
- First date restaurant
- Favorite shared activity
- Total countries visited together
- John’s middle name
- Color of John’s eyes
- Place where John proposed
- John’s go-to drink
- Lushi’s favorite cuisine
- Total number of their dogs
- Name of their corgi
- Lushi’s favorite dessert
- Lushi’s favorite holiday
- John’s favorite music band
- John’s favorite food
- Month of their engagement
Down
- Lushi’s favorite snack to make
- Lushi’s favorite time of year
- City they live in
- John’s work industry
- Lushi’s favorite color
- John’s hometown
- Their dream honeymoon destination
- University John attended
- Lushi’s favorite board game
- City where they met
- John’s favorite video game
29 Clues: John’s hometown • City they live in • John’s middle name • John’s go-to drink • Name of their corgi • City where they met • John’s work industry • Color of John’s eyes • John’s favorite food • First date restaurant • Lushi’s favorite color • Favorite shared activity • Lushi’s favorite cuisine • University John attended • Lushi’s favorite dessert • Lushi’s favorite holiday • ...
Eva and Clayton 2024-11-23
Across
- Subject Eva studies in graduate school
- Sport played by the couple
- Eva's musical hobby
- Clayton’s favorite food
- Clayton's least favorite food
- Clayton’s favorite movie genre
- Eva's first job
- Subject of Clayton’s bachelor’s degree
- Clayton’s favorite holiday
- Number of years the couple has been together
- Clayton's football team
- Shape of Eva’s birthmark
Down
- Eva’s middle name
- The older half of the couple (bride/groom)
- Clayton’s favorite childhood video game
- English town where Eva lived while studying abroad
- City where the couple currently lives (abbr)
- Couple’s go to breakfast food
- Eva’s favorite TV show
- Eva’s favorite season
- The couple's future furry friend
- Eva's hockey team
- Clayton’s eye color
- Couple’s favorite vacation spot
- Mascot of the couple's alma mater (abbr)
25 Clues: Eva's first job • Eva's hockey team • Eva's musical hobby • Clayton’s eye color • Eva’s middle name • Eva’s favorite TV show • Clayton’s favorite food • Clayton's football team • Eva’s favorite season • Clayton’s favorite holiday • Shape of Eva’s birthmark • Clayton's least favorite food • Couple’s go to breakfast food • Sport played by the couple • ...
STEM Quest: Discovering Careers and Concepts at Idaho National Laboratory 2025-07-18
Across
- Type of engineer that designs and builds machines
- A person who designs buildings, roads, and bridges
- Tiny basic building block of all matter
- Where is INL located?
- Process of splitting an atom to create nuclear power
- A person who writes computer programs
Down
- Person who analyzes experiments in science at INL
- Energy released in a reactor
- First atomic-powered town in 1951
- Science, Technology, Engineering, and Math
- (Advanced Test Reactor) A unique reactor at INL used for testing materials
- The L in INL
- Protecting computers and networks from attacks
- Scientists use these to test their ideas
14 Clues: The L in INL • Where is INL located? • Energy released in a reactor • First atomic-powered town in 1951 • A person who writes computer programs • Tiny basic building block of all matter • Scientists use these to test their ideas • Science, Technology, Engineering, and Math • Protecting computers and networks from attacks • Person who analyzes experiments in science at INL • ...
Computer Article Crossword 2015-06-10
Across
- Very important and possibly dangerous
- The month which the hack happened
- Far away from anything else
- The Chairman of the Senate Armed Services Committee
- Keeping people safe on the Internet
- Breaking into a secure area
- To put together information
- To break into a secure area on the internet
Down
- Stealing someone's personal details
- All over the world
- The abbreviation for The Office of Personnel Management
- One billion people have access to Facebook on.......
- The Name of Mark Zuckerberg's company
- The name of the new App Zuckerberg is releasing
- The ........ Intelligence Committee which released information about the cyber attack
- The Country blamed for the hacking of American databases
- The President of America
17 Clues: All over the world • The President of America • Far away from anything else • Breaking into a secure area • To put together information • The month which the hack happened • Stealing someone's personal details • Keeping people safe on the Internet • Very important and possibly dangerous • The Name of Mark Zuckerberg's company • To break into a secure area on the internet • ...
2025 Grad Crossword 2025-05-29
Across
- What does Ben plan to study at LCSC?
- Eliza will be going to school here
- Ben's favorite sport
- The last letter in PCHE stands for _______
- Isabella has a degree in information _______
- What does Denae plan to become?
- The song Ben is signing "________ of Jesus"
Down
- The second letter in PCHE stands for _______
- The first letter in PCHE stands for _______
- Who is the PCHE president?
- The name of the processional "____ and Circumstance"
- What is Isabella planning to study at LCSC?
- The third letter in PCHE stands for _______
- What is Eliza planning to study at NSA?
- What does Garrett plan to study after Bible School?
- Denae's hobby
- Program Garrett will attend in Texas
17 Clues: Denae's hobby • Ben's favorite sport • Who is the PCHE president? • What does Denae plan to become? • Eliza will be going to school here • What does Ben plan to study at LCSC? • Program Garrett will attend in Texas • What is Eliza planning to study at NSA? • The last letter in PCHE stands for _______ • The first letter in PCHE stands for _______ • ...
The Voice: October 2nd, 2023 2023-10-02
Across
- One of the new members highlighted!
- What curriculum is Alberta Education redrafting?
- DS Tax
- Someone who can help with templates and shortcuts!
Down
- Be a ________ of the 2026 Special Olympics Summer Games!
- What awareness month is October?
- 2023 ______ Breakfast coming up.
- Minister on Agriculture under Advocacy in Action.
8 Clues: DS Tax • What awareness month is October? • 2023 ______ Breakfast coming up. • One of the new members highlighted! • What curriculum is Alberta Education redrafting? • Minister on Agriculture under Advocacy in Action. • Someone who can help with templates and shortcuts! • Be a ________ of the 2026 Special Olympics Summer Games!
cybersecurity 2023-03-03
Across
- The practice of protecting computer systems from theft, damage, and unauthorized access. (11)
- A software program designed to prevent unauthorized access to a computer system. (8)
Down
- A type of attack that attempts to overwhelm a system with traffic. (4)
- A type of cyber attack that attempts to obtain sensitive information by tricking users. (6)
- A type of encryption that uses two keys to encrypt and decrypt data. (3)
5 Clues: A type of attack that attempts to overwhelm a system with traffic. (4) • A type of encryption that uses two keys to encrypt and decrypt data. (3) • A software program designed to prevent unauthorized access to a computer system. (8) • A type of cyber attack that attempts to obtain sensitive information by tricking users. (6) • ...
Cybersecurity 2023-05-11
Across
- A process that proves the identity of the user
- The art of writing or solving codes
- A cyberattack carried out by creating a fake website, or compromising/ corrupting a real one, in order to gather information or data on visitors
Down
- The process of encoding or scrambling data to prevent unauthorized people from opening or accessing it
- A cyberattack carried out by sending emails to large numbers of people asking for sensitive information
5 Clues: The art of writing or solving codes • A process that proves the identity of the user • The process of encoding or scrambling data to prevent unauthorized people from opening or accessing it • A cyberattack carried out by sending emails to large numbers of people asking for sensitive information • ...
Cybersecurity 2024-04-23
5 Clues: Ongevraagde mail • Verzamelnaam voor malafide software • Poging tot het achterhalen van persoonlijke gegevens • Software die bestanden infecteert en zich zelf kan vermenigvuldigen • Persoon die ongeoorloofd toegang probeert te krijgen tot een netwerk of computer
Cybersecurity 2019-11-30
Across
- : A malware that spies on your online activities and captures information from your computer, e.g. your web browsing habits, email messages, login credentials, banking and credit card details. It does all this without your knowledge.
- : “VPN” is short for “virtual p______ network”
- : P_______ is when cybercriminals use fake emails to bait their victims to click on a link or download a file containing infectious malware.
Down
- : Short for “malicious software”
- : “IT” is short for “Information Technology”, “OT” is short for “O______ Technology”.
5 Clues: : Short for “malicious software” • : “VPN” is short for “virtual p______ network” • : “IT” is short for “Information Technology”, “OT” is short for “O______ Technology”. • : P_______ is when cybercriminals use fake emails to bait their victims to click on a link or download a file containing infectious malware. • ...
CyberSecurity 2020-08-21
Across
- Persona que por diversos motivos se dedica a manipular sistemas informáticos ajenos
- es un programa informático que tiene el propósito de detectar y eliminar virus y otros programas perjudiciales antes o después de que ingresen al sistema.
Down
- es un software que recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador.
- Programa informático que controla el acceso de una computadora a la red y de elementos de la red a la computadora, por motivos de seguridad.
- Programa que se elabora de manera accidental o intencionada y se introduce en los ordenadores, causando daños en la información contenida en el disco duro.
5 Clues: Persona que por diversos motivos se dedica a manipular sistemas informáticos ajenos • Programa informático que controla el acceso de una computadora a la red y de elementos de la red a la computadora, por motivos de seguridad. • ...
