cybersecurity Crossword Puzzles

Getting to Know Darnnell 2024-08-31

Getting to Know Darnnell crossword puzzle
Across
  1. French city Darnnell visited for official duty
  2. Proud native of DC
  3. Short for Darnnell's DC high school, McKinley
  4. Darnnell's bachelor’s degree from Strayer University
  5. Where Darnnell worked in cybersecurity
  6. Cruise destination Darnnell visited on Royal Caribbean
  7. Darnnell wrote books, including *Victorious!*
  8. She served during Operation Desert Storm
  9. Darnnell's graduation honor with a 4.0 GPA
  10. City Darnnell toured for Underground Railroad history
Down
  1. Key role Darnnell played in guiding teams and projects
  2. Military operation where she served
  3. Hawaiian island Darnnell visited in 2023
  4. Focused on preventing global threats; her role at DOJ
  5. Historical figure’s birthplace Darnnell visited
  6. The cornerstone of Darnnell's strength
  7. Central to Darnnell's heart and soul
  8. Language Darnnell’s learning on Duo lingo
  9. International police organization she worked with
  10. Operating system Darnnell once specialized in

20 Clues: Proud native of DCMilitary operation where she servedCentral to Darnnell's heart and soulThe cornerstone of Darnnell's strengthWhere Darnnell worked in cybersecurityHawaiian island Darnnell visited in 2023She served during Operation Desert StormLanguage Darnnell’s learning on Duo lingoDarnnell's graduation honor with a 4.0 GPA...

Wedding 2024-06-08

Wedding crossword puzzle
Across
  1. Brand of Michael’s car
  2. Michael’s job industry
  3. The number of years the couple is together
  4. Michael’s middle name
  5. Where did Michael and Stacey meet
  6. What the groom has for breakfast everyday
  7. How long has Stacey been in Australia for
  8. Stacey’s favourite food (hint: ask father of bride)
  9. City where Michael was born
  10. Honeymoon destination
  11. Mr & Mrs _____
  12. The age gap between the bride and the groom
  13. Number of their siblings all together
Down
  1. Flavour of the wedding cake
  2. Where did Michael propose
  3. Michael’s birthday month
  4. Who’s the better cook
  5. Their favourite season
  6. Michael and Stacey’s dating anniversary month (hint: Maid of Honour’s birth month)
  7. How many years did Michael live overseas for (hint: bribe Father of Groom)
  8. Favourite AFL team (hint: ask Best Man)
  9. Michael’s favourite drink
  10. Stacey’s best friend
  11. Stacey’s birthday month

24 Clues: Mr & Mrs _____Stacey’s best friendWho’s the better cookMichael’s middle nameHoneymoon destinationTheir favourite seasonBrand of Michael’s carMichael’s job industryStacey’s birthday monthMichael’s birthday monthWhere did Michael proposeMichael’s favourite drinkFlavour of the wedding cakeCity where Michael was bornWhere did Michael and Stacey meet...

Technology Words 2024-10-09

Technology Words crossword puzzle
Across
  1. Computer Camera
  2. Used to type
  3. You call people on it
  4. Set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
  5. Communicate with others vocally
  6. Coded software
  7. Analyze and solve problems
  8. Prevents viruses
  9. Provides entertainment
  10. Something that you can transfer digital info to
  11. Stores information
  12. Another word for apps
Down
  1. Gain unauthorized access
  2. Random Access Memory
  3. Decode a code
  4. Also an animal
  5. Requires a router
  6. Protects from cyber attacks
  7. The use of computer technology
  8. Remote connection
  9. Communication technology tool
  10. Central Processing Unit
  11. Look through the web
  12. Creates apps/websites
  13. Find locations
  14. Amount of data your internet connection can handle
  15. Accessed from a browser
  16. Protects your computer from virus
  17. Convert data into a code
  18. Social feed

30 Clues: Social feedUsed to typeDecode a codeAlso an animalCoded softwareFind locationsComputer CameraPrevents virusesRequires a routerRemote connectionStores informationRandom Access MemoryLook through the webYou call people on itCreates apps/websitesAnother word for appsProvides entertainmentCentral Processing UnitAccessed from a browser...

Sip & Solve 2025-06-06

Sip & Solve crossword puzzle
Across
  1. Aydens zodiac sign
  2. Groom’s middle name
  3. How many months apart in age is the couple
  4. Camille’s College Acronym
  5. Best Man
  6. Aydens position in football
  7. What was Camille’s childhood nickname
  8. Who said I love you first
  9. Color of Ayden’s eyes
  10. Aydens current general profession
  11. Grooms favorite fast food restaurant
  12. Maid of Honor
  13. Name of Camille’s oldest friend
  14. Camille’s favorite color
  15. Couples first date
Down
  1. What month Ayden proposed
  2. Town Ayden & Camille grew up in
  3. Bride’s new last name
  4. First concert the couple attended together
  5. Bride’s maiden name
  6. Aydens birthday month
  7. Ayden & Camille’s high school mascot
  8. Camille’s favorite TV show
  9. Camille’s college degree
  10. Couples favorite soda
  11. Ayden’s College Acronym
  12. Where the couple got engaged
  13. Camille’s birthday month
  14. How many years have the couple been together

29 Clues: Best ManMaid of HonorAydens zodiac signCouples first dateGroom’s middle nameBride’s maiden nameBride’s new last nameAydens birthday monthCouples favorite sodaColor of Ayden’s eyesAyden’s College AcronymCamille’s college degreeCamille’s birthday monthCamille’s favorite colorWhat month Ayden proposedCamille’s College AcronymWho said I love you first...

Grace & Branden 2025-09-04

Grace & Branden crossword puzzle
Across
  1. The best man’s name
  2. Branden’s middle name
  3. Branden and Grace each have blank siblings
  4. Grace’s brother recently enlisted in the blank
  5. Season they met
  6. Who the better cook is
  7. Grace’s birth month
  8. Mother of the Bride’s name
  9. Grace’s eye color
  10. Branden’s favorite hobby
  11. Grace’s unknown talent
  12. Branden’s birth month
  13. Month they got engaged
  14. Grace’s new last name
  15. Their favorite sweet treat
Down
  1. Where they met
  2. Mother of the Groom’s name
  3. Grace brews some awesome
  4. Branden’s college major
  5. Branden’s eye color
  6. The maid of honor’s name
  7. Honeymoon destination
  8. What similar job did they hold while in high school
  9. The first meal they made together
  10. The officiant’s name
  11. Years they have known each other
  12. The state Branden was born in

27 Clues: Where they metSeason they metGrace’s eye colorThe best man’s nameBranden’s eye colorGrace’s birth monthThe officiant’s nameBranden’s middle nameHoneymoon destinationBranden’s birth monthGrace’s new last nameWho the better cook isGrace’s unknown talentMonth they got engagedBranden’s college majorGrace brews some awesomeThe maid of honor’s name...

Intro Cybersecurity Puzzle 2 2021-09-15

Intro Cybersecurity Puzzle 2 crossword puzzle
Across
  1. Acronym for a _____ model typically used for troubleshooting communication with TCP protocol
  2. Another form of single sign on, initially supported by Twitter and Google
  3. Biometrics is an example of something you _____
  4. single sign-on authentication, think three headed dog
  5. A key fob is an example of something you _____
  6. A Command Prompt command used to test the ability of the source computer to reach a specified destination computer
  7. Robot Network
  8. Acronym for Industrial Control Systems Supervisory Software
  9. Acronym for the expectations between the service provider and the customer and describes the products or services to be delivered
Down
  1. The infected computer in a network of computers with infected malware
  2. Your location to sign in is an example of somewhere you _____
  3. the process of converting a given key into another value. If they are the same this is known as collision.
  4. An emerging technology used in cryptocurrency
  5. Acronym for "Smart Devices" over the internet
  6. Your password is an example of something you _____
  7. Acronym for Anything as a service
  8. The acronym for the masterbot centralization

17 Clues: Robot NetworkAcronym for Anything as a serviceThe acronym for the masterbot centralizationAn emerging technology used in cryptocurrencyAcronym for "Smart Devices" over the internetA key fob is an example of something you _____Biometrics is an example of something you _____Your password is an example of something you _____...

Cybersecurity Fundamentals Chapter 5 2022-10-27

Cybersecurity Fundamentals Chapter 5 crossword puzzle
Across
  1. an efficient way to store, retrieve, and analyze data.
  2. table relationship must remain consistent.
  3. a set of rules defined by the user which does not belong to one of the other categories.
  4. use to make hashing more secure.
  5. strengthens hashing algorithm by using additional secret key as input to the hash function.
  6. a tool that ensures data integrity by taking binary data and producing a fixed-length. representation call the hash value.
  7. checks that data falls within the parameters defined by the database designer.
  8. all data stored in a column must follow the same format.
  9. hashing algorithm developed by ron rivest that produces a 128-bit hash value.
Down
  1. refers to the accuracy, consistency, and reliability of data stored in a
  2. developed by the us national institute of standards and technology (nist) and can be implemented in different strengths.
  3. the policies, roles, and procedures required to create, manage, distribute, use, store, and revoke digital certificate.
  4. provide the same functionality as handwritten signature for electronics documents.
  5. all rows must have a unique identifier called primary key.
  6. equivalent to an electronic passport.
  7. standard for the construction of digital certificate and public key infrastructure (pki) used to manage digital certificate.

16 Clues: use to make hashing more secure.equivalent to an electronic passport.table relationship must remain consistent.an efficient way to store, retrieve, and analyze data.all data stored in a column must follow the same format.all rows must have a unique identifier called primary key....

Digimath 9 2025-03-05

Digimath 9 crossword puzzle
Across
  1. – The smallest unit of data in a computer
  2. – A wireless technology standard used to exchange data between devices over short distances
  3. – The practice of protecting computers and networks from digital attacks
  4. – A harmful program that can damage a computer
  5. – Used to type and input data
  6. – A screen that displays information
  7. – Physical parts of a computer
Down
  1. – A global network connecting millions of computers
  2. – A wireless connection to the internet
  3. – The "brain" of the computer
  4. – Storing data on the internet instead of a local device
  5. – Programs that run on a computer
  6. – A pointing device used to control the cursor

13 Clues: – The "brain" of the computer– Used to type and input data– Physical parts of a computer– Programs that run on a computer– A screen that displays information– A wireless connection to the internet– The smallest unit of data in a computer– A harmful program that can damage a computer– A pointing device used to control the cursor...

Computer Science 2023-05-05

Computer Science crossword puzzle
Across
  1. another word for virus
  2. A software that can do problem solving and learn on it's own
  3. Bill Gate's corporation
  4. Way to stop seeing ads
  5. Software to access the internet
  6. Owner of Tesla
  7. Lots of computers joined together through signals sending data
  8. The code that the nazis communicated through
  9. A software that infects your computer secretly
  10. A collection of code
  11. Code made out of 0s and 1s
Down
  1. The person who created the Universal Turing Machine
  2. A visual display which shows the code on a computer
  3. Small device that is pushed across a small area to do different actions
  4. A software addon
  5. Stops viruses from infecting your pc
  6. What you're using
  7. What you use to type
  8. What a computer uses to operate
  9. Another software that is very HOT
  10. Owner of apple

21 Clues: Owner of TeslaOwner of appleA software addonWhat you're usingWhat you use to typeA collection of codeanother word for virusWay to stop seeing adsBill Gate's corporationCode made out of 0s and 1sSoftware to access the internetWhat a computer uses to operateAnother software that is very HOTStops viruses from infecting your pc...

