cybersecurity Crossword Puzzles

Technology and Society 2024-09-02

Technology and Society crossword puzzle
Across
  1. A virtual representation of a person
  2. A digital platform for sharing and connecting
  3. A type of software that protects against malware
  4. A device used for communication and information
  5. The practice of protecting systems, networks
  6. The global network connecting millions of computers
Down
  1. The use of technology to perform tasks without human intervention
  2. A digital currency
  3. The buying and selling of goods and services over the internet.
  4. Online theft of personal information

10 Clues: A digital currencyA virtual representation of a personOnline theft of personal informationThe practice of protecting systems, networksA digital platform for sharing and connectingA device used for communication and informationA type of software that protects against malwareThe global network connecting millions of computers...

Technology 2025-06-16

Technology crossword puzzle
Across
  1. an important discovery or development
  2. the use of machines to perform tasks without human intervention
  3. easy to use or understand
  4. a small electronic device with a specific function
  5. the trail of data left by users on the internet
  6. introducing new ideas or methods
Down
  1. knowledgeable about modern technology
  2. extremely modern and advanced
  3. measures taken to protect systems from cyber threats
  4. the simulation of human intelligence in machines

10 Clues: easy to use or understandextremely modern and advancedintroducing new ideas or methodsknowledgeable about modern technologyan important discovery or developmentthe trail of data left by users on the internetthe simulation of human intelligence in machinesa small electronic device with a specific function...

Teka Teki Silang 2025-06-26

Teka Teki Silang crossword puzzle
Across
  1. Profesi yang bertugas mendesain dan mengembangkan perangkat lunak
  2. Membuat dan menulis program komputer
  3. Orang yang mengelola jaringan komputer dalam suatu organisasi
  4. Orang yang mengoprasikan komputer dalam kehidupan sehari-hari
  5. Profesi yang membantu pengguna saat mengalami masalah teknis
Down
  1. Profesi yang bertugas merancang dan membangun halaman web
  2. Orang yang bertugas menjaga keamanan sistem dari serangan siber
  3. Profesi yang menganalisis kebutuhan sistem sebelum dibuat
  4. Komponen sistem komputer selain hardware dan software
  5. Orang yang menggunakan komputer

10 Clues: Orang yang menggunakan komputerMembuat dan menulis program komputerKomponen sistem komputer selain hardware dan softwareProfesi yang bertugas merancang dan membangun halaman webProfesi yang menganalisis kebutuhan sistem sebelum dibuatProfesi yang membantu pengguna saat mengalami masalah teknis...

Privacy Summit 2025 2025-01-06

Privacy Summit 2025 crossword puzzle
Across
  1. Federal law governing information security management
  2. Hide one's IP address
  3. Unique code or number assigned to an individual
  4. Government watching
  5. Personal info stored online
  6. Cybersecurity sequence
  7. Measures to prevent hacking
  8. Threat of hacking or online attack or Reason to use strong passwords
  9. Code for secure messaging
  10. Alert to potential threat
  11. Not for public view
  12. Secure online account
Down
  1. Requirement of FOIA
  2. Secret information
  3. Method of identification using fingerprints or High-tech way to unlock your phone
  4. Protected from hacking
  5. Nameless online user
  6. Conceal online activity
  7. Personal info to be guarded
  8. Unauthorized access
  9. Right to keep info secret
  10. Shield from identity theft
  11. Reduce the severity of a cyber-attack/data breach or Lessen the blow of a data breach
  12. Document or file containing personal data

24 Clues: Secret informationRequirement of FOIAGovernment watchingUnauthorized accessNot for public viewNameless online userHide one's IP addressSecure online accountProtected from hackingCybersecurity sequenceConceal online activityRight to keep info secretCode for secure messagingAlert to potential threatShield from identity theft...

attempt 3 2025-07-10

attempt 3 crossword puzzle
Across
  1. The flavor of their wedding cake
  2. The instrument the groom played in high school
  3. Their first dance song
  4. The city they met in
  5. The name of their dog
  6. How many years the couple has been together
  7. The first movie they watched as a couple
  8. The bride's maiden name
  9. First concert they saw together
  10. number of pets the couple has
  11. The stone in the engagement ring
Down
  1. The country they visited last summer
  2. The street Sarah and Liam call home
  3. What did the groom study in college
  4. Name of Sarah's Maid of Honor
  5. The month they first met
  6. Sarah's middle name
  7. The month the couple got engaged
  8. Where did the proposal happen
  9. The color of the bridesmaid dresses
  10. Name of the Best Man
  11. Sarah's star sign

22 Clues: Sarah's star signSarah's middle nameThe city they met inName of the Best ManThe name of their dogTheir first dance songThe bride's maiden nameThe month they first metName of Sarah's Maid of HonorWhere did the proposal happennumber of pets the couple hasFirst concert they saw togetherThe flavor of their wedding cakeThe month the couple got engaged...

disguise 2024-09-22

disguise crossword puzzle
Across
  1. Has a trunk
  2. Likes to chase mice
Down
  1. Man's best friend
  2. Large marsupial
  3. Flying mammal

5 Clues: Has a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice

security 2021-08-18

security crossword puzzle
Across
  1. I am testin gthis out
  2. a color I like
  3. director cybersecurity
Down
  1. a way to protect data
  2. a way to look at the sun
  3. a way to protect users

6 Clues: a color I likea way to protect dataI am testin gthis outa way to protect usersdirector cybersecuritya way to look at the sun

Cittadinanza digitale 2021-11-15

Cittadinanza digitale crossword puzzle
Across
  1. bullismo in rete
  2. la sicurezza informatica
  3. insieme di regole per il buon comportamento su internet
Down
  1. il pirata del sistema informatico
  2. colui che infetta i file
  3. parola segreta legata a un account
  4. rete di computer che possono comunicare tra loro

7 Clues: bullismo in retecolui che infetta i filela sicurezza informaticail pirata del sistema informaticoparola segreta legata a un accountrete di computer che possono comunicare tra loroinsieme di regole per il buon comportamento su internet

Smart System 2021-06-08

Smart System crossword puzzle
Across
  1. maintenance of systems
  2. smart system incorporate functions of sensing, actuation and?
  3. application that involves wireless sensors
  4. example of smart system - monitoring
Down
  1. application of tackling with climate change
  2. #1 cons of the smart system
  3. application improving quality of life

7 Clues: maintenance of systems#1 cons of the smart systemexample of smart system - monitoringapplication improving quality of lifeapplication that involves wireless sensorsapplication of tackling with climate changesmart system incorporate functions of sensing, actuation and?

CTE Pathway Lake Highlands HS 2022-11-16

CTE Pathway Lake Highlands HS crossword puzzle
Across
  1. Computer Science Magnet Pathway (Level 3)
  2. Manufacturing Technology Magnet Pathway (Level 1)
  3. Digital Communications -AV Production Pathway (Level 2)
Down
  1. Legal Studies Magnet Pathway (Level 1)
  2. Cybersecurity Magnet Pathway (Level 4)
  3. Robotics Pathway (Level 4)
  4. Culinary Arts Magnet Pathway (Level 3)

7 Clues: Robotics Pathway (Level 4)Legal Studies Magnet Pathway (Level 1)Cybersecurity Magnet Pathway (Level 4)Culinary Arts Magnet Pathway (Level 3)Computer Science Magnet Pathway (Level 3)Manufacturing Technology Magnet Pathway (Level 1)Digital Communications -AV Production Pathway (Level 2)

High School Pathways 2024-04-26

High School Pathways crossword puzzle
Across
  1. Take courses to become a teacher
  2. Take courses about wildlife, plants and animals
  3. Finish 2 years of your Bachelor's Degree
  4. Take courses on building, carpentry work
Down
  1. Take courses in computer technology
  2. Course towards medical fields
  3. Earn a welding certificate

7 Clues: Earn a welding certificateCourse towards medical fieldsTake courses to become a teacherTake courses in computer technologyFinish 2 years of your Bachelor's DegreeTake courses on building, carpentry workTake courses about wildlife, plants and animals

CSIT - Cybersecurity Vocab 2024-12-02

CSIT - Cybersecurity Vocab crossword puzzle
Across
  1. A person or entity responsible for an event that has been identified as a security incident or as a risk
  2. Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted
  3. Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage
  4. The security goal of ensuring that the party that sent a transmission or created data remains associated with that data and cannot deny sending or creating that data
  5. Data that can be used to identify or contact an individual
  6. A physical or virtual item that contains authentication and/or authorization data, commonly used in multifactor authentication
Down
  1. A number used in conjunction with authentication devices
  2. Scans that allow access to a physical space or program by verifying unique body features
  3. unauthorized use is detected or attempted
  4. Security control that can enforce a virtual boundary based on real-world geography
  5. A basic principle of security stating that a person should be allocated the minimum necessary rights, privileges, or information to perform its role

11 Clues: unauthorized use is detected or attemptedA number used in conjunction with authentication devicesData that can be used to identify or contact an individualSecurity control that can enforce a virtual boundary based on real-world geographyScans that allow access to a physical space or program by verifying unique body features...

IT Networking & Cybersecurity 2025-03-27

IT Networking & Cybersecurity crossword puzzle
Across
  1. Connects multiple local networks
  2. Personal small device network
  3. Defines data transmission rules
  4. Central hub connects devices
  5. Single central network cable
Down
  1. Mix of multiple topologies
  2. Devices form a closed loop
  3. Nodes interconnect with redundancy
  4. Splits, checks, and reassembles data
  5. Large, wide-area network
  6. Small local network area

11 Clues: Large, wide-area networkSmall local network areaMix of multiple topologiesDevices form a closed loopCentral hub connects devicesSingle central network cablePersonal small device networkDefines data transmission rulesConnects multiple local networksNodes interconnect with redundancySplits, checks, and reassembles data

Vocabulary 2024-10-17

Vocabulary crossword puzzle
Across
  1. For higher cybersecurity, you need a better ... (Passwort).
  2. Most of the times, there is no ... (Zeuge/Zeugin) to cybercrime.
  3. schützen/beschützen
  4. Most crimes involve hacking into the individual's computer to ... (stehlen) credit card information.
  5. Sometimes there is no ... (Beweis) of the cyberattack.
  6. beliebig
  7. The company got ... (gehackt).
  8. Hackers use the internet as their ... (Waffe).
  9. They use information to ... (erpressen) people.
Down
  1. The ... (Opfer) often doesn't recognize hackers as criminals.
  2. Hackers' ... (Verbrechen) are often invisible.
  3. The ... (Verdächtige/r) was probably from the UK.
  4. This ... (illegale) activity is costing the global economy a lot of money.
  5. Schadsoftware
  6. Sicherheit
  7. It sometimes can be really difficult to catch a ... (Kriminelle/r).

16 Clues: beliebigSicherheitSchadsoftwareschützen/beschützenThe company got ... (gehackt).Hackers' ... (Verbrechen) are often invisible.Hackers use the internet as their ... (Waffe).They use information to ... (erpressen) people.The ... (Verdächtige/r) was probably from the UK.Sometimes there is no ... (Beweis) of the cyberattack....

Cybersecurity Crossword Puzzle 2023-04-17

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. Engineering, Is a technique that a hacker uses to steal data by a person for different purposes by psychological manipulation combined with social scenes.
  2. access, When someone gains access to a server, website, or other sensitive data using someone else's account details.
  3. It is a software or hardware which is used to filter network traffic based on rules.
  4. It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding the security system.
  5. Is a software that operates on different OS which is used to prevent malicious software.
  6. security, the protection of computer systems and information from harm, theft, and unauthorized use.
Down
  1. Is a person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.
  2. Is an action or event that might compromise the security.
  3. It is a malicious software that installs on your computer without your consent for a bad purpose.
  4. security, refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
  5. Is an assault on the system security that is delivered by a person or a machine to a system.

