cybersecurity Crossword Puzzles
Network Components 2022-10-27
Across
- a device used at the customer premises to terminate a dial-up Integrated Services Digital Network line and connect it to a computer or a local area network
- a transmitter and a receiver of signals, such as analog or digital
- a cybersecurity tool that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of cybersecurity rules
- a transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signals
- is a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
Down
- networking devices that connect networks
- a network node used in telecommunications that connects two networks with different transmission protocols together
- a hardware component responsible for relaying data from a computer network to the destination endpoint
8 Clues: networking devices that connect networks • a transmitter and a receiver of signals, such as analog or digital • a transmitter and receiver (transceiver) device used for wireless LAN (WLAN) radio signals • a hardware component responsible for relaying data from a computer network to the destination endpoint • ...
CYBER AWARENESS 2024-11-02
Across
- A group of experts dedicated to responding to computer security incidents.
- The practice of protecting computer systems and networks from digital attacks.
- The process of converting data into an unreadable format to protect it from unauthorized access.
- Acronym for the process of collecting and analyzing publicly available information to gain insights.
- The unauthorized access to computer systems or networks.
- A notification from your security systems that someone is trying to break in (or, perhaps, has already done so).
- Any malicious act aimed at disrupting, damaging, or stealing information from computer systems or networks.
- A security system that monitors and controls network traffic.
- The process of converting readable data (plaintext) into unreadable code (ciphertext) to protect it from unauthorized access.
- Web The part of the internet that is not indexed by search engines but is accessible through specific URLs.
- Malicious software designed to harm computer systems or networks.
- A network of compromised computers controlled by an attacker.
Down
- Acronym for the process of gathering, analyzing, and interpreting data from social media platforms to gain insights.
- Malware that encrypts a victim's data and demands a ransom for its decryption.
- Deceiving individuals into revealing sensitive information through fraudulent emails or messages.
- The likelihood of a threat exploiting a vulnerability and causing harm.
- A weakness in a system or network that can be exploited by attackers.
- A piece of software or code that takes advantage of a vulnerability to gain unauthorized access.
- The first decentralized digital currency / cryptocurrency in which transactions can be performed without the need for a central bank.
- Web A part of the internet that is not indexed by search engines and requires special software to access.
- A group of information security experts who respond to malware attacks or other computer security incidents.
- Acronym for a software solution designed to streamline and automate various aspects of digital forensic investigations.
- Acronym for a centralized team that combines cybersecurity efforts to better detect, prevent, and respond to cyber threats.
- Illegal activities committed using computer networks or devices.
24 Clues: The unauthorized access to computer systems or networks. • A security system that monitors and controls network traffic. • A network of compromised computers controlled by an attacker. • Illegal activities committed using computer networks or devices. • Malicious software designed to harm computer systems or networks. • ...
Mechdyne's 30th Anniversary Puzzle 2026-01-05
Across
- A quick discussion at the beginning of a meeting to prevent accidents
- One of our core values us Profit and _____
- Acronym for Audio Visual
- At Mechdyne we strive to "stay ____ the line"
- phrase we use to secure and dedicate an assignment to a teammate
Down
- Apart of the 4 P's
- Mechdyne's headquarters state
- One of Mechdyne's sister companies
- The college the Mechdyne founders attended
- Our people are...
- Popular video conferencing platform used for remote meetings\
- System that protects against cyber threats
- Month dedicated to cybersecurity awareness
- The universal “fix” for most tech problems
14 Clues: Our people are... • Apart of the 4 P's • Acronym for Audio Visual • Mechdyne's headquarters state • One of Mechdyne's sister companies • The college the Mechdyne founders attended • System that protects against cyber threats • Month dedicated to cybersecurity awareness • The universal “fix” for most tech problems • One of our core values us Profit and _____ • ...
cybersecurity 2025-04-27
Cybersecurity 2025-02-23
Across
- uses an unsecured public network as if it were a secure private network and encrypts data between remote the device and the network
- when you click or execute it, it infects your systems
- security incident that occurs when classified data is shown in an unclassified system or system with lower-level classification
Down
- process that scrambles readable text so it can only be read by the person who has the secret key
- generally install themselves on a computer and collect user data without the user's awareness
5 Clues: when you click or execute it, it infects your systems • generally install themselves on a computer and collect user data without the user's awareness • process that scrambles readable text so it can only be read by the person who has the secret key • ...
PAW 2024 Crossword Puzzle 2024-05-16
Across
- Always access and transmit patient data ________.
- When faxing, ensure that the fax _____-sheet is free of any PHI.
- If someone contacts you requesting information about a confidential patient, the response should be “I do not have any information available for that ______”.
- Snooping may be motivated by _________, concern about the health and well-being of others, interpersonal conflicts, or personal gain.
- Always verify the source of emails and links ______ clicking.
- All access to personal health information must be limited to what is _________ to perform your job duties.
- Loss of _____ by patients and families may be one of the consequences of a privacy breach.
- When verbally disclosing information, _____ the information shared to what is necessary for the purpose.
- The patient must be informed of the purpose of the _________, use, or disclosure of their PHI.
Down
- If you notice anything unusual about your system’s performance or receive __________ messages, report them immediately to our IT cybersecurity team.
- When mailing information, ensure that the person named on the ________ is authorized to receive every document included within.
- A patient may be confidential not only for privacy reasons but also potentially for ______ reasons.
- Check twice that all information is the correct information for the correct person _____ to releasing it.
- If a patient does not wish for it to be disclosed that they are in the facility, they can request to add a ____________ patient flag.
- All access to personal health information must be for a ____ -related need-to-know.
- Consent must be _________, whether it is written or verbal.
- ____________ is a crucial aspect that safeguards both our information and our patients’ trust.
- Contact the ______ ______ if you have been made aware of PHI being disclosed inappropriately.
- Defined by the Information and Privacy Commissioner of Ontario (IPC) as, the unauthorized access of PHI which may be motivated by several factors.
- If a patient has added a restriction to accessing their information, the authorization to override the consent directive must be documented in a ______ manner.
20 Clues: Always access and transmit patient data ________. • Consent must be _________, whether it is written or verbal. • Always verify the source of emails and links ______ clicking. • When faxing, ensure that the fax _____-sheet is free of any PHI. • All access to personal health information must be for a ____ -related need-to-know. • ...
HOMELAND SECURITY I CROSSWORD 2026-03-26
Across
- : Decision made by a jury
- : Person who oversees court proceedings
- : Information used to prevent threats
- : Taking property by law enforcement
- : Place where legal cases are decided
- : Systems like power, water, and transportation
- : Supreme law of the United States
- : Agency that handles disaster response and recovery
- : Freedom from government control
- : Legal document allowing a search or arrest
- : Law passed to help prevent terrorism
- : Freedoms protected by law
- : Agency that enforces immigration laws inside the U.S.
- : Request to review a court decision
- : Monitoring people or places for security purposes
- : Ability to act or speak without unjust restriction
- : Federal department responsible for homeland security
- : Legal status of being a member of a country
- : Potential danger to people or systems
- : Process of entering a country to live
- : Person who gives testimony in court
- : Use of violence to create fear for political purposes
- : Fair treatment under the law
- : Group of citizens who decide a case
- : Agency that provides airport and transportation security
Down
- : Taking a person into custody
- : Information used to prove facts in court
- : Boundary between countries
- : Balancing safety with personal freedoms
- : Highest court in the United States
- : Lawyer who represents the government
- : Reasonable belief that a crime occurred
- : Rights that protect individuals from discrimination
- : Branch that protects waterways and performs rescues
- : Legal process to determine guilt or innocence
- : Protection from threats or danger
- : Agency responsible for border protection and customs
- : Agency that protects national leaders
- : Looking for evidence
- : Person accused of a crime
- : Organization within the government with a specific mission
- : Agency focused on cybersecurity and infrastructure protection
- : Freedoms protected by law
- : Protection of computer systems and networks
- : Change or addition to the Constitution
- : Right to keep personal information protected
- : Lawyer who represents a person in court
- : Statement made under oath
- : Rules created and enforced by government
49 Clues: : Looking for evidence • : Decision made by a jury • : Freedoms protected by law • : Person accused of a crime • : Freedoms protected by law • : Statement made under oath • : Boundary between countries • : Taking a person into custody • : Fair treatment under the law • : Freedom from government control • : Supreme law of the United States • : Protection from threats or danger • ...
crossword #1 2023-03-15
Across
- Change: Long-term change in global climate patterns.
- Practical application of scientific knowledge.
- Acquisition of knowledge and skills.
- Physical and mental wellbeing.
- Protection of computer systems and data.
- Meeting present needs without compromising future generations.
Down
- Integration and interaction among people, companies, and governments worldwide.
- Setting up a business and taking financial risks for profit.
- Media: Online platforms for creating and sharing content.
- Intelligence: Machines that think and learn like humans.
- Inclusion of people from different backgrounds.
11 Clues: Physical and mental wellbeing. • Acquisition of knowledge and skills. • Protection of computer systems and data. • Practical application of scientific knowledge. • Inclusion of people from different backgrounds. • Change: Long-term change in global climate patterns. • Intelligence: Machines that think and learn like humans. • ...
Kuis Audit TI 2024-03-04
Across
- sistem manajemen audit yang digunakan Itjen
- Audit TIK atas pelaksanaan tusi yang memanfaatkan TIK
- pengendalian proses hanya melihat input dan output
- Salah satu area audit TIK
Down
- Memastikan keselarasan bisnis dan TIK
- pengendalian yang dilakukan oleh manusia tanpa bantuan mesin
- Audit TIK terintegrasi yang dilakukan secara bersamaan
- Audit TIK terintegrasi yang dilakukan secara berurutan
- Auditor harus ... yang artinya memiliki kemampuan untuk melakukan tugas audit
- singkatan dari pengendalian aplikasi
- Pengujian secara sistematis untuk memberikan keyakinan terbatas
11 Clues: Salah satu area audit TIK • singkatan dari pengendalian aplikasi • Memastikan keselarasan bisnis dan TIK • sistem manajemen audit yang digunakan Itjen • pengendalian proses hanya melihat input dan output • Audit TIK atas pelaksanaan tusi yang memanfaatkan TIK • Audit TIK terintegrasi yang dilakukan secara bersamaan • ...
Vanessa and Jinsik <3 2024-09-06
Across
- How many months have Vanessa and Jinsik been together?
- How many people are in the wedding party?
- Where do Vanessa and Jinsik live?
- How did Vanessa and Jinsik meet?
- How old is Vanessa?
- Where did Jinsik propose?
Down
- What does Jinsik do for work?
- Where are Vanessa and Jinsik going for their honeymoon?
- How old is Jinsik?
- What holiday did Vanessa and Jinsik first spend together?