TTS informatika 2025-04-10

TTS informatika crossword puzzle
Across
  1. .Hak atas kekayaan intelektual
  2. .Sistem komputer untuk menelusuri informasi di internet
  3. .Profesiyang merancang tampilan dan interaksi aplikasi
  4. .Profesi yang menulis kode program
  5. .Mesin pencari paling populer saat ini
  6. .Profesi yang mengelola data dan sistem basis data
  7. .Singkatan dari Creative Commons (izin berbagi konten)
  8. .Hak yang diberikan kepada pencipta karya seni atau tulisan
  9. .Akhiran domain untuk situs komersial
  10. .Proses mengamankan data dari akses tidak sah
Down
  1. .Tempat untuk menyimpan dan berbagi video
  2. .Jenis hak kekayaan intelektual untuk merek dagang
  3. .Proses penyebaran informasi secara luas
  4. .Media sosial berbasis gambar milik Meta
  5. .Kegiatan mengambil data dari internet secara otomatis
  6. .Jenis konten digital berbentuk suara
  7. .Produk digital berbentuk tulisan panjang seperti e-book
  8. .Format file gambar umum (3 huruf)
  9. .Konten digital berbasis gambar bergerak
  10. .Profesi yang fokus pada keamanan jaringan komputer

20 Clues: .Hak atas kekayaan intelektual.Profesi yang menulis kode program.Format file gambar umum (3 huruf).Jenis konten digital berbentuk suara.Akhiran domain untuk situs komersial.Mesin pencari paling populer saat ini.Proses penyebaran informasi secara luas.Media sosial berbasis gambar milik Meta.Konten digital berbasis gambar bergerak...

Tugas Daring INF Jum'at 04/11/25 Jasmine Khairunnisa(14) X-I 2025-04-11

Tugas Daring INF Jum'at 04/11/25 Jasmine Khairunnisa(14) X-I crossword puzzle
Across
  1. Melindungi karya seni atau tulisan.
  2. Menampilkan halaman dengan URL serupa.
  3. Proses mengatur konten.
  4. Perlindungan atas penemuan teknologi.
  5. Mengecek kebenaran informasi.
  6. Engineer Ahli jaringan komputer.
  7. Penyebaran konten ke audiens luas.
  8. Analyst Menganalisis data besar.
  9. Digunakan untuk menghilangkan kata tertentu dalam pencarian.
  10. Syntax untuk pencarian kata spesifik.
Down
  1. Verifikasi keaslian konten.
  2. Menjaga keamanan data digital.
  3. Proses memanfaatkan teknologi untuk budaya.
  4. Identifikasi konten berbahaya.
  5. Budaya Konten berbasis nilai tradisional.
  6. Industri Hak untuk desain produk tertentu.
  7. Merancang perangkat lunak.
  8. Hak atas logo atau merek dagang.
  9. Lokal Media untuk menyebarluaskan budaya lokal.
  10. Konten palsu yang menyesatkan.
  11. Lokal Nilai tradisional dalam konten digital.
  12. Operator untuk pencarian di situs tertentu.
  13. Designer Merancang antarmuka pengguna.
  14. Mencari file dengan format spesifik.
  15. Hak atas ide atau karya pemikiran.

25 Clues: Proses mengatur konten.Merancang perangkat lunak.Verifikasi keaslian konten.Mengecek kebenaran informasi.Menjaga keamanan data digital.Identifikasi konten berbahaya.Konten palsu yang menyesatkan.Hak atas logo atau merek dagang.Engineer Ahli jaringan komputer.Penyebaran konten ke audiens luas.Analyst Menganalisis data besar....

IT 2025-12-02

IT crossword puzzle
Across
  1. Tool used to secure data by converting it to code
  2. Extracting useful patterns from large datasets
  3. Software that manages computer hardware
  4. The visual part of software users interact with
  5. Rules for data communication over networks
  6. Checking a system for malicious software
  7. Online space to save and access files
  8. A software-based emulation of a computer
  9. Machines simulating human intelligence
Down
  1. Keeping servers running smoothly and securely
  2. Organizing and handling structured data
  3. Find and fix errors in software
  4. A set of rules for writing computer code
  5. Algorithms that learn from data automatically
  6. Protecting computers and networks from attacks
  7. New version of a program to improve it
  8. Measures to protect systems from digital threats
  9. Blocks unauthorized access to a network
  10. Copy of data saved for recovery purposes
  11. Write instructions for a computer program

20 Clues: Find and fix errors in softwareOnline space to save and access filesNew version of a program to improve itMachines simulating human intelligenceOrganizing and handling structured dataSoftware that manages computer hardwareBlocks unauthorized access to a networkA set of rules for writing computer codeChecking a system for malicious software...

Cybersecurity Awareness Month 2025 2025-10-07

Cybersecurity Awareness Month 2025 crossword puzzle
Across
  1. Malware that attaches to files and spreads when executed
  2. Network of infected devices, often remotely controlled
  3. Method of converting data into a fixed-size string
  4. Piece of code that takes advantage of a vulnerability
  5. Hidden method of bypassing normal authentication
  6. Software that secretly gathers data without consent
  7. Potential cause of an unwanted incident
  8. Self-replicating malware that spreads without user interaction
  9. Fraudulent attempt to obtain sensitive information via email or messaging
Down
  1. Incident where data is accessed without authorization
  2. Type of malware disguised as a legitimate file
  3. Process of verifying a user's identity
  4. Impersonating another user or device to gain access
  5. General term for malicious software
  6. Part of malware that performs the malicious action
  7. Stealthy type of malware designed to hide its presence

16 Clues: General term for malicious softwareProcess of verifying a user's identityPotential cause of an unwanted incidentType of malware disguised as a legitimate fileHidden method of bypassing normal authenticationMethod of converting data into a fixed-size stringPart of malware that performs the malicious action...

Online Child Safety 2013-05-14

Online Child Safety crossword puzzle
Across
  1. a person who access internet files either legally or illegally
  2. software that allows parents to control what their children do online
  3. an unsolicited email or junk mail
  4. Malicious hardware and code
  5. any software or technique used to prevent online crime
Down
  1. an interactive forum where you can talk in real time
  2. unsolicited adds on your computer
  3. a hostile strongly worded message that may contain obscene language
  4. scam that involves a fraudulent e-mail
  5. An adult internet user who exploits children or teens
  6. online site where people can post information about themselves
  7. rules/manners of inline usage
  8. a sexual message sent to someone
  9. virtual sexual encounters
  10. The Communications Decency Act

15 Clues: virtual sexual encountersMalicious hardware and coderules/manners of inline usageThe Communications Decency Acta sexual message sent to someoneunsolicited adds on your computeran unsolicited email or junk mailscam that involves a fraudulent e-mailan interactive forum where you can talk in real time...

Technology 2023-09-15

Technology crossword puzzle
Across
  1. - Prefix for environments simulated by computers.
  2. - A global network connecting computers and devices.
  3. - Unmanned aerial vehicles used for various purposes.
  4. - A mobile device with advanced features.
  5. - Prefix for intelligence created by machines.
  6. - Wireless technology for short-range data exchange.
  7. - The study of designing and building robots.
  8. - Programs and applications used on computers.
Down
  1. - Authentication based on unique physical characteristics.
  2. - Measures to protect computer systems and data.
  3. - A small, specialized electronic device.
  4. - The process of converting data into a code to secure it.
  5. - Storage and computing resources accessed over the internet.
  6. - A set of rules for solving a problem or performing a task.
  7. - Using technology to perform tasks without human intervention.

15 Clues: - A small, specialized electronic device.- A mobile device with advanced features.- The study of designing and building robots.- Prefix for intelligence created by machines.- Programs and applications used on computers.- Measures to protect computer systems and data.- Prefix for environments simulated by computers....

Computer Science 2025-08-12

Computer Science crossword puzzle
Across
  1. – Finding and fixing errors in code.
  2. – Online storage and services accessed via the internet.
  3. – Two or more computers connected to share data.
  4. – Protecting computers and networks from attacks.
  5. – The physical parts of a computer.
  6. – Data or commands entered into a computer.
Down
  1. – A device used to type into a computer.
  2. – A global network that connects computers.
  3. – Scrambling data to keep it secure.
  4. – Information a computer gives back after processing.
  5. – Step-by-step instructions to solve a problem.
  6. – A way computers store data using 0s and 1s.
  7. – Instructions written for a computer to follow.
  8. – Programs that run on a computer.
  9. – Facts or information stored on a computer.

15 Clues: – Programs that run on a computer.– The physical parts of a computer.– Scrambling data to keep it secure.– Finding and fixing errors in code.– A device used to type into a computer.– A global network that connects computers.– Data or commands entered into a computer.– Facts or information stored on a computer....

Information Security 2025-01-06

Information Security crossword puzzle
Across
  1. Malicious Software
  2. Malware that attaches to programs
  3. Designed to lessen the risk of cyber attack
  4. Protect with up to date software, encrypted information, limited employee access
Down
  1. Protect with strong passwords and password storage
  2. Protection of ownership and reputation
  3. Acceptable Use Policy

7 Clues: Malicious SoftwareAcceptable Use PolicyMalware that attaches to programsProtection of ownership and reputationDesigned to lessen the risk of cyber attackProtect with strong passwords and password storageProtect with up to date software, encrypted information, limited employee access

ISC 3 2025-03-24

ISC 3 crossword puzzle
Across
  1. Mandates EU data protection
  2. Governs California consumer rights
  3. Agency sets cybersecurity benchmarks
Down
  1. Health privacy
  2. Card security

5 Clues: Card securityHealth privacyMandates EU data protectionGoverns California consumer rightsAgency sets cybersecurity benchmarks

Cybersecurity Unit 10 Crossword 2025-03-20

Cybersecurity Unit 10 Crossword crossword puzzle
Across
  1. also known as a "white list"
  2. any software that relies upon by other applications and software
  3. predefined responses for security incidents
  4. this type of restart is needed for applying updates
  5. when a system is unavailable
  6. involves assessing all existing security controls, policies and procedures
  7. step-by-step instructions for security measures
  8. ideal security position based on industry standards
  9. define requirements for security controls and configurations
Down
  1. prioritization of improving security and moving to the desired state
  2. also known as "block lists"
  3. limiting certain actions or behaviors
  4. comparing the current and desired states
  5. Comparing the current state of an organization's security position to a desired state
  6. never trust, always verify
  7. these types of apps are outdated and older

16 Clues: never trust, always verifyalso known as "block lists"also known as a "white list"when a system is unavailablelimiting certain actions or behaviorscomparing the current and desired statesthese types of apps are outdated and olderpredefined responses for security incidentsstep-by-step instructions for security measures...

Cybersecurity Fundamental Chapter 2 2022-11-24

Cybersecurity Fundamental Chapter 2 crossword puzzle
Across
  1. a type of storage device retains the data when no user or process is using it.
  2. cyber criminals can capture, save and steal data in-transit.
  3. uses removable media to physically move data from one computer to another.
  4. procedures, and guidelines that enable the citizen of the cyber world to stay safe and follow good practices.
  5. devices, and product available to protect information systems and fend off cyber criminals.
  6. verifies the identify of a user to prevent unauthorized access.
  7. uses cable to transmit data.
Down
  1. verifies determine which resources users can access, along with the operations that users can perform.
  2. is the principle used to describe the need to maintain availability of information systems and services at all times.
  3. involves sending information from one device to another.
  4. cyber criminals can use rogue or unauthorized devices to interrupt data availability.
  5. cyber criminals can intercept and alter data in-transit.
  6. aware and knowledgeable about their world and the dangers that threaten their world.
  7. keeps tracks of what users do, including what they access, the amount of time they access resources, and any changes made.
  8. prevents the disclosure of information to unauthorize people, resource and processes.
  9. uses the airways to transmit data.

16 Clues: uses cable to transmit data.uses the airways to transmit data.involves sending information from one device to another.cyber criminals can intercept and alter data in-transit.cyber criminals can capture, save and steal data in-transit.verifies the identify of a user to prevent unauthorized access....

SCIENCE AND TECHNOLOGY 2024-03-29

SCIENCE AND TECHNOLOGY crossword puzzle
Across
  1. Protection of computer systems from theft or damage.
  2. The study of living organisms.
  3. Intelligence Teaching computers to think and learn.
  4. introducing new ideas or methods.
  5. A series of steps to accomplish a task.
Down
  1. Energy Energy derived from naturally replenished resources like sunlight, wind, or water.
  2. Connecting computers or devices to communicate.
  3. Study of heredity and variation in living organisms.
  4. Distinctive features or traits.
  5. A community of living organisms and their environment.
  6. Using machines to perform tasks.
  7. Genetic material containing instructions for living organisms' development and traits.