11 Clues: Is an action or event that might compromise the security.It is a software or hardware which is used to filter network traffic based on rules.Is a software that operates on different OS which is used to prevent malicious software.Is an assault on the system security that is delivered by a person or a machine to a system....

Unit 4 Cybersecurity 2022-03-02

Unit 4 Cybersecurity crossword puzzle
Across
  1. a check for a secure BIOS operation
  2. when an information system receives protection from a pre-existing security controls
  3. software built into a piece of hardware
  4. securing devices by reducing the exposure
Down
  1. a more thorough hotfix
  2. quick fix for a software problem
  3. firewall command to block or allow certain user
  4. a device that acts as a file server
  5. proprietary journaling file system
  6. a guide for efficiency of a network
  7. network of high speed storage used by servers

11 Clues: a more thorough hotfixquick fix for a software problemproprietary journaling file systema check for a secure BIOS operationa device that acts as a file servera guide for efficiency of a networksoftware built into a piece of hardwaresecuring devices by reducing the exposurenetwork of high speed storage used by servers...

CYBERSECURITY AWARENESS - C40 2024-10-22

CYBERSECURITY AWARENESS - C40 crossword puzzle
Across
  1. The process of analyzing systems for vulnerabilities (8 LETTERS)
  2. A program that replicates itself to spread malware (4 LETTERS)
  3. A security method where each user has specific privileges (6 LETTERS)
  4. Cybercriminals often use this method to monitor network activity (8 LETTERS)
  5. Using multiple types of information to verify identity (14 LETTERS)
  6. Security strategy that requires users to change this regularly (8 LETTERS)
Down
  1. Common method used to protect sensitive data (10 LETTERS)
  2. Fake emails claiming to be from trusted sources (8 LETTERS)
  3. A phrase longer than a password for added security (9 LETTERS)
  4. Network of infected computers controlled remotely (6 LETTERS)
  5. Program designed to prevent unauthorized access (8 LETTERS)

11 Clues: Common method used to protect sensitive data (10 LETTERS)Fake emails claiming to be from trusted sources (8 LETTERS)Program designed to prevent unauthorized access (8 LETTERS)Network of infected computers controlled remotely (6 LETTERS)A phrase longer than a password for added security (9 LETTERS)...

Luka's Cybersecurity Quizz 2024-03-20

Luka's Cybersecurity Quizz crossword puzzle
Across
  1. Something that protect a network
  2. Symetrical encryption
  3. Keep a message unmodified
  4. Someone who doing hacking for there ethic
  5. Garanty that a message come from one person
  6. Something that encrypt or deencrypt a message
Down
  1. The possibility to access data
  2. Something that will damage your pc or things on it
  3. Privacy of a message
  4. A type of attack on a network
  5. Asymetrical encryption

11 Clues: Privacy of a messageSymetrical encryptionAsymetrical encryptionKeep a message unmodifiedA type of attack on a networkThe possibility to access dataSomething that protect a networkSomeone who doing hacking for there ethicGaranty that a message come from one personSomething that encrypt or deencrypt a message...

National Cybersecurity Month 2022-09-16

National Cybersecurity Month crossword puzzle
Across
  1. SOFTWARE DESIGNED TO INTERFERE WITH A COMPUTER'S NORMAL FUNCTIONING
  2. A SCAM BY WHICH AN EMAIL USER IS DUPED INTO REVEALING PERSONAL OR CONFIDENTIAL INFORMATION WHICH THE SCAMMER CAN USE ILLICITLY
  3. AN INTEGRATED COLLECTION OF SECURITY MEASURES DESIGNED TO PREVENT UNAUTHORIZED ELECTRONIC ACCESS TO A NETWORKED COMPUTER
  4. A COMPUTER THAT IS UNDER COTNROL OF A MALICIOUS HACKER WITHOUT THE KNOWLEDGE OF THE COMPUTER OWNER
  5. A PROGRAM THAT IS DESIGNED TO HARM A COMPUTER BY DELETING DATA, RUINING FILES, & THAT CAN BE SPREAD SECRETLY FROM ONE COMPUTER TO ANOTHER
Down
  1. COMPUTER SOFTWARE THAT SECRETLY RECORDS INFORMATION ABOUT THE WAY YOU USE YOUR COMPUTER
  2. THE ACT OF OBTAINING OR ATTEMPTING TO OBTAIN OTHERWISE SECURE DATA BY CONNING AN INDIVIDUAL INTO REVEALING SECURE INFORMATION
  3. MEASURES TAKEN TO PROTECT A COMPUTER OR COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS OR ATTACK
  4. A SECRET SERIES OF NUMBERS OR LETTERS THAT ALLOWS YOU TO USE A COMPUTER SYSTEM
  5. USUALLY A SMALL SELF-CONTAINED & SELF REPLICATING COMPUTER PROGRAM THAT INVADES COMPUTERS ON A NETWORK AND USUALLY PERFORMS A DESTRUCTIVE ACTION
  6. EMAIL THAT IS NOT WANTED, EMAIL THAT IS SENT TO LARGE NUMBERS OF PEOPLE AND CONSISTS OF MOSTLY ADVERTISING

11 Clues: SOFTWARE DESIGNED TO INTERFERE WITH A COMPUTER'S NORMAL FUNCTIONINGA SECRET SERIES OF NUMBERS OR LETTERS THAT ALLOWS YOU TO USE A COMPUTER SYSTEMCOMPUTER SOFTWARE THAT SECRETLY RECORDS INFORMATION ABOUT THE WAY YOU USE YOUR COMPUTERMEASURES TAKEN TO PROTECT A COMPUTER OR COMPUTER SYSTEM AGAINST UNAUTHORIZED ACCESS OR ATTACK...

Cybersecurity for Seniors 2025-10-10

Cybersecurity for Seniors crossword puzzle
Across
  1. Be____when sharing credit card information
  2. Do not _____ passwords with anyone
  3. Signifies the protection of important information
  4. Do not ___ the same password
  5. ____ applications you don't use anymore
  6. Means keeping information unchanged and trustworthy
Down
  1. Turn off ____ on all applications
  2. ____ software when available
  3. _____ calls/texts/links from strangers
  4. Availability means making sure computers, websites and ___ are ready to be used
  5. When making an account set good ____

11 Clues: ____ software when availableDo not ___ the same passwordTurn off ____ on all applicationsDo not _____ passwords with anyoneWhen making an account set good _________ calls/texts/links from strangers____ applications you don't use anymoreBe____when sharing credit card informationSignifies the protection of important information...

Compliance Newsletter, Vol 1. April 2021 2021-03-26

Compliance Newsletter, Vol 1.  April 2021 crossword puzzle
Across
  1. Covid conference room
  2. Ticker symbol for Apex Clearing Holdings
  3. Outside Brokerage Accounts are required to be disclosed via ________ Compliance Technologies
  4. Sum of money paid by a company to its shareholders
  5. Written ________ Procedures
  6. Protects against the criminal or unauthorized use of electronic data
  7. A Series 4 Exam covers this specific area
  8. Securities ________ Protection Corporation
  9. The acknowledgement of understanding and abidance to policies, procedures or training
  10. ________ Oxley Act of 2002
Down
  1. Being in accordance with established guidelines or regulations
  2. Special Purpose ________ Company
  3. People who have material nonpublic information about a company
  4. The Firm's new Deputy CCO
  5. State where Apex Clearing is based
  6. Know Your ________
  7. Vendor for Firm Element Training
  8. Driving for Uber is an example of an Outside ________ Activity
  9. Handles the licensing and regulation of broker-dealers

19 Clues: Know Your ________Covid conference roomThe Firm's new Deputy CCO________ Oxley Act of 2002Written ________ ProceduresSpecial Purpose ________ CompanyVendor for Firm Element TrainingState where Apex Clearing is basedTicker symbol for Apex Clearing HoldingsA Series 4 Exam covers this specific areaSecurities ________ Protection Corporation...

Cybersecurity Crossword Puzzle 2025-04-29

Cybersecurity Crossword Puzzle crossword puzzle
Across
  1. part of the CIA triad that ensures no unauthorized access to sensitive data
  2. a deceptive technique where someone pretends to be from another source or entity to gain trust, access, or information
  3. A type of malware that propagates across a network without the help of a user
  4. denial of _________
  5. a wireless hijacking attack involving a rogue access point
  6. part of the CIA triad that ensures access to data is readily available
Down
  1. a type of social engineering where attackers send fraudulent messages in an attempt to trick the user into giving them information
  2. a type of malware that blocks user access to a machine or data until they pay a large fee to the attacker
  3. man in the ________
  4. part of the CIA triad that ensures accuracy and trustworthiness of data
  5. malware that disguises itself as a harmless program

11 Clues: man in the ________denial of _________malware that disguises itself as a harmless programa wireless hijacking attack involving a rogue access pointpart of the CIA triad that ensures access to data is readily availablepart of the CIA triad that ensures accuracy and trustworthiness of data...

Let's Play OPS 2025-12-01

Let's Play OPS crossword puzzle
Across
  1. Unauthorized access gained by cracking credentials
  2. Attack where shipment or order details are altered secretly
  3. Encrypted communication protocol used between supply chain systems
  4. Event where warehouse operations halt due to corrupted systems
  5. Malicious entry inserted through software updates
  6. Weakest digital point that can collapse a multi-partner network
  7. Fraud where attackers pose as legitimate suppliers
Down
  1. Practice of verifying every transaction or shared data
  2. Undetected extraction of sensitive commercial data
  3. Technique that overwhelms logistics systems with fake traffic
  4. Process of assessing supplier cybersecurity capability

11 Clues: Malicious entry inserted through software updatesUnauthorized access gained by cracking credentialsUndetected extraction of sensitive commercial dataFraud where attackers pose as legitimate suppliersPractice of verifying every transaction or shared dataProcess of assessing supplier cybersecurity capability...

Northwood and NUIAS 2024-10-02

Northwood and NUIAS crossword puzzle
Across
  1. Built Tough
  2. Who runs the Auto Show?
  3. What is the name of the Automotive Roundtable at 9 am on October 5th?
  4. The protection of computers and computer systems
  5. What number is this year's Auto Show?
  6. Ford's newest active driving assistance system
  7. The collection of multi-million dollar hypercars
Down
  1. America's _____ University
  2. What is both a degree at Northwood and a section of the Auto Show
  3. Liberty and ____ for all
  4. What does the "I" in NUIAS stand for
  5. What does the "M" in CAMS stand for?

12 Clues: Built ToughWho runs the Auto Show?Liberty and ____ for allAmerica's _____ UniversityWhat does the "I" in NUIAS stand forWhat does the "M" in CAMS stand for?What number is this year's Auto Show?Ford's newest active driving assistance systemThe protection of computers and computer systemsThe collection of multi-million dollar hypercars...

Build with AI Bamenda 2025 2025-05-03

Build with AI Bamenda 2025 crossword puzzle
Across
  1. Platform for data science competitions and hosting datasets
  2. Unit of a neural network
  3. Hardware accelerator for speeding up AI computations
  4. Text-to-image model developed by Google DeepMind
  5. Model error due to excessive complexity
  6. Protection of digital systems and data
  7. Platform for collaborative coding and machine learning
  8. Google's AI research organization
  9. AI chatbot developed by Google DeepMind
Down
  1. Collection of data for training AI models
  2. Decentralized and secure data storage
  3. Open-source ML framework used on Google Cloud
  4. Notebook Interactive coding environment
  5. Proportion of correct predictions made by a model
  6. Method for solving a problem
  7. Google infrastructure for scalable AI computing
  8. AI Platform for building and deploying ML models on Google Cloud

17 Clues: Unit of a neural networkMethod for solving a problemGoogle's AI research organizationDecentralized and secure data storageProtection of digital systems and dataNotebook Interactive coding environmentModel error due to excessive complexityAI chatbot developed by Google DeepMindCollection of data for training AI models...