Cybersecurity 2020-08-21
Across
- Correo electrónico no solicitado que se envía a un gran número de destinatarios con fines publicitarios o comerciales.
- Programa informático que controla el acceso de una computadoraa la red y de elementos de la red a la computadora, por motivos de seguridad, evitan que usuarios de Internet no autorizados accedan a redes privadas conectadas a la red.
- Programa que se elabora de manera accidental o intencionada y se introduce en los ordenadores, causando daños en la información contenida en el disco duro. Estos, por lo general, infectan otros archivos del sistema con la intención de modificarlos para destruir archivos o datos almacenados en tu computador.
Down
- Es una estafa que tiene como objetivo obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias.
- Persona que se dedica a detectar fallos de seguridad en sistemas informáticos ajenos.
5 Clues: Persona que se dedica a detectar fallos de seguridad en sistemas informáticos ajenos. • Correo electrónico no solicitado que se envía a un gran número de destinatarios con fines publicitarios o comerciales. • ...
CyberSecurity 2021-09-24
Across
- Should be strong and not shred with anyone
- The protection of information from unauthorized access
Down
- something of either tangible or intangible value that is worth protecting
- Ensures the timely and Reliable access to and use if information systems
- the combination of the probability of an event and its consequence
5 Clues: Should be strong and not shred with anyone • The protection of information from unauthorized access • the combination of the probability of an event and its consequence • Ensures the timely and Reliable access to and use if information systems • something of either tangible or intangible value that is worth protecting
ISSN Day 2 2024-09-09
Across
- Entry-level certification for IT technicians (2 words)
- Career path for someone with CCNA (2 words)
- Network certification from Cisco (acronym)
- Type of device covered in A+ certification, besides computers
Down
- Career path for someone with A+ (2 words)
- Network topic covered in CCNA
- Security topic covered in Security+ certification
- Cybersecurity certification from CompTIA
- Operating system topic covered in A+ certification
9 Clues: Network topic covered in CCNA • Cybersecurity certification from CompTIA • Career path for someone with A+ (2 words) • Network certification from Cisco (acronym) • Career path for someone with CCNA (2 words) • Security topic covered in Security+ certification • Operating system topic covered in A+ certification • Entry-level certification for IT technicians (2 words) • ...
cybersecurity 2025-04-27
Cybersecurity 2025-02-23
Across
- uses an unsecured public network as if it were a secure private network and encrypts data between remote the device and the network
- when you click or execute it, it infects your systems
- security incident that occurs when classified data is shown in an unclassified system or system with lower-level classification
Down
- process that scrambles readable text so it can only be read by the person who has the secret key
- generally install themselves on a computer and collect user data without the user's awareness
5 Clues: when you click or execute it, it infects your systems • generally install themselves on a computer and collect user data without the user's awareness • process that scrambles readable text so it can only be read by the person who has the secret key • ...
Network Components 2022-10-27
Across
- a device used at the customer premises to terminate a dial-up Integrated Services Digital Network line and connect it to a computer or a local area network
- a transmitter and a receiver of signals, such as analog or digital
- a cybersecurity tool that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of cybersecurity rules
- a transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signals
- is a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
Down
- networking devices that connect networks
- a network node used in telecommunications that connects two networks with different transmission protocols together
- a hardware component responsible for relaying data from a computer network to the destination endpoint
8 Clues: networking devices that connect networks • a transmitter and a receiver of signals, such as analog or digital • a transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signals • a hardware component responsible for relaying data from a computer network to the destination endpoint • ...
Cybersecurity Fundamental Chapter 6 2022-10-27
Across
- protect data and information.
- writes data across multiple drives
- can actually improve availability.
- a system or component that is continuously operational for a given length of time.
- as part of an it asset management system, an organization specifies the acceptable it assets that meets its objectives.
- access to data and information reduces the possibility of a threat.
Down
- the most comprehensive protection.
- detects data errors
- assigns all resources of an organization into a group based on common characteristics.
- the weak links in the chain that can cause disruption of the organization's operations.
- analysis the process of analyzing the dangers posed by natural and human-caused events to the assets of an organization.
- changing the controls and procedures at different layers.
- involves reducing the severity of the loss or the likelihood of the loss from occurring.
- combines multiple physical hard disk drives into single logical units to provide data redundancy and improve performance.
- ensures system availability in the event of a component failure.
- systems and services are available 99.999% of the time.
- store duplicate data on second drive.
17 Clues: detects data errors • protect data and information. • the most comprehensive protection. • writes data across multiple drives • can actually improve availability. • store duplicate data on second drive. • systems and services are available 99.999% of the time. • changing the controls and procedures at different layers. • ...
LCA ACTIVITY 2 2024-07-18
Across
- Metric improved by good BI practices
- Type of organization that benefits from BI
- The primary focus of intelligence efforts
- Creating summaries of analyzed data
- Valuable understanding gained from data analysis
- Process of turning data into insights
- Type of analytics answering "What happened?"
- Applications used in business intelligence
- Repositories for storing unstructured data
- Software and hardware supporting BI efforts
- Metaphor for complex business structures
Down
- Pattern identified through data analysis
- Essential plan before construction begins
- Visual tool for displaying business data
- The blueprint for an organization's BI efforts
- Important feature of data management systems
- How data is collected, stored, and accessed
- Databases designed for storing and analyzing data
- Devices used to collect data in manufacturing
- Critical aspect of protecting data
20 Clues: Critical aspect of protecting data • Creating summaries of analyzed data • Metric improved by good BI practices • Process of turning data into insights • Pattern identified through data analysis • Visual tool for displaying business data • Metaphor for complex business structures • Essential plan before construction begins • The primary focus of intelligence efforts • ...
Web Wonders Crossword Challenge 2023-10-09
Across
- - Data protection through coding
- - Wireless internet connection
- - Online buying and selling
- - Tool for finding information on the internet
- - Measures to protect online data and privacy
- - Electronic mail for online communication
- - Content that spreads rapidly online
- - Storage and computing services on the internet
- - Web address identifying a website
- - Symbol used to categorize and search for topics
Down
- - Platforms for sharing content and connecting
- - Software for accessing the web
- - Audio or video series available for streaming
- - Online location with webpages
- - Security system to block unauthorized access
- - Saving files from the internet to a device
- - Real-time media content delivery
- - Clickable link that directs to another webpage
- - Sending files from a device to the internet
- - Online journal or diary
20 Clues: - Online journal or diary • - Online buying and selling • - Wireless internet connection • - Online location with webpages • - Data protection through coding • - Software for accessing the web • - Real-time media content delivery • - Web address identifying a website • - Content that spreads rapidly online • - Electronic mail for online communication • ...
ICS and Hydropower 2024-04-02
Across
- Turbine type operating from fluid pressure.
- System distributing control for efficiency.
- Height of water used to generate pressure.
- Mechanism for moving or controlling a system.
- Protection against digital attacks.
- Interface for human interaction with machines.
- Device detecting changes in environment.
- Device for converting fluid flow into energy.
- A type of turbine used in low-head applications.
Down
- Movement of water through a system.
- Pipe channeling water to turbines.
- Converts mechanical energy to electrical.
- System for remote monitoring and control.
- A communication protocol for devices.
- Type of turbine driven by water jet.
- Programmable controller critical in automation.
- Storage space for water.
- A type of turbine used in medium to high-head applications.
- Security system for network defense.
- Device for remote utility control.
20 Clues: Storage space for water. • Pipe channeling water to turbines. • Device for remote utility control. • Movement of water through a system. • Protection against digital attacks. • Type of turbine driven by water jet. • Security system for network defense. • A communication protocol for devices. • Device detecting changes in environment. • ...
TTS INFORMATIKA 2025-04-10
Across
- Teknologi yang menunjukkan animasi yang berisi unsur budaya
- Memindahkan koneksi internet ke lokasi berbeda sehingga lebih aman saat berselancar
- Mesin pencari dikenal dengan istilah
- Pekerjaan yang menjaga keamanan siber
- Aplikasi pengolah data angka dari Microsoft
- Sintaks pencarian dari Google
- Profesional yang membuat sistem
- Hak kekayaan intelektual berupa lagu atau film
- Simbol atau tanda milik suatu merek
- Mesin pencari selain Google
- Tindakan menyebar konten ke masyarakat
- Hak untuk menggunakan konten tertentu
Down
- Informasi yang mengandung tidak ada kebenaran
- Yang bukan hukum digital (hukum siber – syber law)
- Seseorang yang menciptakan aplikasi
- Kata kunci untuk mencari informasi di internet
- Jenis profesi pembuat perangkat lunak
- Mendeteksi dan menghapus perangkat lunak berbaha
- Profesi bidang data dan informasi
- Bahasa pemrograman web
- Hak cipta dan merek termasuk dalam
21 Clues: Bahasa pemrograman web • Mesin pencari selain Google • Sintaks pencarian dari Google • Profesional yang membuat sistem • Profesi bidang data dan informasi • Hak cipta dan merek termasuk dalam • Seseorang yang menciptakan aplikasi • Simbol atau tanda milik suatu merek • Mesin pencari dikenal dengan istilah • Pekerjaan yang menjaga keamanan siber • ...