12 Clues: The study of living organisms.Distinctive features or traits.Using machines to perform tasks.introducing new ideas or methods.A series of steps to accomplish a task.Connecting computers or devices to communicate.Study of heredity and variation in living organisms.Protection of computer systems from theft or damage....

User responsibility 2025-10-14

User responsibility crossword puzzle
Across
  1. practicing ethical respectful and safe behavior online
  2. the trace of all your online activities
  3. respecting differences and opinions in digital spaces
Down
  1. protecting systems and data from digital attacks
  2. accepting consequences for online actions
  3. checking accuracy before believing or sharing
  4. settings tools that control who can see your information
  5. false information shared without verifying facts

8 Clues: the trace of all your online activitiesaccepting consequences for online actionschecking accuracy before believing or sharingprotecting systems and data from digital attacksfalse information shared without verifying factsrespecting differences and opinions in digital spacespracticing ethical respectful and safe behavior online...

cyber threat actors, attacks & motivations 2023-12-18

cyber threat actors, attacks & motivations crossword puzzle
Across
  1. Where to report a a cybersecurity incident at RDA
  2. It's something RDA is known for, but in the social form
  3. Homophone of a much loved pass time
  4. Supported by a government
  5. Australian Government agency that houses the ACSC
  6. Cybercrime that involves encryption and blackmail
  7. The name of the cipher you may or may not have succeeded in solving
  8. Furtum identitatis
Down
  1. A brute force technique used by cybercriminals
  2. An important aspect of security as a capability that isn't cyber
  3. Morris distributed this via the internet in 1988
  4. Something you must protect in the digital age
  5. A characteristic of cybercriminal groups
  6. Cybercriminal motivated by ideology
  7. A leading motivator for cybercriminals
  8. Malicious software used to establish remote access
  9. It's everyone's responsibility

17 Clues: Furtum identitatisSupported by a governmentIt's everyone's responsibilityHomophone of a much loved pass timeCybercriminal motivated by ideologyA leading motivator for cybercriminalsA characteristic of cybercriminal groupsSomething you must protect in the digital ageA brute force technique used by cybercriminals...

Source Vs Machine Code 2025-11-12

Source Vs Machine Code crossword puzzle
Across
  1. – Low-level software stored in ROM
  2. – Easy for humans to understand (like source code)
  3. – A single command in a program
  4. – Person who writes source code
  5. – Example of a high-level programming language
  6. – Uses programming to analyze and interpret data
  7. – Job that designs or builds software applications
  8. – Field that protects systems from digital attacks
Down
  1. – Coder who designs and codes video games
  2. – Field that creates and maintains websites
  3. – System using only 0 and 1
  4. – Part of the computer that executes machine code
  5. – Another term for bits (0s and 1s)
  6. – Hard or impossible to modify (like machine code)
  7. – Read-Only Memory that stores permanent instructions
  8. – Programs and applications created using source code
  9. – The physical components of a computer

17 Clues: – System using only 0 and 1– A single command in a program– Person who writes source code– Low-level software stored in ROM– Another term for bits (0s and 1s)– The physical components of a computer– Coder who designs and codes video games– Field that creates and maintains websites– Example of a high-level programming language...

Cyber Security 2023-11-07

Cyber Security crossword puzzle
Across
  1. Logs and Event Management provided in JICA Project
  2. Set of rules, policies and operations that a company uses to achieve its business goals
  3. Compliance is act of following rules, laws and regulations
  4. Network Monitoring system short form
  5. Term that Deals with Organization secret data
  6. Operates continuously and Data visible 24*7
  7. Next Generation Firewall brand provided in JICA Project
Down
  1. Term used to define Weakness
  2. Keeping Information and Communication Private
  3. Terms used for Logging all the user activity
  4. Keeping Organizational information accurate and free of errors
  5. Authorizing a Person to perform certain activity
  6. cybersecurity standards for OT technology
  7. Role Based Access Control

14 Clues: Role Based Access ControlTerm used to define WeaknessNetwork Monitoring system short formcybersecurity standards for OT technologyOperates continuously and Data visible 24*7Terms used for Logging all the user activityKeeping Information and Communication PrivateTerm that Deals with Organization secret data...

E-Commerce Crossword 2024-04-19

E-Commerce Crossword crossword puzzle
Across
  1. digital shopping cart used to hold items before purchase
  2. online advertisements targeted to specific users
  3. short for "electronic commerce"
  4. process of securely storing and transmitting customer data
  5. mobile app used to browse and purchase products online
  6. process of fulfilling an online order by delivering it
  7. process of returning a purchased item online
Down
  1. detailed description of a product listed online
  2. positive online review left by a satisfied customer
  3. online marketplace where sellers and buyers connect
  4. discounts offered online to attract customers
  5. secure online payment method using a credit card
  6. person who influences buying decisions through online reviews
  7. images used online to showcase products

14 Clues: short for "electronic commerce"images used online to showcase productsprocess of returning a purchased item onlinediscounts offered online to attract customersdetailed description of a product listed onlineonline advertisements targeted to specific userssecure online payment method using a credit card...

Internet Safety Crossword 2023-04-20

Internet Safety Crossword crossword puzzle
Across
  1. a part of a computer system or network which is made to block unwanted access
  2. the state of being free from public attention
  3. a piece of information needed to log in to websites
  4. information made available by a website
  5. never share personal information online
  6. unwanted messages
  7. bulling done over the internet
  8. facts given about something or someone
Down
  1. someone that hacks
  2. websites and apps that enable users to create and share content EX.SnapChat
  3. a world wide computer network
  4. the state of being protected against the criminal use of electronic data
  5. like a cold for your computer
  6. be careful what you make public

14 Clues: unwanted messagessomeone that hacksa world wide computer networklike a cold for your computerbulling done over the internetbe careful what you make publicfacts given about something or someoneinformation made available by a websitenever share personal information onlinethe state of being free from public attention...

Career Clusters Crossword 2024-12-20

Career Clusters Crossword crossword puzzle
Across
  1. Promotes whole health in individuals through an array of services
  2. Focuses on administration, strategic planning, and entrepreneurship
  3. Designing and executing the built environment
  4. Encompasses roles in local, state, and federal governments
  5. Movement of goods over air, ground, and water
Down
  1. Fostering learning from early-childhood to adulthood
  2. Supports plant and animal based industries
  3. Promoting products and brands
  4. Developing digital systems such as AI, data analytics, and cybersecurity
  5. Renewable fuel production, power generation, utilities
  6. Includes services related to food, travel, and lodging
  7. Aims to produce high quality goods
  8. Banking, lending, corporate, debt management
  9. Includes film, fashion, journalism, interior design, and more

14 Clues: Promoting products and brandsAims to produce high quality goodsSupports plant and animal based industriesBanking, lending, corporate, debt managementDesigning and executing the built environmentMovement of goods over air, ground, and waterFostering learning from early-childhood to adulthoodRenewable fuel production, power generation, utilities...

Information Management 2025-09-23

Information Management crossword puzzle
Across
  1. Identifying risks and taking precautions to avoid them.
  2. Anything valuable that isn’t natural.
  3. A system that supports functions of Information Management.
  4. Anything created with someone’s mind.
Down
  1. The protection of networks, and data.
  2. A business that involves people, processes that collects data.
  3. An unbiased inspection to review safety, integrity, and accuracy of information.
  4. The accuracy of data.
  5. A practice not knowing outside the company.

9 Clues: The accuracy of data.The protection of networks, and data.Anything valuable that isn’t natural.Anything created with someone’s mind.A practice not knowing outside the company.Identifying risks and taking precautions to avoid them.A system that supports functions of Information Management....

UNODC TOT Crossword 2025-11-11

UNODC TOT Crossword crossword puzzle
Across
  1. The hackers we aim to defend against
  2. The regional center name abbreviation under UNODC
  3. The brilliant course instructor guiding us
  4. The mandatory course we completed before the TOT
Down
  1. The country hosting our training and collaboration
  2. The field our expertise revolves around
  3. The second participating institution in the training
  4. The center in Doha where the TOT course is conducted
  5. The first participating institution in the training

9 Clues: The hackers we aim to defend againstThe field our expertise revolves aroundThe brilliant course instructor guiding usThe mandatory course we completed before the TOTThe regional center name abbreviation under UNODCThe country hosting our training and collaborationThe first participating institution in the training...

TECHNOLOGY 2025-01-29

TECHNOLOGY crossword puzzle
Across
  1. easy to use or understand
  2. the use of machines to perform tasks without human intervention
  3. knowledgeable about modern technology
  4. the trail of data left by users on the internet
  5. a small electronic device with a specific function
Down
  1. measures taken to protect systems from cyber threats
  2. an important discovery or development
  3. introducing new ideas or methods
  4. extremely modern and advanced
  5. Intelligence (AI) the simulation of human intelligence in machines

10 Clues: easy to use or understandextremely modern and advancedintroducing new ideas or methodsan important discovery or developmentknowledgeable about modern technologythe trail of data left by users on the interneta small electronic device with a specific functionmeasures taken to protect systems from cyber threats...

17 Miftahul Huda 8i 2025-10-16

17 Miftahul Huda 8i crossword puzzle
Across
  1. Program untuk mengatur dan mempercepat unduhan file.
  2. Proses mengubah data agar tidak bisa dibaca orang lain.
  3. Memuat ulang halaman web agar tampil terbaru.
  4. Program berbahaya yang bisa merusak sistem komputer.
  5. Salinan data untuk mencegah kehilangan.
  6. Upaya penipuan untuk mencuri data pribadi lewat internet.
Down
  1. Penanda halaman web agar mudah dikunjungi lagi.
  2. Perlindungan sistem komputer dari serangan digital.
  3. Proses menampilkan gambar atau halaman web di layar.
  4. Jalan pintas untuk membuka program atau file cepat.

10 Clues: Salinan data untuk mencegah kehilangan.Memuat ulang halaman web agar tampil terbaru.Penanda halaman web agar mudah dikunjungi lagi.Perlindungan sistem komputer dari serangan digital.Jalan pintas untuk membuka program atau file cepat.Program untuk mengatur dan mempercepat unduhan file.Proses menampilkan gambar atau halaman web di layar....

Career Focus 2 2025-11-05

Career Focus 2 crossword puzzle
Across
  1. Core skill that helps you calculate trade measurements
  2. A common Registered Training Organisation in Australia
  3. Major regional NSW university, abbr.
  4. OUTLOOK An industry's future demand for workers
  5. A person undertaking structured, paid training, often in non-trade areas
  6. The national system of qualifications (Australian Qualifications Framework)
  7. ETHIC The personal quality behind motivation and drive
Down
  1. The general direction of your working life
  2. Sector that includes software, data and cybersecurity roles
  3. A typical trade apprenticeship.

10 Clues: A typical trade apprenticeship.Major regional NSW university, abbr.The general direction of your working lifeOUTLOOK An industry's future demand for workersCore skill that helps you calculate trade measurementsA common Registered Training Organisation in AustraliaETHIC The personal quality behind motivation and drive...

TIAA - SMT Crossword 2024-09-19

TIAA - SMT Crossword crossword puzzle
Across
  1. One of 5 Latin American countries that celebrates their independence on sept 15
  2. TIAA strategic partner
  3. First name of a T3CON presenter
Down
  1. TIAA office location that is closing
  2. Female associates and allies BRG
  3. CS&T Drive24 initiative
  4. agile, cybersecurity, data, AI and emerging tech

7 Clues: TIAA strategic partnerCS&T Drive24 initiativeFirst name of a T3CON presenterFemale associates and allies BRGTIAA office location that is closingagile, cybersecurity, data, AI and emerging techOne of 5 Latin American countries that celebrates their independence on sept 15

AUDITOR 4.0 TRENDS AND CHALLENGES 2023-06-06

AUDITOR 4.0 TRENDS AND CHALLENGES crossword puzzle
Across
  1. Use of technologies to improve accuracy.
  2. Another word for difficulties experienced.
  3. Increasing use of online and cloud based tools increases this item.
Down
  1. One of the benefits of ESG reporting.
  2. Whats new in the industry?
  3. New technology used by companies for financial reporting.
  4. Profession being explored.