- How many kids do Vanessa and Jinsik want?
11 Clues: How old is Jinsik? • How old is Vanessa? • Where did Jinsik propose? • What does Jinsik do for work? • How did Vanessa and Jinsik meet? • Where do Vanessa and Jinsik live? • How many people are in the wedding party? • How many kids do Vanessa and Jinsik want? • How many months have Vanessa and Jinsik been together? • Where are Vanessa and Jinsik going for their honeymoon? • ...
Group 1 - CSE 167 2022-11-16
Across
- What's the weakest element in Cybersecurity
- The fake folder that acts as bait for hackers.
- The I in the CIA Triad
- The A in the CIA Triad
- All companies should have a ____ framework
Down
- The C in the CIA Triad
- An area that a hacker can use for their benefit
- Websites identify
- A type of key to use in Asymmetric encryption
- How to make a message secret.
- A copy of data that could be lost
11 Clues: Websites identify • The C in the CIA Triad • The I in the CIA Triad • The A in the CIA Triad • How to make a message secret. • A copy of data that could be lost • All companies should have a ____ framework • What's the weakest element in Cybersecurity • A type of key to use in Asymmetric encryption • The fake folder that acts as bait for hackers. • ...
FY26 Q1 2025-10-14
Across
- January training: “Call ___”
- Leaves the forum when they don’t consent to one
- EU regulation keeping the financial sector in check
- CCPA fine was issued in this country
- Cybersecurity Awareness Month theme this year
- Complete by November: “Secure use of ___”
- Workstation compliance training goes live in this month
- If DORA’s vertical, NIS2 must be this
Down
- Under privacy law, it means “forget about me”
- Top-performing MU for SBS
- Fined 5.8 million AUD over data breach
11 Clues: Top-performing MU for SBS • January training: “Call ___” • CCPA fine was issued in this country • If DORA’s vertical, NIS2 must be this • Fined 5.8 million AUD over data breach • Complete by November: “Secure use of ___” • Under privacy law, it means “forget about me” • Cybersecurity Awareness Month theme this year • Leaves the forum when they don’t consent to one • ...
crossword #1 2023-03-15
Across
- Change: Long-term change in global climate patterns.
- Practical application of scientific knowledge.
- Acquisition of knowledge and skills.
- Physical and mental wellbeing.
- Protection of computer systems and data.
- Meeting present needs without compromising future generations.
Down
- Integration and interaction among people, companies, and governments worldwide.
- Setting up a business and taking financial risks for profit.
- Media: Online platforms for creating and sharing content.
- Intelligence: Machines that think and learn like humans.
- Inclusion of people from different backgrounds.
11 Clues: Physical and mental wellbeing. • Acquisition of knowledge and skills. • Protection of computer systems and data. • Practical application of scientific knowledge. • Inclusion of people from different backgrounds. • Change: Long-term change in global climate patterns. • Intelligence: Machines that think and learn like humans. • ...
TEKNOLOGI INFORMASI DAN KOMUNIKASI 2025-09-23
Across
- sejajar dengan lantai gunakan penyangga kaki
- harus ada sandaran punggung dan tangan atur ketinggian
- keamanan informasi di internet
- sebuah layanan blog milik geogle
- catatan harian atau jurnal pribadi di internet yang dapat diakses oleh siapa saja.
- individu yang melakukan aktivitas peretasan sistem komputer
Down
- konten lebih banyak mengandung teks
- pusat operasi keamanan siber nasional di indones
- konten dengan format angka, data numerik
- membuat blog dalam format video
- makna yang disampaiakan oleh serangkaian representasi hasil pemprosesan data
11 Clues: keamanan informasi di internet • membuat blog dalam format video • sebuah layanan blog milik geogle • konten lebih banyak mengandung teks • konten dengan format angka, data numerik • sejajar dengan lantai gunakan penyangga kaki • pusat operasi keamanan siber nasional di indones • harus ada sandaran punggung dan tangan atur ketinggian • ...
Cybersecurity Fundamental Chapter 6 2022-10-27
Across
- protect data and information.
- writes data across multiple drives
- can actually improve availability.
- a system or component that is continuously operational for a given length of time.
- as part of an it asset management system, an organization specifies the acceptable it assets that meets its objectives.
- access to data and information reduces the possibility of a threat.
Down
- the most comprehensive protection.
- detects data errors
- assigns all resources of an organization into a group based on common characteristics.
- the weak links in the chain that can cause disruption of the organization's operations.
- analysis the process of analyzing the dangers posed by natural and human-caused events to the assets of an organization.
- changing the controls and procedures at different layers.
- involves reducing the severity of the loss or the likelihood of the loss from occurring.
- combines multiple physical hard disk drives into single logical units to provide data redundancy and improve performance.
- ensures system availability in the event of a component failure.
- systems and services are available 99.999% of the time.
- store duplicate data on second drive.
17 Clues: detects data errors • protect data and information. • the most comprehensive protection. • writes data across multiple drives • can actually improve availability. • store duplicate data on second drive. • systems and services are available 99.999% of the time. • changing the controls and procedures at different layers. • ...
Information and Cyber Security 2021-03-29
Across
- uses asymmetric key encryption
- person who performs a social engineering attack
- What will freezing your credit not affect?
- For online shopping it's best to use...?
Down
- most valuable to companies looking to sell you something
- Requires a carrier file to self-replicate
- What information do you need to set up a wireless access point?
- When is it ok to reuse a password?
- Cyber security month
- Weakest link in cybersecurity
- Continually bombarding a targeted network with fake requests
11 Clues: Cyber security month • Weakest link in cybersecurity • uses asymmetric key encryption • When is it ok to reuse a password? • For online shopping it's best to use...? • Requires a carrier file to self-replicate • What will freezing your credit not affect? • person who performs a social engineering attack • most valuable to companies looking to sell you something • ...
crossword #1 2023-03-15
Across
- Change: Long-term change in global climate patterns.
- Practical application of scientific knowledge.
- Acquisition of knowledge and skills.
- Physical and mental wellbeing.
- Protection of computer systems and data.
- Meeting present needs without compromising future generations.
Down
- Integration and interaction among people, companies, and governments worldwide.
- Setting up a business and taking financial risks for profit.
- Media: Online platforms for creating and sharing content.
- Intelligence: Machines that think and learn like humans.
- Inclusion of people from different backgrounds.
11 Clues: Physical and mental wellbeing. • Acquisition of knowledge and skills. • Protection of computer systems and data. • Practical application of scientific knowledge. • Inclusion of people from different backgrounds. • Change: Long-term change in global climate patterns. • Intelligence: Machines that think and learn like humans. • ...
Total Defence Crossword Puzzle 2025-02-15
Across
- The state of being safe from harm.
- The country that practices Total Defence.
- A serious situation that needs immediate action.
- People who serve in the army to protect the country.
- Living together peacefully despite differences.
- Protection against threats or danger.
Down
- Protecting computers and networks from attacks.
- Working together to achieve a common goal.
- Being prepared for any situation.
- The quality of being strong, physically or mentally.
- The ability to recover from challenges or difficulties.
11 Clues: Being prepared for any situation. • The state of being safe from harm. • Protection against threats or danger. • The country that practices Total Defence. • Working together to achieve a common goal. • Protecting computers and networks from attacks. • Living together peacefully despite differences. • A serious situation that needs immediate action. • ...
Technology 2025-06-26
6 Clues: small useful device. • improved or made better. • picture of a screen display. • person who loves technology. • video games in virtual reality. • protection of computers and data.
mari 2024-05-20
Across
- a decentralized digital currency
- the application of conceptual knowledge for
- a wide range of criminal activity that are
- providing the appearance of smth without reality
- practice and study of techniques for secure
- the process of writing computer software code
Down
- study and experimentation of algorithmic process
- a public distributed ledger of lists of records
- protection of computer systems and networks
- collection of accounts in which accounting
- a potential for vulnerabilities to turn into
- a digital currency designated to work as
- a device that can make and receive calls over
- the minimum amount of any physical entity involved
- the opposite of natural
15 Clues: the opposite of natural • a decentralized digital currency • a digital currency designated to work as • collection of accounts in which accounting • a wide range of criminal activity that are • protection of computer systems and networks • the application of conceptual knowledge for • practice and study of techniques for secure • ...
Financial Technology 2026-02-16
Across
- Financial services provided through apps
- trading Automated trading using computerrograms based on pre-set rules.
- Technology FinTech stand for
- WALLET App used to make payments with a smartphone
- Bitcoin is an example of:
- risks Major challenge faced by FinTech companies?
- Process of verifying customer identity
- Raising funds through digital coins
Down
- banking apps one example of FinTech innovation in banks.
- Bank of India organization regulates digital paymentsyment systems in India?
- one example of a peer-to-peer payment app starting with G
- Payments Interface UPI stand for
- Security method using fingerprints or face recognition
- Short code sent to verify online transactions
- banking
- Regulatory technology used to ensure compliance
16 Clues: banking • Bitcoin is an example of: • Technology FinTech stand for • Raising funds through digital coins • Payments Interface UPI stand for • Process of verifying customer identity • Financial services provided through apps • Short code sent to verify online transactions • Regulatory technology used to ensure compliance • ...
test 2026-02-18
Across
- Tətbiqləri konteynerlərdə işlətməyə imkan verən platforma
- Veb səhifələrə interaktivlik qatan proqramlaşdırma dili
- Proqramların bir-biri ilə əlaqə qurmasını təmin edən interfeys
- Veb səhifələrin dizayn və görünüşünü tərtib edən stil dili
- Microsoft tərəfindən hazırlanmış əməliyyat sistemi
- Veb səhifənin strukturunu quran işarələmə dili
- Açıq mənbəli əməliyyat sistemi
- Bulud əsaslı backend xidmətləri təqdim edən platforma
Down
- Server tərəfində JavaScript işlətməyə imkan verən mühit
- İstifadəçi interfeysi yaratmaq üçün JavaScript kitabxanası
- Məlumatların və sistemlərin təhlükəsizliyini təmin edən sahə
- Obyekt yönümlü və platformadan asılı olmayan proqramlaşdırma dili
- Sadə sintaksisli və çox məqsədli proqramlaşdırma dili
- Kodların saxlanıldığı və versiya nəzarəti platforması
- Verilənlər bazası ilə işləmək üçün sorğu dili
15 Clues: Açıq mənbəli əməliyyat sistemi • Verilənlər bazası ilə işləmək üçün sorğu dili • Veb səhifənin strukturunu quran işarələmə dili • Microsoft tərəfindən hazırlanmış əməliyyat sistemi • Sadə sintaksisli və çox məqsədli proqramlaşdırma dili • Kodların saxlanıldığı və versiya nəzarəti platforması • Bulud əsaslı backend xidmətləri təqdim edən platforma • ...