IT Terms 2025-05-15
Across
- Internet-based delivery of IT resources.
- Software to manage customer interactions.
- Two-symbol system used by computers.
- Computer system within a larger system.
- Plan for continuing business during disruption.
- Simulates human intelligence in machines.
- Processes and executes instructions (abbr).
- Network of physical devices sharing data.
- Unique address for a device on a network.
- Device connected to a network.
- Visual interface with icons and menus.
- Tech and strategy for analyzing business data.
Down
- Stores data temporarily for quick access.
- Organized collection of electronic data.
- Protects systems from digital threats.
- Converts data into code for security.
- Group of connected computers sharing rules.
- Security device that filters traffic.
- Finding and fixing code issues.
- Set of rules for communication between software components.
20 Clues: Device connected to a network. • Finding and fixing code issues. • Two-symbol system used by computers. • Converts data into code for security. • Security device that filters traffic. • Protects systems from digital threats. • Visual interface with icons and menus. • Computer system within a larger system. • Internet-based delivery of IT resources. • ...
Digital Literacy 2025-10-29
Across
- The software that runs a computer
- Computer thinking
- External devices(mouse,printer,headset)
- fake emails or texts to share data
- Random Access Memory, a type of processing computer memory
- Behaving responsibly and ethically online
- Result
- A software application used to access and navigate the internet
- Locks files until ransom is paid
Down
- Software designed to harm devices or steal info
- The practice of protecting computer systems and networks from theft, damage, or unauthorized access
- Programs that tell hardware what to do
- Working with others in a digital environment
- The trail of data a person leaves behind
- Data entered
- Physical parts of the computer
- unauthorized access to private data
- Unsolicited bulk electronic messages
18 Clues: Result • Data entered • Computer thinking • Physical parts of the computer • Locks files until ransom is paid • The software that runs a computer • fake emails or texts to share data • unauthorized access to private data • Unsolicited bulk electronic messages • Programs that tell hardware what to do • External devices(mouse,printer,headset) • ...
crossword #1 2023-03-15
Across
- Change: Long-term change in global climate patterns.
- Practical application of scientific knowledge.
- Acquisition of knowledge and skills.
- Physical and mental wellbeing.
- Protection of computer systems and data.
- Meeting present needs without compromising future generations.
Down
- Integration and interaction among people, companies, and governments worldwide.
- Setting up a business and taking financial risks for profit.
- Media: Online platforms for creating and sharing content.
- Intelligence: Machines that think and learn like humans.
- Inclusion of people from different backgrounds.
11 Clues: Physical and mental wellbeing. • Acquisition of knowledge and skills. • Protection of computer systems and data. • Practical application of scientific knowledge. • Inclusion of people from different backgrounds. • Change: Long-term change in global climate patterns. • Intelligence: Machines that think and learn like humans. • ...
Kuis Audit TI 2024-03-04
Across
- sistem manajemen audit yang digunakan Itjen
- Audit TIK atas pelaksanaan tusi yang memanfaatkan TIK
- pengendalian proses hanya melihat input dan output
- Salah satu area audit TIK
Down
- Memastikan keselarasan bisnis dan TIK
- pengendalian yang dilakukan oleh manusia tanpa bantuan mesin
- Audit TIK terintegrasi yang dilakukan secara bersamaan
- Audit TIK terintegrasi yang dilakukan secara berurutan
- Auditor harus ... yang artinya memiliki kemampuan untuk melakukan tugas audit
- singkatan dari pengendalian aplikasi
- Pengujian secara sistematis untuk memberikan keyakinan terbatas
11 Clues: Salah satu area audit TIK • singkatan dari pengendalian aplikasi • Memastikan keselarasan bisnis dan TIK • sistem manajemen audit yang digunakan Itjen • pengendalian proses hanya melihat input dan output • Audit TIK atas pelaksanaan tusi yang memanfaatkan TIK • Audit TIK terintegrasi yang dilakukan secara bersamaan • ...
Vanessa and Jinsik <3 2024-09-06
Across
- How many months have Vanessa and Jinsik been together?
- How many people are in the wedding party?
- Where do Vanessa and Jinsik live?
- How did Vanessa and Jinsik meet?
- How old is Vanessa?
- Where did Jinsik propose?
Down
- What does Jinsik do for work?
- Where are Vanessa and Jinsik going for their honeymoon?
- How old is Jinsik?
- What holiday did Vanessa and Jinsik first spend together?
- How many kids do Vanessa and Jinsik want?
11 Clues: How old is Jinsik? • How old is Vanessa? • Where did Jinsik propose? • What does Jinsik do for work? • How did Vanessa and Jinsik meet? • Where do Vanessa and Jinsik live? • How many people are in the wedding party? • How many kids do Vanessa and Jinsik want? • How many months have Vanessa and Jinsik been together? • Where are Vanessa and Jinsik going for their honeymoon? • ...
Group 1 - CSE 167 2022-11-16
Across
- What's the weakest element in Cybersecurity
- The fake folder that acts as bait for hackers.
- The I in the CIA Triad
- The A in the CIA Triad
- All companies should have a ____ framework
Down
- The C in the CIA Triad
- An area that a hacker can use for their benefit
- Websites identify
- A type of key to use in Asymmetric encryption
- How to make a message secret.
- A copy of data that could be lost
11 Clues: Websites identify • The C in the CIA Triad • The I in the CIA Triad • The A in the CIA Triad • How to make a message secret. • A copy of data that could be lost • All companies should have a ____ framework • What's the weakest element in Cybersecurity • A type of key to use in Asymmetric encryption • The fake folder that acts as bait for hackers. • ...
FY26 Q1 2025-10-14
Across
- January training: “Call ___”
- Leaves the forum when they don’t consent to one
- EU regulation keeping the financial sector in check
- CCPA fine was issued in this country
- Cybersecurity Awareness Month theme this year
- Complete by November: “Secure use of ___”
- Workstation compliance training goes live in this month
- If DORA’s vertical, NIS2 must be this
Down
- Under privacy law, it means “forget about me”
- Top-performing MU for SBS
- Fined 5.8 million AUD over data breach
11 Clues: Top-performing MU for SBS • January training: “Call ___” • CCPA fine was issued in this country • If DORA’s vertical, NIS2 must be this • Fined 5.8 million AUD over data breach • Complete by November: “Secure use of ___” • Under privacy law, it means “forget about me” • Cybersecurity Awareness Month theme this year • Leaves the forum when they don’t consent to one • ...
Technology 2025-06-26
6 Clues: small useful device. • improved or made better. • picture of a screen display. • person who loves technology. • video games in virtual reality. • protection of computers and data.
Mechdyne's 30th Anniversary Puzzle 2026-01-05
Across
- A quick discussion at the beginning of a meeting to prevent accidents
- One of our core values us Profit and _____
- Acronym for Audio Visual
- At Mechdyne we strive to "stay ____ the line"
- phrase we use to secure and dedicate an assignment to a teammate
Down
- Apart of the 4 P's
- Mechdyne's headquarters state
- One of Mechdyne's sister companies
- The college the Mechdyne founders attended
- Our people are...
- Popular video conferencing platform used for remote meetings\
- System that protects against cyber threats
- Month dedicated to cybersecurity awareness
- The universal “fix” for most tech problems
14 Clues: Our people are... • Apart of the 4 P's • Acronym for Audio Visual • Mechdyne's headquarters state • One of Mechdyne's sister companies • The college the Mechdyne founders attended • System that protects against cyber threats • Month dedicated to cybersecurity awareness • The universal “fix” for most tech problems • One of our core values us Profit and _____ • ...
PAW 2024 Crossword Puzzle 2024-05-16
Across
- Always access and transmit patient data ________.
- When faxing, ensure that the fax _____-sheet is free of any PHI.
- If someone contacts you requesting information about a confidential patient, the response should be “I do not have any information available for that ______”.
- Snooping may be motivated by _________, concern about the health and well-being of others, interpersonal conflicts, or personal gain.
- Always verify the source of emails and links ______ clicking.
- All access to personal health information must be limited to what is _________ to perform your job duties.
- Loss of _____ by patients and families may be one of the consequences of a privacy breach.
- When verbally disclosing information, _____ the information shared to what is necessary for the purpose.
- The patient must be informed of the purpose of the _________, use, or disclosure of their PHI.
Down
- If you notice anything unusual about your system’s performance or receive __________ messages, report them immediately to our IT cybersecurity team.
- When mailing information, ensure that the person named on the ________ is authorized to receive every document included within.
- A patient may be confidential not only for privacy reasons but also potentially for ______ reasons.
- Check twice that all information is the correct information for the correct person _____ to releasing it.
- If a patient does not wish for it to be disclosed that they are in the facility, they can request to add a ____________ patient flag.