7 Clues: Whats new in the industry?Profession being explored.One of the benefits of ESG reporting.Use of technologies to improve accuracy.Another word for difficulties experienced.New technology used by companies for financial reporting.Increasing use of online and cloud based tools increases this item.

Cybersecurity Awareness Month 2023-09-20

Cybersecurity Awareness Month crossword puzzle
Across
  1. Personally Identifiable Information
  2. ______ force is a password attack method where many passwords are submitted with the hopes of guessing the correct one
  3. Type of malware that threatens to expose information unless a payment is made
  4. Health Insurance Portability and Accountability Act
  5. An email that tricks you into giving up your passphrase
Down
  1. A weakness in a program or system that can be exploited
  2. Email ______ makes it seem that an email came from someone else when it came from a scammer instead, hiding their true identity
  3. CWRU classifies information as: public, internal-use, and _______
  4. Install operating system security ________ regularly
  5. The process of changing plain text to cipher text using an algorithm
  6. A ______ and Control, or C2, server is used by an adversary to communicate with compromised systems

11 Clues: Personally Identifiable InformationHealth Insurance Portability and Accountability ActInstall operating system security ________ regularlyA weakness in a program or system that can be exploitedAn email that tricks you into giving up your passphraseCWRU classifies information as: public, internal-use, and _______...

Meet UAlbany 2023-07-26

Meet UAlbany crossword puzzle
Across
  1. Nonprofit who manages the UAlbany ID Card Office
  2. The last C in CEHC stands for
  3. Online platform for mandatory compliance trainings
  4. UAlbany's free safety app for your smartphone
  5. The number of libraries on the UAlbany Uptown Campus
  6. The Great Dane
  7. Renowned American architect and designer of main campus
  8. Symbol of commitment to Latina/o student success
Down
  1. Name of the weekly which facilitates discussions on ecological literacy and funding opportunities
  2. College of Arts &
  3. Office responsible for preservation, modernization, and construction that enable the University at Albany to achieve its objectives
  4. Colonial, Dutch, State, and Indigenous
  5. TAS stands for? Hint: $$

13 Clues: The Great DaneCollege of Arts &TAS stands for? Hint: $$The last C in CEHC stands forColonial, Dutch, State, and IndigenousUAlbany's free safety app for your smartphoneNonprofit who manages the UAlbany ID Card OfficeSymbol of commitment to Latina/o student successOnline platform for mandatory compliance trainings...

CIA 2025-05-08

CIA crossword puzzle
Across
  1. You can make up to _________ a year
  2. The CIA helps students develop mission _____ while finishing their degrees
  3. You must take a _________ security clearance process.
  4. To serve you need to be a U.S. ________ and have a bachelors degree
  5. It was created to coordinate the nations _______ activities
Down
  1. Headquarters is located in Langley ______
  2. Some careers are analysis, auditing, ________, and engineering
  3. It doesn´t operate with traditional __________
  4. The CIA was founded in _______
  5. How was the CIA founded_______
  6. CIA recruits through their online portal __________
  7. CIA serves the ______________
  8. The CIA gathers and ________ intelligence about foreign countries

13 Clues: CIA serves the ______________The CIA was founded in _______How was the CIA founded_______You can make up to _________ a yearHeadquarters is located in Langley ______It doesn´t operate with traditional __________CIA recruits through their online portal __________You must take a _________ security clearance process....

CIS 178 Participation 3 Security 2023-07-17

CIS 178 Participation 3 Security crossword puzzle
Across
  1. computers or devices infected with malicious software
  2. collects and transmits sensitive information
  3. form of bullying that occurs online
  4. spreads from one computer to another
  5. virtual private network, secure online service
  6. "advertising-supported software" designed to display unwanted advertisements
  7. malicious software
  8. intrudes on a device remotely
  9. protecting digital assets
  10. development/use of computer systems/networks to store information.
  11. tricks users into clicking a disguised link
Down
  1. application designed to monitor network traffic
  2. disguises itself as a legitimate program or software
  3. uses bait to lure unsuspecting victims
  4. uses fingerprints, facial recognition, etc. to log into a device
  5. encrypts user's files or locks computer until a ransom is paid
  6. media manipulation, alter images/video for fake perception
  7. actions aimed to infiltrate computer networks.
  8. method of scrambling data for authorized users
  9. fake, disguised, bogus

20 Clues: malicious softwarefake, disguised, bogusprotecting digital assetsintrudes on a device remotelyform of bullying that occurs onlinespreads from one computer to anotheruses bait to lure unsuspecting victimstricks users into clicking a disguised linkcollects and transmits sensitive informationvirtual private network, secure online service...

Sip & Solve 2025-06-06

Sip & Solve crossword puzzle
Across
  1. Camille’s birthday month
  2. Aydens birthday month
  3. Ayden’s College Acronym
  4. Couples favorite soda
  5. How many years have the couple been together
  6. What was Camille’s childhood nickname
  7. Bride’s maiden name
  8. Where the couple got engaged
  9. Couples first date
  10. Best Man
  11. How many months apart in age is the couple
  12. Name of Camille’s oldest friend
  13. Aydens current general profession
  14. Camille’s college degree
  15. First concert the couple attended together
  16. Aydens zodiac sign
Down
  1. Camille’s favorite TV show
  2. Camille’s favorite color
  3. Aydens position in football
  4. What month Ayden proposed
  5. Groom’s middle name
  6. Maid of Honor
  7. Ayden & Camille’s high school mascot
  8. Bride’s new last name
  9. Town Ayden & Camille grew up in
  10. Who said I love you first
  11. Color of Ayden’s eyes
  12. Grooms favorite fast food restaurant
  13. Camille’s College Acronym

29 Clues: Best ManMaid of HonorCouples first dateAydens zodiac signGroom’s middle nameBride’s maiden nameAydens birthday monthCouples favorite sodaBride’s new last nameColor of Ayden’s eyesAyden’s College AcronymCamille’s birthday monthCamille’s favorite colorCamille’s college degreeWhat month Ayden proposedWho said I love you firstCamille’s College Acronym...

Sarah and Liam's wedding 2025-07-10

Sarah and Liam's wedding crossword puzzle
Across
  1. The month they first met
  2. The country they visited last summer
  3. The month the couple got engaged
  4. The first movie they watched as a couple
  5. The city they met in
  6. What did the groom study in college
  7. Where did the proposal happen
  8. Sarah's middle name
  9. The flavor of their wedding cake
  10. number of pets the couple has
  11. The stone in the engagement ring
Down
  1. The color of the bridesmaid dresses
  2. The street Sarah and Liam call home
  3. The bride's maiden name
  4. How many years the couple has been together
  5. Their first dance song
  6. First concert they saw together
  7. name of Sarah's Maid of Honor
  8. Sarah's star sign
  9. The instrument the groom played in high school
  10. The name of their dog
  11. Name of the Best Man

22 Clues: Sarah's star signSarah's middle nameThe city they met inName of the Best ManThe name of their dogTheir first dance songThe bride's maiden nameThe month they first metname of Sarah's Maid of HonorWhere did the proposal happennumber of pets the couple hasFirst concert they saw togetherThe month the couple got engagedThe flavor of their wedding cake...

WHAT LIES AHEAD 2025-11-20

WHAT LIES AHEAD crossword puzzle
Across
  1. New alloys or concrete that repairs itself.
  2. Very large, rapidly growing cities (50M+).
  3. Urban areas using technology for efficiency.
  4. Clean, very inexpensive nuclear energy.
  5. New, wealthy areas separate from declining cities.
  6. The engineering that makes all structures work together.
  7. Robotic clothing that helps workers.
  8. Machines' ability to make decisions and automate design.
  9. The issue of public money for infrastructure.
  10. Very fast train in vacuum tubes.
Down
  1. The large amounts of information from sensors.
  2. A structure's ability to resist disasters.
  3. Environmental change affecting cities
  4. Means of transport that can be automated (driverless).
  5. Small unmanned aircraft for delivery or building.
  6. Protection against hacking of connected systems.
  7. Network of sensors that exchange data in the infrastructure.
  8. Building and public works.
  9. Small devices to monitor infrastructure health.
  10. Non-fossil resources like solar or fusion

20 Clues: Building and public works.Very fast train in vacuum tubes.Robotic clothing that helps workers.Environmental change affecting citiesClean, very inexpensive nuclear energy.Non-fossil resources like solar or fusionA structure's ability to resist disasters.Very large, rapidly growing cities (50M+).New alloys or concrete that repairs itself....

PROFESI TKJ 2025-05-03

PROFESI TKJ crossword puzzle
Across
  1. Orang yang bertugas memasang dan memelihara jaringan komputer
  2. Orang yang menulis dan mengembangkan kode perangkat lunak
  3. Orang yang memperbaiki dan merakit komputer
  4. Pembuat dan pengelola situs web
  5. Pengelola dan pengawas sistem server dalam sebuah jaringan
Down
  1. Ahli yang merancang dan mengelola sistem jaringan skala besar
  2. Profesional yang menjaga keamanan jaringan dan data digital
  3. Orang yang memasang perangkat dan kabel jaringan
  4. Petugas yang memberikan bantuan teknis kepada pengguna komputer
  5. Penasihat teknis dalam bidang teknologi informasi untuk perusahaan

10 Clues: Pembuat dan pengelola situs webOrang yang memperbaiki dan merakit komputerOrang yang memasang perangkat dan kabel jaringanOrang yang menulis dan mengembangkan kode perangkat lunakPengelola dan pengawas sistem server dalam sebuah jaringanProfesional yang menjaga keamanan jaringan dan data digital...

Privacy & Security 2022-11-01

Privacy & Security crossword puzzle
Across
  1. a malware designed to deny a user or organization access to files on their computer
  2. the art of protecting networks, devices, and data from unauthorized access
  3. process of identifying a user’s identity
  4. the right to be let alone
Down
  1. common examples are viruses & trojans
  2. coding protecting information from hackers
  3. (2 words) information about an individual
  4. compromise of security
  5. a set of policies and procedures for systematically managing an organization's sensitive data
  6. international organization for standardization

10 Clues: compromise of securitythe right to be let alonecommon examples are viruses & trojansprocess of identifying a user’s identity(2 words) information about an individualcoding protecting information from hackersinternational organization for standardizationthe art of protecting networks, devices, and data from unauthorized access...

work 2024-03-22

work crossword puzzle
Across
  1. Novel ideas and creativity.
  2. Administration and control of technological resources.
  3. Organization and oversight of tasks to achieve objectives.
  4. Advanced academic qualification.
  5. Examination and interpretation of information.
  6. Protection of digital systems and data.
  7. Long-term planning for achieving goals.
Down
  1. Investigation into government or organizational policies.
  2. Acronym for a specific department or field.
  3. Digital Academy Educational institution focusing on technology.
  4. Rules and guidelines governing behavior or activities.
  5. Possibly an acronym for a certain system or process.
  6. Techniques and processes for conducting studies.
  7. Sustainable use of ocean resources for economic growth.
  8. Government framework for science, technology, and innovation.
  9. Conference or meeting on a national scale.
  10. Legal rights over creations of the mind.
  11. Mandates Responsibilities of a certain organization.
  12. 2024 Event showcasing science, technology, and innovation in a specific year.

19 Clues: Novel ideas and creativity.Advanced academic qualification.Protection of digital systems and data.Long-term planning for achieving goals.Legal rights over creations of the mind.Conference or meeting on a national scale.Acronym for a specific department or field.Examination and interpretation of information....