Technology 2024-01-26
Across
- Smallest unity of information
- Small electronic devices that make your life easier.
- Electronic devices that you can wear as accessories.
- About conersing analog information to a digital ones.
- Intenet of things.
- To protect systems or data from cybernetics attacks.
- Programmable machine to automate processes
Down
- The smallest technology.
- It's used to talk to someone that is far from you.
- A process or set of rules that solve a specific problem.
- Msurament and analysis about unique physical of everyone.
- Aereal no tipulated devices
- Can make tridimensional images to crate optical illusions.
- Generally, the not physical about a computer.
- It's used to protect data encoding the information.
15 Clues: Intenet of things. • The smallest technology. • Aereal no tipulated devices • Smallest unity of information • Programmable machine to automate processes • Generally, the not physical about a computer. • It's used to talk to someone that is far from you. • It's used to protect data encoding the information. • Small electronic devices that make your life easier. • ...
Electricity back 2023-05-30
Across
- Measures the voltage in a circuit
- Measurement of electrical power
- Power lines connecting power supplies to homes in a large area
- A place to plug in a device
- Power used by a device
- Makes your hair stand up, gives a shock
- Online protection
Down
- Too much power at one time
- Transfers electricity from one circuit to another with more or less power
- Portable power supply, can power a remote
- Anything that makes power, like a generator or a battery
- Protects us from electric shocks
- Measures the current in a circuit
- Adjusts the power in a circuit
- Happens again and again
15 Clues: Online protection • Power used by a device • Happens again and again • Too much power at one time • A place to plug in a device • Adjusts the power in a circuit • Measurement of electrical power • Protects us from electric shocks • Measures the voltage in a circuit • Measures the current in a circuit • Makes your hair stand up, gives a shock • ...
soca 2023-03-13
Across
- Type Gryphons plan & organize ______-___-___ competitions
- ______ organized the SOC Open House.
- SEED hosts the ___-___-Series
- SOCC’s _____ department is in charge of planning events
- Programming competition only for freshmen
- SOCA is In charge of ________ relations
- Gryphons aims to promote ________ to students that are passionate about IT
- SOCC is in charge of maintaining and building ________ relations
Down
- SPAI is part of the AI Singapore Student ________
- SPAI attended and presented at the ____ Conference.
- SOCA’s ________ department is the first point of contact with outside organizations.
- SEED stands for Sharing, _______, Enriching, Development
- Gryphon’s Mascot
- SPAI created its own Project _____.
- SOCC organized Freshman Orientation ______
15 Clues: Gryphon’s Mascot • SEED hosts the ___-___-Series • SPAI created its own Project _____. • ______ organized the SOC Open House. • SOCA is In charge of ________ relations • Programming competition only for freshmen • SOCC organized Freshman Orientation ______ • SPAI is part of the AI Singapore Student ________ • SPAI attended and presented at the ____ Conference. • ...
BACO Conference Team Builder 2024-11-20
Across
- – The process of identifying and analyzing risks.
- – Violation of a law, duty, or agreement.
- – Abbreviation for Foreign Corrupt Practices Act.
- – Consequences for failing to follow regulations.
- – Recording and documenting compliance breaches.
- – Procedures to ensure proper operation of systems.
- – A professional responsible for managing compliance.
- – Protecting systems and data from cyber threats.
Down
- – Measures to prevent illicit financial activities.
- – A group responsible for overseeing ethical practices.
- – An in-house review of processes and systems.
- – The act of making information known.
- – Adherence to moral and ethical principles.
- – A set of rules outlining acceptable behaviors.
- – Relating to rules issued by governing bodies.
15 Clues: – The act of making information known. • – Violation of a law, duty, or agreement. • – Adherence to moral and ethical principles. • – An in-house review of processes and systems. • – Relating to rules issued by governing bodies. • – Recording and documenting compliance breaches. • – A set of rules outlining acceptable behaviors. • ...
Cybersecurity 2019-11-30
Across
- : A malware that spies on your online activities and captures information from your computer, e.g. your web browsing habits, email messages, login credentials, banking and credit card details. It does all this without your knowledge.
- : “VPN” is short for “virtual p______ network”
- : P_______ is when cybercriminals use fake emails to bait their victims to click on a link or download a file containing infectious malware.
Down
- : Short for “malicious software”
- : “IT” is short for “Information Technology”, “OT” is short for “O______ Technology”.
5 Clues: : Short for “malicious software” • : “VPN” is short for “virtual p______ network” • : “IT” is short for “Information Technology”, “OT” is short for “O______ Technology”. • : P_______ is when cybercriminals use fake emails to bait their victims to click on a link or download a file containing infectious malware. • ...
CyberSecurity 2020-08-21
Across
- Persona que por diversos motivos se dedica a manipular sistemas informáticos ajenos
- es un programa informático que tiene el propósito de detectar y eliminar virus y otros programas perjudiciales antes o después de que ingresen al sistema.
Down
- es un software que recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador.
- Programa informático que controla el acceso de una computadora a la red y de elementos de la red a la computadora, por motivos de seguridad.
- Programa que se elabora de manera accidental o intencionada y se introduce en los ordenadores, causando daños en la información contenida en el disco duro.
5 Clues: Persona que por diversos motivos se dedica a manipular sistemas informáticos ajenos • Programa informático que controla el acceso de una computadora a la red y de elementos de la red a la computadora, por motivos de seguridad. • ...
Cybersecurity 2020-08-21
Across
- Correo electrónico no solicitado que se envía a un gran número de destinatarios con fines publicitarios o comerciales.
- Programa informático que controla el acceso de una computadoraa la red y de elementos de la red a la computadora, por motivos de seguridad, evitan que usuarios de Internet no autorizados accedan a redes privadas conectadas a la red.
- Programa que se elabora de manera accidental o intencionada y se introduce en los ordenadores, causando daños en la información contenida en el disco duro. Estos, por lo general, infectan otros archivos del sistema con la intención de modificarlos para destruir archivos o datos almacenados en tu computador.
Down
- Es una estafa que tiene como objetivo obtener a través de internet datos privados de los usuarios, especialmente para acceder a sus cuentas bancarias.
- Persona que se dedica a detectar fallos de seguridad en sistemas informáticos ajenos.
5 Clues: Persona que se dedica a detectar fallos de seguridad en sistemas informáticos ajenos. • Correo electrónico no solicitado que se envía a un gran número de destinatarios con fines publicitarios o comerciales. • ...
CyberSecurity 2021-09-24
Across
- Should be strong and not shred with anyone
- The protection of information from unauthorized access
Down
- something of either tangible or intangible value that is worth protecting
- Ensures the timely and Reliable access to and use if information systems
- the combination of the probability of an event and its consequence
5 Clues: Should be strong and not shred with anyone • The protection of information from unauthorized access • the combination of the probability of an event and its consequence • Ensures the timely and Reliable access to and use if information systems • something of either tangible or intangible value that is worth protecting
FOP Crossword Puzzle 2023-03-28
Across
- SOCC is in charge of maintaining and building ________ relations.
- SPAI created its own Project _____.
- Gryphons plan & organize ______-___-___ competitions.
- SOCC organized Freshman Orientation ______.
- ______ organized the SOC Open House.
- Gryphons aims to promote ________ to students that are passionate about IT.
Down
- Programming competition only for freshmen.
- SOCC is in charge of events like ____ tournaments, Community Service Events and Sports Events
- SOCA is In charge of ________ relations.
- SEED hosts the ___-___-Series.
- SEED stands for Sharing, _______, Enriching, Development.
- DISM’s SIG.
- SPAI attended and presented at the ____ Conference.
- SPAI is part of the AI Singapore Student ________.
- SOCA’s ________ department is the first point of contact with outside organizations.
15 Clues: DISM’s SIG. • SEED hosts the ___-___-Series. • SPAI created its own Project _____. • ______ organized the SOC Open House. • SOCA is In charge of ________ relations. • Programming competition only for freshmen. • SOCC organized Freshman Orientation ______. • SPAI is part of the AI Singapore Student ________. • SPAI attended and presented at the ____ Conference. • ...
Viruses 2018-04-10
Across
- to preserve or keep safe from harm
- protection from hackers and viruses
- identify the presence of something concealed
- a malware that replicates itself in order to spread
- "in the ____" meaning it is still a threat to your computer
- software that is intended to damage or disable computers
- distributed denial of service
Down
- set of instructions for a computer
- tools, machinery, and other durable equipment
- electronic device for storing and processing data
- someone who uses computers to gain unauthorized access to data
- fake emails
- messages delivered by electronics
- a type of virus that disguises itself as something else
- corrupts your system and can be easily spread
15 Clues: fake emails • distributed denial of service • messages delivered by electronics • set of instructions for a computer • to preserve or keep safe from harm • protection from hackers and viruses • identify the presence of something concealed • tools, machinery, and other durable equipment • corrupts your system and can be easily spread • ...
Browsing safely 2025-05-26
Across
- Collection of technologies to prevent cybercrimes
- Prevents unauthorised access
- Process of befriending children on social media
- Committing crimes in your name after stealing your identity
- Conducting Terrorism online to cause fear and panic
- Illegal entry into computer systems
- A password valid for few minutes
- Designed to identify,prevent and remove viruses
- Hoaxing or misleading people online
Down
- Computer programs used to corrupt a computer system
- Criminal activity to harm a computer or internet connection
- Unethical hackers
- threat for people who use internet for online shopping,cash transactions and banking services
- Act of harming or harassing people online
- Tricking financial organisation to steal money online
15 Clues: Unethical hackers • Prevents unauthorised access • A password valid for few minutes • Illegal entry into computer systems • Hoaxing or misleading people online • Act of harming or harassing people online • Process of befriending children on social media • Designed to identify,prevent and remove viruses • Collection of technologies to prevent cybercrimes • ...
XoXo Your BIg 2024-10-12
Across
- What do you call a fake noodle?
- Home to summer fun and seaside charm
- I named my car this
- My fav littles major
- America favorite fighting frenchman
- My favorite subject in school
Down
- What do you call a dinosaur with a extensive vocab
- My favorite little name
- My favorite day of the week
- What do you call a bear with no teeth?
- My favorite animal
- I call this salty place home
- My favorite color is
- I’m a dark elixir that many drink to kickstart their day
- I’m a sturdy substance often found underfoot, shaping landscapes and used for building
15 Clues: My favorite animal • I named my car this • My favorite color is • My fav littles major • My favorite little name • My favorite day of the week • I call this salty place home • My favorite subject in school • What do you call a fake noodle? • America favorite fighting frenchman • Home to summer fun and seaside charm • What do you call a bear with no teeth? • ...