- All access to personal health information must be for a ____ -related need-to-know.
- Consent must be _________, whether it is written or verbal.
- ____________ is a crucial aspect that safeguards both our information and our patients’ trust.
- Contact the ______ ______ if you have been made aware of PHI being disclosed inappropriately.
- Defined by the Information and Privacy Commissioner of Ontario (IPC) as, the unauthorized access of PHI which may be motivated by several factors.
- If a patient has added a restriction to accessing their information, the authorization to override the consent directive must be documented in a ______ manner.
20 Clues: Always access and transmit patient data ________. • Consent must be _________, whether it is written or verbal. • Always verify the source of emails and links ______ clicking. • When faxing, ensure that the fax _____-sheet is free of any PHI. • All access to personal health information must be for a ____ -related need-to-know. • ...
Information and Cyber Security 2021-03-29
Across
- uses asymmetric key encryption
- person who performs a social engineering attack
- What will freezing your credit not affect?
- For online shopping it's best to use...?
Down
- most valuable to companies looking to sell you something
- Requires a carrier file to self-replicate
- What information do you need to set up a wireless access point?
- When is it ok to reuse a password?
- Cyber security month
- Weakest link in cybersecurity
- Continually bombarding a targeted network with fake requests
11 Clues: Cyber security month • Weakest link in cybersecurity • uses asymmetric key encryption • When is it ok to reuse a password? • For online shopping it's best to use...? • Requires a carrier file to self-replicate • What will freezing your credit not affect? • person who performs a social engineering attack • most valuable to companies looking to sell you something • ...
crossword #1 2023-03-15
Across
- Change: Long-term change in global climate patterns.
- Practical application of scientific knowledge.
- Acquisition of knowledge and skills.
- Physical and mental wellbeing.
- Protection of computer systems and data.
- Meeting present needs without compromising future generations.
Down
- Integration and interaction among people, companies, and governments worldwide.
- Setting up a business and taking financial risks for profit.
- Media: Online platforms for creating and sharing content.
- Intelligence: Machines that think and learn like humans.
- Inclusion of people from different backgrounds.
11 Clues: Physical and mental wellbeing. • Acquisition of knowledge and skills. • Protection of computer systems and data. • Practical application of scientific knowledge. • Inclusion of people from different backgrounds. • Change: Long-term change in global climate patterns. • Intelligence: Machines that think and learn like humans. • ...
Total Defence Crossword Puzzle 2025-02-15
Across
- The state of being safe from harm.
- The country that practices Total Defence.
- A serious situation that needs immediate action.
- People who serve in the army to protect the country.
- Living together peacefully despite differences.
- Protection against threats or danger.
Down
- Protecting computers and networks from attacks.
- Working together to achieve a common goal.
- Being prepared for any situation.
- The quality of being strong, physically or mentally.
- The ability to recover from challenges or difficulties.
11 Clues: Being prepared for any situation. • The state of being safe from harm. • Protection against threats or danger. • The country that practices Total Defence. • Working together to achieve a common goal. • Protecting computers and networks from attacks. • Living together peacefully despite differences. • A serious situation that needs immediate action. • ...
Cybersecurity Awareness Month Crossword 2018-09-28
Across
- A form of malware that replicates across computer systems by infecting another piece of software
- Software that runs on the endpoint and prevents malware from accessing the system
- An appliance that sits between your network and the Internet and scans all data passes through
- An attempt by cybersecurity expert to hack into your network and identify any holes in your cybersecurity
- These bad actors may or may not be hackers. Their purpose is to acquire and use stolen information or attack users solely for gain.
- When an attacker sends emails that appear to be legitimate but have links to pharming sites or attachments that contain malware
- Encrypts either a portion or entire computer system and presents the user with a ransom note on how to pay and receive a decryption tool
- These spread across computer systems but self-replicates rather than infecting other software
- A network of hijacked computers a hacker uses for attacking other networks, sending spam or performing calculations such as cryptocurrency mining or cracking stolen passwords
Down
- Any software intended to damage, disable or take control of a computer system without the owner’s consent
- This practice encompasses techniques used by bad actors to trick a person into providing them key information needed for a scheme.
- A hacker that sees their activity as political activism
- Skilled computer users that seek to discover flaws in computer systems that allow them to access part of a system without proper authorization
- A series of software tools that enable an attacker to take control of an operating system at the root level
- A highly targeted phishing attack with information typically acquired through social engineering
- This is a series of numbers, letters, and characters that safeguard accounts. It should be easy to remember but hard to guess
- The process of encoding information so that only authorized individuals can access it
17 Clues: A hacker that sees their activity as political activism • Software that runs on the endpoint and prevents malware from accessing the system • The process of encoding information so that only authorized individuals can access it • These spread across computer systems but self-replicates rather than infecting other software • ...
Crossword Puzzle on Cybersecurity 2026-01-20
Across
- Umbrella term for malicious software.
- Code or technique used to take advantage of a vulnerability.
- Fraudulent attempt to obtain sensitive information through deception.
- Malicious program that records keystrokes.
- Unknown vulnerability with no available patch.
- Security technique that executes programs in an isolated environment.
- Process of verifying a user's identity.
- One-way process used to securely store passwords.
- A weakness that can be exploited by an attacker.
- Harmful component delivered by malware.
Down
- Security device that filters network traffic based on rules.
- Technique used to protect data by converting it into unreadable form.
- Malware designed to hide itself and maintain privileged access.
- Malware that encrypts files and demands payment.
- Group of compromised systems controlled remotely.
- Defines what an authenticated user is allowed to do.
- Unauthorized attempt to access a system.
17 Clues: Umbrella term for malicious software. • Process of verifying a user's identity. • Harmful component delivered by malware. • Unauthorized attempt to access a system. • Malicious program that records keystrokes. • Unknown vulnerability with no available patch. • Malware that encrypts files and demands payment. • A weakness that can be exploited by an attacker. • ...
CYBER AWARENESS 2024-11-02
Across
- A group of experts dedicated to responding to computer security incidents.
- The practice of protecting computer systems and networks from digital attacks.
- The process of converting data into an unreadable format to protect it from unauthorized access.
- Acronym for the process of collecting and analyzing publicly available information to gain insights.
- The unauthorized access to computer systems or networks.
- A notification from your security systems that someone is trying to break in (or, perhaps, has already done so).
- Any malicious act aimed at disrupting, damaging, or stealing information from computer systems or networks.
- A security system that monitors and controls network traffic.
- The process of converting readable data (plaintext) into unreadable code (ciphertext) to protect it from unauthorized access.
- Web The part of the internet that is not indexed by search engines but is accessible through specific URLs.
- Malicious software designed to harm computer systems or networks.
- A network of compromised computers controlled by an attacker.
Down
- Acronym for the process of gathering, analyzing, and interpreting data from social media platforms to gain insights.
- Malware that encrypts a victim's data and demands a ransom for its decryption.
- Deceiving individuals into revealing sensitive information through fraudulent emails or messages.
- The likelihood of a threat exploiting a vulnerability and causing harm.
- A weakness in a system or network that can be exploited by attackers.
- A piece of software or code that takes advantage of a vulnerability to gain unauthorized access.
- The first decentralized digital currency / cryptocurrency in which transactions can be performed without the need for a central bank.
- Web A part of the internet that is not indexed by search engines and requires special software to access.
- A group of information security experts who respond to malware attacks or other computer security incidents.
- Acronym for a software solution designed to streamline and automate various aspects of digital forensic investigations.
- Acronym for a centralized team that combines cybersecurity efforts to better detect, prevent, and respond to cyber threats.
- Illegal activities committed using computer networks or devices.
24 Clues: The unauthorized access to computer systems or networks. • A security system that monitors and controls network traffic. • A network of compromised computers controlled by an attacker. • Illegal activities committed using computer networks or devices. • Malicious software designed to harm computer systems or networks. • ...
crossword #1 2023-03-15
Across
- Change: Long-term change in global climate patterns.
- Practical application of scientific knowledge.
- Acquisition of knowledge and skills.
- Physical and mental wellbeing.
- Protection of computer systems and data.
- Meeting present needs without compromising future generations.
Down
- Integration and interaction among people, companies, and governments worldwide.
- Setting up a business and taking financial risks for profit.
- Media: Online platforms for creating and sharing content.
- Intelligence: Machines that think and learn like humans.
- Inclusion of people from different backgrounds.
11 Clues: Physical and mental wellbeing. • Acquisition of knowledge and skills. • Protection of computer systems and data. • Practical application of scientific knowledge. • Inclusion of people from different backgrounds. • Change: Long-term change in global climate patterns. • Intelligence: Machines that think and learn like humans. • ...
TEKNOLOGI INFORMASI DAN KOMUNIKASI 2025-09-23
Across
- sejajar dengan lantai gunakan penyangga kaki
- harus ada sandaran punggung dan tangan atur ketinggian
- keamanan informasi di internet
- sebuah layanan blog milik geogle
- catatan harian atau jurnal pribadi di internet yang dapat diakses oleh siapa saja.