Akash Test crossword 2025-03-21

Akash Test crossword crossword puzzle
Across
  1. Protects your data and accounts from unauthorized access
  2. Avoiding practices that harm the environment in tech usage
  3. Giving credit to original creators when using their work
  4. Verifying facts before sharing online information
  5. Avoiding the use of pirated software
  6. Ensuring websites are trustworthy before sharing personal data
  7. A harmful program that can damage your computer
Down
  1. Abiding by rules and regulations online
  2. Keeping your information secret online
  3. To act thoughtfully when posting or commenting online
  4. Using strong passwords and two-factor authentication

11 Clues: Avoiding the use of pirated softwareKeeping your information secret onlineAbiding by rules and regulations onlineA harmful program that can damage your computerVerifying facts before sharing online informationUsing strong passwords and two-factor authenticationTo act thoughtfully when posting or commenting online...

Test Yourself! 2025-06-24

Test Yourself! crossword puzzle
Across
  1. Unauthorized access to systems or data
  2. Malicious software designed to harm or exploit systems
  3. A fake website or link used to trick people
  4. messages distributed by electronic means
  5. Secret sequence of characters used for safety purposes
  6. Program that appears useful but is harmful
  7. File extension often used for dangerous attachments
Down
  1. A flaw or gap in software security
  2. Practice of protecting systems, networks, and programs
  3. Type of scam that tricks users via fake emails
  4. Type of attack where users are locked out unless they pay
  5. Common malware that replicates through a network

12 Clues: A flaw or gap in software securityUnauthorized access to systems or datamessages distributed by electronic meansProgram that appears useful but is harmfulA fake website or link used to trick peopleType of scam that tricks users via fake emailsCommon malware that replicates through a networkFile extension often used for dangerous attachments...

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
  2. Entries due NLT 10/23
  3. Do your Part.#BeCyberSmart
  4. Quality Management Principles
Down
  1. Entries due NLT 11/2
  2. Test Monthly
  3. Home of the 14th Flying Training Wing of Air Education and Training Command
  4. By David C. Graham

8 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartQuality Management PrinciplesHome of the 14th Flying Training Wing of Air Education and Training CommandTo be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees

DCT Crossword Puzzle 2025-12-18

DCT Crossword Puzzle crossword puzzle
Across
  1. Unplanned interruption of IT services
  2. Device used to connect multiple networked computers
  3. First application most staff check in the morning
  4. Document sent to clients detailing cost and scope
  5. Secure method used to access company systems remotely
Down
  1. Protection against malware, ransomware, and cyber threats
  2. The process of identifying and resolving technical issues
  3. A system update meant to fix bugs or vulnerabilities
  4. A formal agreement signed by client and company
  5. Financial document required for reimbursement claims
  6. Slow system response that frustrates users
  7. Central location where company data is stored

12 Clues: Unplanned interruption of IT servicesSlow system response that frustrates usersCentral location where company data is storedA formal agreement signed by client and companyFirst application most staff check in the morningDocument sent to clients detailing cost and scopeDevice used to connect multiple networked computers...

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Chad's Favorite sports team?
  2. _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  3. Test Monthly
  4. Do your Part.#BeCyberSmart
  5. Entries due NLT 10/23
  6. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 11/2
  2. By David C. Graham
  3. Home of the 14th Flying Training Wing of Air Education and Training Command
  4. Licensed amateur radio operator

10 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training Command_____Satisfaction should also be measured and monitored to insure all needs and expectations are met....

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Chad's Favorite sports team?
  2. _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  3. Test Monthly
  4. Do your Part.#BeCyberSmart
  5. Entries due NLT 10/23
  6. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 11/2
  2. By David C. Graham
  3. Home of the 14th Flying Training Wing of Air Education and Training Command
  4. Licensed amateur radio operator

10 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training Command_____Satisfaction should also be measured and monitored to insure all needs and expectations are met....

Legal terminology 2019-11-19

Legal terminology crossword puzzle
Across
  1. Electronic currency.
  2. Check the safety on the internet.
  3. People with good computer knowledge and skills.
  4. A variety of data that is rapidly increasing.
  5. Computer systems, programs and data are free from threats.
  6. reality This project is the technology between reality and the virtual world.
Down
  1. Use of electronic devices to destroy, change, or steal information.
  2. Bullying and Malignant, Insulting.
  3. User avatar in a virtual world or game.
  4. Scam through the internet

10 Clues: Electronic currency.Scam through the internetCheck the safety on the internet.Bullying and Malignant, Insulting.User avatar in a virtual world or game.A variety of data that is rapidly increasing.People with good computer knowledge and skills.Computer systems, programs and data are free from threats....

Montreat College 2023-05-24

Montreat College crossword puzzle
Across
  1. What is it's school colors?
  2. What sport am I going to this college for?
  3. What is our Mascot?
  4. What is the mascots name?
  5. What is the name of Montreats honors college?
Down
  1. Which famous preacher was married in the chapel on campus?
  2. This major has been gaining a lot of popularity at Montreat.
  3. Where is Montreat Located?
  4. What popular American sport is not offered here?
  5. What is the name of Montreats popular lake?

10 Clues: What is our Mascot?What is the mascots name?Where is Montreat Located?What is it's school colors?What sport am I going to this college for?What is the name of Montreats popular lake?What is the name of Montreats honors college?What popular American sport is not offered here?Which famous preacher was married in the chapel on campus?...

General Knowledge 2025-04-16

General Knowledge crossword puzzle
Across
  1. Doctors for animals
  2. A word that can be read the same in both directions
  3. Which type of company is CrowdStrike?
  4. Missile man of India
Down
  1. Char Minar is located in which city?
  2. By which process does the excess water in plants get released?
  3. Current Home Minister of India
  4. Which country was the primary target of Trump's tariff war?
  5. Ornithology is the scientific study of?
  6. What is the term lunar related to?

10 Clues: Doctors for animalsMissile man of IndiaCurrent Home Minister of IndiaWhat is the term lunar related to?Char Minar is located in which city?Which type of company is CrowdStrike?Ornithology is the scientific study of?A word that can be read the same in both directionsWhich country was the primary target of Trump's tariff war?...

C4i4's Connect Crossword 2025-07-02

C4i4's Connect Crossword crossword puzzle
Across
  1. Future-focused maintenance strategy to reduce downtime
  2. Country widely credited for pioneering Industry 4.0.
  3. Actionable digital layer applied on physical systems.
  4. Data-driven insight method used in business intelligence.
  5. Smart factory enabler that reduces human intervention
Down
  1. Backbone technology for protecting digital infrastructure
  2. Converting analog processes to digital formats.
  3. Real-time sensor-based technology for tracking machinery performance.
  4. Seamless transfer of information across systems.
  5. Centralized location where digital info is kept safely.

10 Clues: Converting analog processes to digital formats.Seamless transfer of information across systems.Country widely credited for pioneering Industry 4.0.Actionable digital layer applied on physical systems.Smart factory enabler that reduces human interventionFuture-focused maintenance strategy to reduce downtime...

Cybersecurity Awareness Month 2025 2025-10-07

Cybersecurity Awareness Month 2025 crossword puzzle
Across
  1. Malware that attaches to files and spreads when executed
  2. Network of infected devices, often remotely controlled
  3. Method of converting data into a fixed-size string
  4. Piece of code that takes advantage of a vulnerability
  5. Hidden method of bypassing normal authentication
  6. Software that secretly gathers data without consent
  7. Potential cause of an unwanted incident
  8. Self-replicating malware that spreads without user interaction
  9. Fraudulent attempt to obtain sensitive information via email or messaging
Down
  1. Incident where data is accessed without authorization
  2. Type of malware disguised as a legitimate file
  3. Process of verifying a user's identity
  4. Impersonating another user or device to gain access
  5. General term for malicious software
  6. Part of malware that performs the malicious action
  7. Stealthy type of malware designed to hide its presence

16 Clues: General term for malicious softwareProcess of verifying a user's identityPotential cause of an unwanted incidentType of malware disguised as a legitimate fileHidden method of bypassing normal authenticationMethod of converting data into a fixed-size stringPart of malware that performs the malicious action...

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Licensed amateur radio operator
  2. Entries due NLT 11/2
  3. Test Monthly
  4. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 10/23
  2. By David C. Graham
  3. Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  4. Chad's Favorite sports team?
  5. Do your Part.#BeCyberSmart
  6. Home of the 14th Flying Training Wing of Air Education and Training Command

10 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training CommandSatisfaction should also be measured and monitored to insure all needs and expectations are met....

cyber security 2022-05-05

cyber security crossword puzzle
Across
  1. a type of malware that modifies information on a computer
  2. virtual private network
  3. distributed denial of service
  4. someone who enters a technological divice illegaly
  5. attacker uses malici=ous codes to take the victims information
  6. a type of software allowing an attacker to take over a computer
Down
  1. set of programs that allow a computer to perform the task
  2. a technique allowing the hacker to imporsonate
  3. protection of technological devices
  4. malicious softwares

10 Clues: malicious softwaresvirtual private networkdistributed denial of serviceprotection of technological devicesa technique allowing the hacker to imporsonatesomeone who enters a technological divice illegalya type of malware that modifies information on a computerset of programs that allow a computer to perform the task...

Technology 2023-07-06

Technology crossword puzzle
Across
  1. Identification used by a person with access to a computer
  2. Another word for the top-notch support that we provide our users.
  3. A smaller computer that runs on ChromeOS
  4. A systematic approach to solving a problem
  5. What kids use to spell bad words
  6. A person that is learning
Down
  1. Sound
  2. Enables storing data and files on the internet
  3. The practice of protecting systems and networks from digital attacks
  4. Intelligence demonstrated by computers

10 Clues: SoundA person that is learningWhat kids use to spell bad wordsIntelligence demonstrated by computersA smaller computer that runs on ChromeOSA systematic approach to solving a problemEnables storing data and files on the internetIdentification used by a person with access to a computerAnother word for the top-notch support that we provide our users....

byte trails 3 2025-03-05

byte trails 3 crossword puzzle
Across
  1. Protocol for transferring files over the internet
  2. Protecting systems from unauthorized access
  3. Secures data by converting it into a coded form
  4. Small data stored on a user’s computer by a website
  5. Logical division of a drive
Down
  1. A type of scam email designed to steal user data
  2. Wireless technology for local area networking
  3. Temporary storage for faster access
  4. A device or point in a network
  5. Software that manages hardware and software resources

10 Clues: Logical division of a driveA device or point in a networkTemporary storage for faster accessProtecting systems from unauthorized accessWireless technology for local area networkingSecures data by converting it into a coded formA type of scam email designed to steal user dataProtocol for transferring files over the internet...

Computer Science 2025-05-15

Computer Science crossword puzzle
Across
  1. A place to store files and data
  2. The part of the computer you can touch
  3. A language used to write computer programs
  4. A list of instructions for a computer to follow
  5. A mistake in a program
Down
  1. Protecting information from unauthorized access
  2. Repeating a set of actions
  3. A symbol or name that stores data in a program
  4. An action or information given to a computer
  5. The result produced by a computer

10 Clues: A mistake in a programRepeating a set of actionsA place to store files and dataThe result produced by a computerThe part of the computer you can touchA language used to write computer programsAn action or information given to a computerA symbol or name that stores data in a programProtecting information from unauthorized access...

DigitalGuard: Protecting Your Online Footprint 2023-09-18

DigitalGuard: Protecting Your Online Footprint crossword puzzle
Across
  1. You need this to unlock your online world securely
  2. Doing the right thing in the digital world
  3. Defending against online threats
  4. Platforms like Facebook and Twitter for online networking
  5. Online harassment that hurts.
Down
  1. Protecting your personal space in the digital realm
  2. The process of converting data into a secret code
  3. Fraudulent attempts to obtain sensitive information
  4. Your online trail of likes, posts, and searches
  5. -An extra layer of security for online accounts

10 Clues: Online harassment that hurts.Defending against online threatsDoing the right thing in the digital worldYour online trail of likes, posts, and searches-An extra layer of security for online accountsThe process of converting data into a secret codeYou need this to unlock your online world securelyProtecting your personal space in the digital realm...