Cybersecurity Awareness Month Crossword 2018-09-28
Across
- A form of malware that replicates across computer systems by infecting another piece of software
- Software that runs on the endpoint and prevents malware from accessing the system
- An appliance that sits between your network and the Internet and scans all data passes through
- An attempt by cybersecurity expert to hack into your network and identify any holes in your cybersecurity
- These bad actors may or may not be hackers. Their purpose is to acquire and use stolen information or attack users solely for gain.
- When an attacker sends emails that appear to be legitimate but have links to pharming sites or attachments that contain malware
- Encrypts either a portion or entire computer system and presents the user with a ransom note on how to pay and receive a decryption tool
- These spread across computer systems but self-replicates rather than infecting other software
- A network of hijacked computers a hacker uses for attacking other networks, sending spam or performing calculations such as cryptocurrency mining or cracking stolen passwords
Down
- Any software intended to damage, disable or take control of a computer system without the owner’s consent
- This practice encompasses techniques used by bad actors to trick a person into providing them key information needed for a scheme.
- A hacker that sees their activity as political activism
- Skilled computer users that seek to discover flaws in computer systems that allow them to access part of a system without proper authorization
- A series of software tools that enable an attacker to take control of an operating system at the root level
- A highly targeted phishing attack with information typically acquired through social engineering
- This is a series of numbers, letters, and characters that safeguard accounts. It should be easy to remember but hard to guess
- The process of encoding information so that only authorized individuals can access it
17 Clues: A hacker that sees their activity as political activism • Software that runs on the endpoint and prevents malware from accessing the system • The process of encoding information so that only authorized individuals can access it • These spread across computer systems but self-replicates rather than infecting other software • ...
Crossword Puzzle on Cybersecurity 2026-01-20
Across
- Umbrella term for malicious software.
- Code or technique used to take advantage of a vulnerability.
- Fraudulent attempt to obtain sensitive information through deception.
- Malicious program that records keystrokes.
- Unknown vulnerability with no available patch.
- Security technique that executes programs in an isolated environment.
- Process of verifying a user's identity.
- One-way process used to securely store passwords.
- A weakness that can be exploited by an attacker.
- Harmful component delivered by malware.
Down
- Security device that filters network traffic based on rules.
- Technique used to protect data by converting it into unreadable form.
- Malware designed to hide itself and maintain privileged access.
- Malware that encrypts files and demands payment.
- Group of compromised systems controlled remotely.
- Defines what an authenticated user is allowed to do.
- Unauthorized attempt to access a system.
17 Clues: Umbrella term for malicious software. • Process of verifying a user's identity. • Harmful component delivered by malware. • Unauthorized attempt to access a system. • Malicious program that records keystrokes. • Unknown vulnerability with no available patch. • Malware that encrypts files and demands payment. • A weakness that can be exploited by an attacker. • ...
Online Bankling 2025-11-27
7 Clues: Email-based scam • Monthly account reports • A type of money transfer • Illegal financial activity • Protects data during transfer • Protection of computers, networks, and data from digital attacks. • A process used to verify a user’s identity before granting access.
PROFESI DAN PELUANG USAHA DI BIDANG TKJT 2023-11-17
Across
- Orang yang merancang dan mengembangkan perangkat lunak.
- Orang yang ahli dalam merancang rangkaian listrik.
- Bisnis yang fokus pada pengembangan aplikasi mobile.
- Bisnis yang menyediakan layanan keamanan jaringan.
- Orang yang spesialis dalam keamanan informasi.
Down
- Bisnis yang menyediakan solusi perangkat lunak ERP.
- Orang yang bekerja dengan perangkat keras komputer.
- Bisnis yang menyediakan solusi penyimpanan data.
- Bisnis yang menyediakan layanan cloud computing.
- Orang yang ahli dalam analisis data besar.
10 Clues: Orang yang ahli dalam analisis data besar. • Orang yang spesialis dalam keamanan informasi. • Bisnis yang menyediakan solusi penyimpanan data. • Bisnis yang menyediakan layanan cloud computing. • Orang yang ahli dalam merancang rangkaian listrik. • Bisnis yang menyediakan layanan keamanan jaringan. • Bisnis yang menyediakan solusi perangkat lunak ERP. • ...
WeWork Noble House Community 2022-06-25
Across
- Solving the world's 1 gigaton refrigerant problem
- Pioneer of global content service and distribution
- Offering lead generation services from B2B telemarketing to inside sales
- Supporting diverse clean energy entrepreneurs to thrive
Down
- #DemiMasaDepan #MakingEducationAffordable
- Consumer intelligence platform specializing in mobile advertising
- SaaS platform that makes cybersecurity accessible to all
- Logistics service provider
- Language learning platform, mainly Chinese
- Consumer electronics company, well-known for its technologically advanced smartwatch
10 Clues: Logistics service provider • #DemiMasaDepan #MakingEducationAffordable • Language learning platform, mainly Chinese • Solving the world's 1 gigaton refrigerant problem • Pioneer of global content service and distribution • Supporting diverse clean energy entrepreneurs to thrive • SaaS platform that makes cybersecurity accessible to all • ...
English assignment 2024-11-25
Across
- the essence of knowledge
- deployed for the purpose of dealing harm
- a branch of IT tasked with protection of virtual assets
- a core part of identity of something
- a simplified idea for ease of use
Down
- another word for confidential
- given permissions based on confirmed identity
- a way of viewing and dealing with an issue
- to construct a new product
- a broad group within a company; battles a common issue
10 Clues: the essence of knowledge • to construct a new product • another word for confidential • a simplified idea for ease of use • a core part of identity of something • deployed for the purpose of dealing harm • a way of viewing and dealing with an issue • given permissions based on confirmed identity • a broad group within a company; battles a common issue • ...
PROFESI DAN PELUANG USAHA 2023-11-17
Across
- Orang yang spesialis dalam keamanan informasi.
- Orang yang merancang dan mengembangkan perangkat lunak.
- Bisnis yang menyediakan layanan cloud computing.
- Orang yang ahli dalam analisis data besar.
- Orang yang bekerja dengan perangkat keras komputer.
- Bisnis yang menyediakan solusi penyimpanan data.
- Bisnis yang fokus pada pengembangan aplikasi mobile.
Down
- Bisnis yang menyediakan solusi perangkat lunak ERP.
- Bisnis yang menyediakan layanan keamanan jaringan.
- Orang yang ahli dalam merancang rangkaian listrik.
10 Clues: Orang yang ahli dalam analisis data besar. • Orang yang spesialis dalam keamanan informasi. • Bisnis yang menyediakan layanan cloud computing. • Bisnis yang menyediakan solusi penyimpanan data. • Bisnis yang menyediakan layanan keamanan jaringan. • Orang yang ahli dalam merancang rangkaian listrik. • Bisnis yang menyediakan solusi perangkat lunak ERP. • ...
Technology Terminology 2022-09-26
Across
- Imaginary creatures that cause unexplained technology problems
- IT protection.
- Computer that manages access to centralized resource.
Down
- American multinational technology corporation based in Washington.
- Location of multiple centralized IT resources.
- Tool used to send and receive data across shared or public networks.
- Data "rains" from here.
- Interconnected people or technology.
8 Clues: IT protection. • Data "rains" from here. • Interconnected people or technology. • Location of multiple centralized IT resources. • Computer that manages access to centralized resource. • Imaginary creatures that cause unexplained technology problems • American multinational technology corporation based in Washington. • ...
Cybersecurity 2020-08-21
Across
- They are small files that some websites save on your computer. This little files store information about you, such as username, but they cannot spy on you.
- the junk email people receive. These messages, also known as unsolicited mail, are usually service advertisements.
- it is the practice of protecting systems, networks and programs from digital attacks.
Down
- an electronic device to store and process data, in the way that the user wishes.
- Los virus son programas informáticos que tienen como objetivo alterar el funcionamiento del computador, sin que el usuario lo desee. Estos tienen la intención de destruir o modificar los archivos o datos almacenados en tu computadora.
5 Clues: an electronic device to store and process data, in the way that the user wishes. • it is the practice of protecting systems, networks and programs from digital attacks. • the junk email people receive. These messages, also known as unsolicited mail, are usually service advertisements. • ...
CYBERSECURITY 2021-09-28
AI 2025-11-07
Across
- Kemampuan AI untuk membuat teks, gambar, atau musik disebut …
- Informasi yang bersifat pribadi dan rahasia disebut …
- Salah satu etika AI: tidak boleh … manusia
- Sistem keamanan yang mencegah akses tidak sah ke jaringan
- Teknologi yang meniru cara berpikir manusia
- AI yang bisa bermain game disebut … AI
- Cybersecurity melindungi dari serangan …
- Teknologi yang memungkinkan komputer memahami bahasa manusia
- AI yang bisa meniru gaya tulisan disebut … AI
- Sistem yang menyimpan dan mengelola data disebut …
- AI yang bisa membuat video dari teks disebut … AI
- AI yang digunakan untuk menganalisis data disebut … AI
- AI bisa belajar dari … yang diberikan
- Sistem yang memverifikasi identitas pengguna, seperti kata sandi
- Cybersecurity melindungi dari serangan …
- AI yang bisa menghasilkan musik disebut … AI
- AI yang bisa mengenali objek dalam gambar disebut … AI
- Teknologi yang digunakan untuk melacak aktivitas pengguna disebut …
- AI harus digunakan secara … dan bertanggung jawab
- AI yang bisa memahami emosi disebut … AI
- Salah satu contoh penggunaan AI di sekolah adalah … otomatis
Down
- AI yang digunakan untuk mengenali suara disebut ...
- Salah satu risiko AI adalah … pekerjaan manusia
- AI yang digunakan untuk membuat gambar dari teks disebut … AI
- Program jahat yang merusak sistem komputer
- Salah satu bentuk pelanggaran etika AI adalah … data tanpa izin
- AI yang bisa menerjemahkan bahasa disebut … AI
- Serangan yang menipu pengguna agar memberikan informasi disebut …
- Kata lain dari keamanan informasi digital
- AI yang bisa berbicara dan menjawab disebut … AI
- AI bisa digunakan untuk membantu … tugas manusia
- Sistem keamanan yang menggunakan sidik jari disebut …
- Sistem keamanan yang mencegah akses tidak sah ke jaringan
- Teknologi yang digunakan untuk mengenali wajah
- Salah satu risiko AI adalah penyebaran … palsu
- Kata sandi yang kuat harus sulit untuk …
- AI yang bisa membuat desain disebut … AI
- Sistem yang menyimpan data secara online disebut …
- Data pribadi harus dijaga agar tidak …
- AI yang digunakan untuk chatbot disebut … AI
- Serangan digital yang bertujuan mencuri data disebut …
41 Clues: AI bisa belajar dari … yang diberikan • AI yang bisa bermain game disebut … AI • Data pribadi harus dijaga agar tidak … • Cybersecurity melindungi dari serangan … • Kata sandi yang kuat harus sulit untuk … • AI yang bisa membuat desain disebut … AI • Cybersecurity melindungi dari serangan … • AI yang bisa memahami emosi disebut … AI • ...