- individu yang melakukan aktivitas peretasan sistem komputer
Down
- konten lebih banyak mengandung teks
- pusat operasi keamanan siber nasional di indones
- konten dengan format angka, data numerik
- membuat blog dalam format video
- makna yang disampaiakan oleh serangkaian representasi hasil pemprosesan data
11 Clues: keamanan informasi di internet • membuat blog dalam format video • sebuah layanan blog milik geogle • konten lebih banyak mengandung teks • konten dengan format angka, data numerik • sejajar dengan lantai gunakan penyangga kaki • pusat operasi keamanan siber nasional di indones • harus ada sandaran punggung dan tangan atur ketinggian • ...
mari 2024-05-20
Across
- a decentralized digital currency
- the application of conceptual knowledge for
- a wide range of criminal activity that are
- providing the appearance of smth without reality
- practice and study of techniques for secure
- the process of writing computer software code
Down
- study and experimentation of algorithmic process
- a public distributed ledger of lists of records
- protection of computer systems and networks
- collection of accounts in which accounting
- a potential for vulnerabilities to turn into
- a digital currency designated to work as
- a device that can make and receive calls over
- the minimum amount of any physical entity involved
- the opposite of natural
15 Clues: the opposite of natural • a decentralized digital currency • a digital currency designated to work as • collection of accounts in which accounting • a wide range of criminal activity that are • protection of computer systems and networks • the application of conceptual knowledge for • practice and study of techniques for secure • ...
Financial Technology 2026-02-16
Across
- Financial services provided through apps
- trading Automated trading using computerrograms based on pre-set rules.
- Technology FinTech stand for
- WALLET App used to make payments with a smartphone
- Bitcoin is an example of:
- risks Major challenge faced by FinTech companies?
- Process of verifying customer identity
- Raising funds through digital coins
Down
- banking apps one example of FinTech innovation in banks.
- Bank of India organization regulates digital paymentsyment systems in India?
- one example of a peer-to-peer payment app starting with G
- Payments Interface UPI stand for
- Security method using fingerprints or face recognition
- Short code sent to verify online transactions
- banking
- Regulatory technology used to ensure compliance
16 Clues: banking • Bitcoin is an example of: • Technology FinTech stand for • Raising funds through digital coins • Payments Interface UPI stand for • Process of verifying customer identity • Financial services provided through apps • Short code sent to verify online transactions • Regulatory technology used to ensure compliance • ...
test 2026-02-18
Across
- Tətbiqləri konteynerlərdə işlətməyə imkan verən platforma
- Veb səhifələrə interaktivlik qatan proqramlaşdırma dili
- Proqramların bir-biri ilə əlaqə qurmasını təmin edən interfeys
- Veb səhifələrin dizayn və görünüşünü tərtib edən stil dili
- Microsoft tərəfindən hazırlanmış əməliyyat sistemi
- Veb səhifənin strukturunu quran işarələmə dili
- Açıq mənbəli əməliyyat sistemi
- Bulud əsaslı backend xidmətləri təqdim edən platforma
Down
- Server tərəfində JavaScript işlətməyə imkan verən mühit
- İstifadəçi interfeysi yaratmaq üçün JavaScript kitabxanası
- Məlumatların və sistemlərin təhlükəsizliyini təmin edən sahə
- Obyekt yönümlü və platformadan asılı olmayan proqramlaşdırma dili
- Sadə sintaksisli və çox məqsədli proqramlaşdırma dili
- Kodların saxlanıldığı və versiya nəzarəti platforması
- Verilənlər bazası ilə işləmək üçün sorğu dili
15 Clues: Açıq mənbəli əməliyyat sistemi • Verilənlər bazası ilə işləmək üçün sorğu dili • Veb səhifənin strukturunu quran işarələmə dili • Microsoft tərəfindən hazırlanmış əməliyyat sistemi • Sadə sintaksisli və çox məqsədli proqramlaşdırma dili • Kodların saxlanıldığı və versiya nəzarəti platforması • Bulud əsaslı backend xidmətləri təqdim edən platforma • ...
FOP Crossword Puzzle 2023-03-28
Across
- SOCC is in charge of maintaining and building ________ relations.
- SPAI created its own Project _____.
- Gryphons plan & organize ______-___-___ competitions.
- SOCC organized Freshman Orientation ______.
- ______ organized the SOC Open House.
- Gryphons aims to promote ________ to students that are passionate about IT.
Down
- Programming competition only for freshmen.
- SOCC is in charge of events like ____ tournaments, Community Service Events and Sports Events
- SOCA is In charge of ________ relations.
- SEED hosts the ___-___-Series.
- SEED stands for Sharing, _______, Enriching, Development.
- DISM’s SIG.
- SPAI attended and presented at the ____ Conference.
- SPAI is part of the AI Singapore Student ________.
- SOCA’s ________ department is the first point of contact with outside organizations.
15 Clues: DISM’s SIG. • SEED hosts the ___-___-Series. • SPAI created its own Project _____. • ______ organized the SOC Open House. • SOCA is In charge of ________ relations. • Programming competition only for freshmen. • SOCC organized Freshman Orientation ______. • SPAI is part of the AI Singapore Student ________. • SPAI attended and presented at the ____ Conference. • ...
Viruses 2018-04-10
Across
- to preserve or keep safe from harm
- protection from hackers and viruses
- identify the presence of something concealed
- a malware that replicates itself in order to spread
- "in the ____" meaning it is still a threat to your computer
- software that is intended to damage or disable computers
- distributed denial of service
Down
- set of instructions for a computer
- tools, machinery, and other durable equipment
- electronic device for storing and processing data
- someone who uses computers to gain unauthorized access to data
- fake emails
- messages delivered by electronics
- a type of virus that disguises itself as something else
- corrupts your system and can be easily spread
15 Clues: fake emails • distributed denial of service • messages delivered by electronics • set of instructions for a computer • to preserve or keep safe from harm • protection from hackers and viruses • identify the presence of something concealed • tools, machinery, and other durable equipment • corrupts your system and can be easily spread • ...
XoXo Your BIg 2024-10-12
Across
- What do you call a fake noodle?
- Home to summer fun and seaside charm
- I named my car this
- My fav littles major
- America favorite fighting frenchman
- My favorite subject in school
Down
- What do you call a dinosaur with a extensive vocab
- My favorite little name
- My favorite day of the week
- What do you call a bear with no teeth?
- My favorite animal
- I call this salty place home
- My favorite color is
- I’m a dark elixir that many drink to kickstart their day
- I’m a sturdy substance often found underfoot, shaping landscapes and used for building
15 Clues: My favorite animal • I named my car this • My favorite color is • My fav littles major • My favorite little name • My favorite day of the week • I call this salty place home • My favorite subject in school • What do you call a fake noodle? • America favorite fighting frenchman • Home to summer fun and seaside charm • What do you call a bear with no teeth? • ...
Browsing safely 2025-05-26
Across
- Collection of technologies to prevent cybercrimes
- Prevents unauthorised access
- Process of befriending children on social media
- Committing crimes in your name after stealing your identity
- Conducting Terrorism online to cause fear and panic
- Illegal entry into computer systems
- A password valid for few minutes
- Designed to identify,prevent and remove viruses
- Hoaxing or misleading people online
Down
- Computer programs used to corrupt a computer system
- Criminal activity to harm a computer or internet connection
- Unethical hackers
- threat for people who use internet for online shopping,cash transactions and banking services
- Act of harming or harassing people online
- Tricking financial organisation to steal money online
15 Clues: Unethical hackers • Prevents unauthorised access • A password valid for few minutes • Illegal entry into computer systems • Hoaxing or misleading people online • Act of harming or harassing people online • Process of befriending children on social media • Designed to identify,prevent and remove viruses • Collection of technologies to prevent cybercrimes • ...
Technology 2024-01-26
Across
- Smallest unity of information
- Small electronic devices that make your life easier.
- Electronic devices that you can wear as accessories.
- About conersing analog information to a digital ones.
- Intenet of things.
- To protect systems or data from cybernetics attacks.
- Programmable machine to automate processes
Down
- The smallest technology.
- It's used to talk to someone that is far from you.
- A process or set of rules that solve a specific problem.
- Msurament and analysis about unique physical of everyone.
- Aereal no tipulated devices
- Can make tridimensional images to crate optical illusions.
- Generally, the not physical about a computer.
- It's used to protect data encoding the information.
15 Clues: Intenet of things. • The smallest technology. • Aereal no tipulated devices • Smallest unity of information • Programmable machine to automate processes • Generally, the not physical about a computer. • It's used to talk to someone that is far from you. • It's used to protect data encoding the information. • Small electronic devices that make your life easier. • ...