Classwork Crossword Puzzle 2021-09-20

Classwork Crossword Puzzle crossword puzzle
Across
  1. average per year
  2. median of cybersecurity engineer
  3. the second-longest river
Down
  1. circumference of mars
  2. critically endangered species

5 Clues: average per yearcircumference of marsthe second-longest rivercritically endangered speciesmedian of cybersecurity engineer

Challenges Related to Community Safety in the Philippines 2024-02-29

Challenges Related to Community Safety in the Philippines crossword puzzle
Across
  1. Safety, The Philippines has one of the highest rates of road accidents and fatalities in Southeast Asia. This due to factors such as poor road infrastructure, reckless driving, and inadequate enforcement of traffic laws.
  2. Disasters, The Philippines is prone to __________ such as typhoons, earthquakes, and volcanic eruptions and it can result to significant loss of life, property damage, and also hinder economic development.
  3. and Violence, This is a major challenge in the Philippines includes robbery, as well as more serious crimes such as drug trafficking, terrorism, and political violence.
  4. is responsible for fire prevention, suppression, and investigation.
  5. is the primary law enforcement agency in the country.
  6. Awareness, This includes educating the public on disaster preparedness, crime prevention, road safety and cybersecurity as well as encouraging community participation in maintaining peace and order.
Down
  1. the state of being safe; freedom from the occurrence or risk of injury, danger, or loss. e or
  2. is responsible for disaster preparedness, response, and recovery.
  3. With the increasing use of digital technologies in the Philippines has experienced a rise in cybercrime, including online scams, identity theft, and hacking.
  4. implements crime prevention programs and campaigns, such as the Barangay Peacekeeping Action Team (BPAT).

10 Clues: is the primary law enforcement agency in the country.is responsible for disaster preparedness, response, and recovery.is responsible for fire prevention, suppression, and investigation.the state of being safe; freedom from the occurrence or risk of injury, danger, or loss. e or...

FOP 2023-04-01

FOP crossword puzzle
Across
  1. SOCA’s ________ department is the first point of contact with outside organizations.
  2. DISM’s SIG.
  3. Gryphons plan & organize ______-___-___ competitions.
  4. SPAI attended and presented at the ____ Conference.
  5. SEED hosts the ___-___-Series.
  6. SOCA is In charge of ________ relations.
  7. ______ organized the SOC Open House.
Down
  1. Gryphons aims to promote ________ to students that are passionate about it.
  2. SPAI created its own Project _____.
  3. SPAI is part of the AI Singapore Student ____ Group.
  4. SEED stands for Sharing, _______, Enriching, Development.
  5. SOCC is in charge of events like ____ tournaments, Community Service Events and Sports Events.
  6. SOCC is in charge of maintaining and building ________ relations.
  7. League Programming competition only for freshmen.
  8. SOCC organized Freshman Orientation ______.

15 Clues: DISM’s SIG.SEED hosts the ___-___-Series.SPAI created its own Project _____.______ organized the SOC Open House.SOCA is In charge of ________ relations.SOCC organized Freshman Orientation ______.League Programming competition only for freshmen.SPAI attended and presented at the ____ Conference.SPAI is part of the AI Singapore Student ____ Group....

Career Options 2022-11-11

Career Options crossword puzzle
Across
  1. A person trained to give guidance on personal, social, or psychological problems.
  2. Joins two pieces of metal together.
  3. Types include voice, screen, stage or character.
  4. People in these jobs work to protect our communities.
  5. Protects computer systems, networks and data.
  6. Transports goods all over the country.
  7. Repairs and maintains machinery, motors, etc.
Down
  1. A scientist who studies fossils.
  2. Health of the human body.
  3. Jobs in this field include coaches, announcers and recruiters.
  4. Performs beauty treatment regimens on hair, skin and nails.
  5. Invent, design and maintain machines, structures and data systems.
  6. Defends the U.S.and its allies.
  7. Set up situations in which students can learn effectively.

14 Clues: Health of the human body.Defends the U.S.and its allies.A scientist who studies fossils.Joins two pieces of metal together.Transports goods all over the country.Protects computer systems, networks and data.Repairs and maintains machinery, motors, etc.Types include voice, screen, stage or character....

Computer Science Crossword 2024-03-21

Computer Science Crossword crossword puzzle
Across
  1. The main page of a website.
  2. A security system that controls incoming and outgoing network traffic.
  3. A small file saved by websites to remember user information.
  4. Wireless internet connection.
  5. A step-by-step procedure for calculations.
  6. A program used to navigate the internet.
  7. A list of commands executed by a program or scripting engine.
Down
  1. A scam to steal personal information via email.
  2. Information processed or stored by a computer.
  3. Finding and fixing errors in code.
  4. Protection for computer systems and networks.
  5. A way of representing data using only two digits, 0 and 1.
  6. The ability to read and write.
  7. The address of a web page.

14 Clues: The address of a web page.The main page of a website.Wireless internet connection.The ability to read and write.Finding and fixing errors in code.A program used to navigate the internet.A step-by-step procedure for calculations.Protection for computer systems and networks.Information processed or stored by a computer....

Blue Print 2024-09-11

Blue Print crossword puzzle
Across
  1. Person who flies airplanes for a job
  2. Person who promotes products or brands online
  3. Animal expert who might work at a wildlife park
  4. Person who creates new computer and console games
  5. Cook who prepares food for big events
  6. Therapist who teaches exercises to heal injuries
  7. Creator of dance routines for shows or videos
  8. Writer who reports on the latest clothing trends
Down
  1. Computer expert who protects against online threats
  2. Someone who runs for office to make laws
  3. Designer of bridges, roads, and buildings
  4. Problem-solver who works to protect nature
  5. Person in charge of making movies
  6. Sound expert who helps make songs in a studio

14 Clues: Person in charge of making moviesPerson who flies airplanes for a jobCook who prepares food for big eventsSomeone who runs for office to make lawsDesigner of bridges, roads, and buildingsProblem-solver who works to protect natureSound expert who helps make songs in a studioPerson who promotes products or brands online...

Oklahoma Computer Science 2025-05-13

Oklahoma Computer Science crossword puzzle
Across
  1. A tool to organize, calculate, and analyze data
  2. A unique number for each device on a network
  3. Programs and apps that run on a computer
  4. A list of steps to solve a problem
  5. A group of connected computers that share information
  6. Information that can be collected and used
  7. Finding and fixing errors in code
Down
  1. Protecting devices and data from digital threats
  2. A device that sends data between computers and networks
  3. Code that repeats instructions
  4. A value in a program that can change
  5. Technology doing tasks without human help
  6. Showing only specific data based on rules
  7. The physical parts of a computer

14 Clues: Code that repeats instructionsThe physical parts of a computerFinding and fixing errors in codeA list of steps to solve a problemA value in a program that can changePrograms and apps that run on a computerTechnology doing tasks without human helpShowing only specific data based on rulesInformation that can be collected and used...

btyetrails4 2025-02-25

btyetrails4 crossword puzzle
Across
  1. Protecting data from unauthorized access
  2. A system software managing computer hardware
  3. The process of transferring data from one device to another
  4. Permanently removing files from a storage device
Down
  1. A type of scam email designed to steal user data
  2. Storing data over the internet instead of local systems
  3. A web address used to access websites
  4. A software that helps navigate web pages
  5. Company that provides internet access

9 Clues: A web address used to access websitesCompany that provides internet accessProtecting data from unauthorized accessA software that helps navigate web pagesA system software managing computer hardwareA type of scam email designed to steal user dataPermanently removing files from a storage deviceStoring data over the internet instead of local systems...

AI Cyberspace 2024-10-15

AI Cyberspace crossword puzzle
Across
  1. Political factors influencing behavior in cybersecurity
  2. Measures to protect against cyber threats.
  3. AI enabling systems to learn from data.
  4. Total points vulnerable to cyber attacks.
Down
  1. Actions in cyberspace for security or attack.
  2. Actions to exploit vulnerabilities in systems.
  3. Intelligence Machines simulating human intelligence processes.

7 Clues: AI enabling systems to learn from data.Total points vulnerable to cyber attacks.Measures to protect against cyber threats.Actions in cyberspace for security or attack.Actions to exploit vulnerabilities in systems.Political factors influencing behavior in cybersecurityIntelligence Machines simulating human intelligence processes.

Buzzwords and Trends of Disruptive Technology 2025-07-23

Buzzwords and Trends of Disruptive Technology crossword puzzle
Across
  1. A shared virtual world
  2. A Cyber Security Approach
  3. The ability of computer systems to replicate human intelligence
Down
  1. A cybersecurity strengthener
  2. A process used to analyse business data
  3. A Public Cloud Computing Service

6 Clues: A shared virtual worldA Cyber Security ApproachA cybersecurity strengthenerA Public Cloud Computing ServiceA process used to analyse business dataThe ability of computer systems to replicate human intelligence

Buzzwords and Trends of Disruptive Technology 2025-07-23

Buzzwords and Trends of Disruptive Technology crossword puzzle
Across
  1. A shared virtual world
  2. A Cyber Security Approach
  3. The ability of computer systems to replicate human intelligence
Down
  1. A cybersecurity strengthener
  2. A process used to analyse business data
  3. A Public Cloud Computing Service

6 Clues: A shared virtual worldA Cyber Security ApproachA cybersecurity strengthenerA Public Cloud Computing ServiceA process used to analyse business dataThe ability of computer systems to replicate human intelligence

Ransomware 2021-09-23

Ransomware crossword puzzle
Across
  1. Convert information into a code
  2. Protects against threat online
  3. Software created for malicious purposes
  4. New Ransomware Variant
Down
  1. A technique used by hackers to obtain sensitive information
  2. Protecting networks, devices and data from unauthorized access

6 Clues: New Ransomware VariantProtects against threat onlineConvert information into a codeSoftware created for malicious purposesA technique used by hackers to obtain sensitive informationProtecting networks, devices and data from unauthorized access

Fundamentals of Computing: McKown 2022-10-26

Fundamentals of Computing: McKown crossword puzzle
Across
  1. Series of code that completes a specific task
  2. First Digital Computer
  3. Being mean directly or indirectly to an individual or group online
  4. Father of the computer
  5. .mp3 file type
  6. Manages the computer's memory and processes, as well as all of its software and hardware (Windows, Linux, MacOS, iOS, Android)
  7. RAM Memory - Short Term
  8. Device used to display data to the user from the computer
  9. Single unit of the binary language
  10. First computer programmers
  11. 8 bits
Down
  1. Where all of the of compentants of a computer connect to or live
  2. Device used to give the computer data from the user
  3. The brain of the computer
  4. Industry that works to secure computers and computer networks as a whole
  5. Series of commands
  6. CodeHS Programming Dog
  7. Computer language

18 Clues: 8 bits.mp3 file typeComputer languageSeries of commandsFirst Digital ComputerFather of the computerCodeHS Programming DogRAM Memory - Short TermThe brain of the computerFirst computer programmersSingle unit of the binary languageSeries of code that completes a specific taskDevice used to give the computer data from the user...

Tecnologia de la Informacion 2023-05-06

Tecnologia de la Informacion crossword puzzle
Across
  1. Implica en los trabajos en tecnología de la información
  2. La TI admite muchas funciones comerciales y ayuda a?
  3. Una de las carreras que abarca la TI
  4. Es un tipo de tecnología de información
  5. Sigla de la tecnología de información
  6. Las empresas globales utilizan la tecnología de información para?
Down
  1. ¿Qué es la tecnología de la información?
  2. ¿La tecnología de información es responsable de?
  3. ¿Porqué es necesaria la tecnología de la información?

9 Clues: Una de las carreras que abarca la TISigla de la tecnología de informaciónEs un tipo de tecnología de información¿Qué es la tecnología de la información?¿La tecnología de información es responsable de?La TI admite muchas funciones comerciales y ayuda a?¿Porqué es necesaria la tecnología de la información?...

business 2025-05-22

business crossword puzzle
Across
  1. Business model: selling directly to consumers (Business).
  2. Leaving a company, often measured in percentages (HR).
  3. A revolutionary idea that changes the market (Business).
  4. Strategy that compares performance with top competitors (Business).
Down
  1. Security that protects systems and data (Tech).
  2. Design that improves how people interact with a product (Tech).
  3. Bringing new workers into a company smoothly (HR).
  4. Total money earned (Finance).
  5. Group of people you market your product to (Marketing).

9 Clues: Total money earned (Finance).Security that protects systems and data (Tech).Bringing new workers into a company smoothly (HR).Leaving a company, often measured in percentages (HR).Group of people you market your product to (Marketing).A revolutionary idea that changes the market (Business).Business model: selling directly to consumers (Business)....