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Licensed amateur radio operator
  2. Entries due NLT 11/2
  3. Test Monthly
  4. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 10/23
  2. By David C. Graham
  3. _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  4. Chad's Favorite sports team?
  5. Do your Part.#BeCyberSmart
  6. Home of the 14th Flying Training Wing of Air Education and Training Command

10 Clues: Test MonthlyBy David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Do your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training Command_____Satisfaction should also be measured and monitored to insure all needs and expectations are met....

CyberFun 2024-03-18

CyberFun crossword puzzle
Across
  1. Keeping personal information safe from unauthorized access
  2. A protective barrier for your computer or network
  3. Unwanted and unsolicited emails
  4. An attempt to damage or disrupt computer systems
  5. A system of interconnected computers
  6. Measures taken to protect computer systems from theft or damage
Down
  1. A harmful software that can damage your computer
  2. A secret code to access your accounts online
  3. I want to _____ my GF/BF account
  4. Illegal activities conducted using the internet

10 Clues: Unwanted and unsolicited emailsI want to _____ my GF/BF accountA system of interconnected computersA secret code to access your accounts onlineIllegal activities conducted using the internetA harmful software that can damage your computerAn attempt to damage or disrupt computer systemsA protective barrier for your computer or network...

Career Cluster Quiz 2025-05-30

Career Cluster Quiz crossword puzzle
Across
  1. includes jobs like professors and teachers
  2. includes jobs where people help design and create buildings
  3. includes jobs like factory workers and machine operators
  4. includes jobs like CEOS and managers
  5. includes jobs like hotel managers and tour guides
Down
  1. includes jobs like farmers and food scientists
  2. includes jobs like doctors and nurses
  3. includes jobs in advertising and social media
  4. includes jobs in cybersecurity and software engineering
  5. includes jobs in science, technology, engineering, and mathematics

10 Clues: includes jobs like CEOS and managersincludes jobs like doctors and nursesincludes jobs like professors and teachersincludes jobs in advertising and social mediaincludes jobs like farmers and food scientistsincludes jobs like hotel managers and tour guidesincludes jobs in cybersecurity and software engineering...

BYTETRAIL 16 2025-02-25

BYTETRAIL 16 crossword puzzle
Across
  1. Protocol for transferring files over the internet
  2. Protecting systems from unauthorized access
  3. Secures data by converting it into a coded form
  4. Small data stored on a user’s computer by a website
  5. Logical division of a drive
Down
  1. A type of scam email designed to steal user data
  2. Wireless technology for local area networking
  3. Temporary storage for faster access
  4. A device or point in a network
  5. Software that manages hardware and software resources

10 Clues: Logical division of a driveA device or point in a networkTemporary storage for faster accessProtecting systems from unauthorized accessWireless technology for local area networkingSecures data by converting it into a coded formA type of scam email designed to steal user dataProtocol for transferring files over the internet...

BYTETRAIL 16 2025-02-25

BYTETRAIL 16 crossword puzzle
Across
  1. Protocol for transferring files over the internet
  2. Protecting systems from unauthorized access
  3. Secures data by converting it into a coded form
  4. Small data stored on a user’s computer by a website
  5. Logical division of a drive
Down
  1. A type of scam email designed to steal user data
  2. Wireless technology for local area networking
  3. Temporary storage for faster access
  4. A device or point in a network
  5. Software that manages hardware and software resources

10 Clues: Logical division of a driveA device or point in a networkTemporary storage for faster accessProtecting systems from unauthorized accessWireless technology for local area networkingSecures data by converting it into a coded formA type of scam email designed to steal user dataProtocol for transferring files over the internet...

Application of Boosting And Ensemble Learning 2025-10-31

Application of Boosting And Ensemble Learning crossword puzzle
Across
  1. Detects anomalies or intrusions in networks
  2. Used in suggesting products or movies on platforms
  3. General purpose of using ensemble models
  4. Applied in detecting diseases in the medical field
  5. Helps in predicting stock prices or sales trends
  6. Used for improving decision-making processes
Down
  1. Applied in dividing images into meaningful regions
  2. Used in image and speech recognition tasks
  3. Used in identifying spam or fraudulent activities
  4. Common application in sorting data into categories

10 Clues: General purpose of using ensemble modelsUsed in image and speech recognition tasksDetects anomalies or intrusions in networksUsed for improving decision-making processesHelps in predicting stock prices or sales trendsUsed in identifying spam or fraudulent activitiesApplied in dividing images into meaningful regions...

Career Focus 2 2025-12-10

Career Focus 2 crossword puzzle
Across
  1. Sector that includes software, data and cybersecurity roles
  2. A common Registered Training Organisation in Australia
  3. Major regional NSW university, abbr.
  4. The general direction of your working life
  5. A person undertaking structured, paid training, often in non-trade areas
Down
  1. _____ OUTLOOK An industry's future demand for workers
  2. Core skill that helps you calculate trade measurements
  3. A typical trade apprenticeship.
  4. The national system of qualifications (Australian Qualifications Framework)
  5. _____ ETHIC The personal quality behind motivation and drive

10 Clues: A typical trade apprenticeship.Major regional NSW university, abbr.The general direction of your working life_____ OUTLOOK An industry's future demand for workersCore skill that helps you calculate trade measurementsA common Registered Training Organisation in AustraliaSector that includes software, data and cybersecurity roles...

Cybersecurity Unit 10 Crossword 2025-03-20

Cybersecurity Unit 10 Crossword crossword puzzle
Across
  1. also known as a "white list"
  2. any software that relies upon by other applications and software
  3. predefined responses for security incidents
  4. this type of restart is needed for applying updates
  5. when a system is unavailable
  6. involves assessing all existing security controls, policies and procedures
  7. step-by-step instructions for security measures
  8. ideal security position based on industry standards
  9. define requirements for security controls and configurations
Down
  1. prioritization of improving security and moving to the desired state
  2. also known as "block lists"
  3. limiting certain actions or behaviors
  4. comparing the current and desired states
  5. Comparing the current state of an organization's security position to a desired state
  6. never trust, always verify
  7. these types of apps are outdated and older

16 Clues: never trust, always verifyalso known as "block lists"also known as a "white list"when a system is unavailablelimiting certain actions or behaviorscomparing the current and desired statesthese types of apps are outdated and olderpredefined responses for security incidentsstep-by-step instructions for security measures...

Auto 2026-02-16

Auto crossword puzzle
Across
  1. Laser-based system that creates 3D maps of surroundings
  2. Maintaining balanced and steady movement
  3. Device that stabilizes and guides a drone
  4. Method that allows systems to improve using data
  5. Calculating the safest and most efficient path forward
  6. Interpreting sensor data to understand surroundings
Down
  1. Government rules that guide safe technology deployment
  2. Computer systems that mimic human decision-making
  3. Devices that detect changes in the environment
  4. Protection against hacking and digital interference
  5. Determining exact position using maps and signals
  6. Backup systems designed to improve safety
  7. Step-by-step computational rules for solving problems

13 Clues: Maintaining balanced and steady movementDevice that stabilizes and guides a droneBackup systems designed to improve safetyDevices that detect changes in the environmentMethod that allows systems to improve using dataComputer systems that mimic human decision-makingDetermining exact position using maps and signals...

Computer Science 2023-05-05

Computer Science crossword puzzle
Across
  1. another word for virus
  2. A software that can do problem solving and learn on it's own
  3. Bill Gate's corporation
  4. Way to stop seeing ads
  5. Software to access the internet
  6. Owner of Tesla
  7. Lots of computers joined together through signals sending data
  8. The code that the nazis communicated through
  9. A software that infects your computer secretly
  10. A collection of code
  11. Code made out of 0s and 1s
Down
  1. The person who created the Universal Turing Machine
  2. A visual display which shows the code on a computer
  3. Small device that is pushed across a small area to do different actions
  4. A software addon
  5. Stops viruses from infecting your pc
  6. What you're using
  7. What you use to type
  8. What a computer uses to operate
  9. Another software that is very HOT
  10. Owner of apple

21 Clues: Owner of TeslaOwner of appleA software addonWhat you're usingWhat you use to typeA collection of codeanother word for virusWay to stop seeing adsBill Gate's corporationCode made out of 0s and 1sSoftware to access the internetWhat a computer uses to operateAnother software that is very HOTStops viruses from infecting your pc...

TTS informatika 2025-04-10

TTS informatika crossword puzzle
Across
  1. .Hak atas kekayaan intelektual
  2. .Sistem komputer untuk menelusuri informasi di internet
  3. .Profesiyang merancang tampilan dan interaksi aplikasi
  4. .Profesi yang menulis kode program
  5. .Mesin pencari paling populer saat ini
  6. .Profesi yang mengelola data dan sistem basis data
  7. .Singkatan dari Creative Commons (izin berbagi konten)
  8. .Hak yang diberikan kepada pencipta karya seni atau tulisan
  9. .Akhiran domain untuk situs komersial
  10. .Proses mengamankan data dari akses tidak sah
Down
  1. .Tempat untuk menyimpan dan berbagi video
  2. .Jenis hak kekayaan intelektual untuk merek dagang
  3. .Proses penyebaran informasi secara luas
  4. .Media sosial berbasis gambar milik Meta
  5. .Kegiatan mengambil data dari internet secara otomatis
  6. .Jenis konten digital berbentuk suara
  7. .Produk digital berbentuk tulisan panjang seperti e-book
  8. .Format file gambar umum (3 huruf)
  9. .Konten digital berbasis gambar bergerak
  10. .Profesi yang fokus pada keamanan jaringan komputer

20 Clues: .Hak atas kekayaan intelektual.Profesi yang menulis kode program.Format file gambar umum (3 huruf).Jenis konten digital berbentuk suara.Akhiran domain untuk situs komersial.Mesin pencari paling populer saat ini.Proses penyebaran informasi secara luas.Media sosial berbasis gambar milik Meta.Konten digital berbasis gambar bergerak...

Tugas Daring INF Jum'at 04/11/25 Jasmine Khairunnisa(14) X-I 2025-04-11

Tugas Daring INF Jum'at 04/11/25 Jasmine Khairunnisa(14) X-I crossword puzzle
Across
  1. Melindungi karya seni atau tulisan.
  2. Menampilkan halaman dengan URL serupa.
  3. Proses mengatur konten.
  4. Perlindungan atas penemuan teknologi.
  5. Mengecek kebenaran informasi.
  6. Engineer Ahli jaringan komputer.
  7. Penyebaran konten ke audiens luas.
  8. Analyst Menganalisis data besar.
  9. Digunakan untuk menghilangkan kata tertentu dalam pencarian.
  10. Syntax untuk pencarian kata spesifik.
Down
  1. Verifikasi keaslian konten.
  2. Menjaga keamanan data digital.
  3. Proses memanfaatkan teknologi untuk budaya.
  4. Identifikasi konten berbahaya.
  5. Budaya Konten berbasis nilai tradisional.
  6. Industri Hak untuk desain produk tertentu.
  7. Merancang perangkat lunak.
  8. Hak atas logo atau merek dagang.
  9. Lokal Media untuk menyebarluaskan budaya lokal.
  10. Konten palsu yang menyesatkan.
  11. Lokal Nilai tradisional dalam konten digital.
  12. Operator untuk pencarian di situs tertentu.
  13. Designer Merancang antarmuka pengguna.
  14. Mencari file dengan format spesifik.
  15. Hak atas ide atau karya pemikiran.

25 Clues: Proses mengatur konten.Merancang perangkat lunak.Verifikasi keaslian konten.Mengecek kebenaran informasi.Menjaga keamanan data digital.Identifikasi konten berbahaya.Konten palsu yang menyesatkan.Hak atas logo atau merek dagang.Engineer Ahli jaringan komputer.Penyebaran konten ke audiens luas.Analyst Menganalisis data besar....