Electricity back 2023-05-30
Across
- Measures the voltage in a circuit
- Measurement of electrical power
- Power lines connecting power supplies to homes in a large area
- A place to plug in a device
- Power used by a device
- Makes your hair stand up, gives a shock
- Online protection
Down
- Too much power at one time
- Transfers electricity from one circuit to another with more or less power
- Portable power supply, can power a remote
- Anything that makes power, like a generator or a battery
- Protects us from electric shocks
- Measures the current in a circuit
- Adjusts the power in a circuit
- Happens again and again
15 Clues: Online protection • Power used by a device • Happens again and again • Too much power at one time • A place to plug in a device • Adjusts the power in a circuit • Measurement of electrical power • Protects us from electric shocks • Measures the voltage in a circuit • Measures the current in a circuit • Makes your hair stand up, gives a shock • ...
soca 2023-03-13
Across
- Type Gryphons plan & organize ______-___-___ competitions
- ______ organized the SOC Open House.
- SEED hosts the ___-___-Series
- SOCC’s _____ department is in charge of planning events
- Programming competition only for freshmen
- SOCA is In charge of ________ relations
- Gryphons aims to promote ________ to students that are passionate about IT
- SOCC is in charge of maintaining and building ________ relations
Down
- SPAI is part of the AI Singapore Student ________
- SPAI attended and presented at the ____ Conference.
- SOCA’s ________ department is the first point of contact with outside organizations.
- SEED stands for Sharing, _______, Enriching, Development
- Gryphon’s Mascot
- SPAI created its own Project _____.
- SOCC organized Freshman Orientation ______
15 Clues: Gryphon’s Mascot • SEED hosts the ___-___-Series • SPAI created its own Project _____. • ______ organized the SOC Open House. • SOCA is In charge of ________ relations • Programming competition only for freshmen • SOCC organized Freshman Orientation ______ • SPAI is part of the AI Singapore Student ________ • SPAI attended and presented at the ____ Conference. • ...
BACO Conference Team Builder 2024-11-20
Across
- – The process of identifying and analyzing risks.
- – Violation of a law, duty, or agreement.
- – Abbreviation for Foreign Corrupt Practices Act.
- – Consequences for failing to follow regulations.
- – Recording and documenting compliance breaches.
- – Procedures to ensure proper operation of systems.
- – A professional responsible for managing compliance.
- – Protecting systems and data from cyber threats.
Down
- – Measures to prevent illicit financial activities.
- – A group responsible for overseeing ethical practices.
- – An in-house review of processes and systems.
- – The act of making information known.
- – Adherence to moral and ethical principles.
- – A set of rules outlining acceptable behaviors.
- – Relating to rules issued by governing bodies.
15 Clues: – The act of making information known. • – Violation of a law, duty, or agreement. • – Adherence to moral and ethical principles. • – An in-house review of processes and systems. • – Relating to rules issued by governing bodies. • – Recording and documenting compliance breaches. • – A set of rules outlining acceptable behaviors. • ...
PROFESI DAN PELUANG USAHA DI BIDANG TKJT 2023-11-17
Across
- Orang yang merancang dan mengembangkan perangkat lunak.
- Orang yang ahli dalam merancang rangkaian listrik.
- Bisnis yang fokus pada pengembangan aplikasi mobile.
- Bisnis yang menyediakan layanan keamanan jaringan.
- Orang yang spesialis dalam keamanan informasi.
Down
- Bisnis yang menyediakan solusi perangkat lunak ERP.
- Orang yang bekerja dengan perangkat keras komputer.
- Bisnis yang menyediakan solusi penyimpanan data.
- Bisnis yang menyediakan layanan cloud computing.
- Orang yang ahli dalam analisis data besar.
10 Clues: Orang yang ahli dalam analisis data besar. • Orang yang spesialis dalam keamanan informasi. • Bisnis yang menyediakan solusi penyimpanan data. • Bisnis yang menyediakan layanan cloud computing. • Orang yang ahli dalam merancang rangkaian listrik. • Bisnis yang menyediakan layanan keamanan jaringan. • Bisnis yang menyediakan solusi perangkat lunak ERP. • ...
WeWork Noble House Community 2022-06-25
Across
- Solving the world's 1 gigaton refrigerant problem
- Pioneer of global content service and distribution
- Offering lead generation services from B2B telemarketing to inside sales
- Supporting diverse clean energy entrepreneurs to thrive
Down
- #DemiMasaDepan #MakingEducationAffordable
- Consumer intelligence platform specializing in mobile advertising
- SaaS platform that makes cybersecurity accessible to all
- Logistics service provider
- Language learning platform, mainly Chinese
- Consumer electronics company, well-known for its technologically advanced smartwatch
10 Clues: Logistics service provider • #DemiMasaDepan #MakingEducationAffordable • Language learning platform, mainly Chinese • Solving the world's 1 gigaton refrigerant problem • Pioneer of global content service and distribution • Supporting diverse clean energy entrepreneurs to thrive • SaaS platform that makes cybersecurity accessible to all • ...
Online Bankling 2025-11-27
7 Clues: Email-based scam • Monthly account reports • A type of money transfer • Illegal financial activity • Protects data during transfer • Protection of computers, networks, and data from digital attacks. • A process used to verify a user’s identity before granting access.
PROFESI DAN PELUANG USAHA 2023-11-17
Across
- Orang yang spesialis dalam keamanan informasi.
- Orang yang merancang dan mengembangkan perangkat lunak.
- Bisnis yang menyediakan layanan cloud computing.
- Orang yang ahli dalam analisis data besar.
- Orang yang bekerja dengan perangkat keras komputer.
- Bisnis yang menyediakan solusi penyimpanan data.
- Bisnis yang fokus pada pengembangan aplikasi mobile.
Down
- Bisnis yang menyediakan solusi perangkat lunak ERP.
- Bisnis yang menyediakan layanan keamanan jaringan.
- Orang yang ahli dalam merancang rangkaian listrik.
10 Clues: Orang yang ahli dalam analisis data besar. • Orang yang spesialis dalam keamanan informasi. • Bisnis yang menyediakan layanan cloud computing. • Bisnis yang menyediakan solusi penyimpanan data. • Bisnis yang menyediakan layanan keamanan jaringan. • Orang yang ahli dalam merancang rangkaian listrik. • Bisnis yang menyediakan solusi perangkat lunak ERP. • ...
English assignment 2024-11-25
Across
- the essence of knowledge
- deployed for the purpose of dealing harm
- a branch of IT tasked with protection of virtual assets
- a core part of identity of something
- a simplified idea for ease of use
Down
- another word for confidential
- given permissions based on confirmed identity
- a way of viewing and dealing with an issue
- to construct a new product
- a broad group within a company; battles a common issue
10 Clues: the essence of knowledge • to construct a new product • another word for confidential • a simplified idea for ease of use • a core part of identity of something • deployed for the purpose of dealing harm • a way of viewing and dealing with an issue • given permissions based on confirmed identity • a broad group within a company; battles a common issue • ...
Cybersecurity 2020-08-21
Across
- They are small files that some websites save on your computer. This little files store information about you, such as username, but they cannot spy on you.
- the junk email people receive. These messages, also known as unsolicited mail, are usually service advertisements.
- it is the practice of protecting systems, networks and programs from digital attacks.
Down
- an electronic device to store and process data, in the way that the user wishes.
- Los virus son programas informáticos que tienen como objetivo alterar el funcionamiento del computador, sin que el usuario lo desee. Estos tienen la intención de destruir o modificar los archivos o datos almacenados en tu computadora.
5 Clues: an electronic device to store and process data, in the way that the user wishes. • it is the practice of protecting systems, networks and programs from digital attacks. • the junk email people receive. These messages, also known as unsolicited mail, are usually service advertisements. • ...
CYBERSECURITY 2021-09-28
Technology Terminology 2022-09-26
Across
- Imaginary creatures that cause unexplained technology problems
- IT protection.
- Computer that manages access to centralized resource.
Down
- American multinational technology corporation based in Washington.
- Location of multiple centralized IT resources.
- Tool used to send and receive data across shared or public networks.
- Data "rains" from here.
- Interconnected people or technology.
8 Clues: IT protection. • Data "rains" from here. • Interconnected people or technology. • Location of multiple centralized IT resources. • Computer that manages access to centralized resource. • Imaginary creatures that cause unexplained technology problems • American multinational technology corporation based in Washington. • ...
Smart System 2021-06-08
7 Clues: maintenance of systems • #1 cons of the smart system • example of smart system - monitoring • application improving quality of life • application that involves wireless sensors • application of tackling with climate change • smart system incorporate functions of sensing, actuation and?