Smart System 2021-06-08
7 Clues: maintenance of systems • #1 cons of the smart system • example of smart system - monitoring • application improving quality of life • application that involves wireless sensors • application of tackling with climate change • smart system incorporate functions of sensing, actuation and?
Enterprise manual 2022-06-21
Enterprise manual 2022-06-21
Security Awareness Month 2025 2025-10-07
Across
- the credit card security audit we do
- Fastpass uses ____ to authenticate me to Okta.
- passwords should ____ be stored in plaintext
- the button to report a suspicious email
- the wiki code for the AI Knowledge Base
- our password manager tool
- phiches use ___ to pressure people to click or reply.
- Crowd____ is our AV software.
Down
- a pass____ is more memorable than a password
- the data classification for pii and credit card data
- ___@kayak.com where support tickets can be emailed
- ask-kayak-____ is the Slack channel for cybersecurity questions.
- our remote access tool
- ai tool to search all of kayak
- The Acceptable ____ Policy sets employee security rules
15 Clues: our remote access tool • our password manager tool • Crowd____ is our AV software. • ai tool to search all of kayak • the credit card security audit we do • the button to report a suspicious email • the wiki code for the AI Knowledge Base • a pass____ is more memorable than a password • passwords should ____ be stored in plaintext • ...
Starhub 2025-04-06
Across
- Division offering network and cybersecurity solutions
- What class are we in?
- The forecasted revenue was derived from ____ reports
- Streaming platform competing with PAYTV
Down
- The last presenter of the group
- Key transformation strategy Starhub is undergoing:___ +
- Type of strategy Starhub uses to shift from Telco to Digital solutions player
- Our recommendation on Starhub's shares
- The bargaining power of buyers is ___
9 Clues: What class are we in? • The last presenter of the group • The bargaining power of buyers is ___ • Our recommendation on Starhub's shares • Streaming platform competing with PAYTV • The forecasted revenue was derived from ____ reports • Division offering network and cybersecurity solutions • Key transformation strategy Starhub is undergoing:___ + • ...
crossword! 2024-02-03
Across
- Usually consists of 8 bits
- Invisible barrier for women advancing in the workplace
- left no crumbs
- Mentor applications are due on the _
- Film about under-recognized Black women at NASA who were a key part of its success
- Most commonly-used programming language
Down
- practice of protecting systems, networks, and programs from digital attacks
- Purdue's first women-centric hackathon ;)
- When women are generally paid less than men
- women in _
10 Clues: women in _ • left no crumbs • Usually consists of 8 bits • Mentor applications are due on the _ • Most commonly-used programming language • Purdue's first women-centric hackathon ;) • When women are generally paid less than men • Invisible barrier for women advancing in the workplace • practice of protecting systems, networks, and programs from digital attacks • ...
GGH - The odd word out here is a clue to the location of the next riddle. 2024-08-05
Across
- Unethical practice of gaining unauthorized access to computer systems.
- Act of impersonating a legitimate entity to deceive individuals or gain access.
- A type of computer memory.
- A small portable computer.
Down
- Securing computer systems against unauthorized access.
- A popular operating system.
- The brain of a computer.
- Term for gaining access to a secure network through.
- Malicious software used to gain unauthorised access to computer systems.
- Desired outcomes.
10 Clues: Desired outcomes. • The brain of a computer. • A type of computer memory. • A small portable computer. • A popular operating system. • Term for gaining access to a secure network through. • Securing computer systems against unauthorized access. • Unethical practice of gaining unauthorized access to computer systems. • ...
Technology & Innovation 2025-08-09
Across
- – The state of relying on something
- OFFICE – Working physically at a company's premises
- – Protection of computer systems from attacks
- – Introduction of new methods, ideas, or products
- – A mobile phone with advanced features
Down
- – Process of learning and acquiring knowledge
- – State of being free from public attention
- WORK – Working from home or another location outside the office
- – Short for Artificial Intelligence
- – Application of scientific knowledge for practical purposes
10 Clues: – The state of relying on something • – Short for Artificial Intelligence • – A mobile phone with advanced features • – State of being free from public attention • – Process of learning and acquiring knowledge • – Protection of computer systems from attacks • – Introduction of new methods, ideas, or products • OFFICE – Working physically at a company's premises • ...
R&D India Market Place 2022-11-09
Across
- own your_______
- ____ is at the core of our purpose, culture and business.
- Reducing the operational carbon emissions in our supply chain
- chairman and CEO
- one of our core values
- internal tool for mobility, projects and mentorships
Down
- IoT, mobility, sensing, cloud, analytics and cybersecurity to deliver Innovation at Every Level.
- We are Globally recognised for____
- one of our 6 long term commitments
9 Clues: own your_______ • chairman and CEO • one of our core values • We are Globally recognised for____ • one of our 6 long term commitments • internal tool for mobility, projects and mentorships • ____ is at the core of our purpose, culture and business. • Reducing the operational carbon emissions in our supply chain • ...
Parole Cybercrociate 2021-04-23
Across
- Un particolare tipo di dato personale
- Nuovo social network fondato nel 2020
- Città che è una eccellenza mondiale nella Cybersecurity
- La casata rappresentata da un lupo nella serie "Trono di Spade"
- Il pizzo digitale
- Truffa che sfrutta la tecnologia VoiP
- Una delle tre dimensioni di sicurezza del dato
Down
- Probabilità per impatto
- E' una criptovaluta
- Il nome del processore ARM per Mac di Apple
- Rete di computer composta da dispositivi infettati da un malware “zombie”
- Numero di basi giuridiche previste dal GDPR per la liceità di un trattamento di dati personali
12 Clues: Il pizzo digitale • E' una criptovaluta • Probabilità per impatto • Un particolare tipo di dato personale • Nuovo social network fondato nel 2020 • Truffa che sfrutta la tecnologia VoiP • Il nome del processore ARM per Mac di Apple • Una delle tre dimensioni di sicurezza del dato • Città che è una eccellenza mondiale nella Cybersecurity • ...
Professor Sloan's Fun Facts 2025-04-23
Across
- What is the acronym for the New CS Building?
- What month was he born?
- What school did he earn his PhD from?
- What school did he go to for undergrad?
- What is one of his hobbies?
- What book did he write w/Richard Warner in 2021?
Down
- What is his job title?
- What event is he the Official Pronouncer for?
- How many years has he been at UIC?
- What is his favorite apparel to wear?
- What is his newest book about?
- Where was he born?
12 Clues: Where was he born? • What is his job title? • What month was he born? • What is one of his hobbies? • What is his newest book about? • How many years has he been at UIC? • What is his favorite apparel to wear? • What school did he earn his PhD from? • What school did he go to for undergrad? • What is the acronym for the New CS Building? • ...
Cybersecurity Fundamentals - Chapter 3 2022-10-18
Across
- to make malicious website appear higher in search engine result.
- software that enables a criminal to obtain information about user's computer activities.
- an attack that targes high profile targets within an organization.
- impersonation of a legitimate website
- the program or code introduced by a criminal who has compromised a system
- malicious program that uses a trigger to awaken the malicious code
- malicious code that replicates by independently exploiting vulnerabilities.
- malware that carries out malicious operation under the guise of a desired operation.
- a malicious executable code attached to another executable file.
- known as junk mail
Down
- highly targeted phishing attack, that send customized emails to a specific person or individual.
- holds a computer system, or the data it contains, captive until the target makes a payment.
- alters a computer's browser settings to redirect user to website paid for the cyber criminals' customers.
- a form of fraud where a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source.
- persuades the user to take specific action based on fear
- displays annoying pop-ups to generate revenue for its authors.
- using voice communication technology and records message that appears legitimate.
17 Clues: known as junk mail • impersonation of a legitimate website • persuades the user to take specific action based on fear • displays annoying pop-ups to generate revenue for its authors. • to make malicious website appear higher in search engine result. • a malicious executable code attached to another executable file. • ...
Computer Science 2025-09-11
Across
- a graph that plots data using bars
- your credibility to use the internet
- bullying using the internet
- someone you should inform during a bullying situation
- online credentials to an account on the internet
- the Brains of the computer
- Your own information on the internet
- a person who witnesses bullying
Down
- a component that connects your major components of the computer
- usng someone else's work without giving credit to the author
- the physical components of a computer
- your history on the internet
- harmful to your computer/ the internet
- one of the most common software applications
- a place where people can connect with others
- The process of protecting yourself on the internet
16 Clues: the Brains of the computer • bullying using the internet • your history on the internet • a person who witnesses bullying • a graph that plots data using bars • your credibility to use the internet • Your own information on the internet • the physical components of a computer • harmful to your computer/ the internet • one of the most common software applications • ...
IELTS Science & Tech Vocabulary 2025-09-03
Across
- A sudden and important discovery or development
- The investigation of outer space through tech
- A new method, idea, or product
- Highly advanced and innovative
- Based on or guided by data
- The most advanced or sophisticated version available
- The imitation of intelligent human behavior
- The period characterized by the internet
- The gap between those with and without technology
Down
- Technology dealing with robots
- Involving advanced technological development
- High levels of technological development
- The use of machines to perform tasks without human involvement
- A digital space used for interaction or services
- The practice of protecting systems and networks from attacks
- Easy to understand or use
16 Clues: Easy to understand or use • Based on or guided by data • Technology dealing with robots • A new method, idea, or product • Highly advanced and innovative • High levels of technological development • The period characterized by the internet • The imitation of intelligent human behavior • Involving advanced technological development • ...
Senior Management Knowledge 2024-12-25
Across
- Largest threat to Bank.
- Bank’s #1 Strength.
- Financial guide for the Bank.
- Beliefs about what will happen in the future.
- An unexpected event that could have a negative impact on the Bank.
- Fun for all associates.
- Coin or what people fear the most.
Down
- The ability of an asset to be quickly and easily converted to cash.
- The feeling or belief that one can rely on someone or something thing.
- The process of determining a borrower’s creditworthiness.
- Interest free checking accounts.
- A formal agreement to repay a debt.
- Number #1 challenge of FNB.
- Bank’s core system.
- Bank’s define market area.
- Official inspection or Necessity for all Banks.
16 Clues: Bank’s #1 Strength. • Bank’s core system. • Largest threat to Bank. • Fun for all associates. • Bank’s define market area. • Number #1 challenge of FNB. • Financial guide for the Bank. • Interest free checking accounts. • Coin or what people fear the most. • A formal agreement to repay a debt. • Beliefs about what will happen in the future. • ...