IT 2025-12-02

IT crossword puzzle
Across
  1. Tool used to secure data by converting it to code
  2. Extracting useful patterns from large datasets
  3. Software that manages computer hardware
  4. The visual part of software users interact with
  5. Rules for data communication over networks
  6. Checking a system for malicious software
  7. Online space to save and access files
  8. A software-based emulation of a computer
  9. Machines simulating human intelligence
Down
  1. Keeping servers running smoothly and securely
  2. Organizing and handling structured data
  3. Find and fix errors in software
  4. A set of rules for writing computer code
  5. Algorithms that learn from data automatically
  6. Protecting computers and networks from attacks
  7. New version of a program to improve it
  8. Measures to protect systems from digital threats
  9. Blocks unauthorized access to a network
  10. Copy of data saved for recovery purposes
  11. Write instructions for a computer program

20 Clues: Find and fix errors in softwareOnline space to save and access filesNew version of a program to improve itMachines simulating human intelligenceOrganizing and handling structured dataSoftware that manages computer hardwareBlocks unauthorized access to a networkA set of rules for writing computer codeChecking a system for malicious software...

Digimath 9 2025-03-05

Digimath 9 crossword puzzle
Across
  1. – The smallest unit of data in a computer
  2. – A wireless technology standard used to exchange data between devices over short distances
  3. – The practice of protecting computers and networks from digital attacks
  4. – A harmful program that can damage a computer
  5. – Used to type and input data
  6. – A screen that displays information
  7. – Physical parts of a computer
Down
  1. – A global network connecting millions of computers
  2. – A wireless connection to the internet
  3. – The "brain" of the computer
  4. – Storing data on the internet instead of a local device
  5. – Programs that run on a computer
  6. – A pointing device used to control the cursor

13 Clues: – The "brain" of the computer– Used to type and input data– Physical parts of a computer– Programs that run on a computer– A screen that displays information– A wireless connection to the internet– The smallest unit of data in a computer– A harmful program that can damage a computer– A pointing device used to control the cursor...

Intro Cybersecurity Puzzle 2 2021-09-15

Intro Cybersecurity Puzzle 2 crossword puzzle
Across
  1. Acronym for a _____ model typically used for troubleshooting communication with TCP protocol
  2. Another form of single sign on, initially supported by Twitter and Google
  3. Biometrics is an example of something you _____
  4. single sign-on authentication, think three headed dog
  5. A key fob is an example of something you _____
  6. A Command Prompt command used to test the ability of the source computer to reach a specified destination computer
  7. Robot Network
  8. Acronym for Industrial Control Systems Supervisory Software
  9. Acronym for the expectations between the service provider and the customer and describes the products or services to be delivered
Down
  1. The infected computer in a network of computers with infected malware
  2. Your location to sign in is an example of somewhere you _____
  3. the process of converting a given key into another value. If they are the same this is known as collision.
  4. An emerging technology used in cryptocurrency
  5. Acronym for "Smart Devices" over the internet
  6. Your password is an example of something you _____
  7. Acronym for Anything as a service
  8. The acronym for the masterbot centralization

17 Clues: Robot NetworkAcronym for Anything as a serviceThe acronym for the masterbot centralizationAn emerging technology used in cryptocurrencyAcronym for "Smart Devices" over the internetA key fob is an example of something you _____Biometrics is an example of something you _____Your password is an example of something you _____...

Cybersecurity Fundamentals Chapter 5 2022-10-27

Cybersecurity Fundamentals Chapter 5 crossword puzzle
Across
  1. an efficient way to store, retrieve, and analyze data.
  2. table relationship must remain consistent.
  3. a set of rules defined by the user which does not belong to one of the other categories.
  4. use to make hashing more secure.
  5. strengthens hashing algorithm by using additional secret key as input to the hash function.
  6. a tool that ensures data integrity by taking binary data and producing a fixed-length. representation call the hash value.
  7. checks that data falls within the parameters defined by the database designer.
  8. all data stored in a column must follow the same format.
  9. hashing algorithm developed by ron rivest that produces a 128-bit hash value.
Down
  1. refers to the accuracy, consistency, and reliability of data stored in a
  2. developed by the us national institute of standards and technology (nist) and can be implemented in different strengths.
  3. the policies, roles, and procedures required to create, manage, distribute, use, store, and revoke digital certificate.
  4. provide the same functionality as handwritten signature for electronics documents.
  5. all rows must have a unique identifier called primary key.
  6. equivalent to an electronic passport.
  7. standard for the construction of digital certificate and public key infrastructure (pki) used to manage digital certificate.

16 Clues: use to make hashing more secure.equivalent to an electronic passport.table relationship must remain consistent.an efficient way to store, retrieve, and analyze data.all data stored in a column must follow the same format.all rows must have a unique identifier called primary key....

Getting to Know Darnnell 2024-08-31

Getting to Know Darnnell crossword puzzle
Across
  1. French city Darnnell visited for official duty
  2. Proud native of DC
  3. Short for Darnnell's DC high school, McKinley
  4. Darnnell's bachelor’s degree from Strayer University
  5. Where Darnnell worked in cybersecurity
  6. Cruise destination Darnnell visited on Royal Caribbean
  7. Darnnell wrote books, including *Victorious!*
  8. She served during Operation Desert Storm
  9. Darnnell's graduation honor with a 4.0 GPA
  10. City Darnnell toured for Underground Railroad history
Down
  1. Key role Darnnell played in guiding teams and projects
  2. Military operation where she served
  3. Hawaiian island Darnnell visited in 2023
  4. Focused on preventing global threats; her role at DOJ
  5. Historical figure’s birthplace Darnnell visited
  6. The cornerstone of Darnnell's strength
  7. Central to Darnnell's heart and soul
  8. Language Darnnell’s learning on Duo lingo
  9. International police organization she worked with
  10. Operating system Darnnell once specialized in

20 Clues: Proud native of DCMilitary operation where she servedCentral to Darnnell's heart and soulThe cornerstone of Darnnell's strengthWhere Darnnell worked in cybersecurityHawaiian island Darnnell visited in 2023She served during Operation Desert StormLanguage Darnnell’s learning on Duo lingoDarnnell's graduation honor with a 4.0 GPA...

Wedding 2024-06-08

Wedding crossword puzzle
Across
  1. Brand of Michael’s car
  2. Michael’s job industry
  3. The number of years the couple is together
  4. Michael’s middle name
  5. Where did Michael and Stacey meet
  6. What the groom has for breakfast everyday
  7. How long has Stacey been in Australia for
  8. Stacey’s favourite food (hint: ask father of bride)
  9. City where Michael was born
  10. Honeymoon destination
  11. Mr & Mrs _____
  12. The age gap between the bride and the groom
  13. Number of their siblings all together
Down
  1. Flavour of the wedding cake
  2. Where did Michael propose
  3. Michael’s birthday month
  4. Who’s the better cook
  5. Their favourite season
  6. Michael and Stacey’s dating anniversary month (hint: Maid of Honour’s birth month)
  7. How many years did Michael live overseas for (hint: bribe Father of Groom)
  8. Favourite AFL team (hint: ask Best Man)
  9. Michael’s favourite drink
  10. Stacey’s best friend
  11. Stacey’s birthday month

24 Clues: Mr & Mrs _____Stacey’s best friendWho’s the better cookMichael’s middle nameHoneymoon destinationTheir favourite seasonBrand of Michael’s carMichael’s job industryStacey’s birthday monthMichael’s birthday monthWhere did Michael proposeMichael’s favourite drinkFlavour of the wedding cakeCity where Michael was bornWhere did Michael and Stacey meet...

Technology Words 2024-10-09

Technology Words crossword puzzle
Across
  1. Computer Camera
  2. Used to type
  3. You call people on it
  4. Set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
  5. Communicate with others vocally
  6. Coded software
  7. Analyze and solve problems
  8. Prevents viruses
  9. Provides entertainment
  10. Something that you can transfer digital info to
  11. Stores information
  12. Another word for apps
Down
  1. Gain unauthorized access
  2. Random Access Memory
  3. Decode a code
  4. Also an animal
  5. Requires a router
  6. Protects from cyber attacks
  7. The use of computer technology
  8. Remote connection
  9. Communication technology tool
  10. Central Processing Unit
  11. Look through the web
  12. Creates apps/websites
  13. Find locations
  14. Amount of data your internet connection can handle
  15. Accessed from a browser
  16. Protects your computer from virus
  17. Convert data into a code
  18. Social feed

30 Clues: Social feedUsed to typeDecode a codeAlso an animalCoded softwareFind locationsComputer CameraPrevents virusesRequires a routerRemote connectionStores informationRandom Access MemoryLook through the webYou call people on itCreates apps/websitesAnother word for appsProvides entertainmentCentral Processing UnitAccessed from a browser...

Sip & Solve 2025-06-06

Sip & Solve crossword puzzle
Across
  1. Aydens zodiac sign
  2. Groom’s middle name
  3. How many months apart in age is the couple
  4. Camille’s College Acronym
  5. Best Man
  6. Aydens position in football
  7. What was Camille’s childhood nickname
  8. Who said I love you first
  9. Color of Ayden’s eyes
  10. Aydens current general profession
  11. Grooms favorite fast food restaurant
  12. Maid of Honor
  13. Name of Camille’s oldest friend
  14. Camille’s favorite color
  15. Couples first date
Down
  1. What month Ayden proposed
  2. Town Ayden & Camille grew up in
  3. Bride’s new last name
  4. First concert the couple attended together
  5. Bride’s maiden name
  6. Aydens birthday month
  7. Ayden & Camille’s high school mascot
  8. Camille’s favorite TV show
  9. Camille’s college degree
  10. Couples favorite soda
  11. Ayden’s College Acronym
  12. Where the couple got engaged
  13. Camille’s birthday month
  14. How many years have the couple been together

29 Clues: Best ManMaid of HonorAydens zodiac signCouples first dateGroom’s middle nameBride’s maiden nameBride’s new last nameAydens birthday monthCouples favorite sodaColor of Ayden’s eyesAyden’s College AcronymCamille’s college degreeCamille’s birthday monthCamille’s favorite colorWhat month Ayden proposedCamille’s College AcronymWho said I love you first...

Grace & Branden 2025-09-04

Grace & Branden crossword puzzle
Across
  1. The best man’s name
  2. Branden’s middle name
  3. Branden and Grace each have blank siblings
  4. Grace’s brother recently enlisted in the blank
  5. Season they met
  6. Who the better cook is
  7. Grace’s birth month
  8. Mother of the Bride’s name
  9. Grace’s eye color
  10. Branden’s favorite hobby
  11. Grace’s unknown talent
  12. Branden’s birth month
  13. Month they got engaged
  14. Grace’s new last name
  15. Their favorite sweet treat
Down
  1. Where they met
  2. Mother of the Groom’s name
  3. Grace brews some awesome
  4. Branden’s college major
  5. Branden’s eye color
  6. The maid of honor’s name
  7. Honeymoon destination
  8. What similar job did they hold while in high school
  9. The first meal they made together
  10. The officiant’s name
  11. Years they have known each other
  12. The state Branden was born in

27 Clues: Where they metSeason they metGrace’s eye colorThe best man’s nameBranden’s eye colorGrace’s birth monthThe officiant’s nameBranden’s middle nameHoneymoon destinationBranden’s birth monthGrace’s new last nameWho the better cook isGrace’s unknown talentMonth they got engagedBranden’s college majorGrace brews some awesomeThe maid of honor’s name...