Enterprise manual 2022-06-21
AI 2025-11-07
Across
- Kemampuan AI untuk membuat teks, gambar, atau musik disebut …
- Informasi yang bersifat pribadi dan rahasia disebut …
- Salah satu etika AI: tidak boleh … manusia
- Sistem keamanan yang mencegah akses tidak sah ke jaringan
- Teknologi yang meniru cara berpikir manusia
- AI yang bisa bermain game disebut … AI
- Cybersecurity melindungi dari serangan …
- Teknologi yang memungkinkan komputer memahami bahasa manusia
- AI yang bisa meniru gaya tulisan disebut … AI
- Sistem yang menyimpan dan mengelola data disebut …
- AI yang bisa membuat video dari teks disebut … AI
- AI yang digunakan untuk menganalisis data disebut … AI
- AI bisa belajar dari … yang diberikan
- Sistem yang memverifikasi identitas pengguna, seperti kata sandi
- Cybersecurity melindungi dari serangan …
- AI yang bisa menghasilkan musik disebut … AI
- AI yang bisa mengenali objek dalam gambar disebut … AI
- Teknologi yang digunakan untuk melacak aktivitas pengguna disebut …
- AI harus digunakan secara … dan bertanggung jawab
- AI yang bisa memahami emosi disebut … AI
- Salah satu contoh penggunaan AI di sekolah adalah … otomatis
Down
- AI yang digunakan untuk mengenali suara disebut ...
- Salah satu risiko AI adalah … pekerjaan manusia
- AI yang digunakan untuk membuat gambar dari teks disebut … AI
- Program jahat yang merusak sistem komputer
- Salah satu bentuk pelanggaran etika AI adalah … data tanpa izin
- AI yang bisa menerjemahkan bahasa disebut … AI
- Serangan yang menipu pengguna agar memberikan informasi disebut …
- Kata lain dari keamanan informasi digital
- AI yang bisa berbicara dan menjawab disebut … AI
- AI bisa digunakan untuk membantu … tugas manusia
- Sistem keamanan yang menggunakan sidik jari disebut …
- Sistem keamanan yang mencegah akses tidak sah ke jaringan
- Teknologi yang digunakan untuk mengenali wajah
- Salah satu risiko AI adalah penyebaran … palsu
- Kata sandi yang kuat harus sulit untuk …
- AI yang bisa membuat desain disebut … AI
- Sistem yang menyimpan data secara online disebut …
- Data pribadi harus dijaga agar tidak …
- AI yang digunakan untuk chatbot disebut … AI
- Serangan digital yang bertujuan mencuri data disebut …
41 Clues: AI bisa belajar dari … yang diberikan • AI yang bisa bermain game disebut … AI • Data pribadi harus dijaga agar tidak … • Cybersecurity melindungi dari serangan … • Kata sandi yang kuat harus sulit untuk … • AI yang bisa membuat desain disebut … AI • Cybersecurity melindungi dari serangan … • AI yang bisa memahami emosi disebut … AI • ...
Enterprise manual 2022-06-21
Security Awareness Month 2025 2025-10-07
Across
- the credit card security audit we do
- Fastpass uses ____ to authenticate me to Okta.
- passwords should ____ be stored in plaintext
- the button to report a suspicious email
- the wiki code for the AI Knowledge Base
- our password manager tool
- phiches use ___ to pressure people to click or reply.
- Crowd____ is our AV software.
Down
- a pass____ is more memorable than a password
- the data classification for pii and credit card data
- ___@kayak.com where support tickets can be emailed
- ask-kayak-____ is the Slack channel for cybersecurity questions.
- our remote access tool
- ai tool to search all of kayak
- The Acceptable ____ Policy sets employee security rules
15 Clues: our remote access tool • our password manager tool • Crowd____ is our AV software. • ai tool to search all of kayak • the credit card security audit we do • the button to report a suspicious email • the wiki code for the AI Knowledge Base • a pass____ is more memorable than a password • passwords should ____ be stored in plaintext • ...
Starhub 2025-04-06
Across
- Division offering network and cybersecurity solutions
- What class are we in?
- The forecasted revenue was derived from ____ reports
- Streaming platform competing with PAYTV
Down
- The last presenter of the group
- Key transformation strategy Starhub is undergoing:___ +
- Type of strategy Starhub uses to shift from Telco to Digital solutions player
- Our recommendation on Starhub's shares
- The bargaining power of buyers is ___
9 Clues: What class are we in? • The last presenter of the group • The bargaining power of buyers is ___ • Our recommendation on Starhub's shares • Streaming platform competing with PAYTV • The forecasted revenue was derived from ____ reports • Division offering network and cybersecurity solutions • Key transformation strategy Starhub is undergoing:___ + • ...
Cybersecurity Fundamentals - Chapter 3 2022-10-18
Across
- to make malicious website appear higher in search engine result.
- software that enables a criminal to obtain information about user's computer activities.
- an attack that targes high profile targets within an organization.
- impersonation of a legitimate website
- the program or code introduced by a criminal who has compromised a system
- malicious program that uses a trigger to awaken the malicious code
- malicious code that replicates by independently exploiting vulnerabilities.
- malware that carries out malicious operation under the guise of a desired operation.
- a malicious executable code attached to another executable file.
- known as junk mail
Down
- highly targeted phishing attack, that send customized emails to a specific person or individual.
- holds a computer system, or the data it contains, captive until the target makes a payment.
- alters a computer's browser settings to redirect user to website paid for the cyber criminals' customers.
- a form of fraud where a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source.
- persuades the user to take specific action based on fear
- displays annoying pop-ups to generate revenue for its authors.
- using voice communication technology and records message that appears legitimate.
17 Clues: known as junk mail • impersonation of a legitimate website • persuades the user to take specific action based on fear • displays annoying pop-ups to generate revenue for its authors. • to make malicious website appear higher in search engine result. • a malicious executable code attached to another executable file. • ...
R&D India Market Place 2022-11-09
Across
- own your_______
- ____ is at the core of our purpose, culture and business.
- Reducing the operational carbon emissions in our supply chain
- chairman and CEO
- one of our core values
- internal tool for mobility, projects and mentorships
Down
- IoT, mobility, sensing, cloud, analytics and cybersecurity to deliver Innovation at Every Level.
- We are Globally recognised for____
- one of our 6 long term commitments
9 Clues: own your_______ • chairman and CEO • one of our core values • We are Globally recognised for____ • one of our 6 long term commitments • internal tool for mobility, projects and mentorships • ____ is at the core of our purpose, culture and business. • Reducing the operational carbon emissions in our supply chain • ...
crossword! 2024-02-03
Across
- Usually consists of 8 bits
- Invisible barrier for women advancing in the workplace
- left no crumbs
- Mentor applications are due on the _
- Film about under-recognized Black women at NASA who were a key part of its success
- Most commonly-used programming language
Down
- practice of protecting systems, networks, and programs from digital attacks
- Purdue's first women-centric hackathon ;)
- When women are generally paid less than men
- women in _
10 Clues: women in _ • left no crumbs • Usually consists of 8 bits • Mentor applications are due on the _ • Most commonly-used programming language • Purdue's first women-centric hackathon ;) • When women are generally paid less than men • Invisible barrier for women advancing in the workplace • practice of protecting systems, networks, and programs from digital attacks • ...
GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05
Across
- Unethical practice of gaining unauthorized access to computer systems.
- Act of impersonating a legitimate entity to deceive individuals or gain access.
- A type of computer memory.
- A small portable computer.
Down
- Securing computer systems against unauthorized access.
- A popular operating system.
- The brain of a computer.
- Term for gaining access to a secure network through.
- Malicious software used to gain unauthorised access to computer systems.
- Desired outcomes.
10 Clues: Desired outcomes. • The brain of a computer. • A type of computer memory. • A small portable computer. • A popular operating system. • Term for gaining access to a secure network through. • Securing computer systems against unauthorized access. • Unethical practice of gaining unauthorized access to computer systems. • ...
Technology & Innovation 2025-08-09
Across
- – The state of relying on something
- OFFICE – Working physically at a company's premises
- – Protection of computer systems from attacks
- – Introduction of new methods, ideas, or products
- – A mobile phone with advanced features
Down
- – Process of learning and acquiring knowledge
- – State of being free from public attention
- WORK – Working from home or another location outside the office
- – Short for Artificial Intelligence
- – Application of scientific knowledge for practical purposes
10 Clues: – The state of relying on something • – Short for Artificial Intelligence • – A mobile phone with advanced features • – State of being free from public attention • – Process of learning and acquiring knowledge • – Protection of computer systems from attacks • – Introduction of new methods, ideas, or products • OFFICE – Working physically at a company's premises • ...
Parole Cybercrociate 2021-04-23
Across
- Un particolare tipo di dato personale
- Nuovo social network fondato nel 2020
- Città che è una eccellenza mondiale nella Cybersecurity
- La casata rappresentata da un lupo nella serie "Trono di Spade"
- Il pizzo digitale
- Truffa che sfrutta la tecnologia VoiP
- Una delle tre dimensioni di sicurezza del dato
Down
- Probabilità per impatto
- E' una criptovaluta
- Il nome del processore ARM per Mac di Apple
- Rete di computer composta da dispositivi infettati da un malware “zombie”
- Numero di basi giuridiche previste dal GDPR per la liceità di un trattamento di dati personali
12 Clues: Il pizzo digitale • E' una criptovaluta • Probabilità per impatto • Un particolare tipo di dato personale • Nuovo social network fondato nel 2020 • Truffa che sfrutta la tecnologia VoiP • Il nome del processore ARM per Mac di Apple • Una delle tre dimensioni di sicurezza del dato • Città che è una eccellenza mondiale nella Cybersecurity • ...