Cyber security 2025-08-22

Cyber security crossword puzzle
Across
  1. organized collection of data, stored and accessed by computers
  2. unauthorized access or exposure of sensitive information
  3. a collection of interconnected computing devices that can communicate and share resources with each other
  4. a weakness in a system
  5. publishing private personal information about an individual online without their consent
Down
  1. IT professional who ensures an organization's computer networks are secure
  2. raw facts, figures, and observations
  3. protecting digital systems
  4. Personal identification information

9 Clues: a weakness in a systemprotecting digital systemsPersonal identification informationraw facts, figures, and observationsunauthorized access or exposure of sensitive informationorganized collection of data, stored and accessed by computersIT professional who ensures an organization's computer networks are secure...

Cyber Security Puzzle 2024-10-21

Cyber Security Puzzle crossword puzzle
Across
  1. term used for various pop-up advertisements that show up on your computer or mobile device.
  2. a malware designed to deny a user or organization access to files on their computer
  3. what type of data may adversely affect individuals, the business of the Company, or relevant third parties (e.g., customers
Down
  1. specialized term used in the fields of cybersecurity and information governance to describe the process of identifying, categorizing, and protecting content according to its sensitivity or impact level
  2. the most sensitive and subject to the strictest security controls and Data Handling Standards .e.g PCI-DSS information,
  3. refers to any software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
  4. what type of data is published by authorized Company Personnel in a format that can be read and shared with individuals within and outside the Company
  5. A worm in cybersecurity is a type of malicious software that spreads across computer networks
  6. A virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user

9 Clues: a malware designed to deny a user or organization access to files on their computerterm used for various pop-up advertisements that show up on your computer or mobile device.A worm in cybersecurity is a type of malicious software that spreads across computer networks...

CYBERSECURITY PUZZLE 2023-09-13

CYBERSECURITY PUZZLE crossword puzzle
Across
  1. Shady..do not click!
  2. Do not visit
  3. Don't ever share this to strangers!
  4. Dishonest offer online
Down
  1. Publishing someone's private information on the internet
  2. Always change this throughout accounts!
  3. Be careful when doing this on social media!

7 Clues: Do not visitShady..do not click!Dishonest offer onlineDon't ever share this to strangers!Always change this throughout accounts!Be careful when doing this on social media!Publishing someone's private information on the internet

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity crossword 2023-03-17

Cybersecurity crossword crossword puzzle
Across
  1. Which tool can reveal hidden relationships and identify attack paths within an AD environment ?
  2. Which computer network security protocol used by Windows is designed to authenticate service requests between two or more trusted hosts across an untrusted network, like the internet ?
  3. Find a synonym of preempt
Down
  1. What is the naming convention for ecrime category ?
  2. What is 84 minutes the average time for ?
  3. What defense technology aims to lure attackers by distributing a collection of traps and decoys across a system's infrastructure to imitate genuine assets ?
  4. Which type of accounts are mainly targeted by adversaries ?

7 Clues: Find a synonym of preemptWhat is 84 minutes the average time for ?What is the naming convention for ecrime category ?Which type of accounts are mainly targeted by adversaries ?Which tool can reveal hidden relationships and identify attack paths within an AD environment ?...

Cybersecurity Crossword 2022-05-19

Cybersecurity Crossword crossword puzzle
Across
  1. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  2. establishes a secure connection between you and the internet
  3. the practice of protecting critical systems and sensitive information from digital attacks.
Down
  1. a set of instructions, data or programs used to operate computers and execute specific tasks
  2. a standalone malware computer program that replicates itself in order to spread to other computers
  3. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
  4. a computer program that can copy itself and infect a computer without permission or knowledge of the user

7 Clues: establishes a secure connection between you and the internetthe practice of protecting critical systems and sensitive information from digital attacks.a set of instructions, data or programs used to operate computers and execute specific tasksa standalone malware computer program that replicates itself in order to spread to other computers...

Cybersecurity Crossword 2023-11-10

Cybersecurity Crossword crossword puzzle
Across
  1. What type of hacker exploits systems for personal gain and bad intention
  2. What is used to hide messages so only authorized people can understand?
  3. What type of hacker exploits systems to find vulnerabilities and makes recommendation for fix
Down
  1. Using deceptive measures to manipulate someone in disclosing personal information
  2. Data, information , device anything that is of value
  3. Acquiring unauthorized access to system or data
  4. An incident where attackers steal information without authorization?

7 Clues: Acquiring unauthorized access to system or dataData, information , device anything that is of valueAn incident where attackers steal information without authorization?What is used to hide messages so only authorized people can understand?What type of hacker exploits systems for personal gain and bad intention...

The Voice: October 7th, 2024 2024-10-07

The Voice: October 7th, 2024 crossword puzzle
Across
  1. Going to represent Canada internationally Finalist for 2024 Constantinus International Award.
  2. What _____ look like in Canada today.
  3. Limited spots left for this event!
  4. October is what awareness month?
Down
  1. One of the highlighted members this week.
  2. Since 2012, the Chamber has advocated for improved what?
  3. EcoBrooks _____ Award.

7 Clues: EcoBrooks _____ Award.October is what awareness month?Limited spots left for this event!What _____ look like in Canada today.One of the highlighted members this week.Since 2012, the Chamber has advocated for improved what?Going to represent Canada internationally Finalist for 2024 Constantinus International Award.

Phishing Crossword 2023-10-14

Phishing Crossword crossword puzzle
Across
  1. an email that tricks people
  2. commonly hunted by fisherman
  3. a way scams try to reach you
  4. a sense that a scammer creates when rushing you
Down
  1. a fake email address
  2. The process of verifying a claimed identity of a user or device
  3. protects against online threats

7 Clues: a fake email addressan email that tricks peoplecommonly hunted by fishermana way scams try to reach youprotects against online threatsa sense that a scammer creates when rushing youThe process of verifying a claimed identity of a user or device

Privacy & Security 2023-12-20

Privacy & Security crossword puzzle
Across
  1. coding protecting information from hackers
  2. the right to be let alone
  3. a malware designed to deny a user or organization access to files on their computer
  4. the art of protecting networks, devices, and data from unauthorized access
Down
  1. (2 words) information about an individual
  2. common examples are viruses and trojans
  3. the process of identifying a user's identity
  4. international organization for standardization
  5. compromise of security
  6. a set of policies and procedures for systematically managing an organization's sensitive data

10 Clues: compromise of securitythe right to be let alonecommon examples are viruses and trojans(2 words) information about an individualcoding protecting information from hackersthe process of identifying a user's identityinternational organization for standardizationthe art of protecting networks, devices, and data from unauthorized access...

Did you read it? 2020-10-16

Did you read it? crossword puzzle
Across
  1. Chad's Favorite sports team?
  2. _____Satisfaction should also be measured and monitored to insure all needs and expectations are met.
  3. Should be tested monthly
  4. Do your Part.#BeCyberSmart
  5. Entries due NLT 10/23
  6. To be the premier Tribal Enterprise in the eyes of our customers, tribal shareholders, communities, and employees
Down
  1. Entries due NLT 11/2
  2. By David C. Graham
  3. Home of the 14th Flying Training Wing of Air Education and Training Command
  4. Licensed amateur radio operator

10 Clues: By David C. GrahamEntries due NLT 11/2Entries due NLT 10/23Should be tested monthlyDo your Part.#BeCyberSmartChad's Favorite sports team?Licensed amateur radio operatorHome of the 14th Flying Training Wing of Air Education and Training Command_____Satisfaction should also be measured and monitored to insure all needs and expectations are met....

Digital Health 2025-02-26

Digital Health crossword puzzle
Across
  1. Large datasets analyzed to reveal patterns and trends.
  2. On-demand computing services over the internet.
  3. A secure, decentralized technology used for data integrity.
  4. Technology simulating human intelligence processes.
  5. Remote diagnosis and treatment of patients using technology.
  6. Ability of different systems to exchange and use information.
Down
  1. Protection of digital systems from attacks and threats.
  2. Use of digital technologies to improve healthcare delivery.
  3. Digital version of a patient's paper chart.
  4. AI technique that allows systems to learn from data.

10 Clues: Digital version of a patient's paper chart.On-demand computing services over the internet.Technology simulating human intelligence processes.AI technique that allows systems to learn from data.Large datasets analyzed to reveal patterns and trends.Protection of digital systems from attacks and threats....

IT 2024-11-28

IT crossword puzzle
Across
  1. Field focused on protecting data from cyberattacks.
  2. What does IoT stand for?
  3. Common programming language used for AI.
  4. Process of identifying and fixing software issues.
Down
  1. A key method for securing data online.
  2. Smart system connecting everyday devices.
  3. Main component of a computer system's physical setup.

7 Clues: What does IoT stand for?A key method for securing data online.Common programming language used for AI.Smart system connecting everyday devices.Process of identifying and fixing software issues.Field focused on protecting data from cyberattacks.Main component of a computer system's physical setup.

AI in education 2024-06-05

AI in education crossword puzzle
Across
  1. Protection of personal information.
  2. Lack of neutrality, prejudice.
  3. Guidelines or principles governing proper conduct.
  4. Actions taken to use something wrongly or inappropriately.
  5. The quality of being honest and having strong moral principles.
  6. The state of being clear and open.
Down
  1. The protection of data from unauthorized access or corruption.
  2. The state of being answerable or responsible.
  3. Practices designed to ensure secure data and systems.
  4. The practice of keeping information secret to prevent unauthorized access.

10 Clues: Lack of neutrality, prejudice.The state of being clear and open.Protection of personal information.The state of being answerable or responsible.Guidelines or principles governing proper conduct.Practices designed to ensure secure data and systems.Actions taken to use something wrongly or inappropriately....

Comms & Media Crossword - October Edition 2022-10-04

Comms & Media Crossword - October Edition crossword puzzle
Across
  1. This company was recently in news for launching 5G Lab-as-a-service ​
  2. Leading telecom equipment provider, & our client
  3. Virtual representation of a real-world physical system​
  4. One of the most important digital challenges today​
  5. Continuous Expenditure that companies incur
Down
  1. Satoshi Nakamoto was the pioneer behind this technology​
  2. Software based technology used in Telecom
  3. This company launched India’s 1st multiplex in Metaverse
  4. Telecom players fight for this
  5. boAt had a K-pop concert on this platform​

10 Clues: Telecom players fight for thisSoftware based technology used in TelecomboAt had a K-pop concert on this platform​Continuous Expenditure that companies incurLeading telecom equipment provider, & our clientOne of the most important digital challenges today​Virtual representation of a real-world physical system​...

MEKATRONIK T3 2024-05-24

MEKATRONIK T3 crossword puzzle
Across
  1. merupakan satu teras utama revolusi industri 4.0
  2. satu sistem susunan dan sambungan fizikal komponen dalam satu litar
  3. merupakan contoh bagi sistem kawalan
  4. LITAR merupakan salah satu aspek penning dalam product mekatronik
  5. merupakan salah satu ujian kefungsian
  6. ..........manufacturing Hialeah pembuatan bah mental
Down
  1. berfungsi membekalkan arus bagi membolehkan peranti berfungsi
  2. ialah sistem yang memindahkan suatu sumber gerakan kupada Bentuk yang lain
  3. ialah proses untuk membangunkan atur cara komputer denga bahasa penagturcaraan
  4. jurutera jepun yang memperkenalkan konsep mekatronik

10 Clues: merupakan contoh bagi sistem kawalanmerupakan salah satu ujian kefungsianmerupakan satu teras utama revolusi industri 4.0..........manufacturing Hialeah pembuatan bah mentaljurutera jepun yang memperkenalkan konsep mekatronikberfungsi membekalkan arus bagi membolehkan peranti berfungsi...

Globalization and Technology 2025-02-06

Globalization and Technology crossword puzzle
Across
  1. Transaction on the internet like Amazon Pay, Paypal etc
  2. A global network the world uses for communications and other features
  3. A period of hundred years
  4. A system that gives music and transmits audio
  5. The act of buying and selling goods
  6. An Act of introducing new ideas or products
Down
  1. Process of exchanging Information through any medium
  2. A simulated experience using computer technology used by headset
  3. Moving things from one place to another
  4. Measures taken to protect a computer

10 Clues: A period of hundred yearsThe act of buying and selling goodsMeasures taken to protect a computerMoving things from one place to anotherAn Act of introducing new ideas or productsA system that gives music and transmits audioProcess of exchanging Information through any mediumTransaction on the internet like Amazon Pay, Paypal etc...