Jargon Crossword 2025-12-11

Jargon Crossword crossword puzzle
Across
  1. EU directive for cybersecurity
  2. fieldbus communication standard
  3. Key metric for manufacturing productivity
  4. network device used to connect multiple devices
  5. system used to monitor and control processes
  6. IT and OT systems integration
  7. device connecting different networks or protocols
  8. Manages and monitors factory floor operations
  9. serial communication protocol
  10. industrial network protocol
  11. Lightweight messaging protocol for IoT devices
Down
  1. Upgrading existing industrial site
  2. device detecting changes in physical conditions
  3. Period when equipment is not operational
  4. computer used to automate processes
  5. specialized database for large volumes of data
  6. New facility built from scratch
  7. processes data at or near the source
  8. Automated machine performing repetitive tasks
  9. Evaluation process for systems or risks
  10. Driverless vehicle for material transport
  11. Industrial version of the Internet of Things
  12. Deviation from expected process behavior

23 Clues: industrial network protocolIT and OT systems integrationserial communication protocolEU directive for cybersecurityfieldbus communication standardNew facility built from scratchUpgrading existing industrial sitecomputer used to automate processesprocesses data at or near the sourceEvaluation process for systems or risks...

Online Child Safety 2013-05-14

Online Child Safety crossword puzzle
Across
  1. a person who access internet files either legally or illegally
  2. software that allows parents to control what their children do online
  3. an unsolicited email or junk mail
  4. Malicious hardware and code
  5. any software or technique used to prevent online crime
Down
  1. an interactive forum where you can talk in real time
  2. unsolicited adds on your computer
  3. a hostile strongly worded message that may contain obscene language
  4. scam that involves a fraudulent e-mail
  5. An adult internet user who exploits children or teens
  6. online site where people can post information about themselves
  7. rules/manners of inline usage
  8. a sexual message sent to someone
  9. virtual sexual encounters
  10. The Communications Decency Act

15 Clues: virtual sexual encountersMalicious hardware and coderules/manners of inline usageThe Communications Decency Acta sexual message sent to someoneunsolicited adds on your computeran unsolicited email or junk mailscam that involves a fraudulent e-mailan interactive forum where you can talk in real time...

Technology 2023-09-15

Technology crossword puzzle
Across
  1. - Prefix for environments simulated by computers.
  2. - A global network connecting computers and devices.
  3. - Unmanned aerial vehicles used for various purposes.
  4. - A mobile device with advanced features.
  5. - Prefix for intelligence created by machines.
  6. - Wireless technology for short-range data exchange.
  7. - The study of designing and building robots.
  8. - Programs and applications used on computers.
Down
  1. - Authentication based on unique physical characteristics.
  2. - Measures to protect computer systems and data.
  3. - A small, specialized electronic device.
  4. - The process of converting data into a code to secure it.
  5. - Storage and computing resources accessed over the internet.
  6. - A set of rules for solving a problem or performing a task.
  7. - Using technology to perform tasks without human intervention.

15 Clues: - A small, specialized electronic device.- A mobile device with advanced features.- The study of designing and building robots.- Prefix for intelligence created by machines.- Programs and applications used on computers.- Measures to protect computer systems and data.- Prefix for environments simulated by computers....

Computer Science 2025-08-12

Computer Science crossword puzzle
Across
  1. – Finding and fixing errors in code.
  2. – Online storage and services accessed via the internet.
  3. – Two or more computers connected to share data.
  4. – Protecting computers and networks from attacks.
  5. – The physical parts of a computer.
  6. – Data or commands entered into a computer.
Down
  1. – A device used to type into a computer.
  2. – A global network that connects computers.
  3. – Scrambling data to keep it secure.
  4. – Information a computer gives back after processing.
  5. – Step-by-step instructions to solve a problem.
  6. – A way computers store data using 0s and 1s.
  7. – Instructions written for a computer to follow.
  8. – Programs that run on a computer.
  9. – Facts or information stored on a computer.

15 Clues: – Programs that run on a computer.– The physical parts of a computer.– Scrambling data to keep it secure.– Finding and fixing errors in code.– A device used to type into a computer.– A global network that connects computers.– Data or commands entered into a computer.– Facts or information stored on a computer....

Engineering 2026-01-17

Engineering crossword puzzle
Across
  1. To roughly calculate the cost, value, or quantity
  2. To keep something in good condition
  3. Weakness in materials caused by repeated stress
  4. Protection of computer systems from digital attacks
  5. Industry concerned with aviation and space flight
  6. A plan giving lists of intended events and times
  7. A person who designs, builds, or maintains machines
  8. Consistently good in quality or performance
  9. A barrier constructed to hold back water
Down
  1. To put a decision or plan into effect
  2. To create a plan or drawing before building something
  3. Basic physical structures like roads, bridges, and power supplies
  4. To follow a rule or regulation
  5. Possible to do easily or conveniently; achievable
  6. A liquid fossil fuel; crude oil

15 Clues: To follow a rule or regulationA liquid fossil fuel; crude oilTo keep something in good conditionTo put a decision or plan into effectA barrier constructed to hold back waterConsistently good in quality or performanceWeakness in materials caused by repeated stressA plan giving lists of intended events and times...

Information Security 2025-01-06

Information Security crossword puzzle
Across
  1. Malicious Software
  2. Malware that attaches to programs
  3. Designed to lessen the risk of cyber attack
  4. Protect with up to date software, encrypted information, limited employee access
Down
  1. Protect with strong passwords and password storage
  2. Protection of ownership and reputation
  3. Acceptable Use Policy

7 Clues: Malicious SoftwareAcceptable Use PolicyMalware that attaches to programsProtection of ownership and reputationDesigned to lessen the risk of cyber attackProtect with strong passwords and password storageProtect with up to date software, encrypted information, limited employee access

Cybersecurity Fundamental Chapter 2 2022-11-24

Cybersecurity Fundamental Chapter 2 crossword puzzle
Across
  1. a type of storage device retains the data when no user or process is using it.
  2. cyber criminals can capture, save and steal data in-transit.
  3. uses removable media to physically move data from one computer to another.
  4. procedures, and guidelines that enable the citizen of the cyber world to stay safe and follow good practices.
  5. devices, and product available to protect information systems and fend off cyber criminals.
  6. verifies the identify of a user to prevent unauthorized access.
  7. uses cable to transmit data.
Down
  1. verifies determine which resources users can access, along with the operations that users can perform.
  2. is the principle used to describe the need to maintain availability of information systems and services at all times.
  3. involves sending information from one device to another.
  4. cyber criminals can use rogue or unauthorized devices to interrupt data availability.
  5. cyber criminals can intercept and alter data in-transit.
  6. aware and knowledgeable about their world and the dangers that threaten their world.
  7. keeps tracks of what users do, including what they access, the amount of time they access resources, and any changes made.
  8. prevents the disclosure of information to unauthorize people, resource and processes.
  9. uses the airways to transmit data.

16 Clues: uses cable to transmit data.uses the airways to transmit data.involves sending information from one device to another.cyber criminals can intercept and alter data in-transit.cyber criminals can capture, save and steal data in-transit.verifies the identify of a user to prevent unauthorized access....

Cybersecurity Awareness Month 2023-09-20

Cybersecurity Awareness Month crossword puzzle
Across
  1. Personally Identifiable Information
  2. ______ force is a password attack method where many passwords are submitted with the hopes of guessing the correct one
  3. Type of malware that threatens to expose information unless a payment is made
  4. Health Insurance Portability and Accountability Act
  5. An email that tricks you into giving up your passphrase
Down
  1. A weakness in a program or system that can be exploited
  2. Email ______ makes it seem that an email came from someone else when it came from a scammer instead, hiding their true identity
  3. CWRU classifies information as: public, internal-use, and _______
  4. Install operating system security ________ regularly
  5. The process of changing plain text to cipher text using an algorithm
  6. A ______ and Control, or C2, server is used by an adversary to communicate with compromised systems

11 Clues: Personally Identifiable InformationHealth Insurance Portability and Accountability ActInstall operating system security ________ regularlyA weakness in a program or system that can be exploitedAn email that tricks you into giving up your passphraseCWRU classifies information as: public, internal-use, and _______...

ISC 3 2025-03-24

ISC 3 crossword puzzle
Across
  1. Mandates EU data protection
  2. Governs California consumer rights
  3. Agency sets cybersecurity benchmarks
Down
  1. Health privacy
  2. Card security

5 Clues: Card securityHealth privacyMandates EU data protectionGoverns California consumer rightsAgency sets cybersecurity benchmarks

SCIENCE AND TECHNOLOGY 2024-03-29

SCIENCE AND TECHNOLOGY crossword puzzle
Across
  1. Protection of computer systems from theft or damage.
  2. The study of living organisms.
  3. Intelligence Teaching computers to think and learn.
  4. introducing new ideas or methods.
  5. A series of steps to accomplish a task.
Down
  1. Energy Energy derived from naturally replenished resources like sunlight, wind, or water.
  2. Connecting computers or devices to communicate.
  3. Study of heredity and variation in living organisms.
  4. Distinctive features or traits.
  5. A community of living organisms and their environment.
  6. Using machines to perform tasks.
  7. Genetic material containing instructions for living organisms' development and traits.

12 Clues: The study of living organisms.Distinctive features or traits.Using machines to perform tasks.introducing new ideas or methods.A series of steps to accomplish a task.Connecting computers or devices to communicate.Study of heredity and variation in living organisms.Protection of computer systems from theft or damage....

cyber threat actors, attacks & motivations 2023-12-18

cyber threat actors, attacks & motivations crossword puzzle
Across
  1. Where to report a a cybersecurity incident at RDA
  2. It's something RDA is known for, but in the social form
  3. Homophone of a much loved pass time
  4. Supported by a government
  5. Australian Government agency that houses the ACSC
  6. Cybercrime that involves encryption and blackmail
  7. The name of the cipher you may or may not have succeeded in solving
  8. Furtum identitatis
Down
  1. A brute force technique used by cybercriminals
  2. An important aspect of security as a capability that isn't cyber
  3. Morris distributed this via the internet in 1988
  4. Something you must protect in the digital age
  5. A characteristic of cybercriminal groups
  6. Cybercriminal motivated by ideology
  7. A leading motivator for cybercriminals
  8. Malicious software used to establish remote access
  9. It's everyone's responsibility

17 Clues: Furtum identitatisSupported by a governmentIt's everyone's responsibilityHomophone of a much loved pass timeCybercriminal motivated by ideologyA leading motivator for cybercriminalsA characteristic of cybercriminal groupsSomething you must protect in the digital ageA brute force technique used by cybercriminals...

Source Vs Machine Code 2025-11-12

Source Vs Machine Code crossword puzzle
Across
  1. – Low-level software stored in ROM
  2. – Easy for humans to understand (like source code)
  3. – A single command in a program
  4. – Person who writes source code
  5. – Example of a high-level programming language
  6. – Uses programming to analyze and interpret data
  7. – Job that designs or builds software applications
  8. – Field that protects systems from digital attacks
Down
  1. – Coder who designs and codes video games
  2. – Field that creates and maintains websites
  3. – System using only 0 and 1
  4. – Part of the computer that executes machine code
  5. – Another term for bits (0s and 1s)
  6. – Hard or impossible to modify (like machine code)
  7. – Read-Only Memory that stores permanent instructions
  8. – Programs and applications created using source code
  9. – The physical components of a computer

17 Clues: – System using only 0 and 1– A single command in a program– Person who writes source code– Low-level software stored in ROM– Another term for bits (0s and 1s)– The physical components of a computer– Coder who designs and codes video games– Field that creates and maintains websites– Example of a high-level programming language...

User responsibility 2025-10-14

User responsibility crossword puzzle
Across
  1. practicing ethical respectful and safe behavior online
  2. the trace of all your online activities
  3. respecting differences and opinions in digital spaces
Down
  1. protecting systems and data from digital attacks
  2. accepting consequences for online actions
  3. checking accuracy before believing or sharing
  4. settings tools that control who can see your information
  5. false information shared without verifying facts

8 Clues: the trace of all your online activitiesaccepting consequences for online actionschecking accuracy before believing or sharingprotecting systems and data from digital attacksfalse information shared without verifying factsrespecting differences and opinions in digital spacespracticing ethical respectful and safe behavior online...