Senior Management Knowledge 2024-12-25
Across
- Number #1 challenge of FNB.
- The feeling or belief that one can rely on someone or something thing.
- Largest threat to Bank.
- An unexpected event that could have a negative impact on the Bank.
- Financial guide for the Bank.
- A formal agreement to repay a debt.
- Official inspection or Necessity for all Banks.
Down
- Bank’s #1 Strength.
- Coin or what people fear the most.
- Bank’s define market area.
- The ability of an asset to be quickly and easily converted to cash.
- The process of determining a borrower’s creditworthiness.
- Interest free checking accounts.
- Beliefs about what will happen in the future.
- Bank’s core system.
- Fun for all associates.
16 Clues: Bank’s #1 Strength. • Bank’s core system. • Largest threat to Bank. • Fun for all associates. • Bank’s define market area. • Number #1 challenge of FNB. • Financial guide for the Bank. • Interest free checking accounts. • Coin or what people fear the most. • A formal agreement to repay a debt. • Beliefs about what will happen in the future. • ...
Did you read it? 2020-10-16
Across
- Entries due NLT 11/2
- Home of the 14th Flying Training Wing of Air Education and Training Command
- By David C. Graham
- Entries due NLT 10/23
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Do your Part.#BeCyberSmart
- Quality Management Principles
- Test Monthly
8 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Quality Management Principles • Home of the 14th Flying Training Wing of Air Education and Training Command • To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Hacktivism Vocabulary Crossword 2 2023-05-09
Across
- protecting an organization and its employees against cyber threats
- a person or thing likely to cause damage or danger
- a hacker with bad intentions
Down
- an attempt by hackers to damage or destroy a computer network or system
- a legal hacker hired by a company or government
- reveal
- take something that is not yours
- to search
8 Clues: reveal • to search • a hacker with bad intentions • take something that is not yours • a legal hacker hired by a company or government • a person or thing likely to cause damage or danger • protecting an organization and its employees against cyber threats • an attempt by hackers to damage or destroy a computer network or system
tema 2 perkembangan ekonomi digital 2025-10-27
Across
- digital menciptakan pekerjaan baru berbasis → TEKNOLOGI
- besar yang digunakan untuk analisis bisnis disebut → BIGDATA
- baru berbasis teknologi disebut → STARTUP
- keuangan secara online disebut → EBANKING
- depan ekonomi digital bergantung pada literasi → DIGITAL
- dan GrabFood merupakan layanan → DIGITALDELIVERY
- merupakan singkatan dari → FINANCIALTECHNOLOGY
- pemerintah untuk mendukung ekonomi digital UMKM disebut → DIGITALISASIUMKM
- utama dalam ekonomi digital adalah keamanan data dan → PRIVASI
- melalui marketplace online termasuk kegiatan → EKOMERCE
- transaksi online dikenal dengan istilah → CYBERSECURITY
- ekonomi digital adalah kebocoran → DATA
Down
- buatan dikenal juga dengan istilah → ARTIFICIALINTELLIGENCE
- aplikasi fintech di Indonesia adalah → OVO
- ekonomi yang memanfaatkan teknologi digital dan internet → EKONOMIDIGITAL
- melalui media sosial disebut → DIGITALMARKETING
- Shopee, dan Lazada adalah contoh platform → MARKETPLACE
- utama ekonomi digital adalah mempercepat → TRANSAKSI
- tanpa uang tunai menggunakan kartu atau aplikasi disebut → EMONEY
- usaha kecil dapat menjangkau pasar luas melalui → INTERNET
20 Clues: ekonomi digital adalah kebocoran → DATA • baru berbasis teknologi disebut → STARTUP • keuangan secara online disebut → EBANKING • aplikasi fintech di Indonesia adalah → OVO • merupakan singkatan dari → FINANCIALTECHNOLOGY • melalui media sosial disebut → DIGITALMARKETING • dan GrabFood merupakan layanan → DIGITALDELIVERY • ...
TEMA 2 TTS perkembangan ekonomi digital M.mumthazul fikri 9A 2025-10-22
Across
- , Kegiatan ekonomi melalui media internet.
- ,Singkatan dari teknologi kecerdasan buatan dalam bahasa Inggris.
- kredit , Alat pembayaran berbentuk kartu dari bank.
- , Aplikasi belanja online yang berwarna oranye.
- banking , Layanan bank yang sepenuhnya berbasis internet.
- Salah satu dompet digital terkenal di Indonesia.
- Sistem pembayaran tanpa uang tunai.
- , Sistem keamanan siber untuk perlindungan data.
- , Proses jual beli yang terjadi secara online.
- , Salah satu e-wallet milik Gojek.
Down
- Bentuk pasar digital tempat jual beli online.
- , Teknologi virtual yang berkembang bersama ekonomi digital.
- , Perusahaan teknologi keuangan disebut ...
- Bentuk uang yang hanya bisa digunakan secara elektronik.
- , Mata uang kripto pertama di dunia.
- , Mata uang digital resmi dari bank sentral disebut.
- , Metode pembayaran dengan memindai kode.
- , Transaksi keuangan melalui jaringan komputer disebut ...
- Teknologi dasar dari mata uang kripto.
- Mata uang digital yang populer dan terdesentralisasi.
20 Clues: , Salah satu e-wallet milik Gojek. • Sistem pembayaran tanpa uang tunai. • , Mata uang kripto pertama di dunia. • Teknologi dasar dari mata uang kripto. • , Metode pembayaran dengan memindai kode. • , Kegiatan ekonomi melalui media internet. • , Perusahaan teknologi keuangan disebut ... • Bentuk pasar digital tempat jual beli online. • ...
Technology and Society 2024-09-02
Across
- A virtual representation of a person
- A digital platform for sharing and connecting
- A type of software that protects against malware
- A device used for communication and information
- The practice of protecting systems, networks
- The global network connecting millions of computers
Down
- The use of technology to perform tasks without human intervention
- A digital currency
- The buying and selling of goods and services over the internet.
- Online theft of personal information
10 Clues: A digital currency • A virtual representation of a person • Online theft of personal information • The practice of protecting systems, networks • A digital platform for sharing and connecting • A device used for communication and information • A type of software that protects against malware • The global network connecting millions of computers • ...
Technology 2025-06-16
Across
- an important discovery or development
- the use of machines to perform tasks without human intervention
- easy to use or understand
- a small electronic device with a specific function
- the trail of data left by users on the internet
- introducing new ideas or methods
Down
- knowledgeable about modern technology
- extremely modern and advanced
- measures taken to protect systems from cyber threats
- the simulation of human intelligence in machines
10 Clues: easy to use or understand • extremely modern and advanced • introducing new ideas or methods • knowledgeable about modern technology • an important discovery or development • the trail of data left by users on the internet • the simulation of human intelligence in machines • a small electronic device with a specific function • ...
Teka Teki Silang 2025-06-26
Across
- Profesi yang bertugas mendesain dan mengembangkan perangkat lunak
- Membuat dan menulis program komputer
- Orang yang mengelola jaringan komputer dalam suatu organisasi
- Orang yang mengoprasikan komputer dalam kehidupan sehari-hari
- Profesi yang membantu pengguna saat mengalami masalah teknis
Down
- Profesi yang bertugas merancang dan membangun halaman web
- Orang yang bertugas menjaga keamanan sistem dari serangan siber
- Profesi yang menganalisis kebutuhan sistem sebelum dibuat
- Komponen sistem komputer selain hardware dan software
- Orang yang menggunakan komputer
10 Clues: Orang yang menggunakan komputer • Membuat dan menulis program komputer • Komponen sistem komputer selain hardware dan software • Profesi yang bertugas merancang dan membangun halaman web • Profesi yang menganalisis kebutuhan sistem sebelum dibuat • Profesi yang membantu pengguna saat mengalami masalah teknis • ...
Privacy Summit 2025 2025-01-06
Across
- Federal law governing information security management
- Hide one's IP address
- Unique code or number assigned to an individual
- Government watching
- Personal info stored online
- Cybersecurity sequence
- Measures to prevent hacking
- Threat of hacking or online attack or Reason to use strong passwords
- Code for secure messaging
- Alert to potential threat
- Not for public view
- Secure online account
Down
- Requirement of FOIA
- Secret information
- Method of identification using fingerprints or High-tech way to unlock your phone
- Protected from hacking
- Nameless online user
- Conceal online activity
- Personal info to be guarded
- Unauthorized access
- Right to keep info secret
- Shield from identity theft
- Reduce the severity of a cyber-attack/data breach or Lessen the blow of a data breach
- Document or file containing personal data
24 Clues: Secret information • Requirement of FOIA • Government watching • Unauthorized access • Not for public view • Nameless online user • Hide one's IP address • Secure online account • Protected from hacking • Cybersecurity sequence • Conceal online activity • Right to keep info secret • Code for secure messaging • Alert to potential threat • Shield from identity theft • ...
attempt 3 2025-07-10
Across
- The flavor of their wedding cake
- The instrument the groom played in high school
- Their first dance song
- The city they met in
- The name of their dog
- How many years the couple has been together
- The first movie they watched as a couple
- The bride's maiden name
- First concert they saw together
- number of pets the couple has
- The stone in the engagement ring
Down
- The country they visited last summer
- The street Sarah and Liam call home
- What did the groom study in college
- Name of Sarah's Maid of Honor
- The month they first met
- Sarah's middle name
- The month the couple got engaged
- Where did the proposal happen
- The color of the bridesmaid dresses
- Name of the Best Man
- Sarah's star sign
22 Clues: Sarah's star sign • Sarah's middle name • The city they met in • Name of the Best Man • The name of their dog • Their first dance song • The bride's maiden name • The month they first met • Name of Sarah's Maid of Honor • Where did the proposal happen • number of pets the couple has • First concert they saw together • The flavor of their wedding cake • The month the couple got engaged • ...
Cittadinanza digitale 2021-11-15
7 Clues: bullismo in rete • colui che infetta i file • la sicurezza informatica • il pirata del sistema informatico • parola segreta legata a un account • rete di computer che possono comunicare tra loro • insieme di regole per il buon comportamento su internet
Smart System 2021-06-08
7 Clues: maintenance of systems • #1 cons of the smart system • example of smart system - monitoring • application improving quality of life • application that involves wireless sensors • application of tackling with climate change • smart system incorporate functions of sensing, actuation and?