03 Almer Billie prabawa 2025-10-17

03 Almer Billie prabawa crossword puzzle
Across
  1. Memuat ulang halaman web agar tampil terbaru.
  2. Program untuk mengatur dan mempercepat unduhan file.
  3. Proses mengubah data agar tidak bisa dibaca orang lain.
  4. Lembar atau jendela kecil dalam browser untuk membuka situs lain.
  5. menampilkan gambar atau halaman web di layar.
  6. Perlindungan sistem komputer dari serangan digital.
Down
  1. Tempat menulis alamat situs web (URL) di browser.
  2. Tab baru untuk membuka halaman web lain.
  3. Memperbarui tampilan halaman yang sedang dibuka.
  4. Upaya penipuan untuk mencuri data pribadi lewat internet.

10 Clues: Tab baru untuk membuka halaman web lain.Memuat ulang halaman web agar tampil terbaru.menampilkan gambar atau halaman web di layar.Memperbarui tampilan halaman yang sedang dibuka.Tempat menulis alamat situs web (URL) di browser.Perlindungan sistem komputer dari serangan digital.Program untuk mengatur dan mempercepat unduhan file....

4.1 Computer Vulnerability - Crossword Puzzle 2024-05-02

4.1 Computer Vulnerability - Crossword Puzzle crossword puzzle
Across
  1. The protection of information and systems from cyberattacks
  2. A threat originating from within an organization
  3. The overall protection of computer systems and data
  4. A weakness in a computer system that can be exploited
  5. The transfer of information between devices
Down
  1. The act of stealing or manipulating data
  2. Unintentional harm caused to data or systems
  3. A threat originating from the internet
  4. The practice of illegally gaining access to a computer system

9 Clues: A threat originating from the internetThe act of stealing or manipulating dataThe transfer of information between devicesUnintentional harm caused to data or systemsA threat originating from within an organizationThe overall protection of computer systems and dataA weakness in a computer system that can be exploited...

EQUATE - Cybersecurity 2023-05-30

EQUATE - Cybersecurity crossword puzzle
Across
  1. file included with an email that may carry risks
  2. Unwanted bulk emails
  3. Something to look for when verifying an email
Down
  1. Website or email address identifier
  2. Malicious assault on computer systems or networks.
  3. Microsoft-developed email client for managing email accounts
  4. Deceptive emails aiming to extract personal data

7 Clues: Unwanted bulk emailsWebsite or email address identifierSomething to look for when verifying an emailDeceptive emails aiming to extract personal datafile included with an email that may carry risksMalicious assault on computer systems or networks.Microsoft-developed email client for managing email accounts

EQUATE - Cybersecurity 2023-05-30

EQUATE - Cybersecurity crossword puzzle
Across
  1. file included with an email that may carry risks
  2. Unwanted bulk emails
  3. Something to look for when verifying an email
Down
  1. Website or email address identifier
  2. Malicious assault on computer systems or networks.
  3. Microsoft-developed email client for managing email accounts
  4. Deceptive emails aiming to extract personal data

7 Clues: Unwanted bulk emailsWebsite or email address identifierSomething to look for when verifying an emailDeceptive emails aiming to extract personal datafile included with an email that may carry risksMalicious assault on computer systems or networks.Microsoft-developed email client for managing email accounts

Cybersecurity Month 2023-09-27

Cybersecurity Month crossword puzzle
Across
  1. A scam where a hacker poses as a legitimate business or organization (especially credit card companies, banks, charities, Internet providers, other utilities) in order to fool the victim into giving them sensitive personal information or inducing them to click a link or attachment that ends up delivering malware
  2. The process of identifying a user’s identity, making sure that they can have access to the system and/or files. This can be accomplished either by a password, retina scan, or fingerprint scan, sometimes even a combination of the above
  3. Coding used to protect your information from hackers. Think of it like the code cipher used to send a top-secret coded spy message
Down
  1. A combination of the words “malicious” and “software”, describing a wide variety of bad software used to infect and/or damage a system
  2. A form of malware used by hackers to spy on you and your computer activities
  3. Any technology, be it software or hardware, used to keep intruders out
  4. Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications

7 Clues: Any technology, be it software or hardware, used to keep intruders outA form of malware used by hackers to spy on you and your computer activitiesCoding used to protect your information from hackers. Think of it like the code cipher used to send a top-secret coded spy message...

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

pasar uang dan ekonomi digital 2024-02-28

pasar uang dan ekonomi digital crossword puzzle
Across
  1. sektor pendukung ekonomi digital
  2. contoh E-Commerce yang ada di Indonesia
  3. sumber pendanaan dalam pasar uang yang berupa utang dagang
  4. karakteristik pasar uang
  5. peluang bisnis ekonomi digital
Down
  1. pekerjaan masyarakat Indonesia dengan adanya media online
  2. masih menjadi ancaman bagi sebagian besar pengguna internet di Indonesia
  3. ekonomi digital sangat efisien
  4. salah satu memanfaatkan ekonomi digital adalah membuat
  5. karakteristik ekonomi digiral yang membuat orang tidak bertemu langsungh
  6. kegiatan pinjam meminjam dana antara satu bank dengan bank lainnya untuk jangka waktu yang pendek
  7. berperan sebagai perantara di antara pelaku dalam Pasar Uang
  8. salah satu fungsi pasar uang
  9. instrumen pasar uang yang diteritkan Bank Umum
  10. pelaku utama dalam pasar uang yang menjaga kestabilan moneter dan harga

15 Clues: karakteristik pasar uangsalah satu fungsi pasar uangekonomi digital sangat efisienpeluang bisnis ekonomi digitalsektor pendukung ekonomi digitalcontoh E-Commerce yang ada di Indonesiainstrumen pasar uang yang diteritkan Bank Umumsalah satu memanfaatkan ekonomi digital adalah membuatpekerjaan masyarakat Indonesia dengan adanya media online...

browsing safely 2025-05-29

browsing safely crossword puzzle
Across
  1. bullying act of harming or harassing using technology
  2. program used to identify and remove viruses
  3. use of illegal methods to get money
  4. criminal activity used to harm anyone using the internet
  5. a set of programs that disrupts the functioning of a compute
  6. hoaxing or misleading
  7. process of 'befriending children' on social media
Down
  1. to conduct terrorism using a computer
  2. sending an email to an user and misleading them to believe its from a trusted account
  3. unethical hackers
  4. helps prevent unauthorised access to your computer
  5. victim is attacked and then forced to pay money
  6. misusing someone's personal information
  7. to protect networks or your devices
  8. illegal entry into computer system

15 Clues: unethical hackershoaxing or misleadingillegal entry into computer systemuse of illegal methods to get moneyto protect networks or your devicesto conduct terrorism using a computermisusing someone's personal informationprogram used to identify and remove virusesvictim is attacked and then forced to pay money...

TEMA 2 2025-10-23

TEMA 2 crossword puzzle
Across
  1. Mata uang kripto pertama di dunia.
  2. Bentuk uang yang hanya bisa digunakan secara elektronik.
  3. Sistem keamanan siber untuk perlindungan data.
  4. Teknologi dasar dari mata uang kripto.
  5. Kegiatan ekonomi melalui media internet.
  6. Singkatan dari teknologi kecerdasan buatan dalam bahasa Inggris.
  7. Aplikasi belanja online yang berwarna oranye.
  8. Transaksi keuangan melalui jaringan komputer disebut ...
  9. Sistem pembayaran tanpa uang tunai.
  10. Bentuk pasar digital tempat jual beli online.
Down
  1. Mata uang digital yang populer dan terdesentralisasi.
  2. Perusahaan teknologi keuangan disebut ...
  3. Mata uang digital resmi dari bank sentral disebut ...
  4. kredit Alat pembayaran berbentuk kartu dari bank.
  5. shopping Proses jual beli yang terjadi secara online.
  6. Teknologi virtual yang berkembang bersama ekonomi digital.
  7. Metode pembayaran dengan memindai kode.
  8. Salah satu dompet digital terkenal di Indonesia.
  9. Salah satu e-wallet milik Gojek.
  10. banking Layanan bank yang sepenuhnya berbasis internet.

20 Clues: Salah satu e-wallet milik Gojek.Mata uang kripto pertama di dunia.Sistem pembayaran tanpa uang tunai.Teknologi dasar dari mata uang kripto.Metode pembayaran dengan memindai kode.Kegiatan ekonomi melalui media internet.Perusahaan teknologi keuangan disebut ...Aplikasi belanja online yang berwarna oranye.Bentuk pasar digital tempat jual beli online....

KeyW Crossword 2017-01-19

KeyW Crossword crossword puzzle
Across
  1. Radio Detection and Ranging
  2. KeyW non-profit organization abbreviated
  3. KeyW's colors
  4. What is the name of our newsletter
  5. How many bridges connect Key West to Florida main land
  6. The branch of science and technology concerned with design, building, and use of engines, machines, and structures
  7. What is the name of our mascot
  8. Parrot Ball location
  9. What color is our KeyW van
  10. What type of bird is our mascot
Down
  1. When at work, what must you always carry
  2. Protection of networks, computers, programs, and data from attack
  3. KeyW's best location
  4. Time sheet
  5. KeyW CEO
  6. What is the surname of KeyW's founder
  7. Which food truck offers the best cheese steaks
  8. Applying statistical analysis to data which has a geographical or spatial aspect
  9. What month was KeyW founded
  10. How many buildings does the Severn location have

20 Clues: KeyW CEOTime sheetKeyW's colorsKeyW's best locationParrot Ball locationWhat color is our KeyW vanRadio Detection and RangingWhat month was KeyW foundedWhat is the name of our mascotWhat type of bird is our mascotWhat is the name of our newsletterWhat is the surname of KeyW's founderWhen at work, what must you always carry...

Raqamli iqtisodiyotni rivojlantirishni xorij tajribasi va undan respublikamizda qo‘llash yo‘llari 2025-03-07

Raqamli iqtisodiyotni rivojlantirishni xorij tajribasi va undan respublikamizda qo‘llash yo‘llari crossword puzzle
Across
  1. Blokcheyn texnologiyasi asosida ishlovchi mashhur kriptovalyuta?
  2. O‘zbekistonda raqamli iqtisodiyotni rivojlantirish strategiyasining nomi?
  3. Raqamli iqtisodiyotning asosiy resursi bo‘lgan ma’lumotlar ombori?
  4. Elektron hujjat almashinuvi va identifikatsiya tizimi bo‘yicha Estoniya tajribasi?
  5. Kompaniyalarga xizmatlarni raqamlashtirishda yordam beradigan bulutli texnologiya?
  6. Dunyodagi eng yirik e-tijorat platformalaridan biri?
  7. Elektron savdoda keng qo‘llaniladigan O‘zbekiston to‘lov tizimlaridan biri?
  8. Raqamli iqtisodiyotda tezkor tranzaksiyalar uchun ishlatiladigan texnologiya?
  9. Estoniyada joriy etilgan ilg‘or raqamli davlat boshqaruvi tizimi?
Down
  1. Raqamli iqtisodiyotda axborot xavfsizligini ta’minlash uchun ishlatiladigan texnologiya?
  2. Elektron tijorat bo‘yicha yetakchi davlatlardan biri?
  3. Katta ma’lumotlar bilan ishlashga asoslangan sun’iy intellekt sohasi?
  4. Elektron hukumat tizimi bo‘yicha yetakchi davlat?
  5. Onlayn to‘lov tizimlaridan biri, keng tarqalgan platforma?
  6. Davlat xizmatlarini raqamlashtirish bo‘yicha O‘zbekistonning asosiy platformasi?
  7. Sun’iy intellekt sohasida yetakchi davlatlardan biri?
  8. Moliyaviy texnologiyalarni rivojlantirish uchun ishlatiladigan atama?
  9. Dunyodagi eng yirik texnologik kompaniyalardan biri?
  10. O‘zbekiston IT sohasini rivojlantirishga ixtisoslashgan hudud?
  11. Turli qurilmalarni internet orqali bog‘lashga imkon beruvchi texnologiya?