E-Commerce Crossword 2024-04-19

E-Commerce Crossword crossword puzzle
Across
  1. digital shopping cart used to hold items before purchase
  2. online advertisements targeted to specific users
  3. short for "electronic commerce"
  4. process of securely storing and transmitting customer data
  5. mobile app used to browse and purchase products online
  6. process of fulfilling an online order by delivering it
  7. process of returning a purchased item online
Down
  1. detailed description of a product listed online
  2. positive online review left by a satisfied customer
  3. online marketplace where sellers and buyers connect
  4. discounts offered online to attract customers
  5. secure online payment method using a credit card
  6. person who influences buying decisions through online reviews
  7. images used online to showcase products

14 Clues: short for "electronic commerce"images used online to showcase productsprocess of returning a purchased item onlinediscounts offered online to attract customersdetailed description of a product listed onlineonline advertisements targeted to specific userssecure online payment method using a credit card...

Internet Safety Crossword 2023-04-20

Internet Safety Crossword crossword puzzle
Across
  1. a part of a computer system or network which is made to block unwanted access
  2. the state of being free from public attention
  3. a piece of information needed to log in to websites
  4. information made available by a website
  5. never share personal information online
  6. unwanted messages
  7. bulling done over the internet
  8. facts given about something or someone
Down
  1. someone that hacks
  2. websites and apps that enable users to create and share content EX.SnapChat
  3. a world wide computer network
  4. the state of being protected against the criminal use of electronic data
  5. like a cold for your computer
  6. be careful what you make public

14 Clues: unwanted messagessomeone that hacksa world wide computer networklike a cold for your computerbulling done over the internetbe careful what you make publicfacts given about something or someoneinformation made available by a websitenever share personal information onlinethe state of being free from public attention...

Career Clusters Crossword 2024-12-20

Career Clusters Crossword crossword puzzle
Across
  1. Promotes whole health in individuals through an array of services
  2. Focuses on administration, strategic planning, and entrepreneurship
  3. Designing and executing the built environment
  4. Encompasses roles in local, state, and federal governments
  5. Movement of goods over air, ground, and water
Down
  1. Fostering learning from early-childhood to adulthood
  2. Supports plant and animal based industries
  3. Promoting products and brands
  4. Developing digital systems such as AI, data analytics, and cybersecurity
  5. Renewable fuel production, power generation, utilities
  6. Includes services related to food, travel, and lodging
  7. Aims to produce high quality goods
  8. Banking, lending, corporate, debt management
  9. Includes film, fashion, journalism, interior design, and more

14 Clues: Promoting products and brandsAims to produce high quality goodsSupports plant and animal based industriesBanking, lending, corporate, debt managementDesigning and executing the built environmentMovement of goods over air, ground, and waterFostering learning from early-childhood to adulthoodRenewable fuel production, power generation, utilities...

Information Management 2025-09-23

Information Management crossword puzzle
Across
  1. Identifying risks and taking precautions to avoid them.
  2. Anything valuable that isn’t natural.
  3. A system that supports functions of Information Management.
  4. Anything created with someone’s mind.
Down
  1. The protection of networks, and data.
  2. A business that involves people, processes that collects data.
  3. An unbiased inspection to review safety, integrity, and accuracy of information.
  4. The accuracy of data.
  5. A practice not knowing outside the company.

9 Clues: The accuracy of data.The protection of networks, and data.Anything valuable that isn’t natural.Anything created with someone’s mind.A practice not knowing outside the company.Identifying risks and taking precautions to avoid them.A system that supports functions of Information Management....

UNODC TOT Crossword 2025-11-11

UNODC TOT Crossword crossword puzzle
Across
  1. The hackers we aim to defend against
  2. The regional center name abbreviation under UNODC
  3. The brilliant course instructor guiding us
  4. The mandatory course we completed before the TOT
Down
  1. The country hosting our training and collaboration
  2. The field our expertise revolves around
  3. The second participating institution in the training
  4. The center in Doha where the TOT course is conducted
  5. The first participating institution in the training

9 Clues: The hackers we aim to defend againstThe field our expertise revolves aroundThe brilliant course instructor guiding usThe mandatory course we completed before the TOTThe regional center name abbreviation under UNODCThe country hosting our training and collaborationThe first participating institution in the training...

TECHNOLOGY 2025-01-29

TECHNOLOGY crossword puzzle
Across
  1. easy to use or understand
  2. the use of machines to perform tasks without human intervention
  3. knowledgeable about modern technology
  4. the trail of data left by users on the internet
  5. a small electronic device with a specific function
Down
  1. measures taken to protect systems from cyber threats
  2. an important discovery or development
  3. introducing new ideas or methods
  4. extremely modern and advanced
  5. Intelligence (AI) the simulation of human intelligence in machines

10 Clues: easy to use or understandextremely modern and advancedintroducing new ideas or methodsan important discovery or developmentknowledgeable about modern technologythe trail of data left by users on the interneta small electronic device with a specific functionmeasures taken to protect systems from cyber threats...

17 Miftahul Huda 8i 2025-10-16

17 Miftahul Huda 8i crossword puzzle
Across
  1. Program untuk mengatur dan mempercepat unduhan file.
  2. Proses mengubah data agar tidak bisa dibaca orang lain.
  3. Memuat ulang halaman web agar tampil terbaru.
  4. Program berbahaya yang bisa merusak sistem komputer.
  5. Salinan data untuk mencegah kehilangan.
  6. Upaya penipuan untuk mencuri data pribadi lewat internet.
Down
  1. Penanda halaman web agar mudah dikunjungi lagi.
  2. Perlindungan sistem komputer dari serangan digital.
  3. Proses menampilkan gambar atau halaman web di layar.
  4. Jalan pintas untuk membuka program atau file cepat.

10 Clues: Salinan data untuk mencegah kehilangan.Memuat ulang halaman web agar tampil terbaru.Penanda halaman web agar mudah dikunjungi lagi.Perlindungan sistem komputer dari serangan digital.Jalan pintas untuk membuka program atau file cepat.Program untuk mengatur dan mempercepat unduhan file.Proses menampilkan gambar atau halaman web di layar....

Career Focus 2 2025-11-05

Career Focus 2 crossword puzzle
Across
  1. Core skill that helps you calculate trade measurements
  2. A common Registered Training Organisation in Australia
  3. Major regional NSW university, abbr.
  4. OUTLOOK An industry's future demand for workers
  5. A person undertaking structured, paid training, often in non-trade areas
  6. The national system of qualifications (Australian Qualifications Framework)
  7. ETHIC The personal quality behind motivation and drive
Down
  1. The general direction of your working life
  2. Sector that includes software, data and cybersecurity roles
  3. A typical trade apprenticeship.

10 Clues: A typical trade apprenticeship.Major regional NSW university, abbr.The general direction of your working lifeOUTLOOK An industry's future demand for workersCore skill that helps you calculate trade measurementsA common Registered Training Organisation in AustraliaETHIC The personal quality behind motivation and drive...

Cyber Security 2023-11-07

Cyber Security crossword puzzle
Across
  1. Logs and Event Management provided in JICA Project
  2. Set of rules, policies and operations that a company uses to achieve its business goals
  3. Compliance is act of following rules, laws and regulations
  4. Network Monitoring system short form
  5. Term that Deals with Organization secret data
  6. Operates continuously and Data visible 24*7
  7. Next Generation Firewall brand provided in JICA Project
Down
  1. Term used to define Weakness
  2. Keeping Information and Communication Private
  3. Terms used for Logging all the user activity
  4. Keeping Organizational information accurate and free of errors
  5. Authorizing a Person to perform certain activity
  6. cybersecurity standards for OT technology
  7. Role Based Access Control

14 Clues: Role Based Access ControlTerm used to define WeaknessNetwork Monitoring system short formcybersecurity standards for OT technologyOperates continuously and Data visible 24*7Terms used for Logging all the user activityKeeping Information and Communication PrivateTerm that Deals with Organization secret data...

AUDITOR 4.0 TRENDS AND CHALLENGES 2023-06-06

AUDITOR 4.0 TRENDS AND CHALLENGES crossword puzzle
Across
  1. Use of technologies to improve accuracy.
  2. Another word for difficulties experienced.
  3. Increasing use of online and cloud based tools increases this item.
Down
  1. One of the benefits of ESG reporting.
  2. Whats new in the industry?
  3. New technology used by companies for financial reporting.
  4. Profession being explored.

7 Clues: Whats new in the industry?Profession being explored.One of the benefits of ESG reporting.Use of technologies to improve accuracy.Another word for difficulties experienced.New technology used by companies for financial reporting.Increasing use of online and cloud based tools increases this item.

TIAA - SMT Crossword 2024-09-19

TIAA - SMT Crossword crossword puzzle
Across
  1. One of 5 Latin American countries that celebrates their independence on sept 15
  2. TIAA strategic partner
  3. First name of a T3CON presenter
Down
  1. TIAA office location that is closing
  2. Female associates and allies BRG
  3. CS&T Drive24 initiative
  4. agile, cybersecurity, data, AI and emerging tech

7 Clues: TIAA strategic partnerCS&T Drive24 initiativeFirst name of a T3CON presenterFemale associates and allies BRGTIAA office location that is closingagile, cybersecurity, data, AI and emerging techOne of 5 Latin American countries that celebrates their independence on sept 15

Meet UAlbany 2023-07-26

Meet UAlbany crossword puzzle
Across
  1. Nonprofit who manages the UAlbany ID Card Office
  2. The last C in CEHC stands for
  3. Online platform for mandatory compliance trainings
  4. UAlbany's free safety app for your smartphone
  5. The number of libraries on the UAlbany Uptown Campus
  6. The Great Dane
  7. Renowned American architect and designer of main campus
  8. Symbol of commitment to Latina/o student success
Down
  1. Name of the weekly which facilitates discussions on ecological literacy and funding opportunities
  2. College of Arts &
  3. Office responsible for preservation, modernization, and construction that enable the University at Albany to achieve its objectives
  4. Colonial, Dutch, State, and Indigenous
  5. TAS stands for? Hint: $$

13 Clues: The Great DaneCollege of Arts &TAS stands for? Hint: $$The last C in CEHC stands forColonial, Dutch, State, and IndigenousUAlbany's free safety app for your smartphoneNonprofit who manages the UAlbany ID Card OfficeSymbol of commitment to Latina/o student successOnline platform for mandatory compliance trainings...

CIA 2025-05-08

CIA crossword puzzle
Across
  1. You can make up to _________ a year
  2. The CIA helps students develop mission _____ while finishing their degrees
  3. You must take a _________ security clearance process.
  4. To serve you need to be a U.S. ________ and have a bachelors degree
  5. It was created to coordinate the nations _______ activities
Down
  1. Headquarters is located in Langley ______
  2. Some careers are analysis, auditing, ________, and engineering
  3. It doesn´t operate with traditional __________
  4. The CIA was founded in _______
  5. How was the CIA founded_______
  6. CIA recruits through their online portal __________
  7. CIA serves the ______________
  8. The CIA gathers and ________ intelligence about foreign countries

13 Clues: CIA serves the ______________The CIA was founded in _______How was the CIA founded_______You can make up to _________ a yearHeadquarters is located in Langley ______It doesn´t operate with traditional __________CIA recruits through their online portal __________You must take a _________ security clearance process....