CTE Pathway Lake Highlands HS 2022-11-16
7 Clues: Robotics Pathway (Level 4) • Legal Studies Magnet Pathway (Level 1) • Cybersecurity Magnet Pathway (Level 4) • Culinary Arts Magnet Pathway (Level 3) • Computer Science Magnet Pathway (Level 3) • Manufacturing Technology Magnet Pathway (Level 1) • Digital Communications -AV Production Pathway (Level 2)
High School Pathways 2024-04-26
7 Clues: Earn a welding certificate • Course towards medical fields • Take courses to become a teacher • Take courses in computer technology • Finish 2 years of your Bachelor's Degree • Take courses on building, carpentry work • Take courses about wildlife, plants and animals
Vocabulary 2024-10-17
Across
- For higher cybersecurity, you need a better ... (Passwort).
- Most of the times, there is no ... (Zeuge/Zeugin) to cybercrime.
- schützen/beschützen
- Most crimes involve hacking into the individual's computer to ... (stehlen) credit card information.
- Sometimes there is no ... (Beweis) of the cyberattack.
- beliebig
- The company got ... (gehackt).
- Hackers use the internet as their ... (Waffe).
- They use information to ... (erpressen) people.
Down
- The ... (Opfer) often doesn't recognize hackers as criminals.
- Hackers' ... (Verbrechen) are often invisible.
- The ... (Verdächtige/r) was probably from the UK.
- This ... (illegale) activity is costing the global economy a lot of money.
- Schadsoftware
- Sicherheit
- It sometimes can be really difficult to catch a ... (Kriminelle/r).
16 Clues: beliebig • Sicherheit • Schadsoftware • schützen/beschützen • The company got ... (gehackt). • Hackers' ... (Verbrechen) are often invisible. • Hackers use the internet as their ... (Waffe). • They use information to ... (erpressen) people. • The ... (Verdächtige/r) was probably from the UK. • Sometimes there is no ... (Beweis) of the cyberattack. • ...
Compliance Newsletter, Vol 1. April 2021 2021-03-26
Across
- Covid conference room
- Ticker symbol for Apex Clearing Holdings
- Outside Brokerage Accounts are required to be disclosed via ________ Compliance Technologies
- Sum of money paid by a company to its shareholders
- Written ________ Procedures
- Protects against the criminal or unauthorized use of electronic data
- A Series 4 Exam covers this specific area
- Securities ________ Protection Corporation
- The acknowledgement of understanding and abidance to policies, procedures or training
- ________ Oxley Act of 2002
Down
- Being in accordance with established guidelines or regulations
- Special Purpose ________ Company
- People who have material nonpublic information about a company
- The Firm's new Deputy CCO
- State where Apex Clearing is based
- Know Your ________
- Vendor for Firm Element Training
- Driving for Uber is an example of an Outside ________ Activity
- Handles the licensing and regulation of broker-dealers
19 Clues: Know Your ________ • Covid conference room • The Firm's new Deputy CCO • ________ Oxley Act of 2002 • Written ________ Procedures • Special Purpose ________ Company • Vendor for Firm Element Training • State where Apex Clearing is based • Ticker symbol for Apex Clearing Holdings • A Series 4 Exam covers this specific area • Securities ________ Protection Corporation • ...
CSIT - Cybersecurity Vocab 2024-12-02
Across
- A person or entity responsible for an event that has been identified as a security incident or as a risk
- Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted
- Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage
- The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data
- Data that can be used to identify or contact an individual
- A physical or virtual item that contains authentication and/or authorization data, commonly used in multifactor authentication
Down
- A number used in conjunction with authentication devices
- Scans that allow access to a physical space or program by verifying unique body features
- unauthorized use is detected or attempted
- Security control that can enforce a virtual boundary based on real-world geography
- A basic principle of security stating that a person should be allocated the minimum necessary rights, privileges, or information to perform its role
11 Clues: unauthorized use is detected or attempted • A number used in conjunction with authentication devices • Data that can be used to identify or contact an individual • Security control that can enforce a virtual boundary based on real-world geography • Scans that allow access to a physical space or program by verifying unique body features • ...
Cybersecurity Crossword Puzzle 2023-04-17
Across
- Engineering, Is a technique that a hacker uses to steal data by a person for different purposes by psychological manipulation combined with social scenes.
- access, When someone gains access to a server, website, or other sensitive data using someone else's account details.
- It is a software or hardware which is used to filter network traffic based on rules.
- It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding the security system.
- Is a software that operates on different OS which is used to prevent malicious software.
- security, the protection of computer systems and information from harm, theft, and unauthorized use.
Down
- Is a person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.
- Is an action or event that might compromise the security.
- It is a malicious software that installs on your computer without your consent for a bad purpose.
- security, refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
- Is an assault on the system security that is delivered by a person or a machine to a system.
11 Clues: Is an action or event that might compromise the security. • It is a software or hardware which is used to filter network traffic based on rules. • Is a software that operates on different OS which is used to prevent malicious software. • Is an assault on the system security that is delivered by a person or a machine to a system. • ...
Unit 4 Cybersecurity 2022-03-02
Across
- a check for a secure BIOS operation
- when an information system receives protection from a pre-existing security controls
- software built into a piece of hardware
- securing devices by reducing the exposure
Down
- a more thorough hotfix
- quick fix for a software problem
- firewall command to block or allow certain user
- a device that acts as a file server
- proprietary journaling file system
- a guide for efficiency of a network
- network of high speed storage used by servers
11 Clues: a more thorough hotfix • quick fix for a software problem • proprietary journaling file system • a check for a secure BIOS operation • a device that acts as a file server • a guide for efficiency of a network • software built into a piece of hardware • securing devices by reducing the exposure • network of high speed storage used by servers • ...
CYBERSECURITY AWARENESS - C40 2024-10-22
Across
- The process of analyzing systems for vulnerabilities (8 LETTERS)
- A program that replicates itself to spread malware (4 LETTERS)
- A security method where each user has specific privileges (6 LETTERS)
- Cybercriminals often use this method to monitor network activity (8 LETTERS)
- Using multiple types of information to verify identity (14 LETTERS)
- Security strategy that requires users to change this regularly (8 LETTERS)
Down
- Common method used to protect sensitive data (10 LETTERS)
- Fake emails claiming to be from trusted sources (8 LETTERS)
- A phrase longer than a password for added security (9 LETTERS)
- Network of infected computers controlled remotely (6 LETTERS)
- Program designed to prevent unauthorized access (8 LETTERS)
11 Clues: Common method used to protect sensitive data (10 LETTERS) • Fake emails claiming to be from trusted sources (8 LETTERS) • Program designed to prevent unauthorized access (8 LETTERS) • Network of infected computers controlled remotely (6 LETTERS) • A phrase longer than a password for added security (9 LETTERS) • ...
Luka's Cybersecurity Quizz 2024-03-20
Across
- Something that protect a network
- Symetrical encryption
- Keep a message unmodified
- Someone who doing hacking for there ethic
- Garanty that a message come from one person
- Something that encrypt or deencrypt a message
Down
- The possibility to access data
- Something that will damage your pc or things on it
- Privacy of a message
- A type of attack on a network
- Asymetrical encryption
11 Clues: Privacy of a message • Symetrical encryption • Asymetrical encryption • Keep a message unmodified • A type of attack on a network • The possibility to access data • Something that protect a network • Someone who doing hacking for there ethic • Garanty that a message come from one person • Something that encrypt or deencrypt a message • ...
National Cybersecurity Month 2022-09-16
Across
- SOFTWARE DESIGNED TO INTERFERE WITH A COMPUTER'S NORMAL FUNCTIONING
- A SCAM BY WHICH AN EMAIL USER IS DUPED INTO REVEALING PERSONAL OR CONFIDENTIAL INFORMATION WHICH THE SCAMMER CAN USE ILLICITLY
- AN INTEGRATED COLLECTION OF SECURITY MEASURES DESIGNED TO PREVENT UNAUTHORIZED ELECTRONIC ACCESS TO A NETWORKED COMPUTER
- A COMPUTER THAT IS UNDER COTNROL OF A MALICIOUS HACKER WITHOUT THE KNOWLEDGE OF THE COMPUTER OWNER
- A PROGRAM THAT IS DESIGNED TO HARM A COMPUTER BY DELETING DATA, RUINING FILES, & THAT CAN BE SPREAD SECRETLY FROM ONE COMPUTER TO ANOTHER
Down
- COMPUTER SOFTWARE THAT SECRETLY RECORDS INFORMATION ABOUT THE WAY YOU USE YOUR COMPUTER
- THE ACT OF OBTAINING OR ATTEMPTING TO OBTAIN OTHERWISE SECURE DATA BY CONNING AN INDIVIDUAL INTO REVEALING SECURE INFORMATION
- MEASURES TAKEN TO PROTECT A COMPUTER OR COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS OR ATTACK
- A SECRET SERIES OF NUMBERS OR LETTERS THAT ALLOWS YOU TO USE A COMPUTER SYSTEM
- USUALLY A SMALL SELF-CONTAINED & SELF REPLICATING COMPUTER PROGRAM THAT INVADES COMPUTERS ON A NETWORK AND USUALLY PERFORMS A DESTRUCTIVE ACTION
- EMAIL THAT IS NOT WANTED, EMAIL THAT IS SENT TO LARGE NUMBERS OF PEOPLE AND CONSISTS OF MOSTLY ADVERTISING
11 Clues: SOFTWARE DESIGNED TO INTERFERE WITH A COMPUTER'S NORMAL FUNCTIONING • A SECRET SERIES OF NUMBERS OR LETTERS THAT ALLOWS YOU TO USE A COMPUTER SYSTEM • COMPUTER SOFTWARE THAT SECRETLY RECORDS INFORMATION ABOUT THE WAY YOU USE YOUR COMPUTER • MEASURES TAKEN TO PROTECT A COMPUTER OR COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS OR ATTACK • ...
Cybersecurity for Seniors 2025-10-10
Across
- Be____when sharing credit card information
- Do not _____ passwords with anyone
- Signifies the protection of important information
- Do not ___ the same password
- ____ applications you don't use anymore
- Means keeping information unchanged and trustworthy
Down
- Turn off ____ on all applications
- ____ software when available
- _____ calls/texts/links from strangers
- Availability means making sure computers, websites and ___ are ready to be used
- When making an account set good ____
11 Clues: ____ software when available • Do not ___ the same password • Turn off ____ on all applications • Do not _____ passwords with anyone • When making an account set good ____ • _____ calls/texts/links from strangers • ____ applications you don't use anymore • Be____when sharing credit card information • Signifies the protection of important information • ...