20 Clues: Elektron hukumat tizimi bo‘yicha yetakchi davlat?Dunyodagi eng yirik e-tijorat platformalaridan biri?Dunyodagi eng yirik texnologik kompaniyalardan biri?Elektron tijorat bo‘yicha yetakchi davlatlardan biri?Sun’iy intellekt sohasida yetakchi davlatlardan biri?Onlayn to‘lov tizimlaridan biri, keng tarqalgan platforma?...

cpsc4240 2024-10-31

cpsc4240 crossword puzzle
Across
  1. legal license that allows you to use and edit a product
  2. protecting systems and networks from digital attacks
  3. type of attack that can be caused by a nuke
  4. linuxdef
  5. number that determines process priority
  6. each one has a unique PID
  7. leaked the docs
  8. command to add user
  9. command to open this user is su
  10. command to control log settings
  11. partition that allows for temp storage
  12. link that points to another file
Down
  1. only letting users access what they need
  2. feature that logs metadata
  3. read write execute
  4. having many security layers
  5. system that has both ipv4 and ipv6
  6. file that discards all data written to it
  7. type of link that creates a direct copy
  8. file that stores password hashes
  9. sets file permission upon create
  10. process that creates child
  11. command to run a privileged command
  12. attaching a filesystem to another

24 Clues: linuxdefleaked the docsread write executecommand to add usereach one has a unique PIDfeature that logs metadatahaving many security layersprocess that creates childcommand to open this user is sucommand to control log settingsfile that stores password hashessets file permission upon createlink that points to another file...

Reyfanzha XH/30 2025-04-15

Reyfanzha XH/30 crossword puzzle
Across
  1. Unsur budaya dalam konten digital disebut juga?
  2. Lembaga yang mengurus HAKI di Indonesia?
  3. Sintaks untuk mencari dalam situs tertentu?
  4. Kata kunci untuk mencari sinonim?
  5. Format umum bideo digital adalah?
  6. Profesi yang membuat perangkat lunak?
  7. Operator pencarian untuk kata kunci dijudul?
  8. Profesi pembuat aplikasi?
  9. Haki melindungi karya apa?
  10. Apa tujuan utama produksi konten digital?
  11. Haki menjaga kah dari?
  12. Apa fungsi tanda kutip (“”) dalam pencarian Google?
Down
  1. Pencarian menggunakan simbol bintang disebut?
  2. Operator untuk menemukan jenis file tertentu?
  3. Sesuatu yang tidak benar dan mengada ngada disebut?
  4. Ahli jaringan disebut?
  5. Apa media umum untuk diseminasi konten digital?
  6. Hak cipta dalam bahasa Inggris?
  7. Profesi yang menjaga keamanan data?
  8. Alat bantu desain konten digital adalah?
  9. Haki berlaku secara?
  10. Platform untuk distribusi video terpopuler?
  11. Salah satu bentuk haki?
  12. Konten yang disebar melalui suara?
  13. Apa operator untuk mengecualikan kata dalam pencarian?

25 Clues: Haki berlaku secara?Ahli jaringan disebut?Haki menjaga kah dari?Salah satu bentuk haki?Profesi pembuat aplikasi?Haki melindungi karya apa?Hak cipta dalam bahasa Inggris?Kata kunci untuk mencari sinonim?Format umum bideo digital adalah?Konten yang disebar melalui suara?Profesi yang menjaga keamanan data?Profesi yang membuat perangkat lunak?...

TTS INFORMATIKA 2025-04-24

TTS INFORMATIKA crossword puzzle
Across
  1. media untuk menyebarkan konten budaya?
  2. contoh konten budaya?
  3. siapa yang mendesain tampilan apk?
  4. apa itu validasi konten?
  5. contoh search engine paling populer?
  6. apa tujuan produksi konten budaya?
  7. apa yang analisis data?
  8. siapa yang menggunakan search engine?
  9. profesi yang menjaga keamanan data?
Down
  1. – Orang yang menganalisis data dalam jumlah besar untuk mendapatkan informasi berguna.
  2. – Orang yang merancang dan membuat aplikasi atau perangkat lunak.
  3. apa itu keyword?
  4. siapa yang memberi haki di Indonesia?
  5. apa itu konten negatif
  6. kunci
  7. siapa yang bertugas memeriksa konten?
  8. – Profesi yang bertugas menjaga keamanan jaringan dan data.
  9. tujuan diseminasi konten budaya?
  10. contoh karya yang bisa didaftarkan haki?
  11. contoh konten negatif?20. apa tugas data analyst?
  12. saja siapa yang bisa membuat konten budaya?
  13. apa tugas programmer?
  14. – Orang yang merancang tampilan dan pengalaman pengguna pada aplikasi atau situs web
  15. – Orang yang mengatur dan memelihara sistem komputer dan jaringan dalam suatu organisasi.
  16. apa yang diketikkan di search engine?

25 Clues: kunciapa itu keyword?contoh konten budaya?apa tugas programmer?apa itu konten negatifapa yang analisis data?apa itu validasi konten?tujuan diseminasi konten budaya?siapa yang mendesain tampilan apk?apa tujuan produksi konten budaya?profesi yang menjaga keamanan data?contoh search engine paling populer?siapa yang memberi haki di Indonesia?...

Tema 02 perkembangan ekonomi digital 2025-10-27

Tema 02 perkembangan ekonomi digital crossword puzzle
Across
  1. → Risiko ekonomi digital adalah kebocoran
  2. → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
  3. → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
  4. → Pemasaran melalui media sosial disebut
  5. → Berjualan melalui marketplace online termasuk kegiatan
  6. → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan
  7. → Fintech merupakan singkatan dari
  8. → Perusahaan baru yang berbasis teknologi disebut
  9. → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
Down
  1. → Keamanan transaksi online dikenal dengan istilah
  2. → Masa depan ekonomi digital bergantung pada literasi
  3. → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
  4. → Kecerdasan buatan dikenal juga dengan istilah
  5. → Transaksi keuangan secara online disebut
  6. → Tokopedia, Shopee, dan Lazada adalah contoh platform
  7. → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
  8. → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
  9. → Ekonomi digital menciptakan pekerjaan baru berbasis
  10. → Data berukuran besar yang digunakan untuk analisis bisnis disebut
  11. → Contoh aplikasi fintech di Indonesia adalah

20 Clues: → Fintech merupakan singkatan dari→ Pemasaran melalui media sosial disebut→ Risiko ekonomi digital adalah kebocoran→ Transaksi keuangan secara online disebut→ Contoh aplikasi fintech di Indonesia adalah→ Kecerdasan buatan dikenal juga dengan istilah→ Perusahaan baru yang berbasis teknologi disebut→ Keamanan transaksi online dikenal dengan istilah...

rahef isna 2025-10-27

rahef isna crossword puzzle
Across
  1. → Masa depan ekonomi digital bergantung pada literasi
  2. → Perusahaan baru yang berbasis teknologi disebut
  3. → Program pemerintah untuk mendukung ekonomi digital UMKM disebut
  4. → Risiko ekonomi digital adalah kebocoran
  5. → Berjualan melalui marketplace online termasuk kegiatan
  6. → Contoh aplikasi fintech di Indonesia adalah
  7. → Ekonomi digital menciptakan pekerjaan baru berbasis
  8. → Masalah utama dalam ekonomi digital adalah keamanan data dan pengguna
  9. → Transaksi keuangan secara online disebut
  10. → Fintech merupakan singkatan dari
  11. → Pemasaran melalui media sosial disebut
  12. → Data berukuran besar yang digunakan untuk analisis bisnis disebut
Down
  1. → Kecerdasan buatan dikenal juga dengan istilah
  2. → Keamanan transaksi online dikenal dengan istilah
  3. → Manfaat utama ekonomi digital adalah mempercepat kegiatan jual beli
  4. → GoFood dan GrabFood merupakan contoh layanan pengantaran digital
  5. → Tokopedia, Shopee, dan Lazada adalah contoh platform
  6. → Transaksi tanpa uang tunai menggunakan kartu atau aplikasi disebut
  7. → Kegiatan ekonomi yang memanfaatkan teknologi digital dan internet
  8. → Pelaku usaha kecil dapat menjangkau pasar luas melalui jaringan

20 Clues: → Fintech merupakan singkatan dari→ Pemasaran melalui media sosial disebut→ Risiko ekonomi digital adalah kebocoran→ Transaksi keuangan secara online disebut→ Contoh aplikasi fintech di Indonesia adalah→ Kecerdasan buatan dikenal juga dengan istilah→ Perusahaan baru yang berbasis teknologi disebut→ Keamanan transaksi online dikenal dengan istilah...

Queenbee Cybersecurity 2025-03-17

Queenbee Cybersecurity crossword puzzle
Across
  1. An hacker sends a ___________ email requesting the victim for sensitive information
  2. A _________ access by a third party is called a cyber attack
  3. Trojan is an example of __________ attack
Down
  1. Users need to use unique __________ passwords to strengthen defence against attacks
  2. ________ are dummy computers systems to deceive attackers
  3. A virtual wall between the computer and the internet is called as _______
  4. A person who performs a cybersecurity attack is called a _______

7 Clues: Trojan is an example of __________ attack________ are dummy computers systems to deceive attackersA _________ access by a third party is called a cyber attackA person who performs a cybersecurity attack is called a _______A virtual wall between the computer and the internet is called as _______...

Cybersecurity Crossword 2021-11-14

Cybersecurity Crossword crossword puzzle
Across
  1. Proving your identity
  2. Encrypting files and holding them hostage for money
Down
  1. A horse with a surprise
  2. software designed to corrupt or steal information
  3. Pretending to be someone you are not to extract information out of someone
  4. A denial of service attack targets this
  5. a brute force attack takes a long time to work on this

7 Clues: Proving your identityA horse with a surpriseA denial of service attack targets thissoftware designed to corrupt or steal informationEncrypting files and holding them hostage for moneya brute force attack takes a long time to work on thisPretending to be someone you are not to extract information out of someone

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity Crosswords 2023-11-14

Cybersecurity Crosswords crossword puzzle
Across
  1. Do not open emails or email attachments if you do not know the__.
  2. If you receive offensive material or threatening emails, report to the------team.
  3. Never send a ______ of yourself to strangers on the Internet.
  4. A program that replicates itself to other devices.
Down
  1. When someone send an email with a link to a bogus website it is called.
  2. Software used to protect form virus.
  3. Never give out your name, address, telephone number, password, customer data, Project details, pictures of yourself, credit card numbers, or any other personal ______ to others online.

7 Clues: Software used to protect form virus.A program that replicates itself to other devices.Never send a ______ of yourself to strangers on the Internet.Do not open emails or email attachments if you do not know the__.When someone send an email with a link to a bogus website it is called....

Cybersecurity Crossword 2023-07-25

Cybersecurity Crossword crossword puzzle
Across
  1. Unauthorized individuals gaining physical access through closely following authorized personnel
  2. A form of business risk resulting from cyberattacks or data breache
Down
  1. Suspicious emails
  2. Another word for tailgating
  3. Unexpected behavior exhibited by software applications, such as crashes could be caused by
  4. Unusual or unrecognizable cables or devices connected to computers, network equipment, or power outlets
  5. could be physical or virtual including ransomware, phishing, malware, third-party risks, internal risks, vandalism, theft and more.

7 Clues: Suspicious emailsAnother word for tailgatingA form of business risk resulting from cyberattacks or data breacheUnexpected behavior exhibited by software applications, such as crashes could be caused byUnauthorized individuals gaining physical access through closely following authorized personnel...

CyberSecurity Awareness 2025-07-23

CyberSecurity Awareness crossword puzzle
Across
  1. being hidden from public view
  2. Multi-____ Authentication
  3. conversion of information to code
  4. "Enter your username and ______."
Down
  1. fake correspondence sent by a 'Nigerian Prince'
  2. Security Assurance for the Federal Reserve
  3. security protocols; organized into 'families'

7 Clues: Multi-____ Authenticationbeing hidden from public viewconversion of information to code"Enter your username and ______."Security Assurance for the Federal Reservesecurity protocols; organized into 'families'fake correspondence sent by a 'Nigerian Prince'