CIS 178 Participation 3 Security 2023-07-17

CIS 178 Participation 3 Security crossword puzzle
Across
  1. computers or devices infected with malicious software
  2. collects and transmits sensitive information
  3. form of bullying that occurs online
  4. spreads from one computer to another
  5. virtual private network, secure online service
  6. "advertising-supported software" designed to display unwanted advertisements
  7. malicious software
  8. intrudes on a device remotely
  9. protecting digital assets
  10. development/use of computer systems/networks to store information.
  11. tricks users into clicking a disguised link
Down
  1. application designed to monitor network traffic
  2. disguises itself as a legitimate program or software
  3. uses bait to lure unsuspecting victims
  4. uses fingerprints, facial recognition, etc. to log into a device
  5. encrypts user's files or locks computer until a ransom is paid
  6. media manipulation, alter images/video for fake perception
  7. actions aimed to infiltrate computer networks.
  8. method of scrambling data for authorized users
  9. fake, disguised, bogus

20 Clues: malicious softwarefake, disguised, bogusprotecting digital assetsintrudes on a device remotelyform of bullying that occurs onlinespreads from one computer to anotheruses bait to lure unsuspecting victimstricks users into clicking a disguised linkcollects and transmits sensitive informationvirtual private network, secure online service...

Sip & Solve 2025-06-06

Sip & Solve crossword puzzle
Across
  1. Camille’s birthday month
  2. Aydens birthday month
  3. Ayden’s College Acronym
  4. Couples favorite soda
  5. How many years have the couple been together
  6. What was Camille’s childhood nickname
  7. Bride’s maiden name
  8. Where the couple got engaged
  9. Couples first date
  10. Best Man
  11. How many months apart in age is the couple
  12. Name of Camille’s oldest friend
  13. Aydens current general profession
  14. Camille’s college degree
  15. First concert the couple attended together
  16. Aydens zodiac sign
Down
  1. Camille’s favorite TV show
  2. Camille’s favorite color
  3. Aydens position in football
  4. What month Ayden proposed
  5. Groom’s middle name
  6. Maid of Honor
  7. Ayden & Camille’s high school mascot
  8. Bride’s new last name
  9. Town Ayden & Camille grew up in
  10. Who said I love you first
  11. Color of Ayden’s eyes
  12. Grooms favorite fast food restaurant
  13. Camille’s College Acronym

29 Clues: Best ManMaid of HonorCouples first dateAydens zodiac signGroom’s middle nameBride’s maiden nameAydens birthday monthCouples favorite sodaBride’s new last nameColor of Ayden’s eyesAyden’s College AcronymCamille’s birthday monthCamille’s favorite colorCamille’s college degreeWhat month Ayden proposedWho said I love you firstCamille’s College Acronym...

Sarah and Liam's wedding 2025-07-10

Sarah and Liam's wedding crossword puzzle
Across
  1. The month they first met
  2. The country they visited last summer
  3. The month the couple got engaged
  4. The first movie they watched as a couple
  5. The city they met in
  6. What did the groom study in college
  7. Where did the proposal happen
  8. Sarah's middle name
  9. The flavor of their wedding cake
  10. number of pets the couple has
  11. The stone in the engagement ring
Down
  1. The color of the bridesmaid dresses
  2. The street Sarah and Liam call home
  3. The bride's maiden name
  4. How many years the couple has been together
  5. Their first dance song
  6. First concert they saw together
  7. name of Sarah's Maid of Honor
  8. Sarah's star sign
  9. The instrument the groom played in high school
  10. The name of their dog
  11. Name of the Best Man

22 Clues: Sarah's star signSarah's middle nameThe city they met inName of the Best ManThe name of their dogTheir first dance songThe bride's maiden nameThe month they first metname of Sarah's Maid of HonorWhere did the proposal happennumber of pets the couple hasFirst concert they saw togetherThe month the couple got engagedThe flavor of their wedding cake...

IT Terminology 2026-02-05

IT Terminology crossword puzzle
Across
  1. System used to create new content (abbr.)
  2. A space with nothing in it
  3. Person's development in a story
  4. Getting rid of fossil fuel emissions
  5. "By registering, I agree to the _"
  6. The curved path of an object around a planet
  7. A hole in security
  8. Someone who partakes in a project
  9. Entries sent in for review or approval
  10. Used to connect your phone to the electricity socket
  11. People who bring new things into existence
Down
  1. Process of confirming accuracy or truth
  2. A group of satellites working together
  3. Digital security
  4. Extremely joyful or triumphant
  5. Solving a problem
  6. Switching from a diesel car to an electric car
  7. A computer system used to store data
  8. A object orbiting a celestial body
  9. To go from 0 to 100
  10. Giving a false impression

21 Clues: Digital securitySolving a problemA hole in securityTo go from 0 to 100Giving a false impressionA space with nothing in itExtremely joyful or triumphantPerson's development in a storySomeone who partakes in a project"By registering, I agree to the _"A object orbiting a celestial bodyGetting rid of fossil fuel emissions...

WHAT LIES AHEAD 2025-11-20

WHAT LIES AHEAD crossword puzzle
Across
  1. New alloys or concrete that repairs itself.
  2. Very large, rapidly growing cities (50M+).
  3. Urban areas using technology for efficiency.
  4. Clean, very inexpensive nuclear energy.
  5. New, wealthy areas separate from declining cities.
  6. The engineering that makes all structures work together.
  7. Robotic clothing that helps workers.
  8. Machines' ability to make decisions and automate design.
  9. The issue of public money for infrastructure.
  10. Very fast train in vacuum tubes.
Down
  1. The large amounts of information from sensors.
  2. A structure's ability to resist disasters.
  3. Environmental change affecting cities
  4. Means of transport that can be automated (driverless).
  5. Small unmanned aircraft for delivery or building.
  6. Protection against hacking of connected systems.
  7. Network of sensors that exchange data in the infrastructure.
  8. Building and public works.
  9. Small devices to monitor infrastructure health.
  10. Non-fossil resources like solar or fusion

20 Clues: Building and public works.Very fast train in vacuum tubes.Robotic clothing that helps workers.Environmental change affecting citiesClean, very inexpensive nuclear energy.Non-fossil resources like solar or fusionA structure's ability to resist disasters.Very large, rapidly growing cities (50M+).New alloys or concrete that repairs itself....

PROFESI TKJ 2025-05-03

PROFESI TKJ crossword puzzle
Across
  1. Orang yang bertugas memasang dan memelihara jaringan komputer
  2. Orang yang menulis dan mengembangkan kode perangkat lunak
  3. Orang yang memperbaiki dan merakit komputer
  4. Pembuat dan pengelola situs web
  5. Pengelola dan pengawas sistem server dalam sebuah jaringan
Down
  1. Ahli yang merancang dan mengelola sistem jaringan skala besar
  2. Profesional yang menjaga keamanan jaringan dan data digital
  3. Orang yang memasang perangkat dan kabel jaringan
  4. Petugas yang memberikan bantuan teknis kepada pengguna komputer
  5. Penasihat teknis dalam bidang teknologi informasi untuk perusahaan

10 Clues: Pembuat dan pengelola situs webOrang yang memperbaiki dan merakit komputerOrang yang memasang perangkat dan kabel jaringanOrang yang menulis dan mengembangkan kode perangkat lunakPengelola dan pengawas sistem server dalam sebuah jaringanProfesional yang menjaga keamanan jaringan dan data digital...

Privacy & Security 2022-11-01

Privacy & Security crossword puzzle
Across
  1. a malware designed to deny a user or organization access to files on their computer
  2. the art of protecting networks, devices, and data from unauthorized access
  3. process of identifying a user’s identity
  4. the right to be let alone
Down
  1. common examples are viruses & trojans
  2. coding protecting information from hackers
  3. (2 words) information about an individual
  4. compromise of security
  5. a set of policies and procedures for systematically managing an organization's sensitive data
  6. international organization for standardization

10 Clues: compromise of securitythe right to be let alonecommon examples are viruses & trojansprocess of identifying a user’s identity(2 words) information about an individualcoding protecting information from hackersinternational organization for standardizationthe art of protecting networks, devices, and data from unauthorized access...

work 2024-03-22

work crossword puzzle
Across
  1. Novel ideas and creativity.
  2. Administration and control of technological resources.
  3. Organization and oversight of tasks to achieve objectives.
  4. Advanced academic qualification.
  5. Examination and interpretation of information.
  6. Protection of digital systems and data.
  7. Long-term planning for achieving goals.
Down
  1. Investigation into government or organizational policies.
  2. Acronym for a specific department or field.
  3. Digital Academy Educational institution focusing on technology.
  4. Rules and guidelines governing behavior or activities.
  5. Possibly an acronym for a certain system or process.
  6. Techniques and processes for conducting studies.
  7. Sustainable use of ocean resources for economic growth.
  8. Government framework for science, technology, and innovation.
  9. Conference or meeting on a national scale.
  10. Legal rights over creations of the mind.
  11. Mandates Responsibilities of a certain organization.
  12. 2024 Event showcasing science, technology, and innovation in a specific year.

19 Clues: Novel ideas and creativity.Advanced academic qualification.Protection of digital systems and data.Long-term planning for achieving goals.Legal rights over creations of the mind.Conference or meeting on a national scale.Acronym for a specific department or field.Examination and interpretation of information....

Challenges Related to Community Safety in the Philippines 2024-02-29

Challenges Related to Community Safety in the Philippines crossword puzzle
Across
  1. Safety, The Philippines has one of the highest rates of road accidents and fatalities in Southeast Asia. This due to factors such as poor road infrastructure, reckless driving, and inadequate enforcement of traffic laws.
  2. Disasters, The Philippines is prone to __________ such as typhoons, earthquakes, and volcanic eruptions and it can result to significant loss of life, property damage, and also hinder economic development.
  3. and Violence, This is a major challenge in the Philippines includes robbery, as well as more serious crimes such as drug trafficking, terrorism, and political violence.
  4. is responsible for fire prevention, suppression, and investigation.
  5. is the primary law enforcement agency in the country.
  6. Awareness, This includes educating the public on disaster preparedness, crime prevention, road safety and cybersecurity as well as encouraging community participation in maintaining peace and order.
Down
  1. the state of being safe; freedom from the occurrence or risk of injury, danger, or loss. e or
  2. is responsible for disaster preparedness, response, and recovery.
  3. With the increasing use of digital technologies in the Philippines has experienced a rise in cybercrime, including online scams, identity theft, and hacking.
  4. implements crime prevention programs and campaigns, such as the Barangay Peacekeeping Action Team (BPAT).

10 Clues: is the primary law enforcement agency in the country.is responsible for disaster preparedness, response, and recovery.is responsible for fire prevention, suppression, and investigation.the state of being safe; freedom from the occurrence or risk of injury, danger, or loss. e or...

Classwork Crossword Puzzle 2021-09-20

Classwork Crossword Puzzle crossword puzzle
Across
  1. average per year
  2. median of cybersecurity engineer
  3. the second-longest river
Down
  1. circumference of mars
  2. critically endangered species

5 Clues: average per yearcircumference of marsthe second-longest rivercritically endangered speciesmedian of cybersecurity engineer

tech 2025-12-12

tech crossword puzzle
Across
  1. (Anything an organization possesses that needs protection)
  2. (A security device that controls network traffic)
  3. (A key 'P' in the cybersecurity framework)
  4. (A computing system hosted online)
  5. (To watch network activity and traffic)
  6. (A software update to repair bugs or vulnerabilities)
  7. (A deception tool to detect an attack)
  8. (Network communication endpoints)
Down
  1. (Bad software installed on a computer)
  2. (A self-replicating malware program)
  3. (Relates to system processes and authentication)
  4. (Protecting data by converting it into secret code)
  5. (Unauthorized user with malicious intent)
  6. (A server that sits between a computer and the web to hide an IP address)
  7. (A notification that an attack or vulnerability has been detected)

15 Clues: (Network communication endpoints)(A computing system hosted online)(A self-replicating malware program)(Bad software installed on a computer)(A deception tool to detect an attack)(To watch network activity and traffic)(Unauthorized user with malicious intent)(A key 'P' in the cybersecurity framework)(Relates to system processes and authentication)...