Akash Test crossword 2025-03-21
Across
- Protects your data and accounts from unauthorized access
- Avoiding practices that harm the environment in tech usage
- Giving credit to original creators when using their work
- Verifying facts before sharing online information
- Avoiding the use of pirated software
- Ensuring websites are trustworthy before sharing personal data
- A harmful program that can damage your computer
Down
- Abiding by rules and regulations online
- Keeping your information secret online
- To act thoughtfully when posting or commenting online
- Using strong passwords and two-factor authentication
11 Clues: Avoiding the use of pirated software • Keeping your information secret online • Abiding by rules and regulations online • A harmful program that can damage your computer • Verifying facts before sharing online information • Using strong passwords and two-factor authentication • To act thoughtfully when posting or commenting online • ...
Let's Play OPS 2025-12-01
Across
- Unauthorized access gained by cracking credentials
- Attack where shipment or order details are altered secretly
- Encrypted communication protocol used between supply chain systems
- Event where warehouse operations halt due to corrupted systems
- Malicious entry inserted through software updates
- Weakest digital point that can collapse a multi-partner network
- Fraud where attackers pose as legitimate suppliers
Down
- Practice of verifying every transaction or shared data
- Undetected extraction of sensitive commercial data
- Technique that overwhelms logistics systems with fake traffic
- Process of assessing supplier cybersecurity capability
11 Clues: Malicious entry inserted through software updates • Unauthorized access gained by cracking credentials • Undetected extraction of sensitive commercial data • Fraud where attackers pose as legitimate suppliers • Practice of verifying every transaction or shared data • Process of assessing supplier cybersecurity capability • ...
Northwood and NUIAS 2024-10-02
Across
- Built Tough
- Who runs the Auto Show?
- What is the name of the Automotive Roundtable at 9 am on October 5th?
- The protection of computers and computer systems
- What number is this year's Auto Show?
- Ford's newest active driving assistance system
- The collection of multi-million dollar hypercars
Down
- America's _____ University
- What is both a degree at Northwood and a section of the Auto Show
- Liberty and ____ for all
- What does the "I" in NUIAS stand for
- What does the "M" in CAMS stand for?
12 Clues: Built Tough • Who runs the Auto Show? • Liberty and ____ for all • America's _____ University • What does the "I" in NUIAS stand for • What does the "M" in CAMS stand for? • What number is this year's Auto Show? • Ford's newest active driving assistance system • The protection of computers and computer systems • The collection of multi-million dollar hypercars • ...
Build with AI Bamenda 2025 2025-05-03
Across
- Platform for data science competitions and hosting datasets
- Unit of a neural network
- Hardware accelerator for speeding up AI computations
- Text-to-image model developed by Google DeepMind
- Model error due to excessive complexity
- Protection of digital systems and data
- Platform for collaborative coding and machine learning
- Google's AI research organization
- AI chatbot developed by Google DeepMind
Down
- Collection of data for training AI models
- Decentralized and secure data storage
- Open-source ML framework used on Google Cloud
- Notebook Interactive coding environment
- Proportion of correct predictions made by a model
- Method for solving a problem
- Google infrastructure for scalable AI computing
- AI Platform for building and deploying ML models on Google Cloud
17 Clues: Unit of a neural network • Method for solving a problem • Google's AI research organization • Decentralized and secure data storage • Protection of digital systems and data • Notebook Interactive coding environment • Model error due to excessive complexity • AI chatbot developed by Google DeepMind • Collection of data for training AI models • ...
DCT Crossword Puzzle 2025-12-18
Across
- Unplanned interruption of IT services
- Device used to connect multiple networked computers
- First application most staff check in the morning
- Document sent to clients detailing cost and scope
- Secure method used to access company systems remotely
Down
- Protection against malware, ransomware, and cyber threats
- The process of identifying and resolving technical issues
- A system update meant to fix bugs or vulnerabilities
- A formal agreement signed by client and company
- Financial document required for reimbursement claims
- Slow system response that frustrates users
- Central location where company data is stored
12 Clues: Unplanned interruption of IT services • Slow system response that frustrates users • Central location where company data is stored • A formal agreement signed by client and company • First application most staff check in the morning • Document sent to clients detailing cost and scope • Device used to connect multiple networked computers • ...
Test Yourself! 2025-06-24
Across
- Unauthorized access to systems or data
- Malicious software designed to harm or exploit systems
- A fake website or link used to trick people
- messages distributed by electronic means
- Secret sequence of characters used for safety purposes
- Program that appears useful but is harmful
- File extension often used for dangerous attachments
Down
- A flaw or gap in software security
- Practice of protecting systems, networks, and programs
- Type of scam that tricks users via fake emails
- Type of attack where users are locked out unless they pay
- Common malware that replicates through a network
12 Clues: A flaw or gap in software security • Unauthorized access to systems or data • messages distributed by electronic means • Program that appears useful but is harmful • A fake website or link used to trick people • Type of scam that tricks users via fake emails • Common malware that replicates through a network • File extension often used for dangerous attachments • ...
Did you read it? 2020-10-16
Across
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
- Entries due NLT 10/23
- Do your Part.#BeCyberSmart
- Quality Management Principles
Down
- Entries due NLT 11/2
- Test Monthly
- Home of the 14th Flying Training Wing of Air Education and Training Command
- By David C. Graham
8 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Quality Management Principles • Home of the 14th Flying Training Wing of Air Education and Training Command • To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Cybersecurity Crossword Puzzle 2025-04-29
Across
- part of the CIA triad that ensures no unauthorized access to sensitive data
- a deceptive technique where someone pretends to be from another source or entity to gain trust, access, or information
- A type of malware that propagates across a network without the help of a user
- denial of _________
- a wireless hijacking attack involving a rogue access point
- part of the CIA triad that ensures access to data is readily available
Down
- a type of social engineering where attackers send fraudulent messages in an attempt to trick the user into giving them information
- a type of malware that blocks user access to a machine or data until they pay a large fee to the attacker
- man in the ________
- part of the CIA triad that ensures accuracy and trustworthiness of data
- malware that disguises itself as a harmless program
11 Clues: man in the ________ • denial of _________ • malware that disguises itself as a harmless program • a wireless hijacking attack involving a rogue access point • part of the CIA triad that ensures access to data is readily available • part of the CIA triad that ensures accuracy and trustworthiness of data • ...
IT Networking & Cybersecurity 2025-03-27
Across
- Connects multiple local networks
- Personal small device network
- Defines data transmission rules
- Central hub connects devices
- Single central network cable
Down
- Mix of multiple topologies
- Devices form a closed loop
- Nodes interconnect with redundancy
- Splits, checks, and reassembles data
- Large, wide-area network
- Small local network area
11 Clues: Large, wide-area network • Small local network area • Mix of multiple topologies • Devices form a closed loop • Central hub connects devices • Single central network cable • Personal small device network • Defines data transmission rules • Connects multiple local networks • Nodes interconnect with redundancy • Splits, checks, and reassembles data
Did you read it? 2020-10-16
Across
- Chad's Favorite sports team?
- _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
- Test Monthly
- Do your Part.#BeCyberSmart
- Entries due NLT 10/23
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Entries due NLT 11/2
- By David C. Graham
- Home of the 14th Flying Training Wing of Air Education and Training Command
- Licensed amateur radio operator
10 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Chad's Favorite sports team? • Licensed amateur radio operator • Home of the 14th Flying Training Wing of Air Education and Training Command • _____Satisfaction should also be measured and monitored to insure all needs and expectations are met. • ...
Did you read it? 2020-10-16
Across
- Chad's Favorite sports team?
- _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
- Test Monthly
- Do your Part.#BeCyberSmart
- Entries due NLT 10/23
- To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
- Entries due NLT 11/2
- By David C. Graham
- Home of the 14th Flying Training Wing of Air Education and Training Command
- Licensed amateur radio operator
10 Clues: Test Monthly • By David C. Graham • Entries due NLT 11/2 • Entries due NLT 10/23 • Do your Part.#BeCyberSmart • Chad's Favorite sports team? • Licensed amateur radio operator • Home of the 14th Flying Training Wing of Air Education and Training Command • _____Satisfaction should also be measured and monitored to insure all needs and expectations are met. • ...
Legal terminology 2019-11-19
Across
- Electronic currency.
- Check the safety on the internet.
- People with good computer knowledge and skills.
- A variety of data that is rapidly increasing.
- Computer systems, programs and data are free from threats.
- reality This project is the technology between reality and the virtual world.
Down
- Use of electronic devices to destroy, change, or steal information.
- Bullying and Malignant, Insulting.
- User avatar in a virtual world or game.
- Scam through the internet
10 Clues: Electronic currency. • Scam through the internet • Check the safety on the internet. • Bullying and Malignant, Insulting. • User avatar in a virtual world or game. • A variety of data that is rapidly increasing. • People with good computer knowledge and skills. • Computer systems, programs and data are free from threats. • ...
Montreat College 2023-05-24
Across
- What is it's school colors?
- What sport am I going to this college for?
- What is our Mascot?
- What is the mascots name?
- What is the name of Montreats honors college?
Down
- Which famous preacher was married in the chapel on campus?
- This major has been gaining a lot of popularity at Montreat.
- Where is Montreat Located?
- What popular American sport is not offered here?
- What is the name of Montreats popular lake?
10 Clues: What is our Mascot? • What is the mascots name? • Where is Montreat Located? • What is it's school colors? • What sport am I going to this college for? • What is the name of Montreats popular lake? • What is the name of Montreats honors college? • What popular American sport is not offered here? • Which famous preacher was married in the chapel on campus? • ...
General Knowledge 2025-04-16
Across
- Doctors for animals
- A word that can be read the same in both directions
- Which type of company is CrowdStrike?
- Missile man of India
Down
- Char Minar is located in which city?
- By which process does the excess water in plants get released?
- Current Home Minister of India
- Which country was the primary target of Trump's tariff war?
- Ornithology is the scientific study of?
- What is the term lunar related to?
10 Clues: Doctors for animals • Missile man of India • Current Home Minister of India • What is the term lunar related to? • Char Minar is located in which city? • Which type of company is CrowdStrike? • Ornithology is the scientific study of? • A word that can be read the same in both directions • Which country was the primary target of Trump's tariff war? • ...
C4i4's Connect Crossword 2025-07-02
Across
- Future-focused maintenance strategy to reduce downtime
- Country widely credited for pioneering Industry 4.0.
- Actionable digital layer applied on physical systems.
- Data-driven insight method used in business intelligence.
- Smart factory enabler that reduces human intervention
Down
- Backbone technology for protecting digital infrastructure
- Converting analog processes to digital formats.
- Real-time sensor-based technology for tracking machinery performance.
- Seamless transfer of information across systems.
- Centralized location where digital info is kept safely.
10 Clues: Converting analog processes to digital formats. • Seamless transfer of information across systems. • Country widely credited for pioneering Industry 4.0. • Actionable digital layer applied on physical systems. • Smart factory enabler that reduces human intervention • Future-focused maintenance strategy to reduce downtime • ...