Professor Sloan's Fun Facts 2025-04-23
Across
- What is the acronym for the New CS Building?
- What month was he born?
- What school did he earn his PhD from?
- What school did he go to for undergrad?
- What is one of his hobbies?
- What book did he write w/Richard Warner in 2021?
Down
- What is his job title?
- What event is he the Official Pronouncer for?
- How many years has he been at UIC?
- What is his favorite apparel to wear?
- What is his newest book about?
- Where was he born?
12 Clues: Where was he born? • What is his job title? • What month was he born? • What is one of his hobbies? • What is his newest book about? • How many years has he been at UIC? • What is his favorite apparel to wear? • What school did he earn his PhD from? • What school did he go to for undergrad? • What is the acronym for the New CS Building? • ...
Did you read it? 2020-10-16
Across
- Entries due NLT 11/2
- Home of the 14th Flying Training Wing of Air Education and Training Command
- By David C. Graham
- Entries due NLT 10/23
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Do your Part.#BeCyberSmart
- Quality Management Principles
- Test Monthly
8 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Quality Management Principles • Home of the 14th Flying Training Wing of Air Education and Training Command • To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Hacktivism Vocabulary Crossword 2 2023-05-09
Across
- protecting an organization and its employees against cyber threats
- a person or thing likely to cause damage or danger
- a hacker with bad intentions
Down
- an attempt by hackers to damage or destroy a computer network or system
- a legal hacker hired by a company or government
- reveal
- take something that is not yours
- to search
8 Clues: reveal • to search • a hacker with bad intentions • take something that is not yours • a legal hacker hired by a company or government • a person or thing likely to cause damage or danger • protecting an organization and its employees against cyber threats • an attempt by hackers to damage or destroy a computer network or system
Computer Science 2025-09-11
Across
- a graph that plots data using bars
- your credibility to use the internet
- bullying using the internet
- someone you should inform during a bullying situation
- online credentials to an account on the internet
- the Brains of the computer
- Your own information on the internet
- a person who witnesses bullying
Down
- a component that connects your major components of the computer
- usng someone else's work without giving credit to the author
- the physical components of a computer
- your history on the internet
- harmful to your computer/ the internet
- one of the most common software applications
- a place where people can connect with others
- The process of protecting yourself on the internet
16 Clues: the Brains of the computer • bullying using the internet • your history on the internet • a person who witnesses bullying • a graph that plots data using bars • your credibility to use the internet • Your own information on the internet • the physical components of a computer • harmful to your computer/ the internet • one of the most common software applications • ...
IELTS Science & Tech Vocabulary 2025-09-03
Across
- A sudden and important discovery or development
- The investigation of outer space through tech
- A new method, idea, or product
- Highly advanced and innovative
- Based on or guided by data
- The most advanced or sophisticated version available
- The imitation of intelligent human behavior
- The period characterized by the internet
- The gap between those with and without technology
Down
- Technology dealing with robots
- Involving advanced technological development
- High levels of technological development
- The use of machines to perform tasks without human involvement
- A digital space used for interaction or services
- The practice of protecting systems and networks from attacks
- Easy to understand or use
16 Clues: Easy to understand or use • Based on or guided by data • Technology dealing with robots • A new method, idea, or product • Highly advanced and innovative • High levels of technological development • The period characterized by the internet • The imitation of intelligent human behavior • Involving advanced technological development • ...
tema 2 perkembangan ekonomi digital 2025-10-27
Across
- digital menciptakan pekerjaan baru berbasis → TEKNOLOGI
- besar yang digunakan untuk analisis bisnis disebut → BIGDATA
- baru berbasis teknologi disebut → STARTUP
- keuangan secara online disebut → EBANKING
- depan ekonomi digital bergantung pada literasi → DIGITAL
- dan GrabFood merupakan layanan → DIGITALDELIVERY
- merupakan singkatan dari → FINANCIALTECHNOLOGY
- pemerintah untuk mendukung ekonomi digital UMKM disebut → DIGITALISASIUMKM
- utama dalam ekonomi digital adalah keamanan data dan → PRIVASI
- melalui marketplace online termasuk kegiatan → EKOMERCE
- transaksi online dikenal dengan istilah → CYBERSECURITY
- ekonomi digital adalah kebocoran → DATA
Down
- buatan dikenal juga dengan istilah → ARTIFICIALINTELLIGENCE
- aplikasi fintech di Indonesia adalah → OVO
- ekonomi yang memanfaatkan teknologi digital dan internet → EKONOMIDIGITAL
- melalui media sosial disebut → DIGITALMARKETING
- Shopee, dan Lazada adalah contoh platform → MARKETPLACE
- utama ekonomi digital adalah mempercepat → TRANSAKSI
- tanpa uang tunai menggunakan kartu atau aplikasi disebut → EMONEY
- usaha kecil dapat menjangkau pasar luas melalui → INTERNET
20 Clues: ekonomi digital adalah kebocoran → DATA • baru berbasis teknologi disebut → STARTUP • keuangan secara online disebut → EBANKING • aplikasi fintech di Indonesia adalah → OVO • merupakan singkatan dari → FINANCIALTECHNOLOGY • melalui media sosial disebut → DIGITALMARKETING • dan GrabFood merupakan layanan → DIGITALDELIVERY • ...
TEMA 2 TTS perkembangan ekonomi digital M.mumthazul fikri 9A 2025-10-22
Across
- , Kegiatan ekonomi melalui media internet.
- ,Singkatan dari teknologi kecerdasan buatan dalam bahasa Inggris.
- kredit , Alat pembayaran berbentuk kartu dari bank.
- , Aplikasi belanja online yang berwarna oranye.
- banking , Layanan bank yang sepenuhnya berbasis internet.
- Salah satu dompet digital terkenal di Indonesia.
- Sistem pembayaran tanpa uang tunai.
- , Sistem keamanan siber untuk perlindungan data.
- , Proses jual beli yang terjadi secara online.
- , Salah satu e-wallet milik Gojek.
Down
- Bentuk pasar digital tempat jual beli online.
- , Teknologi virtual yang berkembang bersama ekonomi digital.
- , Perusahaan teknologi keuangan disebut ...
- Bentuk uang yang hanya bisa digunakan secara elektronik.
- , Mata uang kripto pertama di dunia.
- , Mata uang digital resmi dari bank sentral disebut.
- , Metode pembayaran dengan memindai kode.
- , Transaksi keuangan melalui jaringan komputer disebut ...
- Teknologi dasar dari mata uang kripto.
- Mata uang digital yang populer dan terdesentralisasi.
20 Clues: , Salah satu e-wallet milik Gojek. • Sistem pembayaran tanpa uang tunai. • , Mata uang kripto pertama di dunia. • Teknologi dasar dari mata uang kripto. • , Metode pembayaran dengan memindai kode. • , Kegiatan ekonomi melalui media internet. • , Perusahaan teknologi keuangan disebut ... • Bentuk pasar digital tempat jual beli online. • ...
Senior Management Knowledge 2024-12-25
Across
- Largest threat to Bank.
- Bank’s #1 Strength.
- Financial guide for the Bank.
- Beliefs about what will happen in the future.
- An unexpected event that could have a negative impact on the Bank.
- Fun for all associates.
- Coin or what people fear the most.
Down
- The ability of an asset to be quickly and easily converted to cash.
- The feeling or belief that one can rely on someone or something thing.
- The process of determining a borrower’s creditworthiness.
- Interest free checking accounts.
- A formal agreement to repay a debt.
- Number #1 challenge of FNB.
- Bank’s core system.
- Bank’s define market area.
- Official inspection or Necessity for all Banks.
16 Clues: Bank’s #1 Strength. • Bank’s core system. • Largest threat to Bank. • Fun for all associates. • Bank’s define market area. • Number #1 challenge of FNB. • Financial guide for the Bank. • Interest free checking accounts. • Coin or what people fear the most. • A formal agreement to repay a debt. • Beliefs about what will happen in the future. • ...
Senior Management Knowledge 2024-12-25
Across
- Number #1 challenge of FNB.
- The feeling or belief that one can rely on someone or something thing.
- Largest threat to Bank.
- An unexpected event that could have a negative impact on the Bank.
- Financial guide for the Bank.
- A formal agreement to repay a debt.
- Official inspection or Necessity for all Banks.
Down
- Bank’s #1 Strength.
- Coin or what people fear the most.
- Bank’s define market area.
- The ability of an asset to be quickly and easily converted to cash.
- The process of determining a borrower’s creditworthiness.
- Interest free checking accounts.
- Beliefs about what will happen in the future.
- Bank’s core system.
- Fun for all associates.
16 Clues: Bank’s #1 Strength. • Bank’s core system. • Largest threat to Bank. • Fun for all associates. • Bank’s define market area. • Number #1 challenge of FNB. • Financial guide for the Bank. • Interest free checking accounts. • Coin or what people fear the most. • A formal agreement to repay a debt. • Beliefs about what will happen in the future. • ...
